Volume 6, Issue 3 (V) ISSN 2394 - 7780 July - September 2019

International Journal of Advance and Innovative Research (Conference Special)

Indian Academicians and Researchers Association www.iaraedu.com

NATIONAL CONFERENCE ON INFLUENCE OF INFORMATION TECHNOLOGY ON SOCIETY (NCIITS – 2019)

Organized by Department of Information Technology Kishinchand Chellaram College Churchgate, Mumbai

th Friday, 27 September 2019

Publication Partner

Indian Academicians and Researcher’s Association

ABOUT COLLEGE Kishinchand Chellaram College was established in 1954. Kishinchand Chellaram College is one of the premier institutions affiliated to the University of Mumbai. The College has been re-accredited 'A' Grade by NAAC (3rd Cycle). Recipient of the- Best College Award by University of Mumbai 2013-14. Star Status Award by Department of Bio-Technology, Government of 2019-20. The National Conference on Influence of Information Technology on Society – 2019 was held under the aegis of Star DBT scheme 2019 - 22 The Motto of the College is ‘SALVATION THROUGH KNOWLEDGE’.

About IARA Indian Academicians and Researchers Association (IARA) is an educational and scientific research organization of Academicians, Research Scholars and practitioners responsible for sharing information about research activities, projects, and conferences to its members. IARA offers an excellent opportunity for networking with other members and exchange knowledge. It also takes immense pride in its services offerings to undergraduate and graduate students. Students are provided opportunities to develop and clarify their research interests and skills as part of their preparation to become faculty members and researcher. Visit our website www.iaraedu.com for more details.

A BRIEF ABOUT ORGANIZING COMMITTEES

PATRONS Mr. Kishu Mansukhani - President and Trustee Mr. Anil Harish - Trustee and Immediate Past President Mr. Niranjan Hiranandani - Trustee and Past President Mr. Lal Chellaram - Trustee Ms. Maya Shahani - Trustee Mr. Dinesh Panjwani – Secretary

CHAIR PERSON Dr. Hemlata K. Bagla (Principal)

VICE CHAIR PERSON Mr. Smarajit Padhi (Vice Principal) Dr. Shalini R. Sinha (Vice Principal)

CONVENER Mrs. Rakhi O. Gupta (HOD Dept. of IT)

CO-CONVENER Mrs. Neha Patel Mrs. Sandhya Bhavsar

ORGANISING COMMITTEE Mrs. Pragati Thawani Mr. Sagar Mehta Ms. Nashrah Gowalker

International Journal of Advance and Innovative Research Volume 6, Issue 3 ( V ): July - September 2019

Editor- In-Chief Dr. Tazyn Rahman

Members of Editorial Advisory Board

Mr. Nakibur Rahman Dr. Mukesh Saxena Ex. General Manager ( Project ) Pro Vice Chancellor, Bongaigoan Refinery, IOC Ltd, Assam University of Technology and Management, Shillong

Dr. Alka Agarwal Dr. Archana A. Ghatule Director, Director, Mewar Institute of Management, Ghaziabad SKN Sinhgad Business School, Pandharpur

Prof. (Dr.) Sudhansu Ranjan Mohapatra Prof. (Dr.) Monoj Kumar Chowdhury Dean, Faculty of Law, Professor, Department of Business Administration, Sambalpur University, Sambalpur Guahati University, Guwahati

Dr. P. Malyadri Prof. (Dr.) Baljeet Singh Hothi Principal, Professor, Government Degree College, Gitarattan International Business School, Delhi

Prof.(Dr.) Shareef Hoque Prof. (Dr.) Badiuddin Ahmed Professor, Professor & Head, Department of Commerce, North South University, Bangladesh Maulana Azad Nationl Urdu University, Hyderabad

Prof.(Dr.) Michael J. Riordan Dr. Anindita Sharma Professor, Dean & Associate Professor, Sanda University, Jiashan, China Jaipuria School of Business, Indirapuram, Ghaziabad

Prof.(Dr.) James Steve Prof. (Dr.) Jose Vargas Hernandez Professor, Research Professor, Fresno Pacific University, California, USA University of Guadalajara,Jalisco, México

Prof.(Dr.) Chris Wilson Prof. (Dr.) P. Madhu Sudana Rao Professor, Professor, Curtin University, Singapore Mekelle University, Mekelle, Ethiopia

Prof. (Dr.) Amer A. Taqa Prof. (Dr.) Himanshu Pandey Professor, DBS Department, Professor, Department of Mathematics and Statistics University of Mosul, Iraq Gorakhpur University, Gorakhpur

Dr. Nurul Fadly Habidin Prof. (Dr.) Agbo Johnson Madaki Faculty of Management and Economics, Faculty, Faculty of Law, Universiti Pendidikan Sultan Idris, Malaysia Catholic University of Eastern Africa, Nairobi, Kenya

Dr. Neetu Singh Prof. (Dr.) D. Durga Bhavani HOD, Department of Biotechnology, Professor, Mewar Institute, Vasundhara, Ghaziabad CVR College of Engineering, Hyderabad, Telangana

Prof. (Dr.) Shashi Singhal Prof. (Dr.) Aradhna Yadav Professor, Professor, Amity University, Jaipur Krupanidhi School of Management, Bengaluru

Prof. (Dr.) Alireza Heidari Prof.(Dr.) Robert Allen Professor, Faculty of Chemistry, Professor California South University, California, USA Carnegie Mellon University, Australia

Prof. (Dr.) A. Mahadevan Prof. (Dr.) S. Nallusamy Professor Professor & Dean, S. G. School of Business Management, Salem Dr. M.G.R. Educational & Research Institute,

Prof. (Dr.) Hemant Sharma Prof. (Dr.) Ravi Kumar Bommisetti Professor, Professor, Amity University, Haryana Amrita Sai Institute of Science & Technology, Paritala

Dr. C. Shalini Kumar Dr. Syed Mehartaj Begum Principal, Professor, Vidhya Sagar Women’s College, Chengalpet Hamdard University, New Delhi

Prof. (Dr.) Badar Alam Iqbal Dr. Darshana Narayanan Adjunct Professor, Head of Research, Monarch University, Switzerland Pymetrics, New York, USA

Prof.(Dr.) D. Madan Mohan Dr. Rosemary Ekechukwu Professor, Associate Dean, Indur PG College of MBA, Bodhan, Nizamabad University of Port Harcourt, Nigeria

Dr. Sandeep Kumar Sahratia Dr. P.V. Praveen Sundar Professor Director, Sreyas Institute of Engineering & Technology Shanmuga Industries Arts and Science College

Dr. S. Balamurugan Dr. Manoj P. K. Director - Research & Development, Associate Professor, Mindnotix Technologies, Coimbatore Cochin University of Science and Technology

Dr. Dhananjay Prabhakar Awasarikar Dr. Indu Santosh Associate Professor, Associate Professor, Suryadutta Institute, Pune Dr. C. V.Raman University, Chhattisgath

Dr. Mohammad Younis Dr. Pranjal Sharma Associate Professor, Associate Professor, Department of Management King Abdullah University, Saudi Arabia Mile Stone Institute of Higher Management, Ghaziabad

Dr. Kavita Gidwani Dr. Lalata K Pani Associate Professor, Reader, Chanakya Technical Campus, Jaipur Bhadrak Autonomous College, Bhadrak, Odisha

Dr. Vijit Chaturvedi Dr. Pradeepta Kishore Sahoo Associate Professor, Associate Professor, Amity University, Noida B.S.A, Institute of Law, Faridabad

Dr. Marwan Mustafa Shammot Dr. R. Navaneeth Krishnan Associate Professor, Associate Professor, King Saud University, Saudi Arabia Bharathiyan College of Engg & Tech, Puducherry

Dr. Mahendra Daiya Dr. G. Valarmathi Associate Professor, Associate Professor, JIET Group of Institutions, Jodhpur Vidhya Sagar Women's College, Chengalpet

Dr. Parbin Sultana Dr. M. I. Qadir Associate Professor, Assistant Professor, University of Science & Technology Meghalaya Bahauddin Zakariya University, Pakistan

Dr. Kalpesh T. Patel Dr. Brijesh H. Joshi Principal (In-charge) Principal (In-charge) Shree G. N. Patel Commerce College, Nanikadi B. L. Parikh College of BBA, Palanpur

Dr. Juhab Hussain Dr. Namita Dixit Assistant Professor, Associate Professor, King Abdulaziz University, Saudi Arabia ITS Institute of Management, Ghaziabad

Dr. V. Tulasi Das Dr. Nidhi Agrawal Assistant Professor, Assistant Professor, Acharya Nagarjuna University, Guntur, A.P. Institute of Technology & Science, Ghaziabad

Dr. Urmila Yadav Dr. Ashutosh Pandey Assistant Professor, Assistant Professor, Sharda University, Greater Noida Lovely Professional University, Punjab

Dr. M. Kanagarathinam Dr. Subha Ganguly Head, Department of Commerce Scientist (Food Microbiology) Nehru Arts and Science College, Coimbatore West Bengal University of A. & F Sciences, Kolkata

Dr. V. Ananthaswamy Dr. R. Suresh Assistant Professor Assistant Professor, Department of Management The Madura College (Autonomous), Madurai Mahatma Gandhi University Dr. S. R. Boselin Prabhu Dr. V. Subba Reddy Assistant Professor, Assistant Professor, SVS College of Engineering, Coimbatore RGM Group of Institutions, Kadapa

Dr. A. Anbu Dr. R. Jayanthi Assistant Professor, Assistant Professor, Achariya College of Education, Puducherry Vidhya Sagar Women's College, Chengalpattu

Dr. C. Sankar Dr. Manisha Gupta Assistant Professor, Assistant Professor, VLB Janakiammal College of Arts and Science Jagannath International Management School

Copyright @ 2019 Indian Academicians and Researchers Association, Guwahati All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, or stored in any retrieval system of any nature without prior written permission. Application for permission for other use of copyright material including permission to reproduce extracts in other published works shall be made to the publishers. Full acknowledgment of author, publishers and source must be given.

The views expressed in the articles are those of the contributors and not necessarily of the Editorial Board or the IARA. Although every care has been taken to avoid errors or omissions, this publication is being published on the condition and understanding that information given in this journal is merely for reference and must not be taken as having authority of or binding in any way on the authors, editors and publishers, who do not owe any responsibility for any damage or loss to any person, for the result of any action taken on the basis of this work. All disputes are subject to Guwahati jurisdiction only.

International Journal of Advance and Innovative Research Volume 6, Issue 3 ( V ) : July - September 2019

CONTENTS

Research Papers

APPLICATION OF ARTIFICIAL INTELLIGENCE IN CRIMINAL INVESTIGATION 1 – 4

Kimberly Moniz, Rakhi Gupta and Nashrah Gowalkar

ROBOTICS IN NEUROSURGERY 5 – 9

Suwati Singh

BIG DATA ANALYTICS AND DECISION MAKING 10 – 12

Aqueebuddin Qazi, Rakhi Gupta and Nashrah Gowalker

COGNITIVE BEHAVIOUR OF ARTIFICIAL INTELLIGENCE ON SOCIETY (CBAIS) 13 – 16

Nida Mullaji

DIGITAL IMAGE PROCESSING TECHNIQUES 17 – 21

Sakina Masalawala

HEALTH CARE 22 – 26

Jay Chiplunkar, Rakhi Gupta, Nashrah Gowalkar

HONEYPOTS / HONEYNETS IN COMPUTING SECURITY 27 – 33

Kaveri G. Vernekar

IOT BASED SURVEILLANCE ROBOT 34 – 39

Juilee S Gije

MOBILE TECHNOLOGY IN HEALTHCARE 40 – 43

Mamta G Yadav

AN OVERVIEW OF MOBILE TECHNOLOGY: FOCUSING ON MOBILE PHONES 44 – 47

Latifa Zaman, Rakhi Gupta and Nashrah Gowalker

QUANTITATIVE COMPARISON BETWEEN NAIVE BAYES AND HAND ROLLED NAIVE 48 – 52 BAYES UNDER SENTIMENT ANALYSIS

Rakhi Gupta and Nashrah Gowalker

A SURVEY ON IOT ELEMENTS, LAYERED ARCHITECTURES AND SECURITY ISSUES 53 – 60

Varkha Jewani and Dr. Prafulla E Ajmire

ARTIFICIAL INTELLIGENCE IN MEDITATION 61 – 67

Khan Musarrat Begum, Rakhi Gupta and Nashra IOT BASED BINS FOR SMART CITIES 68 – 71

