The document lists 75 titles of embedded systems projects from various IEEE publications between 2009-2013. The projects cover a wide range of topics including computer vision, biometrics, robotics, intelligent transportation systems, and wireless sensor networks. Application areas include mobile and wearable devices, smart homes, industrial automation, healthcare, and automotive.
Human Data Acquisition through Biometrics using LabVIEW Yayah Zakaria
Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented
in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.
Applying Brain Computer Interface Technology for Playing GamesDr. Amarjeet Singh
Brain Computer Interfaces are specialized systems that allows users to control computer applications using their brain waves. Initially, BCI were mostly used in medical field. But after some research and thanks to consumer-grade electroencephalography (EEG) devices, many applications and research opportunities were opened outside of the medical field. One particular area that is gaining more evidence due to the arrival consumer-grade devices is that of computer games, as it allows more user-friendly applications of BCI technology for the general public. In this report, we are going to talk about one of those games, Maze game. It will be a 2D maze, path known to the user. Using the EEG device named Neurosky Brain Wave Kit user will be able to move the avatar in order to reach the goal from the starting position.
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
A guidance system is needed when freshmen explore their new building environment. With the advancements of mobile technologies, a guidance system using mobile computing devices such as mobile phones or tablets could aid freshmen in locating the desired destination with ease. The proposed system consists of three main subsystems: the marker-based cyberphysical interaction (CPI) system, the indoor positioning (IP) system, and the augmented-reality (AR) system. With the help of visible markers and invisible markers, the CPI system allows the users to do interactions between the physical and cyber environments; the IP system produces accurate user position information; the AR system provides the users with good user experiences. An Android application, named Engfi Gate, is developed to realize the system design in the test environment. This paper also shows the comparisons of the proposed system with other related systems. Furthermore, the design architecture of Engfi Gate system can be used in other locationbased applications.
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Human Data Acquisition through Biometrics using LabVIEW Yayah Zakaria
Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented
in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.
Applying Brain Computer Interface Technology for Playing GamesDr. Amarjeet Singh
Brain Computer Interfaces are specialized systems that allows users to control computer applications using their brain waves. Initially, BCI were mostly used in medical field. But after some research and thanks to consumer-grade electroencephalography (EEG) devices, many applications and research opportunities were opened outside of the medical field. One particular area that is gaining more evidence due to the arrival consumer-grade devices is that of computer games, as it allows more user-friendly applications of BCI technology for the general public. In this report, we are going to talk about one of those games, Maze game. It will be a 2D maze, path known to the user. Using the EEG device named Neurosky Brain Wave Kit user will be able to move the avatar in order to reach the goal from the starting position.
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
A guidance system is needed when freshmen explore their new building environment. With the advancements of mobile technologies, a guidance system using mobile computing devices such as mobile phones or tablets could aid freshmen in locating the desired destination with ease. The proposed system consists of three main subsystems: the marker-based cyberphysical interaction (CPI) system, the indoor positioning (IP) system, and the augmented-reality (AR) system. With the help of visible markers and invisible markers, the CPI system allows the users to do interactions between the physical and cyber environments; the IP system produces accurate user position information; the AR system provides the users with good user experiences. An Android application, named Engfi Gate, is developed to realize the system design in the test environment. This paper also shows the comparisons of the proposed system with other related systems. Furthermore, the design architecture of Engfi Gate system can be used in other locationbased applications.
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
The challenging problem faced by quadriplegics and paralyzed people is their need for independent mobility. They need
external help to perform their daily activities. The main objective of this project is to provide an automated system for
disabled people to control the motor rotation of wheelchair based on neck movement of physically challenged person. To
facilitate these people for their independent movement, tilt sensor is fitted on person neck. Based on the neck movements,
the accelerometer (tilt sensor) will drive the motor fitted to the wheelchair. The wheel chair can be driven in any of the
four directions and it can also be controlled by using android app (Blynk app). The automated wheelchair is based on
simple electronic control system and the mechanical arrangement that is controlled by a Controller. The ultrasonic
sensors help to avoid obstacles, using the environment information gathered during navigation. The temperature sensor
and heartbeat sensor constantly measure the parameters and display it on LCD.