Satish P. Rodhe, Shivtanu Utpal Falguni Ray and Somesh R. Dubey

“SMART MIRROR” 72 – 75

Rajni Gajbhiye and Saima Shaikh

SOIL MOISTURE CONTROL SYSTEM 76 – 79

Vishal Brahmbhatt and Siddhi Korgaonkar

A MOBILE DISASTER MANAGEMENT SYSTEM USING ANDROID TECHNOLOGY 80 – 86

Alina Mirza

APPLICATION ON ONLINE AUCTION SYSTEM 87 – 88

Ashi Jaiswal and Tanvi Pitlekar

IOT HEALTH MONITORING SYSTEM 89 – 92

Alka Mishra

SPEECH RECOGNITION FOR TELUGU -ENGLISH MACHINE TRANSLATION 93 – 97

Ravali Bingi, Rakhi Gupta and Nashrah Gowalkar

SMART CAR PARKING SYSTEM 98 – 100

Khushbu Oswal and Preety Kumawat

SMART ORDERING SYSTEM USING RESTAURANT’S TABLET 101 – 103

Priyanka Talreja, Girish Budhrani, Rakhi Gupta and Nashrah Gowalkar

STOCK CARE 104 – 107

Kajal Swarup and Pranjal Pawar

SECURITY OVER COMPUTER COMMUNICATIONS 108 – 111

Pankaj Vanjani, Rakhi Gupta, Nashrah Gowalkar

AUTONOMOUS CAR 112 – 114

Navin Bhatotra and Nashrah Gowalker

SMART GLASS 115 – 116

Suraj Yadav

APPLICATION OF MOBILE TECHNOLOGY FOR MARKING ATTENDANCE USING 117 – 124 WHATSAPP

Ramsuraj Basudeo Yadav and Prof. Rakhi Gupta

WEBSITE “THE PRADHAN MANTRI YOJANAS” 125 – 129

Saloni Jain

SOFTWARE BOTS - ROBOTIC PROCESS AUTOMATION LED BY HUMANS 130 – 133

Simone Coelho MALWARE DETECTION AND RMMI 134 – 137

Shaikh Aafreen, Khan Anam, Rakhi Gupta and Nashrah Gowalkar

RESEARCH PAPER FOR GESTURE CALL 138 – 140

Sunil Mandal and Manoj Pillamari

IOT BASED HEARTBEAT MEASURING AND ANALYSIS 141 – 142

Aditya Srivastava and Vimala Rani

GPS FRIEND FINDER 143 – 144

Kajal Tejwani, Girish Narsinghani, Rakhi Gupta and Nashrah Gowalkar

FIX MY ‘SHIP 145 – 147

Abuzarali Peerbhai and Shahdawala

ANALYSIS OF APPLICATIONS OF BLOCKCHAIN: IN INDIAN CONTEXT 148 – 150

Santosh Bhashani and Geeta Brijwani*

MEDIFY (MEDICINE REMINDER + NOTIFICATION) 151 - 153

Niki Choksi and Taiba Habshi

REVIEW OF SECURITY FEATURE IN BLOCKCHAINING 154 - 160

Raghav Thakur

International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

APPLICATION OF ARTIFICIAL INTELLIGENCE IN CRIMINAL INVESTIGATION

Kimberly Moniz, Rakhi Gupta and Nashrah Gowalkar K. C. College, Mumbai

ABSTRACT There has been a steady increase in the crime rate all over the world. This reflects in a large number of crimes yet to be solved. Crime investigators are overwhelmed by the magnitude of these crimes and often suffer from stress, depression, anxiety, and burnouts when faced with intricate cases. Artificial Intelligence employed at various stages of the Crime Solving Process will accelerate the process of criminal investigation and reduce the pressure faced by Crime Investigators. Keywords: Criminal Investigation, Crime Investigator, Artificial Intelligence, Forensic Science, Forensic Investigation

I. INTRODUCTION Crime is an action or omission of a penal law which is punishable by fine, imprisonment or death. In the event of a criminal offence, it is essential for law enforcement agenciesto apprehend and charge the offender. Criminal Investigation is the study of facts that are employed to aid in criminal trials.An entire criminal investigation includes crime scene investigation, searching, interviews, interrogations, evidence collection and preservation and various methods of investigation. Evidence – Evidence encompasses all the available facts, information and tangible objects that are present in support of an assertion. Judgments and conclusions can be founded upon it. Evidence can be of the following types: 1. Associative Evidence links a suspect with a criminal offence. 2. Circumstantial evidence is evidence that helps investigators draw inference but is not adequate for conviction. 3. Competent Evidence is evidence which properly collected, named, filed, and continuously secured. 4. Corpus Delicti Evidence establishes that a crime took place. 5. Direct Evidence is complete evidence capable of asserting the truth without any inference and leading to a conviction. 6. Material evidence is evidence relevant to a specific case and forming a substantive part of the lawsuit or having a legitimate influence on the case's outcome. 7. Trace Evidence is very small evidence such as hair or fibres. 8. Physical Evidence is something tangible that helps to establish the facts of a case. 9. Probative evidence is the grounds necessary to investigate or prosecute a case; proves (or tends) to prove guilt or innocence. Forensics are the scientific methods utilized to solve a crime. Forensic investigation is the assemblage and analysis of all crime-related physical evidence to conclude a suspect. Investigators examine blood, fluid, or fingerprints, residue, hard drives, computers, or other technology to interpret how a crime took place. The most common method of investigation is the establishment of means, motive and opportunity followed by any relationship or animosity between the victim and any known offenders. Forensic Science is the applied science that practices techniques and technologies of physics, chemistry, and biology to examine physical evidence left at a crime scene. Chemical tests can be drawn with hair, blood, dirt, cloth fibres, etc. Tools include DNA testing, microscopy, and spectroscopic analysis. A forensic scientist may study: 1. Sound and video recordings which are analysed and enhanced as needed. 2. Examination of crime scenes

1 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

3. DNA profiles used in the comparison of biological material and with those of victims and suspects. 4. Physical examination of documents (e.g. handwriting, typewriting) and chemical examination of documents (e.g. inks and papers). 5. Analysis of drugs and poisons in human tissue and body fluids 6. Testing and comparison of evidence such as bullets, casings, fibres, glass, gunshot residues, metals, oils, paints, petrol, plastics, soils, etc. 7. Examine the scenes to establish cause and origin of fires and detonations. 8. Forensic ballistics conduct tests with firearms and ammunition to match a bullet to the gun from which it was discharged. 9. Detect, enhance, record, preserve, and identify the latent information, including fingerprints, footprints, shoe prints, tire marks, and tool marks Forensic Anthropology: Forensics using techniques acquired through research by physical anthropologists and archaeologists. Forensic Entomology: The study of insects found on a dead body or at the scene of a death. II. PROBLEM DEFINITION A Crime Scene is replete with useful information that needs to be considered during the investigation. It is essential that all the evidence is submitted into account and scrutinized thoroughly. Due to the outrageous rise in crime rate, it has become difficult to keep up with the pace of crime occurrences and thus many criminals are never penalized. A tremendous quantity of information is collected during an investigation which includes crime scene photographs and videos, surveillance footage, contents of hard drives from computers or laptops, memory cards from mobile phones and cameras. The analysis of this information is cumbersome, demanding a significant investment of expert personnel. The analysis is also prone to human error due to the immense volume of information, the rapidly advancing technologies, and a circumscribed number of adept personnel with the knowledge to process such information. III. PROPOSED METHODOLOGY Rapid advancements in the field of Artificial Intelligence (AI) along with its ability to learn from experience enables it to assist humans. AI can overcome human errors and accelerate the speed of investigation by performing tasks more efficiently and effectively. A. Crime Scene Investigation 1. Semantic Scene Classification: In pattern recognition, scene classification is a very common task in which the system scans a picture and analyzes the various elements in it and uses them to categorize the image to a certain category or group. In this process often such a situation may occur when the divisions are not mutually exclusive by definition. AI can identify the character of crime using Semantic Scene Classification. 2. Crime Scene Modelling: Crime Scene Modelling refers to the conception of a multidimensional model of the crime scene by accounting, all the important aspects of the crime scene. Artificial Intelligence can be applied to create a virtual 3D model of the crime scene using the images captured at the crime scene which can enable investigators to understand hidden facets of the crime. 3. Crime Scene Simulation: A simulation is a virtual representation of the behaviour of a system to simulate various outcomes associated with it.AI can develop a simulation of the crime sceneby using the model. AI will thus create potential scenarios of how the crime took place by reviewing factors such as blood splatter patterns, the position of entry and exit wounds etc. B. Forensic Investigation 1. Facial Recognition: A facial recognition system is a technology that uses biometrics to identify a person from a photograph or video. It compares the information with a database of known faces to find a match.AI can use facial recognition to identify victims and suspects by comparing the images with existing databases. 2. Fingerprint Identification: Forensic scientists use fingerprints in criminal investigations as a means of identification. Fingerprint identification is one of the most significant criminal investigation tools due to two features: their persistence and their uniqueness. A person's fingerprints do not change over time. AI can 2 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

identify fingerprints by comparing them with the victim's, suspects or known offenders. AI can also provide an analysis of a person's personality based on the fingerprints. 3. Handwriting Analysis: AI performs handwriting analysis on written statements, letters or suicide notes. When analyzing the entire document using AI, the objective is to identify key handwriting features. These features are uniform throughout the whole document and the system functions by identifying fundamental character similarities. This helps to identify the original writer of the paper. This is accomplished by identifying the unique features of the handwriting in the entire document. Likewise, each has a unique way of shaping certain letters, and this is consistent throughout the whole document. The software can pick significant features of handwriting as well as unique characters. AI can also identify personality traits by analyzing handwriting and determine whether a person is capable of committing a particular crime or not. 4. Information Inspection: AI can examine the enormous amounts of data collected from the crime scene and the data available in the databases effortlessly thus freeing up personnel for other tasks. AI can perform tests on the data to check whether it was tampered with or edited and also aid in retrieval of lost data. 5. Forensic Photograph Analysis: Forensic photography, as well-referred to as crime scene photography, is an activity that records the initial appearance of the crime scene and physical evidence, to provide a permanent record for the courts. AI analysis of photographs reveals important information and connections that could have been overlooked by humans. AI can recognise objects in the image and discover similarities in multiple images. For instance: AI can map a murder weapon to one in the background of a social media post. C. Criminal Investigation 1. Criminal Profiling: Criminal Profiling is an investigative strategy used by law enforcement authorities to identify likely suspects. It has been employed by investigators to link cases that may have been committed by the same perpetrator. AI can be used to generate a profile of the culprit by analyzing attributes of the victim, weapon and the method of the crime. 2. Suspect Prioritization: A suspect is someone who is under suspicion for a particular crime. AI can create a list of potential suspects based on the profile. Each of these suspects is further ordered based on means, motive and opportunity. 3. Surveillance of Investigative Interviews and Interrogations: An 'investigative interview' is an interview conducted to elicit evidence or information from a person (i.e., witness, victim, complainant or suspect) during the process of an investigation. Investigative interviews conducted by police can vary greatly in purpose, scope and content.Interrogation is, in criminal law, the process of questions asked by an investigator to a person arrested or suspected to seek answers to a crime.AI can review the Investigative Interviews and interrogations to note anomalies in body language that may indicate deceit, agitation or resentment. 4. Network Analysis: Network Analysis is the process of creating a network of links by plotting points on a map or a board. Network Analysis can be used to retrace a person's steps on a map. AI performed Network Analysis can reveal links between suspects and victims. IV. RESULT Engaging AI in Criminal Investigation will substantially speed up the rate of Crime Solving and quick apprehension of the perpetrator will prevent them from committing more crimes.AI will reduce the caseload of the law enforcement department and create a healthy working environment. Facial recognition has a success rate of only 61.4 percent. On the other hand, fingerprint identification is 98.6 percent accurate. Nevertheless, AI is only as accurate as the information it is provided with in the form of past cases and convictions. Likely, AI will also duplicate the mistakes committed in the past instead of learning from them. This is problematic because machine learning models are only as dependable as the data they're trained on. If the underlying data is biased in any form, there is a risk that structural inequalities and unfair biases are not just replicated, but also amplified. In this regard, AI engineers must be especially wary of their blind spots and implicit assumptions; it is not just the choice of machine learning techniques that matters, but also all the small decisions about finding, organising and labelling training data for AI models. 3 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

V. CONCLUSIONS The applications of AI in Criminal Investigation are multiplying exponentially with the evolution of new potential. Incorporating AI in Criminal Investigation will revolutionize crime-solving practices. It will accelerate the speed at which justice is served and also reduce the offence rate. The precision of facial recognition system as a biometric technology is lower than iris recognition and fingerprint recognition. The number of false positives is also high. AI can also use fingerprints to interpret the overall personality of an individual. While, AI can also use handwriting for personality assessment, it depicts the person's state of mind while writing. However, Artificial Intelligence should be employed with utmost care in the Criminal Justice Systems. Courts are using AI to sentence criminals which often leads to a wrongful conviction. AI can be extremely helpful, but it should not be permitted to overtake human judgement. The solutions produced by AI should be reviewed by humans before taking any decisions. REFERENCES [1] A Forensic Guide for Crime Investigators – National Institute of Criminology and Forensic Science [2] Fundamentals of Criminal Investigation (Sixth Edition). Charles E. O'Hara and Gregory L. O'Hara; 1994; ISBN 0-398-05889-X [3] Wikipedia Article on Criminal Investigation Available :https://en.wikipedia.org/wiki/Criminal_ investigation [4] NIJ Journal Issue No. 208 January 2019 [5] http://www2.cruzio.com/~zdino/psychology/criminal.justice.glossary.html [6] https://www.nist.gov/news-events/news/2004/07/nist-study-shows-computerized-fingerprint-matching- highly-accurate [7] https://epic.org/privacy/facerecognition/

4 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

ROBOTICS IN NEUROSURGERY

Suwati Singh Kishinchand Chellaram College, Mumbai University, Churchgate

ABSTRACT We all know that medicine has experienced significant scientific and technological advances in the last 50 years in human history. The basic objective of introducing the surgical robot is to correct human deficiencies and to improve surgical skills. The capacity of performing tasks again and again with precision and reliability has been the base of the robot's success. Yet in the last decade, robotic-assisted surgery has become the next prototype of current times. Surgeons play a vital role in the neurosurgical field, but robotic systems solve many challenges of the current situation of surgery robotic-assisted surgery. Although it has reorganized several surgical fields, still robotic-assisted neurosurgery is limited due to available technology. Keywords: Neurosurgery, Robotics, Robots for neurosurgery.

I. INTRODUCTION Nowadays, in the medical field robotics are playing a major role. Basically, the concept of robots has developed from human-like machines to programmable specialized devices. In the mid-1980s the concept of robotics was used in the surgical field to implement clear-cut biopsy in neurosurgery. After that manufacturers started making efforts to improve the efficacy and reliability of their robotic systems in the surgical field. Neurosurgery is one of the first organ systems in that robotic surgery was founded, due to the high perfection that was required to localize and operate within the brain, and the comparatively fixed landmarks of the cranial anatomy. The Robots have introduced applications in neurosurgical practice for organizing devices along predetermined orientation or supplying physical guidance during Stereotactic operations in the brain and in spinal operations. As first application of robotic-assisted surgery was established in the neurosurgical field, but there was a more robotic enhancement in urology, gynecology, Gastroenterology is more ordinary due to fewer anatomical dare. As a result, technological improvements to the traditional process have always been a basis to enhance the accuracy of surgery and deliver the potential of the technology. The concept of computer-assisted surgery can precisely guide surgeons to their surgical targets, and can, therefore, improving the patient effect by limiting damage to adjacent tissue. It allows the surgeon to use the software to command and move surgical instruments that are organized on a robot and implement surgery through small incisions. This paper provides an overview of the evolution, neurosurgery, robotics, robots for neurosurgery. II. PROBLEM DEFINITION [1] The problem definition describes the background of neurosurgery when performed by human surgeons, and their drawbacks, and the way to overcome these drawbacks by introducing robotics in the neurosurgery field. In the late nineteenth centuries the surgery was implemented by the surgeons. At this moment surgery could be seen, as safe and increasingly risky. [2] For example in the early June 1904, the Dr. Thorne was tried for unproven carelessness. A year later, she had supposedly left a sponge inside a patient, Miss Byrne was the patient upon whom she had performed an abdominal operation. The matter was that the Thorne’s apparent failure to count the sponges used during the operation. As May Thorne had performed a difficult and skillful operations, removing a large blister which had been adherent to both Miss Byrne’s uterus and to one of her Fallopian tubes. [3] As in the above case, the well-trained professional surgeon had made a mistake of leaving sponge while surgery. It’s a human behavior to get nervous while doing very important and difficult task even if they are professional in that field. For that the concept of robotics were introduced in the surgical field or can be said in the medical field. [4] Today, robotics plays very important roles to automate and to implement the day-to-day tasks of the human. Robots are provided with a lot of sensors and decision-making capabilities to complete the jobs in well-organized manner. The Robotics provides mechanical support with surgical tasks and contributing greater precision, accuracy, and allowing automation and argument surgical performance, by stabilizing a surgeon’s hand or scaling hand motion. Work in disposition with human operators to combine advantages of human thinking with the potential of robots to provide data, optimize localization on a moving subject. Surgical robots involve spatial inclination between the robotic operator, and the human operator that can be allocated by effective reality environments that re-design the surgical space, and allow surgeons to execute with the advantages of mechanical support but without being distanced from the sights, sound, and touch of 5 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

surgery. The Robotics in Neurosurgery helped the surgeons to perform surgery easily in a well-defined way and helped them a lot. This paper basically defines the evolution, neurosurgery, robots for neurosurgery. III. PROPOSED METHODOLOGY This part of paper includes the evolution, robots used for neurosurgery, and the surgery done by human and robots. A. Evolution The first application of a robotic system in surgery introduced in 1985, 24 years after the foundation of UNIMATE. In first robotic surgery, surgeons executed a neurosurgical biopsy using PUMA(Programmable Universal Machine for Assembly) 560 robotic arms.

Fig-1: The PUMA Robot The robotic system enabled for higher accuracy in slightly invasive surgery collated to more traditional methods. The system enabled the deployment of a Biopsy needle in the brain using computed tomography (CT) instructions. Robot had the potential to supply speedy outcomes than any other operations accessible at the time that involves the manual adjustment of the Stereotactic frame because its computer calculated Brain tissue may be hard to obtain and manipulate, but it is also incredibly significant. As a result, technological enhancement to traditional methods has always been a focus to enhance the accuracy of surgery and deliver the potential of the technology in this important Advance in engineering and imaging techniques have sparked further attention in computer-assisted and robotic neurosurgery. The need for correctness during brain surgery has conduct to an expansion in computer-assisted surgeries (CAS). This technique requires using imaging technologies such as magnetic resonance imaging (MRI), computerized tomography (CT) or positron emission tomography (PET) to produce an image of the patient's brain. The surgeon will use this information to organize the route of surgery. B. Robots Available For Neurosurgery Some commonly used robots available for neurosurgery are: 1. Neuromate (Renishaw Mayfield, Lyon, France) 2. Pathfinder (Prosurgics, High Wycombe, United Kingdom) 3. NeuroArm (University of Calgary, Calgary, Alberta, Canada) 4. CyberKnife (Accuracy Inc, Sunnyvale, CA) 5. SmartAssist (Mazor Surgical Technologies, Caesarea, Israel)  Neuromate: The neuromate stereotactic robot presents a platform solution for a broad range of functional neurosurgical operations. Neuromate have been used in thousands of electrode implantation operations for deep brain stimulation (DBS), and stereoelectroencephalography (SEEG), stereotactic applications in neuroendoscopy, biopsy, and many other researches applications.· 6 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-2: Neuromate Stereotactic Robot  Pathfinder: The Pathfinder is a stereotactic system that has proven precision in clinical research. These 6- DoF robotic-arm systems vary from other neurosurgical robots because they use associated reflectors attached to the head of the patient that is used a camera system instead of radiological, ultrasonographic, or mechanical direction.

Fig.3: The PathFinder neurosurgical robotic system  Neuroarm: The neuroArm is an MRI-compatible, ambidextrous that is two-faced robot. Its efficient components are two image-guided manipulators with end-effectors that mimic human hands and are efficient of interfacing with new microsurgical tools. It has tremor filters that remove undesired hand tremors seen under the microscope. It also consists of a surgeon-machine interface and multiple surgical displays. The interface consists of two hands controllers which hold tools.

Fig-4: The NeuroArm C. NeuroArm: The Future of Neurosurgery NeuroArm is an MRI-Compatible, image-guided computer-assisted device which is specifically designed for neurosurgery. NeuroArm successfully unites the precision and accuracy of robotics with the executive decision- making ability of the surgeon. 7 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

The official launch of the NeuroArm was introduced on May 12, 2008 — A team from the Foothills Medical Centre finshed the first surgical removal of a brain lesion with the support of an image-guided neurosurgical robot, neuroArm. The surgery was performed on patient a 21-year-old Paige Nickason which had an olfactory groove meningioma, which was disturbing her sense of smell, separated with no problem. Paige suffered from a medical condition, neurofibromatosis, that creates tumours to grow along her exiting cranial nerves. The surgery was the third neurosurgical operation that she had encountered to date. Garnette Sutherland, the neurosurgeon performed the operation, “I had to have the tumour removed anyway, so, I was happy to help by being a part of this historical surgery,” which manipulated the human-like robotic arms from adjacent control room. Dr. Sutherland committed that the surgery was a success, in part due to the increased safety of the machine. “Robotic technology is naturally seen like more clear-cut and accurate compared to a surgeon’s hand,” Sutherland explained during the press conference that noting the robot can make more clear-cut incisions and movements. The operation had marked the first ever image-guided neurosurgical operation executed with a robot.

Fig-5: The First Official launch of the NeuroArm NeuroArm developed as a potential method for enhancing the combination of imaging with microsurgery and stereotaxy. NeuroArm has the potential to implement surgery within the bore of a high-field magnet, which would enable high-quality intraoperative imaging without breaking the rhythm of surgery. Surgeons will be able to notice, and manipulate imaging data from the remote workstation of neuroArmwithout compromising sterility or inordinately extending the surgical procedure. NeuroArm was created to grow alongside improvements in the field of neurosurgery. NeuroArm is a tele-operated magnetic resonance (MR)-compatible image-guided robot.

Fig.6: The Evolution of NeuroArm from 2002 to 2012 8 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IV. RESULT Therefore, as a result of this paper, the concept of introducing robotics in neurosurgery helped the surgeons a lot. Different robotic systems are currently in use, but the application of these systems is restricted in the field of neurosurgery. Current research and improvement teams cornerstone on robotic-assisted surgeries, and minimally invasive surgery. Robots aided the human at the time of surgery by which the chance of doing any mistake was resolved and time required to perform the surgery also reduced. V. CONCLUSION At last, we conclude that Robotics provides mechanical support with surgical tasks, and contributing greater precision, accuracy, and enabling automation and argument surgical performance, by stabilizing a surgeon’s hand or scaling hand motion. The use of robotic systems in neurosurgery may help increase surgical accuracy, and enable surgeons to carry out more complicated operations. However, our current robotic technology is limited to part of anatomical challenges, so other department areas have grown faster than neurosurgery. Robotic-assisted surgery is an encouraging field in neurosurgery, but enhancements and developments in minimally invasive and endoscopic robotic-assisted surgical systems must come before robotic assistance becomes ordinary place in the neurosurgical field. NeuroArm successfully unites the precision and accuracy of robotics with the executive decision-making ability of the surgeon. The concept of introducing robotics in neurosurgery helped the surgeons a lot. REFERENCES [1] https://www.renishaw.com/en/the-impact-of-robotics-on- neurosurgery--39696 [2] https://www.engpaper.net/robotics-2015.htm [3] https://www.ncbi.nlm.nih.gov/pubmed/26351892 [4] https://www.ncbi.nlm.nih.gov/pubmed/10718057 [5] https://ieeexplore.ieee.org/document/1384172 [6] http://www.neuroarm.org/

9 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

BIG DATA ANALYTICS AND DECISION MAKING

Aqueebuddin Qazi, Rakhi Gupta and Nashrah Gowalker Department of M.Sc.I.T., Kishinchand Chelaram College, University of Mumbai

ABSTRACT: This paper aims to explain the use of big data analytics and decision making. In this world of the digital era, the role of data is very important. Traditional data set are not able to manage the rapid growth of data. Big data can handle and process this large set of data and get valuable information about the data set. This data set contains all sort of data that is structured and real-time data. Decision-making systems help the organization to get the best options from this set of data. Keywords: Big data, Big data Analytics, Decision making.

INTRODUCTION Big data is everywhere around us like social media, banking apps and any digital platform that contains a huge volume of data. Big data helps in pulling out enormous data using analytical skills. Big data also Analyzing the complex data which was limited in the traditional data handling system. Big data helps in managing a large amount of data that cannot be managed using the old and Traditional data sets and software as Big data deals with data which growths at a rapid speed. Big Data contains three V’s. volume, variety, and velocity. Volume means the size of the Data. Velocity means the rate at which the data keeps changing. variety means different types of data text, audio, Real-time data, images, etc. Organizations get Data in many ways and it keeps growing rapidly that’s why Big data is required to handle them. The size of big data keeps growing large from terabyte to a petabyte. Big Data contains two types of data structured and unstructured data. What makes Big data makes use of advanced analytical tools and decision-making systems so that the information can be extracted from the data using various tools and analysis of various patterns in the data. This feature of big data is very useful to the organizations as various sorts of data are received every day and this data can be useful to them. Software on Big data platforms and big data analytics focuses on giving an efficient analysis of data on enormously big datasets. Many industries like banking, telecom, automobiles will benefit from big data analytics as Data is becoming a key basis of competition for individual firms for success and growth and strengthening consumer surplus, production growth, and innovation. Thus it means that by using big data and selecting appropriate tools Big data analytics platform and tools are very crucial for the organization.

10 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Why Big Data Analytics?

CHARACTERISTICS OF BIG DATA Big Data Analytics Big Data Analytics has come up as an important tool for supporting the decision-making process. Big data discovery can help to find the unknown findings which are very helpful for decision making. Before big data and invention of the computer the ability to store and process Data was limited. Many experts used to do the decision making. But they were not always perfect and correct as an individual can't process a huge amount of data and make decisions. In the present big data has made it easier to analyze data in terms of statistical reliability and improvement in data models. Big Data Analytics has a significant effect on business value and firm leading to savings, increase customer returns, improving customer relationship and developing new business models. Big data analytics contain advanced analytic techniques that can operate big data sets. Advanced analytics helps in making intelligent decisions. Big data analytics is not only about the data volume but it also handles data variety. Benefits of Big data in decision making There is a large number of data available today coming from various sources. It is a good opportunity for the various firms in the market to use that large number of Data set and make tactical, operational and many other decisions from it. Business transaction data when mined for association rules provide key insights for decision- makers about products bought together or predicting demand for certain items. Decision making helps to analyses, form pattern and notice the details which were previously not possible. For example, noticing a pattern in data like the low sales of a particular product and help the company as it will know now how to solve it. Getting an understanding of data patterns can also be effective as the company can study the pattern and come up with an operational strategy. Analysis of terabytes of data coming from an aircraft provides an indicator which can detect failures of its various part in an aircraft and thus providing safety. Comparison between Big data and Traditional database. Big Data Traditional Database Database Architecture is distributed where a large Database Architecture is in a centralized format. In amount of data is divided into small blocks. Then which a single computer solves all the problems. the solution is computed by various computers This is very costly and ineffective to process a large present in the network. A distributed database is amount of data. cost-efficient and provides better computing and processing compared to Centralized Architecture. . The volume of data in Big data can be used to The volume of data in a traditional database system store a large amount of data it can even go till is limited to an extent where it can only store data petabyte. ranging between gigabytes and terabytes. In big data, various types of data are stored that Traditional database system stores structured data are semi-structured unstructured structured. This that is stored data of a fixed format is stored.. makes big data more efficient and effective compared to traditional database systems as big data can process a different kind of data. Big data is comparatively less expensive as it can Use of traditional database system is expensive as it easily store and process large amounts of data. requires expensive hardware and software to store a large amount of data. 11 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