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A new system to detect coronavirus social distance violation IJECEIAES
In this paper, a novel solution to avoid new infections is presented. Instead of tracing users’ locations, the presence of individuals is detected by analysing the voices, and people’s faces are detected by the camera. To do this, two different Android applications were implemented. The first one uses the camera to detect people’s faces whenever the user answers or performs a phone call. Firebase Platform will be used to detect faces captured by the camera and determine its size and estimate their distance to the phone terminal. The second application uses voice biometrics to differentiate the users’ voice from unknown speakers and creates a neural network model based on 5 samples of the user’s voice. This feature will only be activated whenever the user is surfing the Internet or using other applications to prevent undesired contacts. Currently, the patient’s tracking is performed by geolocation or by using Bluetooth connection. Although face detection and voice recognition are existing methods, this paper aims to use them and integrate both in a single device. Our application cannot violate privacy since it does not save the data used to carry out the detection and does not associate this data to people.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
Design of biometric electronic voting machineIJARIIT
It has always been an arduous task for the election commission to conduct free and fair polls in our country, the
largest democracy in the world. Crores of rupees have been spent on this to make sure that the elections are riot free. But, now-adays
it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual
verdict given by the people. This paper aims to present a new voting system employing biometrics in order to avoid rigging and to
enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we know that the
thumb impression of every human being has a unique pattern. Thus it would have an edge over the present day voting systems.
As a pre-poll procedure, a database consisting of the thumb impressions of all the eligible voters in a constituency is created.
During elections, the thumb impression of a voter
is enteredas input to the system. This is then compared with the available records in the database.
If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern
doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.
All the voting machines are connected in a network, through which data transfer takes place to the main host.
The result is instantaneous and counting is done finally at the main host itself. The overall cost for conducting elections gets
reduced and so does the maintenance cost of the systems.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IL MOBBING LE RAGIONI PER NON ALZARE BANDIERA BIANCADrughe .it
Dalla semplice inimicizia alla persecuzione mirata. Il mobbing nasce sul luogo di lavoro. È il frutto di invidie, rivalità, riorganizzazioni aziendali. La “vittima” si sente progressivamente isolata, perde amicizie e salute. Ma non deve cedere.
Lorenza Armano
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
Video Analytics applications like security and
surveillance face a critical problem of person re-identification
abbreviated as re-ID. The last decade witnessed the emergence of
large-scale datasets and deep learning methods to use these huge
data volumes. Most current re-ID methods are classified into
either image-based or video-based re-ID
The challenging problem faced by quadriplegics and paralyzed people is their need for independent mobility. They need
external help to perform their daily activities. The main objective of this project is to provide an automated system for
disabled people to control the motor rotation of wheelchair based on neck movement of physically challenged person. To
facilitate these people for their independent movement, tilt sensor is fitted on person neck. Based on the neck movements,
the accelerometer (tilt sensor) will drive the motor fitted to the wheelchair. The wheel chair can be driven in any of the
four directions and it can also be controlled by using android app (Blynk app). The automated wheelchair is based on
simple electronic control system and the mechanical arrangement that is controlled by a Controller. The ultrasonic
sensors help to avoid obstacles, using the environment information gathered during navigation. The temperature sensor
and heartbeat sensor constantly measure the parameters and display it on LCD.
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A new system to detect coronavirus social distance violation IJECEIAES
In this paper, a novel solution to avoid new infections is presented. Instead of tracing users’ locations, the presence of individuals is detected by analysing the voices, and people’s faces are detected by the camera. To do this, two different Android applications were implemented. The first one uses the camera to detect people’s faces whenever the user answers or performs a phone call. Firebase Platform will be used to detect faces captured by the camera and determine its size and estimate their distance to the phone terminal. The second application uses voice biometrics to differentiate the users’ voice from unknown speakers and creates a neural network model based on 5 samples of the user’s voice. This feature will only be activated whenever the user is surfing the Internet or using other applications to prevent undesired contacts. Currently, the patient’s tracking is performed by geolocation or by using Bluetooth connection. Although face detection and voice recognition are existing methods, this paper aims to use them and integrate both in a single device. Our application cannot violate privacy since it does not save the data used to carry out the detection and does not associate this data to people.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
Design of biometric electronic voting machineIJARIIT
It has always been an arduous task for the election commission to conduct free and fair polls in our country, the
largest democracy in the world. Crores of rupees have been spent on this to make sure that the elections are riot free. But, now-adays
it has become common for some forces to indulge in rigging which may eventually lead to a result contrary to the actual
verdict given by the people. This paper aims to present a new voting system employing biometrics in order to avoid rigging and to
enhance the accuracy and speed of the process. The system uses thumb impression for voter identification as we know that the
thumb impression of every human being has a unique pattern. Thus it would have an edge over the present day voting systems.