PROBLEM DEFINITION Opportunities in Big data also have some problems. To handle and solve these issues we need to know about various security threats and how Big data analyzes Data. The following are some of the problems variety, Data Quality, and Data management. Variety Data is available in many formats like images audio text etc. The data which we get is unstructured data, semi- structured from the internet which includes images video and all kind of multimedia content. This gives rise to data complexity. Data complexity is when there are many types of data in one data set. Quality and Relevance It is very important that the data collected and processed should be relevant to the requirements and should be of high quality. data that is not relevant to required if processed can affect the result. Thus checking the quality and Relevance of data is very important. PROPOSED METHODOLOGY To solve the problem of variety the following steps can be used. OLAP tools Data processing can be done using OLAP tools as it establishes a connection between information and assembles the data into a logical view. OLAP tools can process any kind of data. Apache Hadoop This software is open source and its function is to manage the huge amount of data with ease in a short period. One of the functionalities of this software is to divide the data among multiple computers on the same network. Also, a map of data content is created so it can be easily accessed whenever required. Data visualization To solve the problem with data quality Data visualization is an effective way because it allows us to see where the no required data is. For quality issue firms should a data quality control team activities to ensure the data is clean. RESULT This paper studied Big data, Big data analytics, decision making. Big data has now replaced the older traditional database system. Big data is better in data processing as well as providing more accurate decision making. Big Data Analytics is more efficient compared to older methods. Big data analytics contains an advanced analytics tool that is used to handle big data sets. Decision making in big data has changed the way of decision making. Replacing the older ways of decision making. As decision making in big data is faster, better and accurate compared to the older ways in which experts used to make the decision. Various Problems related to big data were also discussed and various methods to solve them. CONCLUSION Topics like Big Data, Big data analytics, decision making were written in this research paper. Various benefits of big data, data analytics were discussed in this paper. REFERENCE  https://www.researchgate.net/publication/313819009_Big_Data_Challenges_and_Solutions  https://www.researchgate.net/publication/326408012_Role_of_Big_Data_in_Decision_Making  http://www.diva-portal.org/smash/get/diva2:1110878/FULLTEXT01.pdf  https://www.projectguru.in/publications/difference-traditional-data-big-data/  https://www.ibmbigdatahub.com/infographic/four-vs-big-data

12 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

COGNITIVE BEHAVIOUR OF ARTIFICIAL INTELLIGENCE ON SOCIETY (CBAIS)

Nida Mullaji Assistant Professor, Department of Computer Science, D. B. J. College, Chiplun, Maharashtra

ABSTRACT Have you ever spent a moment of your time thinking how our lives have changed drastically from exchanging any means of communication via humans/animals to sending and receiving any type of message(s) in the mere blink of an eye using just a touch/tap of the human finger via “this” amazing man made digital devices(s)? I bet we all have! This is just one simple scenario narrated. The point being stated is that how we, as humans, have evolved throughout all the years with the advancement in technology. As technology is ever advancing, humans are moving forward too— cognitively. This paper discusses the cognitive behaviour of Artificial Intelligence (AI) and how the rapid improvement in AI is and would impact the society grandly. Keywords: Artificial Intelligence (AI), cognitive behaviour

INTRODUCTION Artificial Intelligence (AI) refers to human “intelligence” manifested by machines. AI can be classified into Strong and Weak AI. Strong artificial intelligence (strong AI) is a form of artificial intelligence that has psychological capabilities and functions that mimic the human brain. A good example of Strong AI would be decision-making capabilities of a system. Weak artificial intelligence (weak AI) simulates human cognition and benefits humans by automating tedious tasks and by analysing data [1][7][8].

Fig-1: General overview of Artificial Intelligence (AI) 1) Machine learning (ML): Machine learning is an application of AI that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. It centres on the progress of computer programs made of a set of instructions that can access data and use it to learn for themselves. 2) Natural Language Processing (NLP): Natural language processing is a branch of AI dealing with the interactions between computers and human languages. 3) Expert Systems: An expert system in AI is a computer system that mirrors the decision-making ability of a human expert and is further designed to solve complex structure problems by reasoning. 4) Vision: Vision in AI is a field that works on enabling machines to see, identify and process images in the same way that human eyesight does, and then provide appropriate results. It is like imparting human intelligence and instincts to a machine. 5) Planning: Planning in AI is about decision-making tasks performed by the robots or computer programs to achieve a specific goal where the execution of planning is about choosing a sequence of actions with a high likelihood to complete the specific task and get desired results. 13 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

6) Robotics: Robotics is a branch of AI. AI Robots are the artificial agents acting in the physical world surroundings. AI Robot is aimed at manipulating the objects by perceiving, picking, moving, and destroying it.

Fig-2: Fields of AI Thus, bringing together all these components i.e. systems integration has been proving to be more and more beneficial for true AI. With the advancement in AI, we are living in the era of AI integrated lifestyle. VI. COGNITIVE BEHAVIOUR OF ARTIFICIAL INTELLIGENCE (AI) The cognitive behaviour of Artificial Intelligence (AI) is the core study of understanding the vital influence of technology on humans and vice versa. AI is not restricted to just robots, AI can vary from any speech- recognition software or digital assistant(s) to a quadcopter [1][3][12]. AI has let humans attain ease of living by conjoining with smart software. Humans have started to rely on their use of technology which they find convenient and time-saving [8][11]. As there are many affirmative pros to AI, there are certain inevitable cons too. The cognitive behaviour in which AI and humans interacting in collaboration, where the results are based on inputs of knowledge directed in a keen manner so as to get desired and expected outputs from the pool of data being accumulated and processed at an ever rapidly increasing rate, as the advancement in technology is reaping further towards its peak is, indeed, the heart of this research. The study highlights on how technology with the help of AI has influenced in becoming a huge part of our lives with cognitive behaviour playing a crucial role in all of it. It further discusses on how technology can do wonders with the colossal amounts of data that are handily available leading its way in interpreting appropriate results in a matter of few seconds. Thus, humans are becoming more contingent on technology. VII. ARTIFICIAL INTELLIGENCE AND SOCIETY A common concern over AI is the impact that the advancement in machine learning and robotics will have on society in terms of employment i.e. job opportunities, current existential job crisis and their overall availability. When we use the term “cognitive behaviour”, it generally refers to the amount of data AI processes in order to generate accurate results by taking several humanly factors into consideration. As exploring the vastness of machine intelligence which led humans to wonder, “Can AI think, act and behave like humans do?” Thus, the development of AI started with the intention of creating similar intelligent systems that think like humans and act accordingly [1][7].

Fig-3: AI and society 1) Assistive Robots: These types of robots can relieve humans from doing tedious tasks all by itself which in turn is going to simplify the work of the employees. 2) Intelligent IT Systems: These types of systems help employees at workplaces from hours long of performing processing and analysing on pools and pools of data as they are capable of working efficiently on their own. 3) Autonomous Driving: Driverless motor vehicles are already on the brim which will lead to eliminate the position of the driver. 14 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

4) Healthcare: Use of AI-induced technologies helps doctors to make better decisions by helping them in interpreting accuracy in the diagnosis and the treatment. 5) Customer Assistants: AI-enabled customer assistants’ helps humans by reducing response time to their queries and giving them quick solutions. 6) Chatbots: Smart chatbots are able to communicate with a real person imitating human conversation through AI. 7) Online Shopping: AI has completely changed the online shopping experience for humans. Online stores keep track of users’ traversing from page to page as per their interests and save it. This helps in giving personalized feel to the users resulting into enhanced shopping experience by applying user behaviour criteria on websites. 8) Social Media: Current social media experience is solely based on induced-AI. It considers all the web searches, behaviour on the web, and everything that a user does accessing various websites. Thus, a majority of decisions are being influenced by AI. 9) Entertainment: AI-induced technologies are being implemented ubiquitously across the globe. By grasping the power of AI, entertainers in various fields (musicians, producers, media-content writers, photographers, et cetera) can understand what their target audiences want. 10) Smart Home: AI has made it possible in easing the life of humans extravagantly. Most of the smart devices in a smart home use AI to learn human behaviour so that the systems can adjust their settings automatically to enhance user experience. VIII. IMPACT OF AI ON SOCIETY Technology is a crucial part in the progress of becoming an advanced species living in a society. Machines are normally made of computer programs and they are programmed to take decisions based on a group of rules and scenarios which are already pre-fed into their software [2][3]. As decisions taken by intelligent systems are based on previous records of data and the set of algorithms implemented, which are used to generate accurate results, the chances of errors reduce [7][8][10]. Humans have become so dependent on AI and its variation in technologies that it nearly seems impossible to survive without the existence of it. Depending too much on something that man himself has created will lead to some serious issues that humans will be facing in the future i.e. too many dependencies on machines and AI is bound to create havoc if we don’t restrain ourselves from relying too much on the data produced by them [6]. This shows cognition in human behaviour and AI resulting in an extremely gripping influence on the society [3][4]. At this rate, human thinking and decision-making abilities will start to degrade. If machines start to replace humans in every field, people are going to be unemployed sooner than expected. This being said there’s tremendous risk of machine intelligent systems taking over the human world. Machine intelligent systems are able to learn by implementing and become better with time. If humans solely depend on these machines, what will our future really look like? [2]. Creativity and innovation are the only things that differentiate humans from machines. If humans continue to rely on their machines, their creativity will eventually fade away. There’s a greater risk that ever increasing impact of AI on society can take away their humanity. This will lead to social destabilization. Certain measures need to be considered and implemented on immediate terms in order to avoid drastic consequences in the near future [2][3][4][9].

Fig-4: Human and intelligent system in conflict IX. SUMMARY Intelligent systems replacing humans in the workplace area is a growing threat for many. Already, it has started to descend upon humans. There are many pros and cons when it comes to impact of AI on society, along with many ethical and moral issues. The dreaded question of all time is that would you be able to put your trust into a machine’s instinct(s) over human instinct(s)? Would you? 15 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

If we expect AI intelligent systems to do what humans want, we need to study humans— psychologically and rationally. Human values need to be taken into consideration as well with the development of AI. As machines and AI have already taken over our human lives, these questions need to be answered. X. CONCLUSION The study topic cognitive behaviour of AI on society has led to many intriguing theories and queries such as to what extent humans are ready to allow machines take over their lives? Will this continue in future? Or will humans finally have their way back to controlling intelligent systems? Future research will have more in-depth perception on the cognitive behaviour of AI and how it smoothly alters and affects its surroundings. Future research will also include the study of social destabilization and how to dismantle it to find a balance between AI and society. REFERENCES [1] Artificial Intelligence A Modern Approach by Stuart J. Russell and Peter Norvig [2] Jobs AI will take over first by sector from https://www.iotforall.com/jobs-ai-will-take-over-first-by- sector/ [3] IBA Global Employment Institute Artificial Intelligence and Robotics and Their Impact on the Workplace April 2017 [4] The alleged threat of AI taking away human jobs is not what we think it is from https://www.forbes.com/sites/forbestechcouncil/2019/01/17/the-alleged-threat-of-ai-taking-away-human- jobs-is-not-what-we-think-it-is/ [5] AI safety needs social scientists from https://distill.pub/2019/safety-needs-social-scientists/ [6] Why AI safety? from https://intelligence.org/why-ai-safety/ [7] Superintelligence: Paths, Dangers, Strategies by Nick Bostrom [8] Explainable Artificial Intelligence (XAI) by David Gunning [9] Artificial Intelligence: Opportunities and Risks Policy Paper by Effective Altruism Foundation [10] Artificial Intelligence and Life in 2030, one hundred year study on Artificial Intelligence | Report of the 2015 study panel | September 2016 [11] Recent and Current Artificial Intelligence Research in the Department of Computer Science, State University of New York at Buffalo by Shoshana L. Hardt & William J. Rapaport [12] The Birth of Artificial Intelligence and its Baby Steps by Nataly Melendez [13] Fig. 1 from Google.com image search results [14] Fig. 4 from Google.com image search results

16 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

DIGITAL IMAGE PROCESSING TECHNIQUES

Sakina Masalawala Department of Information Technology, K.C. College, Churchgate, Mumbai

ABSTRACT Handwritten character recognition is always a frontier area of research in the field of pattern recognition. There is a large demand for OCR on hand written documents in Image processing. Even though, sufficient studies have performed in foreign scripts like Arabic, Chinese and Japanese, only a very few works can be traced for handwritten character recognition mainly for the south Indian scripts. OCR system development for Indian script has many application areas like preserving manuscripts and ancient literatures written in different Indian scripts and making digital libraries for the documents. Feature extraction and classification are essential steps of character recognition process affecting the overall accuracy of the recognition system. This paper presents a brief overview of digital image processing techniques such as Feature Extraction, Image Restoration and Image Enhancement. A brief history of OCR and various approaches to character recognition is also discussed in this paper. Keywords: Optical Character Recognition (OCR), Classification, Digital Image Processing.