As a pre-poll procedure, a database consisting of the thumb impressions of all the eligible voters in a constituency is created.
During elections, the thumb impression of a voter
is enteredas input to the system. This is then compared with the available records in the database.
If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern
doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected.
All the voting machines are connected in a network, through which data transfer takes place to the main host.
The result is instantaneous and counting is done finally at the main host itself. The overall cost for conducting elections gets
reduced and so does the maintenance cost of the systems.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IL MOBBING LE RAGIONI PER NON ALZARE BANDIERA BIANCADrughe .it
Dalla semplice inimicizia alla persecuzione mirata. Il mobbing nasce sul luogo di lavoro. È il frutto di invidie, rivalità, riorganizzazioni aziendali. La “vittima” si sente progressivamente isolata, perde amicizie e salute. Ma non deve cedere.
Lorenza Armano
Human-machine interactions based on hand gesture recognition using deep learn...IJECEIAES
Human interaction with computers and other machines is becoming an increasingly important and relevant topic in the modern world. Hand gesture recognition technology is an innovative approach to managing computers and electronic devices that allows users to interact with technology through gestures and hand movements. This article presents deep learning methods that allow you to efficiently process and classify hand gestures and hand gesture recognition technologies for interacting with computers. This paper discusses modern deep learning methods such as convolutional neural networks (CNN) and recurrent neural networks (RNN), which show excellent results in gesture recognition tasks. Next, the development and implementation of a human-machine interaction system based on hand gesture recognition is discussed. System architectures are described, as well as technical and practical aspects of their application. In conclusion, the article summarizes the research results and outlines the prospects for the development of hand gesture recognition technology to improve human- machine interaction. The advantages and limitations of the technology are analyzed, as well as possible areas of its application in the future.
Hand Motion Gestures For Mobile Communication Based On Inertial Sensors For O...IJERA Editor
This project presents system based on inertial sensors and gesture recognition algorithm for SMS or calling for old age people. Users hold the device to make hand gestures with their preferred handheld style. Hand motions generate inertial signals, which are wirelessly transmitted to a computer for recognition. Here DTW recognition algorithm is used for recognition of hand gestures. Zigbee is used at the transmission section of inertial device to transmit sensor values and at the receiver section of PC to receive values. Recognized gesture is send to the microcontroller for further processing which gives AT commands to GSM to selects the SMS or calling option to the person. GSM model is used for the SMS or calling. An accelerometer-based gestures recognition systems that uses only a single 3-axis accelerometer. 3-axis accelerometer recognizes gestures, where gestures here are hand movements. DTW algorithm is used in this project for recognition. The proposed DTW-based recognition algorithm includes the procedures of inertial signal acquisition, motion detection, template selection, and recognition. Here „a‟, „b‟, „c‟, „d‟, „e‟, „f‟, „g‟, „h‟, „o‟, „v‟ letters are recognized in this system . This system can be used for the emergency calling or emergency SMS by the old age people or blind people from the home.
APPLICATION OF VARIOUS DEEP LEARNING MODELS FOR AUTOMATIC TRAFFIC VIOLATION D...ijitcs
A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on
road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination
faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules
puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the
rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome
this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to
detect traffic violations in real-time using edge computing, which reduces the time to detect. Different
machine learning models and algorithms were applied to detect traffic violations like traveling without a
helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented
gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson
Nano, as the fps is quite low.
Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
In this presentation, Ravi introduces the topic of IoT and associated trends. His interest area lies in application of IoT in intelligence, environmental monitoring and healthcare.