I. INTRODUCTION The history of OCR can actually found back in 1923 Tausheck and 1933 Handel gave the first idea of the concept of the OCR. Optical Character Recognition deals with the problem of recognizing optically processed characters. Optical recognition is an offline process i.e. the recognition starts after writing or printing has been completed. Handwritten character recognition is a frontier area of research for the past few decades and there is a large demand for OCR on handwritten documents. Even though, sufficient studies have performed in foreign scripts like Chinese, Japanese and Arabic characters , only a very few work can be traced for handwritten character recognition of Indian scripts. Even now no complete hand written text recognition system is available in Indian scenario and it is difficult due to large character set of Indian languages and the presence of vowel modifiers and compound characters in Indian script. The problem of character recognition can be classified based on two criteria. One is based on the type of the text which is printed or hand written. The other is based on the acquisition process which can be on-line of off-line. It is generally considered that the on-line method of recognizing handwritten text has achieved better results than its off-line counterpart. In case of online character recognition, there is real time recognition of characters. Online systems have better information for doing recognition since they have timing information and can avoid the initial search step of locating the character as in the case of their offline counterpart. In case of offline character recognition, the typewritten or handwritten character is typically scanned in the form of a paper document and made available in the form of a binary or gray scale image to the recognition algorithm. Offline character recognition is a more challenging and difficult task as there is no control over the medium and instrument used. 1.1 Brief History of Character recognition Many methods have been proposed for character recognition; they are often subjected to substantial constraints due to unexpected difficulties. Historically character recognition system has evolved in three ages , namely the periods cited denoting as 1.1.1 1900-1980 (early ages) – The history of character recognition can be traced as early as 1900. When the Russian Scientist Tyering attempted to develop an aid for visually handicapped the first character recognizers appeared in the middle of 1940s with the development of digital computers. The previous work on the automatic recognition of characters has been concentrated either upon machine printed text or upon small set of well distinguished hand written text or symbols. The commercial character recognizers were available in 1950s. 1.1.2 1980-1990 Developments – The studies until 1980 suffered from the tack of powerful computer hardware and data acquisition derives. However, the character recognition research was focused on basically the shape recognition techniques without using any semantic information. 1.1.3 After 1990 advancements – The real progress on character recognition system is achieved during this period, using the new methodologies and development tools, which are empowered by continuously growing information technologies. In the early nineties, Image processing and Pattern recognition techniques are efficiently combined with the Artificial Intelligence methodologies. These days in addition to the more powerful computers and accurate electronic equipment such as cameras, scanners and electronic tablets, we have efficient use of methodologies such as Hidden Markov models, neural networks; Fuzzy set reasoning and Natural 17 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 language processing. Character recognition system is the base for many different types of applications in various fields, which we use in our daily lives. Post offices, banks, security systems, number plate recognition system and even in the field of robotics use this system as the base of their operations. II. CHARACTER RECOGNITION APPROACHES Character recognition systems extensively use the methodologies of pattern recognition, which allots an unknown sample to a predefined class. Many techniques for character recognition are investigated by the researchers and character recognition approaches can be classified as Template matching, Statistical techniques, Syntactic or structural, Neural network, Hybrid or Combination approaches. 2.1 Template matching approach - This is the simplest way of character recognition, based on matching the stored data against the character to be recognized. The matching operation determines the degree of similarity between two vectors i.e. group of pixels, shapes curvature etc. a gray level or binary input character is compared to a standard set of stored data set. According to similarity measure (e.g. Euclidean, Yule similarity measures etc.), a template matcher can combine multiple information sources, including match strength and k-nearest neighbor measurements from different matrices. The recognition rate of this method is very sensitive to noise and image deformation. 2.2 Statistical Techniques - Statistical decision theory is concerned with statistical decision functions and a set of optimality criteria, which increases the probability of the observed pattern given the model of a certain class. Statistical techniques are based on the assumptions such as Distribution of the feature set, statistics available for each class, collection of images to extract a set of features which represents each distinct class of patterns. The measurements are taken from n-features of each word unit that can be thought to represent an n-dimensional vector space. The major statistical methods applied in the character recognition field are Nearest Neighbor Likelihood or Bayes classifier, clustering Analysis, Hidden Markov Modeling, Fuzzy Set Reasoning, Quadratic classifier etc. 2.3 Syntactic or Structural Approach - In Syntactic Pattern recognition a formal analogy is drawn between the structure of pattern and syntax of a language. Structural pattern recognition is intuitively appealing because in addition to classification, this approach also gives a description of how the given path constructed from the primitives. Flexible structural matching is proposed for identification of alphanumeric characters 2.4 Neural Networks - Various types of neural networks are used for character recognition classification. A neural network is a computing architecture that consists of massively parallel interconnection of adaptive neural processors. Because of its parallel nature, it can perform computations at a higher rate compared to classical techniques. Because of its adaptive nature, it can adapt to changes in the data and learn the characteristics of input signal. Output from one node is fed to another one in the network and final decision depends on the complex interaction of all nodes. Several approaches exist for training of neural networks like error correction, Boltzman, Hebbian and competitive learning. Neural network architectures can be classified as, feed-forward, feed-back and recurrent networks. The most common neural networks used in the character recognition systems are the Multi Layer Perceptron (MLP) of the feed forward networks and the Kohonen’s Self Organizing Map of the feedback networks. 2.5 Hybrid or Combination Classifier - We may have different classification methods or different training sections, different feature sets, different training sets, all resulting in set of classifiers, whose outputs may be combined together, with the hope of improving overall classification accuracy. If this set of classifiers is fixed, the problem mainly focuses on the combination function. It is possible to use a fixed combiner and optimize the set of input classifiers. A typical combination scheme consists of a set of individual combiner and classifiers which combines the results of the individual classifiers to make the final decision. Various schemes for combining multiple classifiers can be grouped into three main categories according to their architecture cascading, hierarchical, and parallel. 2.6 Indian Character Recognition - Not many attempts have been made on the character recognition of Indian character sets. However, some major works are reported on Devanagari. Some attempts are also reported on Tamil, Kannada, Gujarathi, Bengali, Malayalam and Telugu.Character recognition of handwritten and printed text is of great importance for electronic conversion of historical information including letters, diaries, wills and other manuscripts. The problem is challenging because of human handwriting variability, uneven skew and orientation as well as noise and distortion such as smudges, smears, faded print, etc. identification of handwritten Indian scripts especially of Bangala, as well as Malayalam, Hindi, English, etc. Most of the Indian scripts have 500 or more characters or symbols used in running text, through the number of basic vowels and consonants is not more than 50. The number is multiplied by three types of vowel modifiers that may be glued 18 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 below the consonants, thus generating threefold consonant-vowel combinations. Further increase in number is possible where consonant creates a complex orthographic shape called compound characters. For some scripts like Bangla, Gujarthi, Telugu and Devanagari languages consists of large number of compound characters. These compound characters can also take vowel modifiers to generate threefold more shapes. Thus orthographic shapes may run of the order of thousand. Only Tamil and Punjabi scripts are relatively simpler, where the number of characters/ symbol is about 150 and 70 respectively. Most Indian script lines can be partitioned into three sub-zones. The upper and lower zones may consist of parts of the basic characters as well as vowel modifiers. These parts of two consecutive text lines normally do not overlap or touch in case of printed script, but for handwriting, people have the tendency to write them bigger, leading to overlapping and touching characters. Overall these characteristics make handwritten and printed Indian text recognition more challenging. III. ARCHITECTURE OF A GENERAL CHARACTER RECOGNITION SYSTEM The major steps involved in recognition of characters include, pre processing, segmentation, feature extraction and classification (fig. 1) 3.1 Pre Processing - The sequences of pre-processing steps are as follows 3.1.1 Noise Removal - Noise is defined as any degradation in the image due to external disturbance. Quality of handwritten documents depends on various factors including quality of paper, aging of documents, quality of pen, color of ink etc. Some examples of noises are Gaussian noise, salt and pepper noise. These noises can be removed to certain extent using filtering technique. 3.1.2 Thresholding - The task of thresholding is to extract the foreground (ink) from the background (paper). Given a threshold, T between 0 and 255, replace all the pixels with gray level lower than or equal to T with black (0), the rest with white (1). If the threshold is too low, it may reduce the number of objects and some objects may not be visible. If it is too high, we may include unwanted background information. The appropriate threshold value chosen can be applied globally or locally. Otsu’s algorithm is the commonly used global thresholding algorithm. 3.1.3 Skeletonization - Skeletonization is an image pre-processing technique performed to make the image crisper by reducing the binary valued image regions to lines that approximate the skeletons of the region. 3.2 Segmentation - Segmentation step contains word segmentation, character segmentation and line segmentation. Methods for character segmentations are based on i) White space and pitch ii) Projection analysis and iii) Connected component labelling 3.3 Normalization - It is the process of converting the random sized image into standard sized image. In this, size normalization avoids inter class variation among characters. Bilinear, Bi-cubic interpolation techniques are a few methods for size normalization. 3.4 Feature Extraction - Features are a set of numbers that take the salient characteristics of the segmented image. There are different feature extraction methods for character recognition . 3.5 Classification - The feature vector obtained from previous phase is assigned a class label and recognized using unsupervised and supervised method. The data set is divided into training set and test set for each character. Character classifier can be Bayes classifier, Nearest neighbour classifier, Radial basis function, Support vector machine, Linear discriminant functions and Neural networks with or without back propagation. 3.6 Post-processing - Post-processing step involves grouping of symbols. The process of performing the association of symbols into strings is referred to as grouping. IV. FEATURE EXTRACTION AND CLASSIFICATION TECHNIQUES USED IN THE OCR SYSTEMS FOR INDIAN SCRIPTS Veena Bansal and R.M.K Sinha presented a complete OCR for printed Hindi text written in Devanagari script. The system used following features: Coverage of the region of the core strip, Vertical bar feature, Horizontal zero crossings, Number of positions of the vertex points, Moments, Structural descriptors of the characters for classification, Tree classifiers are used. Overall accuracy obtained at the character level is 93%. Sinha and Mahabala designed a syntactic pattern analysis system for Devanagari script recognition. The system stores structural descriptors for each symbol of the script. They achieved 90% accuracy. Reena, Lipika and Chaudhury 19 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 have tried to exploit information about similarity between numerals, Style invariant features and stylistic variations. They presented a approach for recognition of handwritten Devnagari numerals using multiple neural classifiers. Sandhya Arora have used Intersection features with Neural Network for Devanagari script and achieved 89.12% accuracy. Singh and Budhiraja presented an OCR system for handwritten isolated Gurumukhi script using Zoning, Projection histogram, Distance profile features, and Background directional features and used Support Vector Machines (SVM) for classification and thus obtained 95.04% of overall accuracy. Further Geeta and Rani represented an OCR system for Gurumukhi numerals using Zone Distance features and SVM classifier and achieved 99.73% accuracy. G. S. Lehal and Chandan Singh directed their efforts towards development of OCR system for Gurumukhi. They used Local features (concave/convex parts, number of endpoints, branches, joints) and Global features (number of holes, projection profiles, connectivity etc.). For classification hybrid classification technique, binary decision tree and nearest neighbour was used. They achieved a recognition rate of 91.6%. Dharamveer Sharma and Puneet Jhajj used zoning feature with hybrid classification technique using KNN and SVM classifier and achieved 72.7% accuracy. A very influential attempt made by the Jalal, Feroz and Choudhuri for Bangla script. They represent neural network classifier by using Bounded rectangle calculation, Chain code generation, Slope distribution generation features. They achieved 96% system accuracy. Chaudhuri and Paul represent an OCR system to recognize Bangla and Devanagari using stroke and shaded portion feature with tree classifier. U. Bhattacharya, M. Shridhar, and S.K. Paruil implemented Neural network classifier for isolated Bangla characters with chain code features and achieved 92.14% accuracy on testing sets and 94.65% on training sets. Negi and Chakravarthy represent an OCR system with 92% performance using template matching, fringe distance for Telegu script. Another attempt was made by Patvardhan and Lakshmi for Telegu script. They used neural classifier by using directional features and they achieved 92% accuracy. Arun K Pujari, and C Dhanunjaya Naidu implemented an adaptive character recognizer for Telugu scripts using Multi resolution Analysis. They represented DNN (Dynamic Neural Network) using Wavelet analysis and achieved 93.46 % success rate. In south India, Kannada and Telugu have similar scripts. R Sanjeev and R D Sudhakar represent an OCR system for printed Kannada Script using two stage Multi-Network (Neural Network) classification technique employing wavelet feature and achieved 91% accuracy at character level. M Sagar, Shobha and Ramakanth designed a syntactical analysis system using Ternary Tree based classification for isolated Kannada characters. They have given more emphasis on Post-processing step, using dictionary based approach to increase the OCR accuracy. T V Ashwin and P S Sastry represents a font and sizeindependent OCR system for printed Kannada documents using support vector machines (SVM). B Chaudhuri U Pal and Mitra gave a prototype OCR system for Oriya script. They use Directional features and Global Features and classified them using Decision tree classifier and achieved 96.03% accuracy at character level. Junaid, Umar, and Muhammad Umair attempted to make an OCR system for isolated Urdu characters using NN classifier using structural features like width, height and checksum of the character. Their prototype gained the accuracy of 97.43%. Another good attempt was made by Jhuwair and Abdul for Urdu script. They achieved the 97.12% recognition rate using Sliding window and Humoment feature using KNN classifier. V. APPLICATIONS OF CHARACTER RECOGNITION SYSTEM Optical Character Recognition has a wide range of applications in various areas. It can be used as a telecommunication aid for postal address reading for the deaf, processing of documents, in recognition of foreign language and also for language translation . In bill processing systems it is used to read payment slips like electricity bills , telephone / water bills. It will read and recognize the amount to be paid and also recognize the account number. The character recognition system can also be used for reading the address, assigning Zip codes to letters, application forms, voter ID cards, and identification of bank cheques by recognizing the account number and the amount written on the cheque. These systems can also be used in automatic processing of issuing tickets to air line passengers, validation of passports and visa cards etc. Address readers in postal departments locates the address on letters and sorts them according to their location using the zip code. The multiline optical character reader (MLOCR) by United States Postal Services (USPS) locates the address block on a mail piece, reads the address, identifies ZIP and generates a 9-digit bar code and sorts the mail to the correct stacker. This classifier recognizes up to 400 fonts and the system can process up to 45,000 mail pieces per hour. VI. CONCLUSION Apparently, digital image processing is an important aspect of photography considering that technology keeps changing. There are a host of digital image processing techniques that provides a wide application variety in feature extraction and classification. Artificial neural networks are frequently used to undertake character 20 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 recognition because of their high tolerance to noise. The systems have the capability to realize perfect results. Apparently, the feature extraction stage of OCR is the most significant. Survey represents a study of feature extraction methods with different classifiers implemented in OCR systems for different Indian scripts .Variance between the features should be clearly discriminative and specific so that system can classify the characters with maximum efficiency and minimum error rate. This survey paper helps researchers and developers to understand history of the OCR research work for Indian scripts. OCR for Indian scripts that works under all possible conditions and gives highly accurate results still remains a highly challenging task to implement. We believe that our survey will be helpful for researchers in this field. REFERENCES 1. G. Tauschek, “Reading machine,” U.S. Patent 2 026 329, Dec. 1935. [23] P. W. Handel, “Statistical machine,” US. Patent 1915 993, June 1933. 2. P. W. Handel, “Statistical machine,” US. Patent 1915 993, June 1933. 3. R. Plamondon and S. N. Srihari, “On-line and off-line handwritten recognition: a comprehensive survey”, IEEE Transactions on PAMI, Vol. 22(1), pp. 63–84, 2000. 4. T. Yarman, Nafiz arica, factos – “An overview of CR focused on offline handwriting “– IEEE – 1996.