Visual, navigation and communication aid for visually impaired person IJECEIAES
The loss of vision restrained the visually impaired people from performing their daily task. This issue has impeded their free-movement and turned them into dependent a person. People in this sector did not face technologies revamping their situations. With the advent of computer vision, artificial intelligence, the situation improved to a great extent. The propounded design is an implementation of a wearable device which is capable of performing a lot of features. It is employed to provide visual instinct by recognizing objects, identifying the face of choices. The device runs a pre-trained model to classify common objects from household items to automobiles items. Optical character recognition and Google translate were executed to read any text from image and convert speech of the user to text respectively. Besides, the user can search for an interesting topic by the command in the form of speech. Additionally, ultrasonic sensors were kept fixed at three positions to sense the obstacle during navigation. The display attached help in communication with deaf person and GPS and GSM module aid in tracing the user. All these features run by voice commands which are passed through the microphone of any earphone. The visual input is received through the camera and the computation task is processed in the raspberry pi board. However, the device seemed to be effective during the test and validation.
Day by day lots of efforts are been taken towards
developing an intelligent and natural interface between computer
system and users. And looking at the technologies now a day’s it
has become possible by means of variety of media information like
visualization, audio, paint etc. Gesture has become important part
of human communication to convey the information. Thus In this
paper we proposed a method for HAND GESTURE
RECOGNIZATION which includes Hand Segmentation, Hand
Tracking and Edge Traversal Algorithm. We have designed a
system which is limited to the hardware parts such as computer
and webcam. The system consists of four modules: Hand
Tracking and Segmentation, Feature Extraction, Neural
Training, and Testing. The objective of this system to explore the
utility of a neural network-based approach to the recognition of
the hand gestures that create a system that will easily identify the
gesture and use them for device control and convey information
instead of normal inputs devices such as mouse and keyboard.
Presented at the Zurich Frontend Conference (http://2014.frontendconf.ch/) on August 29th, 2014. Here I presented ideas on the integration of user experience in the growing trends of Internet of Things (IoT) devices and wearable sensors.
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5% accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model construction, and the LSTM classifier exhibited heightened accuracy in classification. Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed model, highlighting its potential for enhancing IoT security. The study advocates for future exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and underscores the importance of predictive analyses for a more powerful IOT security. This research serves as a platform for developing more resilient security measures in IoT ecosystems.
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces
a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against
established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5%
accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model
construction, and the LSTM classifier exhibited heightened accuracy in classification.
Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed
model, highlighting its potential for enhancing IoT security. The study advocates for future
exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and
underscores the importance of predictive analyses for a more powerful IOT security. This
research serves as a platform for developing more resilient security measures in IoT ecosystems.
The automatic and manual railroad door systems based on IoTnooriasukmaningtyas
The automatic and manual IoT-based rail door (internet of things) is a door bar designed to be able to close and open automatically and manually. The automatic system works based on sensors that detect the presence of trains and system manual works based on the open and Close button on the smartphone. The components to be used are ATmega328 microcontrollers, Infrared sensors, power supply, CCTV and android applications. Infrared sensor will detect the presence of the train and the gate will close automatically. Then the doorway will open when the train has crossed the automatic door bar. By the manual way, rail door control can be open and closed with android smartphones in real-time with graphical display provided by CCTV. The whole process is connected to a WEB server where the program is embedded. Either it is automatic or manual control. From the tests that have been done, that the response data from the server is very fast, which is less than 1 second civil. For Infrared Sensor 1 There is an average delay of 0,687/sec and Infrared Sensor 2 is 3,449/sec. In realtime CCTV There is an average delay of 0,857/sec.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
1. 11
LATEST-IEEE-BASED-EMBEDDED-SYSTEMS-
PROJECTS-TITLES-2012
1. An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012
2. Robust Multi person Detection and Tracking for Mobile Service and Social Robots.
IEEE transactions on Systems, Man, and Cybernetics—Part B: cybernetics, Vol. 42, No.5,
October 2012
3. On-Line Detection of Drowsiness Using Brain and Visual Information.
IEEE transactions on Systems, Man, and Cybernetics—Part A: systems and Humans, Vol.