21 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

HEALTH CARE

Jay Chiplunkar, Rakhi Gupta, Nashrah Gowalkar KC College, Mumbai University, Mumbai

ABSTRACT This paper shows a unique thought of robotization within the health care sector. The concept is to style a robotic system capable of performing arts remote physical examination with touch (i.e., pressing a patient’s abdomen to spot pain regions and stiffness of organs) and ultrasound. The medical mechanismic system can comprises a far off perception interface for the doctor Associate in Nursing a robot situated at the patient’s facet supported by an assistant. In 2 countries (Austria and Poland), we tend to conducted 1st focus teams with doctors so as to spot however the remote medical medical specialist system is assessed and conceptualized relating to the examination procedures (activities), communication problems, and also the mental image of required data. supported the findings, we'll mirror on the technology assessment, i.e., if remote medical services may be an appropriate chance for rural areas wherever the supply of doctors with varied specializations is usually a haul, in addition as requirements for this novel variety of medical treatment from a doctor’s purpose of read (i.e., known aspects increasing acceptance and adoption by users of the system).

I. INTRODUCTION The lack of medical doctors is already visible with the limited number of specialists, who are not always available to medical units, due to geographical (e.g., provincial hospitals), time (e.g., after regular working hours), or other logistic constraints. As a successful medical treatment depends on a timely and correct diagnosis by doctors with special expertise, medical services performed remotely are emerging. This situation led to development of several types of medicine related services performed remotely, ranging from Telenursing, -rehabilitation, and -psychiatry, to Tele-surgery, and pharmacy. In the ReMeDi (Remote Medical Diagnostician) project a robotic system is developed that enables medical tele examination of patients. The ReMeDi system supports doctors to perform remotely i) a physical examination, including palpation, and/or ii) ultrasonography. The multifunctional robotic system is envisioned to provide a control console with advanced interfaces, including a haptic device (see Fig. 1). This system will be operated by the doctor in a remote location. The robot with sensors and end effectors is located at the patient’s side. The entire procedure will be supported by an assistant at the patient’s location.

The following use cases (potential clinical situations) were the starting point for the investigation of doctors’ needs and strategies regarding palpation and ultrasonography in the requirement analysis of the project. 1) Diagnostics of a severe abdominal pain: A patient in a small rural hospital suffers severe stomach pain. A young physician, who is on-call at the hospital, has difficulties identifying the medical problem. S/He is going to ask an internal medicine specialist at a remote location (Specialist Hospital or Medical Center of Telemedicine) for support in diagnostics. The remotely located specialist, performing a standard medical interview and physical examination, has to make a diagnosis and propose therapeutic procedures. 22 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

2) Diagnostics of an acute heart failure: The patient with symptoms of acute heart failure is admitted to an emergency unit of a small hospital late at night. Since patient’s general conditions continuing to worsen, an immediate ultrasonographic examination of heart (echocardiography) is needed. There is no cardiologist on call in the hospital to perform the examination but they have an ultrasonograph with echocardiography module and the robot for the remote examination. The remotely located cardiologist can perform a remote ultrasonographic examination and, after confirming the pathology, the physicians can immediately plan therapy for the patient or organize additional consultation. 3) For both aforementioned use cases the remotely located specialist can also perform additional examination techniques (e.g., ultrasonography for the abdominal pain or physical examination for the acute heart failure), if in her/his opinion it is needed. II. PROBLEM DEFINITION The focus group started with a warm-up phase and a description of the goal of the focus group, as well as a general explanation of the ReMeDi project. The participants were then divided into two groups to think about two scenarios (1) Diagnosis of abdominal pain by physical examination (2) diagnosis of acute heart failure by ultrasonography. Each group was asked to think about the procedure, i.e., necessary steps for the examination and what information is needed (e.g., medication and the medical history of the patient). Two types of instant cards were provided to them for this purpose: 1) activity cards for necessary steps conducted by the doctor 2) information cards for important information needed for diagnosis. Some cards were pre-printed – derived from the lengthy description of the use cases of the project. Blank cards were also offered to allow participants to write and describe activities and needed information. After they had presented and discussed their scenarios, participants received additional cards to extend their scenarios, i.e., technology cards containing names and descriptions of technologies which could be useful (e.g., a haptic device or a keyboard). Examples of the instant cards can be seen in Fig.

III. PROPOSED METHODOLOGY In order to gain a deeper insight into remote examinations, participants were also asked to solve some small tasks by using the instant card technique [2], which is a participatory design method, where cards are provided in order to develop scenarios together with the users. A typology of cards is offered, which enable a formalized development of scenarios. These cards (providing various perspectives and contextual information like time, space, device, etc.) aim at capturing intentions and opinions of participants and should also encourage and support design ideas. The main goal of this technique is to motivate focus group participants to create first step design ideas and to select relevant ideas, followed by a description of contextual usage scenarios for their innovative and invented design ideas. The content of the cards can be in textual form (questions or statements) or in visual form (graphs, icons, or pictures). The participants are asked to select, sort, and fill out these cards, and then they are taped on a sheet of paper (cf. Fig. 2) for the purpose of pre-organizing the used cards. With their ideas, participants aim to improve the status quo for a certain type of situation – in our case from traditional examination to remote examination by using a robotic system. A final presentation and discussion of the poster helps participants to refine their ideas and scenarios and also helps observers to understand the thoughts of the users. The outcome of the instant card technique from the researchers’ perspective are developed posters and a visual and oral presentation of scenarios by the focus group participants, which can be used to extract design ideas and mental models of users, as well as a deeper understanding of the scenarios. 23 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

III. RESULT One outcome of the focus groups are scenarios, created by the participants, about (1) a diagnosis of abdominal pain by physical examination (2) a diagnosis of acute heart failure by ultrasonography in a remote setting with a medical robot. To illustrate the participant’s ideas, communication issues, and information needs regarding such remote examination settings, we provide condensed versions of both scenarios, as follows. A. Physical examination with palpation scenario The patient comes into a hospital and the doctor, who is not physically present, checks how the patient looks like, e.g., if s/he is pale, has pain, any skin abnormalities or fractures, and how the patient breathes via a system consisting of microphones, speakers, 3D glasses, and a camera. The doctor proceeds with the anamnesis, i.e., interviewing the patient about her/his discomfort and possible reasons, as well as her/his medical history (e.g., past surgeries, medications, allergies, age, lifestyle), which can offer indications. Regarding these questions, the doctor also uses a computer for viewing this information. Also olfactory information about the patient is very important, which can be provided by an assistant. After the anamnesis and depending on the symptoms, the doctor measures the blood pressure, heart rate, and the body temperature of the patient. To conduct all these measurements, the help of the assistant is needed. The doctor then starts with the percussion of the patient, followed by superficial palpation and deep palpation to assess the internal organs and to locate pain. The next step is the palpation of the liver and the spleen to receive more information about both organs. Then the doctor investigates the Blumberg’s sign (i.e., compressing the abdominal wall slowly and then rapidly releasing it). In order to remotely conduct the palpation, the assistant roughly puts the robot in place for the examination, while the finepositioning of the robot is done by the doctor using a joystick or a 3D mouse and a head mounted display (HMD) for controlling the viewing direction of the robot. For the remote palpation in particular, the doctor uses a HMD and haptic interface technologies such as shape rendering arrays or cybergloves in order to locate pain and/or to search for hardenings (possible tumour) or abnormalities of the internal organs. The transmission of data is in real-time without latency. In superficial as well as deep palpation, auditive information is also important when the doctor can hear a strange noise while pressing. During the whole examination, the doctor always checks the reaction of the patient, e.g., facial and verbal expressions and gestures. Moreover, computer equipment like a PC, screens, a mouse, and a keyboard is needed. As the next step, the doctor auscultates the patient using a stethoscope, which is part of the robot, for information about heart tones and breathing sounds. S/He also performs an auscultation of the stomach to check peristalsis. The doctor uses headphones for the auditive information of the stethoscope because it is more similar to a traditional examination situation. The doctor also assesses the patient's throat and neurological symptoms, using a tongue-depressor, neurological hammer or flashlight. In all instrumental procedures, the assistant's help is needed. At the end, the doctor collects the information and sets a diagnosis. B. Ultrasonography scenario The assistant, who is present during the examination together with the patient, turns on every medical device at the beginning of the examination. The doctor, who is not physically present in the examination room, asks the patient via microphone, speakers or headphones about her/his present medical situation (e.g., why he is here, what is the main problem) and her/ past medical history (e.g., past surgeries, medications, life style, drugs, allergies, age). The patient has a speaker and microphone to talk with the doctor. With the help of a camera, screen, or head-mounted display, the doctor checks how the patient looks, if s/he is calm or nervous, if s/he is pale, has any signs of pain, has any bruises or rash, came with the ambulance or by him/herself. In the meantime, the assistant measures the blood pressure and body temperature of the patient with a pressure gauge and thermometer, and the results are shown on the screen of the doctor. Then the doctor auscultates the patient's heart and chest via a robot with a stethoscope (steered by a joystick) and searches for auscultatory phenomena, which the doctor can hear in his/her speakers or headphones. The assistant connects the patient to the ECG in order to synchronize the images of the ECHO of the heart with the ECG line, and the doctor can see the ECG line on his screen. Then the doctor performs the ECHO of the heart with an ECHO device and assesses the function of the heart. S/He sees the image on the screen or head-mounted display, as well as hears audible information in speakers or headphones. The next step is the USG of the blood vessels with an USG device. For assessing the function of the vessels, the doctor sees the image again on the screen or headmounted display. S/He also perceives audible information in speakers or headphones. During the whole examination, the doctor and the assistant can communicate with each other. They want to have the possibility to decide, which part of the communication between them is transmitted to the patient. The communication can be established by speech but is not restricted to it. It is also thinkable to transfer information by text, by simple button presses or other possibilities. Finally, the doctor summarizes the information and creates a therapeutical plan for the patient (i.e., further examinations, medication). The doctor can also access the record from the examination. 24 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

C. Conditions and limitations for the acceptance of the medical robotic system the two focus groups open mainly three factors, that play a significant role for associate agreement to a distant examination via a medical robotic system from doctors’ purpose of view: technology/system-related issues, medical circumstances, and human facilitate on-the-scene. First, the possibilities provided by the technology, i.e., what activities are gettable to be done by the medical robotic system are a significant issue. for a couple of forms of examinations, doctors – relying on the necessary level of fine mechanical activities – would fits perform the examination remotely. this may well be, e.g., ultrasound, procedure of the center and lungs, piece examination, enteroscopy, or operation. Some steps, like giving infusions or blood drawing, are gave the impression to be unfeasible to complete remotely, but are done by the assistant gift on-the-scene. Moreover, realistic feedback modalities and mechanisms for transferring knowledge from the system to the doctor ar crucial. If touching should be done remotely, natural sensory system feedback is vital, in step with the doctors, therefore on conduct this kind of examination. If the sensory system feedback is not natural enough or if any latency is serious the examination, doctors would refuse to conduct a distant examination. apart from natural sensory system feedback, the most focus groups showed that doctors fits conduct a distant examination with a system like ReMeDi, only if they are able to get all the info needed (e.g., temperature, pulse, blood pressure). Obviously, the system should be reliable and in addition information security is a crucial topic for the doctors. If information transmission is not secure or can be hacked, they all told chance would refuse the usage of such a system. Second, the medical circumstances relating to the pathological state of the patients and treatment potentialities are another crucial issue. at intervals the main focus groups, the doctors raised the problem the thanks to influence the patient once the examination. One participant declared, “… It only is sensible, if there is someone, global organization agency can facilitate the patient once the examination, e.g., if we have a tendency to tend to cannot transport the patient as a results of the field does not work, there isn't any reason to seem at the patient remotely …” There should be an inspiration on the thanks to handle extra treatment of the patient, if prompt action is required, as associate example, transferring the patient to a different hospital simply just in case the patient has associate inflammation or associate mobile surgery is vital. If it isn't doable to help the patient afterwards, the doctors do not ought to need over responsibility for the patient and so the examination. Another challenge is that doctors cannot take over responsibility, if they didn't examine the patient by themselves. As a consequence if the patient should be transferred to a distinct hospital for any reason, the examination should be conducted over again. Third, if victimization such a medical robotic system, the doctors want human facilitate on-the-scene. There should be associate assistant with the patient, to whom the doctor can sit down with, provide orders to, and global organization agency is in addition guilty of all the technical instrumentality. many tasks at intervals the examination procedures need to be performed by associate assistant. The assistant is guilty of constructing prepared and caring for the instrumentality and has the first, direct, and immediate contact with the patient. In ancient examination things, the doctor already gains valuable knowledge relating to the patient’s health standing as shortly as s/he enters the realm. As delineate at intervals the physical examination state of affairs with touching, the olfactory knowledge relating to the patient in addition plays a significant role. By that, doctors may perceive if the patient is drunk, has vomited, etc. However, this knowledge is difficult to induce for doctors in an exceedingly} very remote setting. IV. CONCLUSIONS Based on the findings of the focus groups, we can confirm that the processes of the two examinations (physical examination with palpation and/or ultrasonography) have been well defined in the ReMeDi use cases. In short, the examination starts right when the patient enters the examination room (in case the patient comes with an ambulance, even earlier). First, a detailed anamnesis is done which includes medical history, medication, present symptoms and so on. A medical diagnosis is made after the ultrasonography/palpation, and – if necessary – a therapy plan or further examinations are defined. The output of the anticipation phase of technology assessment revealed several necessities for actually using, accepting, and later on adopting the ReMeDi medical robotic system: 1) Reliability - The medical robotic system must work reliably, without information and data interruptions (i.e., it is a life-critical or safety-critical system). Therefore, the assistant should also be in control of the robotic system in case of system malfunction. 2) Intuition - The interaction with the medical robotic system must be as natural as possible so that the interaction comes intuitive and without deep training. For a proper interaction with the multi-modal interface of the systems, it should provide synchronously haptic, visual, and auditive feedback to the doctor. 3) Collaboration - The medical robotic system must provide facilities for a close collaboration between the assistant and the doctor as, for example, the doctor misses her/his olfactory sense, which needs to be compensated and communicated by the assistant. 4) Integration - The usage of the medical robotic system must be properly integrated in the overall medical procedure (i.e., examination, diagnosis, and treatment), as it 25 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 otherwise would not make sense to make a remote examination. The results showed that the combination of focus groups with the instant card technique is a promising approach for technology assessment (i.e., anticipation of even not yet existing robotic systems). It revealed necessities for the medical robotic system, which will increase the possibility of technology acceptance and adoption by the target users, the doctors. In our opinion, a detailed user requirements analysis and technology assessment is inevitable and should be conducted as early as possible in the development phase of robotic systems. All in all, it was shown that the main difference between traditional examinations and remote examinations requires many technologies, which must be carefully assessed. Otherwise, the system will more likely fail to be accepted by the target group. REFERENCES [1] E. Beck, M. Obrist, R. Bernhaupt, and M. Tscheligi, “Instant Card Technique: How and Why to apply in User-Centered Design”, in Proc. Participatory Design Conf., 2008, pp. 162-165.

26 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

HONEYPOTS / HONEYNETS IN COMPUTING SECURITY

Kaveri G. Vernekar KC College, Mumbai University, Churchgate

ABSTRACT Security threats are growing every year and have become more malicious with cybercriminals who have been stealing financial and personal information. Hackers have an even wider selection of devices, like cell phones and automobiles which are becoming more computerized, to infect with malicious threats. New areas of exposure are created with so many pluggable devices available coming on the market. Becoming aware of the security means that one understands the potential of losing data as some individuals or groups who may deliberately attempt to steal, misuse and/or damage said organizational information in the databases and systems of the sufferer organization. Computer security – security applied to computing devices such as computers and smart phones, as well as computer networks such as private and public networks, including the Internet. To avoid such attacks some measures can be taken- Honeypots, Honeynets, Ids, strong passwords, etc. It is very difficult to determine intention for an attack. Places that are appealing to the attackers are called "attractive targets". Keywords: Computer Security, Targets, Attackers, Honeypots, Honeynets

I. IMPORTANCE OF THE SECURITY Information is an important & vital asset to any organization or entity. To understand the significance of information & its security, there is a need to evaluate both the value of information and analyze consequences of such information being compromised. Businesses will continue to hold sensitive information of their employee, trade secrets and business plans, etc. As more and more of this information is stored and processed electronically, and transmitted across company networks or the internet, the risk of unauthorized access increases multi-fold. When information falls in wrong hand, it can ruin business relations, tarnish an organization’s market image & result into loss of Client’s Trust. It can also lead to huge financial loss which can take years to recover from. [1] The meaning of the term computer security means the technique of protecting computers, networks, programs and data from unauthorized access or from cyber attacks. [17] The CIA Triad was developed as a baseline standard model in order to evaluate and implement best practices in information security regardless of the underlying system and/or organization. [2] An attacker drives to the weakest link of security infrastructure. The weakest link will attract the greatest number of attacks. In a computer network, firewalls are often the strongest point of defense. They encounter their fair share of attacks, but most attackers know that properly configured firewalls are difficult to penetrate, so they will look for easier prey. Malicious attackers generally use the means of social engineering to target people. A threat is a potential attack or a loop hole that could leave doors open for a hacker to break confidentiality, integrity and/or availability of the system or data. Threats can be human (intentionally or unintentionally) or environmental (natural or fabricated) [3]. II. ATTACKS AND TARGETS With a rise of the Internet connectivity, use of personal computers and use of computer networks the risk of information vulnerability has increased due to increased number of attacks. Because of the attacks, the important data can be lost. Cybercrime is any criminal or illegal activity that involves computer, networked device or a network. Crimes such as hacking, virus attacks, DOS attack etc. 30,000 websites are hacked every day. Hacking is a phrase used to describe actions taken by someone to gain unauthorized access to a computer. Example of hacking can be- To unauthorized gain access, using different types of password cracking methods or algorithms. Hackers usually have complete knowledge of computer security; they are mostly skilled computer programmers. Hacking is the process by which cyber criminals can gain easy access to your PC. It can:

27 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

1. Find weaknesses (or pre-existing bugs) in your security settings and exploit them in order to access your information. 2. Install a Trojan horse, providing a back door for hackers to enter and search for your information. Malware is one of the more common ways to penetrate or damage your computer. The growth in the number of computer systems, and the increasing dependency upon them of individuals, businesses, industries and governments means that there are an increasing number of systems at risk. The computer systems of financial regulators and financial institutions are prominent hacking targets for cyber criminals. In-store payment systems and ATMs have also been interfered with in order to collect customer account data and PINs. Desktop computers and laptops are usually targeted to collect passwords or financial account information, or to construct a botnet to attack another target. The increasing numbers of home automation devices are also potential targets. Governments and military computer systems are usually attacked by activists and foreign powers. [5][6] The rapid growths of mobile devices are an exponential growth in security risks. Social Media Networking Growing use of social media will put in to personal cyber threats. [8] The Health and Medical organization systems are also at the risk of being attacked. The electronic healthcare records which contain large amounts of personal information as well as financial details are stored and accessed in such organization. [9] III. SECURITY TOOLS In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, vulnerability, or an attack by removing or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that remedial action can be taken. [1] Ignoring the implementation of proper security tools and policies mostly lead to attacks. The readily available security tools are the IDS, Firewalls and Honeypots. [10] A. FIREWALL A firewall is a network security system that monitors and manages incoming and outgoing network traffics based on determined security rules. A firewall typically establishes an obstacle between a trusted internal network and not trusted external network, such as the Internet. [3] Administrators have to carefully setup the Firewall rules. [10] Types of Firewalls 1. Packet-Filtering Router 2. Circuit level gateways 3. Application level gateways. [10] B. The IDS (Intrusion Detection System) An intrusion detection system (IDS) is a system that monitors network traffic for doubtful activity and issues alerts when such activity is discovered. While anomaly detection and reporting is the primary function, some intrusion detection systems are capable of taking actions when harmful activity or irregular traffic is detected, including blocking traffic sent from doubtful IP addresses. Intrusion prevention systems also identifies and monitor network packets inbound the system to check the malicious activities involved in it and at once sends the warning notifications. [1][3]. IDS is basically classified into 2 types NIDS-Network intrusion detection systems are set up at a proposed point within the network to examine traffic from all devices on the network. It performs an inspection of passing traffic on the entire subnet and matches the traffic that is passed on the subnets to the collection of known attacks. Once the attack is recognized or unusual behavior is observed, the alert can be sent to the administrator. HIDS-Host intrusion detection systems run on self-regulating hosts or devices on the network. A HIDS monitors the incoming and outgoing packets from the device only and will alert the administrator if doubtful or malicious activity is detected. It takes a snapshot of existing system files and compares it with the earlier snapshot. If the analytical system files were edited or deleted, an alert is sent to the administrator to investigate.

28 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Detection Method of IDS: 1. Signature-based Method. 2. Anomaly-based Method. C. Honeypots Honeypots is a system which is built and set up in order to be hacked. Honeypots are the decoy computer system for trapping hackers or tracking the new hacking methods. Honeypots are designed to purposely engage and deceive hackers and identify all the malicious activities that they perform over the Internet. It is a system designed to attract the attackers. [12] Honeypots are designed to impersonate systems that an attacker would like to hack into but limit attacker from having access to the entire network. If Honeypots is successful, the attacker will never come to know that s/he is being tricked and monitored. Most honeypots are installed inside firewalls so that they can be controlled in a better way. A firewall in a Honeypots works in the opposite way that normal firewall works: instead of restricting what comes into a system from the Internet, the Honeypot’s firewall allows all traffic to get in from the Internet and also stops whatever the system sends back out. By engaging a hacker into a system, a Honeypots serves some purposes: • The administrator can watch the hacker exploit the weakness of the system, thereby learning where the system has weaknesses that need to be redesigned. • The hacker can be caught and stopped when he tries to obtain main or root access to the system. • By studying the activities of hackers, designers can create more secure systems that are potentially secure to future hackers. There are two different kinds of honeypots. They are classified based on their deployment method: • Production Honeypots: This is used by companies and corporations for the intention of researching the actual aim of hackers as well as diverting and mitigating the risk of attacks on the overall network. • Research Honeypots: This is used by non-profit organizations and educational institutions for the only reason for researching the motives and tactics of the hacker community for targeting diverse networks. Honeypots are not always designed to identify hackers. Honeypots developers are often more interested in getting into the minds of hackers, which then help them to build-up more secure systems, as well as to educate other professionals about what they learned through their efforts. In general, honeypots are considered an effective method to track hacker behavior and enhance the effectiveness of computer security. Advantages of Honeypots • Honeypots collects data only when someone is interacting with them. • Honeypots reduce false positives • Honeypots easily catch a false negative which means they can easily identify and capture new attacks against them. • Honeypots can capture the activity that is maliciously encrypted • It can work in any IP environment, even in ipv6. • These require lesser resources to be built-up. Disadvantages of Honeypots • Data can be captured only when the Hacker hacks the system actively. • It is very simple for well-skilled hacker to analyze whether he is attacking Honeypots system or real system. • The attacker can use the Honeypots (if recognized) for attacking other non-Honeypots systems. Compare: Honeypots and Ids Honeypots gathers such information which is not available on NIDS NIDS need signature of known attacks to determine malicious activity. Wherein, Honeypots can detect weaknesses that are unknown till date, without any signature. 29 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

New attacks are not detected in NIDS, whereas in Honeypots both known and unknown, or new attacks are detected. In IDS many alerts are generated as False positives, whereas in Honeypots considers all activities unauthorized. Compare: Honeypots and Firewall Firewall restricts attacker inside the network- whereas Honeypots purposely engage the attackers into the system. Firewalls have 1000 log entries whereas the Honeypots have only 5-10 entries. Firewall use manually configured rule to differentiate between legal traffic from illegal traffic, for Honeypots such manually configured rules are not needed. [10] IV. MORE ABOUT HONEYPOTS Based on involvement of the attacker the Honeypots have three types: • Low-interaction Honeypots. • Medium-interaction Honeypots. • High-interaction Honeypots. Low-interaction Honeypots are easy to implement and maintain because they have limited interaction capabilities, which also reduces risk. It has very simple design and has basic functionality. Medium-interaction Honeypots are little complicated than lower systems but not as much as higher systems. In these Honeypots the risk increases with the vulnerabilities. High-interaction Honeypots are a complex solution and which also involves the real operating systems and applications. They capture the wide amounts of information which allows the attackers to interact with real systems where the full level of their behavior can be studied and recorded. Comparing Honeypots based on involvement of the attacker: • Low-interaction Honeypots. It has Easy Installation and configuration effort & Deployment and maintenance effort. The Information Gathered is limited. It has Low Level of Risk. • Medium-interaction honeypots. It has Medium Installation and configuration effort & Deployment and maintenance effort. The Information Gathered in this is medium. It has Medium Level of Risk. • High-interaction Honeypots. The Installation and configuration effort & Deployment and maintenance effort is little Difficult. Information Gathered is extensive. Level of Risk is very high. Working and architecture of Honeypots In the System architecture the Honeypots is first protected by a Firewall, router and data layer which is separated from network that is inside the organization. Then the Honeynets mechanism is used to secure the organization network. To apply more security and detection the IDS is implemented. All the incoming entries in the network and the logs that are created by Honeynets are managed by the Monitor and Control system.