42, No. 3, May 2012
4. An Efficient Image Rectification Method for Parallel Multi-Camera Arrangement.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 3, August 2011
5. Fast and Robust Algorithm of Tracking Multiple Moving Objects for Intelligent Video
Surveillance Systems.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 3, August 2011
6. A New Auto-Focus Sharpness Function for Digital and Smart-Phone Cameras.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 3, August 2011
7. Adaptive Edge Detection for Robust Model-Based Camera Tracking.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 4, November 2011
8. Optimizing Video Encoding for Adaptive Streaming over HTTP.
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
2. 22
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012
9. Vision-based Cleaning Area Control for Cleaning Robots.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012
10. Moving Object Detection for Real-Time Augmented Reality Applications in a GPGPU.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 1, February 2012
11. Eye-Tracking Database for a Set of Standard Video Sequences.
IEEE Transactions on Image Processing, Vol. 21, No. 2, February 2012
12. Processing of Eye/Head-Tracking Data in Large-Scale Naturalistic Driving Data Sets.
IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 2, June 2012
13. Spill Detection and Perimeter Surveillance via Distributed Swarming Agents.
IEEE/ASME Transactions on Mechatronics, Vol. 18, No. 1, February 2013
14. A New Biased Discriminate Analysis Using Composite Vectors for Eye Detection.
IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics, Vol. 42, No.
4, August 2012
15. Robust Face-Name Graph Matching for Movie Character Identification.
IEEE Transactions on Multimedia, Vol. 14, No. 3, June 2012
16. Improved Hand Tracking System.
IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No.5, May
2012
17. A Parallel Hardware Architecture for Real-Time Object Detection with Support Vector
Machines.
IEEE Transactions on Computers, Vol. 61, No. 6, June 2012
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
3. 33
18. Adaptive Vehicle Detector Approach for Complex Environments.
IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 2, June 2012
19. Counting People With Low-Level Features and Bayesian Regression.
IEEE Transactions on Image Processing, Vol. 21, No. 4, April 2012
20. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks.
IEEE Transactions on Image Processing, Vol. 21, No. 4, April 2012
21. Maritime Traffic Speed Enforcement.
IEEE Intelligent Transportation Systems Magazine 22 Spring 2012
22. Embedded System Architecture for an WLAN-based Dual Mode Mobile Phone.
IEEE Transactions on Consumer Electronics, Vol. 55, No. 3, August 2009
23. Real time Recognition of Complex Human Daily Activities Using Human Motion and
Location Data.
IEEE Transactions on Biomedical engineering, Vol. 59, No. 9, September 2012
24. Hands-free Voice Communication with TV.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 2, May 2011
25. Eliminating Tromboning Mobile Call Setup for International Roaming Users.
IEEE Transactions on Wireless Communications, Vol. 8, No. 1, January 2009
26. Target Detection and Classification Using Seismic and PIR Sensors.
IEEE Sensors Journal, Vol. 12, No. 6, June 2012
27. Fast and Accurate Human Detection Using a Cascade of Boosted MS-LBP Features.
IEEE Signal Processing Letters, vol. 19, No. 10, October 2012
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
4. 44
28. Physiological Parameter Monitoring from Optical Recordings With a Mobile Phone.
IEEE Transactions on Biomedical Engineering, Vol. 59, No. 2, February 2012
29. GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical
Information System.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 4, November 2011
30. A Smart ECG Measurement System Based on Web-Service-Oriented Architecture for
Telemedicine Applications.
IEEE Transactions on Instrumentation and Measurement, Vol.59, No.10, October 2010
31. Human-Walking-Intention-Based Motion Control of an Omni directional-Type Cane
Robot.
IEEE/ASME Transactions on Mechatronics, Vol. 18, No. 1, February 2013
32. An Intelligent Self-Adjusting Sensor for Smart Home Services based on ZigBee
Communications.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 3, August 2012
33. A Human Detection Method for Residential Smart Energy Systems Based on Zigbee RSSI
Changes.
IEEE Transactions on Consumer Electronics, Vol. 58, No. 3, August 2012
34. Dense and Dynamic 3D Selection for Game-Based Virtual Environments.
IEEE Transactions on Visualization and Computer Graphics, Vol. 18, No. 4, April 2012
35. Real-Time Head and Hand Tracking Based on 2.5D Data.
IEEE Transactions on Multimedia, Vol. 14, No. 3, June 2012
36. A Sensor Package for Ice Surface Observations Using Small Unmanned Aircraft Systems.
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
5. 55
IEEE Transactions on Geo science and Remote Sensing, Vol. 50, No. 4, April 2012
37. Real-Time Vision-Aided Localization and Navigation Based on Three-View Geometry.
IEEE Transactions on Aerospace and Electronic Systems Vol. 48, No. 3 July 2012
38. Leveraging Smartphone Cameras for Collaborative Road Advisories.
IEEE Transactions on Mobile Computing, Vol. 11, No. 5, May 2012
39. Real-Time Computer Vision/DGPS-Aided Inertial Navigation System for Lane-Level
Vehicle Navigation.
IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 2, June 2012
40. Efficient Resource Allocation for Attentive Automotive Vision Systems.
IEEE Transactions on Intelligent Transportation Systems, Vol. 13, No. 2, June 2012
41. Pressure-Based Clutch Control for Automotive Transmissions Using a Sliding-Mode
Controller.
IEEE/ASME Transactions on Mechatronics, Vol. 17, No. 3, June 2012
42. High-Precision Ultrasonic Ranging System Platform Based on Peak-Detected Self-
Interference Technique.
IEEE Transactions on Instrumentation and Measurement, Vol. 60, No. 12, December 2011
43. An Indoor Localization Framework for Four-Rotor Flying Robots Using Low-Power
Sensor Nodes.
IEEE Transactions on Instrumentation and Measurement, Vol.60, No.2, February 2011
44. A Beacon Color Code Scheduling for the Localization of Multiple Robots.
IEEE Transactions on Industrial Informatics, Vol. 7, No. 3, August 2011
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
6. 66
45. Design and Implementation of a Home Embedded Surveillance System with Ultra-Low
Alert Power.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 1, February 2011
46. Meta-Analysis of the First Facial Expression Recognition Challenge
IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics, Vol. 42, No.
4, August 2012
47. 3-D Posture and Gesture Recognition for Interactivity in Smart Spaces.
IEEE Transactions on Industrial Informatics, Vol. 8, No. 1, February 2012
48. Toward E-Motion-Based Music Retrieval a Study of Affective Gesture Recognition.
IEEE Transactions on Affective Computing, Vol. 3, No. 2, April-JUNE 2012
49. Weakly Supervised Learning of Interactions between Humans and Objects.
IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, No.3, March
2012
50. An Accelerometer-Based Digital Pen With a Trajectory Recognition Algorithm for
Handwritten Digit and Gesture Recognition.
IEEE Transactions on Industrial Electronics, Vol. 59, No. 7, July 2012
51. Evaluation of Speech Recognizers for Speech Training Applications
IEEE Transactions on Speech and Audio Processing. Vol. 3, No. 4, July1995
52. Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Inf. Secur., 2011, Vol. 5, Iss. 1, pp. 26–32 doi: 10.1049/iet-ifs.2010.0032
53. Hardware–Software Co design of Automatic Speech Recognition System for Embedded
Real-Time Applications.
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230
8. 88
63. A Reliable Transmission Protocol for ZigBee-Based Wireless Patient Monitoring.
IEEE Transactions on Information Technology in Biomedicine, Vol. 16, No. 1, January 2012
64. A Low Cost GSM/GPRS Based Wireless Home Security System.
IEEE Transactions on Consumer Electronics, Vol. 54, No. 2, MAY 2008
65. A Universal Remote Control with Haptic Interface for Customer Electronic Devices.
IEEE Transactions on Consumer Electronics, Vol. 56, No. 2, May 2010
66. An Internet-Based Interactive Embedded Data-Acquisition System for Real-Time
Applications.
IEEE Transactions on Instrumentation and Measurement, Vol. 58, No. 3, March 2009
67. Developing ZigBee Deployment Guideline Under WiFi Interference for Smart Grid
Applications.
IEEE Transactions on Smart Grid, Vol. 2, No. 1, March 2011
68. Door Phone Embedded System for Voice Based User Identification and Verification
Platform.
IEEE Transactions on Consumer Electronics, Vol. 57, No. 3, August 2011
69. A Paperless Fax Machine with A Single-Touch Panel.
IEEE Transactions on Consumer Electronics, Vol. 54, No. 4, NOVEMBER 2008
70. Maximizing Responsiveness of Touch Sensing via Charge Multiplexing in Touch screen
Devices.
IEEE Transactions on Consumer Electronics, Vol. 56, No. 3, August 2010
71. Design and Implementation of a Home Embedded Surveillance System with Ultra-Low
Alert Power.
V3 TECHNOLOGIES
www.v3technologies.in v3technologies28@yahoo.com,
CONTACT: +91 9750573230, +91 8870525672, 04362-228230