Fig-1: Honeypots Architecture. 30 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Working The administrator of the system will be notified, when an attacker tries to enter the system with a false identity. A log is generated for each entry. As someone tries to enter the system, it is entered in the log. If the attacker is successful in making an entry in systems and attempts to capture data from the database, he can be fooled by fake data. By doing this we can save our system and fool the attackers. When logs are created all information about attacker like attack type, attack pattern, system IP, etc will be easily recorded. This attacker’s information can be used as evidence for further actions. Five Honeypots are discussed below • ManTrap • Back officer friendly • Specter • Honeyd • Honeynet ManTrap ManTrap creates a highly controlled operating environment through which an attacker can interact. It creates a fully functional operating system which has virtual cages. These cages are so strong that attacker is unable to exit and attack the host system. When an attacker attacks and gains access to a cage, for the attacker, it looks as if the cage is a really separate physical system, as he is not aware that he is under observation where every action is recorded. Back Officer Friendly (BOF) It is very straightforward to install, easy to configure, and takes low maintenance. Its capabilities are limited. It has a set of services that simply pay attention on ports, with remarkably limited emulation capabilities. It works with the help of port listeners or open sockets that detect any connections that are made to these ports. Specter Specter is a low-interaction Honeypots. It also has wide alerting and logging capabilities. It is easy to deploy, simple to maintain, and is low at risk because Specter only provide services with limited interaction. Honeyd It is designed as a low-interaction resolution; where there is no operating system projected. Honeyd is designed mainly as a production Honeypots, which is used to detect attacks or illegal activity. When Honeyd receives a query or a connection for a system that does not exist, it assumes that the connection attempt is an attack. When Honeyd receives such traffic, it assumes the IP address of the proposed destination, and then starts an emulated service, and as the emulated service is started, it interacts with the attacker and records all his activities. Honeynets It represents the great of high-interaction Honeypots. It provides the attacker a complete operating system to attack and interact with, and also provide multiple Honeypots. Honeynets are a variety of standard systems implemented within a highly managed network. Since their purpose is in being attacked, by their nature, these systems are type of Honeypots. The controlled network records the entire attacker’s activities that occur within the Honeynet. Anything sent to the Honeynet is suspect. Honeynets take the concept of Honeypots to next level: a Honeynet is a physical network of multiple systems, whereas Honeypots are a single system. Honeynets are highly controlled network, within which you can place any system. A network of Honeypots is mostly called a Honeynet. [18] Comparing the five Honeypots: • In case of Mantrap, specter and Honeynet, the interaction level between the user and the Honeypots is high, and this level is low in case of BOF and honeyd. • Mantrap, specter and BOF are not freely available whereas Honeyd and Honeynet are freely available. • Mantrap, specter and BOF are not open source but Honeyd and Honeynet are open source. • BOF does not support Log file but rest of the Honeypots support log file. • BOF does not emulate the operating system while the remaining four Honeypots can emulate operating system.

31 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

• ManTrap, Honeyd and Honeynet supports unlimited services whereas the BOF and specter support limited services. Honeypots and Honeynets Honeypots and honeynets try to distract attackers from live networks. They collect information on these attacks and give opportunity to observe current methodologies used in attacks. It is a server that is left which allows an attacker to get easy access. The intention is, the attacker spends his time in the Honeypots instead of the actually target. Honeypots typically have the least protection that can help an attacker to bypass easily. If administrators do not use any security, the Honeypots may look doubtful to skilled attackers, and they may simply avoid attacking it. Honeypots are used as a tool to gather information about the attacker. Attackers are constantly evolving their methods to take benefit of different types of attacks. Security professionals are able to observe attackers launching previously unknown attacks against Honeypots. It never holds any valuable data of the organization. The data may appear to be valuable to an attacker, but its expose is risk-free. Honeypots have two primary goals: Distract attackers from the live network. The attacker is not attacking live resources, as long as he is spending time in the Honeypots. Allow observation of an attacker. While an attacker is in the Honeypots, security professionals are able to observe the attack and learn from the attacker’s methodologies. Honeypots can also help security professionals learn about new or previously unknown attacks. The organization is using systems and applications for its production environment, the same systems can be built in the Honeynets. This allows you to recognize the risks and weaknesses that may already exist in the actual production environment. Honeynets can help an organization to develop its response capabilities towards an incident. The results of real environment can be compared to the data captured from within the Honeynet. This information can also be used to identify other compromised systems in real production network. Honeynets also helps to know about security capabilities of the organization. [13] V. RESULT The security provided by the Honeypots based on hardware setups is very expensive for small and medium scaled organization; a software based Honeypots can be used as a very effective security solution for these organizations. Among all these types of Honeypots low-interaction is the mostly used because of its easy implementation and maintenance. But High-interaction Honeypots are the most secure and professional type as these provide security also generates a log about all entries in the system which is handy to find the malicious activity in the system. The Honeypots must be upgraded to supply security against new type to attacks. Honeynets are useful for organization to test and improve their network. Honeypots should be designed as such that the attacker should not be able to identify that his activities are observed or recorded. Honeypots can be used together with some other form of security such as IDS to make it more secure and increase its efficiency. If as Security Company want to identify current and new attack methodologies, then among HIDS, Honeypots and Firewall, the best choice would be Honeypots. Because, Honeypots are a server designed that can help administrators learn about previously unknown attacks- also called zero-day exploits. Whereas, a HIDS makes an attempt to detect attacks on an individual host, but may not catch new methods against the network. The Firewall logs can easily log the connections, but are not able to identify new attack methods. [16] VI. CONCLUSIONS Network security concerns are increasing day by day as the mode and style of attackers are evolving every single day. A universal truth of security, regardless of the application, is the job of the attacker is always easier than the job of the defender. The attacker needs only to find one weakness, while the defender must try to cover all possible vulnerabilities attacker needs only to find one weakness. [3]

32 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Honeypots are the security assets that can be helped in achieving network security. Honeypots approach is used which not only makes attacker to go for an attack, but also alert the network administrators of possible attacks by trailing the attacker. A large amount of data about attackers and their methods has been gathered by the use of Honeypots of various sorts over many years, and it is predictable to see this trend continuing. Honeypots are now being used progressively more in mainstream applications and an ever-increasing array of tools is available to the professionals. As Honeypots are gaining importance to detect and analyze attacks, it is an assumption that the attackers will build up techniques to recognize and avoid Honeypots. [14] VII. REFERENCES • Information Security- by Mark Rhodes Ousley, McGraw-Hill, 2nd, 2013 [1] • vsut.ac.in/lecture_notes/lecture1423183198.pdf [2] • Security in Computing – by Raveena Shetty and Sweety Garg, 2nd [3] • www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx [4] • www.csoonline.com/article/3391589/why-local-governments-are-a-hot-target-for-cyberattacks.html [5] • resources.infosecinstitute.com/category/enterprise/securityawareness/security-threats-by-industry/#gref [6] • blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks [7] • data.conferenceworld.in/IIMT_NHSEMH/16.pdf [8] • www.redteamsecure.com/the-top-6-industries-at-risk-for-cyber-attacks[9] • semanticscholar.org/c437/2e695acd7636367c106d6c347544ed131b98.pdf[10] • www.techopedia.com/definition/10278/honeypot[11] • www.sciencedirect.com/topics/computer-science/honeypots[12] • www.informit.com/articles/article.aspx?p=23948&seqNum=4[13] • www.symantec.com/connect/articles/guide-different-kinds-honeypots[14] • www.ukessays.com/dissertation/examples/information-technology/honeynet.php[15] • blogs.getcertifiedgetahead.com/honeypots-and-honeynets/[16] • economictimes.indiatimes.com/definition/cyber-security [17] • www.informit.com/articles/article.aspx?p=23948&seqNum=5[18]

33 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IOT BASED SURVEILLANCE ROBOT

Juilee S Gije Department of M.Sc.I.T., Kishinchand Chelaram College, University of Mumbai

ABSTRACT This paper offers the ability to remotely control a robot with an unlimited range by using the internet. This paper also overcomes the problems that occur during making this system.

I. INTRODUCTION The main objective of the proposed work is to build a surveillance system that can be used remotely. In the field of surveillance, a lot of work has been done to control the system of wireless surveillance robots. In this paperwork, a network-based mobile robot is designed with the goal of remote control and surveillance using the IOT framework via the internet. A mobile robot has been applied in manufacturing, nuclear plant maintenance, etc. The data is been recorded in the database by the sensors which can be used in real-time monitoring of the environment. The sensor can monitor the location, temperature, vibration, and motion. The data sent by the sensor is displayed through various devices such as laptops, mobile, etc.

This IOT-Aided system consists of a remote computer and a robot. The robot is controlled by the end-user by sitting at the remote computer, over the internet. The mobile robot consists of a camera by which it gets a video or image on the user laptop or mobile device, An Android smartphone, Arduino Microcontroller (ATmega328) to control the robot’s motion, it has 14 digital pins, 8 analog pins, 2 Reset pins & 6 power pins, A Wi-Fi module (ESP8266 12ev), consists of a TCP/IP protocol stack which is used to provide network access to microcontroller, An ultrasonic sensor to measure the distance of an object(obstacle), Two 6v Batteries, A charging module (TP4056), A motor driver which allows you to control the working speed and direction of two motors simultaneously, Connecting wires to establish a connection between two points, Mechanical Chasis, USB cable. Arduino Software (IDE) is the open-source software that is used to write codes and later uploads it to the Arduino board. How it works? The end-user controls the robot by sending the control signals to the Android smartphone. The signals are then forward to the Arduino microcontroller. After getting the signals the robot then moves in the stated or required direction. The camera is used to send feedback to the user simultaneously over the internet, which enables the user to navigate the robot remotely. 34 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Implementation Approaches There are 3 modules by which the project is implemented. A. Android to user interface By using some sort of toolsets the user will be able to control the robot through an android app.

As shown in the above figure the user will be able to control the robot. B. Android to Robot interface By using a USB cable the android phone is connected to the microcontroller. An android smartphone is like a bridge that communicates between the Arduino and the remote computer. On the Android smartphone, two apps are running simultaneously. One for video feed to the remote computer and the second one for receiving the control signals from the remote user. The app used is coded using the Android Software Development Kit (SDK). The app listens for the signals received from the remote user on a specified port. The app includes navigation buttons that simulate the response as one from the android app. 35 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

C. Arduino Implementation

A Circuit Diagram An Arduino Uno microcontroller board is used in this project. It develops an IDE for processing and programming is done using a language based on wiring. The Arduino is configured to receive the signals from the app running on the smartphone, which subsequently controls four DC motors. E.g. For forward motion, arduino sends one HIGH and one LOW on each pair of control signals, Inverted the same for backward motion and so on.

II. PROBLEM DEFINITION Any device which is poorly secured that is connected online affects the security of the internet not just locally, but globally.

36 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Mobile IOT devices are connected to one or more networks that tend the hacker to insert the malicious code into devices. In the future, the condition would be worse with social IOT devices. The main security challenge is to address cross-domain identification and trust. a. Hardware-Software interaction It affects in the terms of the environment, data transfer, etc. So only the functionality testing doesn’t help. b. Real-Time data Testing the real-time data is very tough as you have to get regular checkpoints. With the increasing of IOT devices in business culture, it becomes difficult to convert the expectations into IOT devices to insights. Also, it is financially affected, the acquisition cost increases and the cost becomes too expensive. Nowadays, people are failing to identify the real business needs. Taking a normal regular product and then connecting it to IOT device gradually increases the cost unnecessarily. IOT-aided robots are very helpful in many ways but at the same time they are taking away human jobs as well. As IOT systems are made mixing different devices, protocols, gateways, platforms, etc. it may suffer from reliability, performance, scalability, interoperability, etc. Problems of: a. Accuracy: As with the rapidly growing technology the accuracy of the fabrication process is very limited. b. Reliability: Device’s lifetime is reduced due to temperature stress and utilization. c. Timeliness: If there is a breakdown of time it leads to transistor failure. d. Capacity: Limited battery capacity. III. PROPOSED METHODOLOGY The big challenge for IOT would be security problems. To prevent this problem from facing the system it should protect the access to the equipment, the protection of the company data, etc. Keep changing the configuration of devices to decrease the probability of the attack. You also need to check if the data you’re sending from one device to the other is protected or encrypted, Make sure it is password protected.

 Hardware and software interaction problems are solved by performing various numbers of test cases. Their main aim is to check the relationship between the object and the software which are interacted.  Compatibility testing is carried out to check whether the system can perform in the digital environment or not. It should work on various platforms, multiple operating system versions, browser types, etc. Some validations are being considered such as the checks and security standards, hardware compatibility, etc.  User Experience is very necessary as it is about how the device or system or application works through various channels and interfaces. Various types of testing are done. Such as unit testing, it helps to check for a small module or component in the whole system.  Integration Testing In this type of testing various software modules or components are combined and tested as a whole group. This testing takes place after unit testing is done and before performing validation testing.

37 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

 Beta Testing It is also considered as “Pre-release testing”. This is done by the number of end-users before delivering the product. The version after this testing is called a beta release. Some functionality testing is also carried out. a. Usability: This is to ensure that the usability of each device is checked, Such as displaying data, processing data, etc. b. Connectivity: Connectivity plays a very important role here. In some cases, there might be a chance that the system may go offline so we also have to check the offline conditions as well. The data should retrieve back once the system is online there should be no loss of data. c. Performance: We have to make sure that the system is scalable. It should perform the same when a larger dataset is propagated. It should also test the power usage, system usage, temperature, etc. d. Pilot testing: This is a must. It should check the system in real-time scenarios as well. The number of users uses the system in the real field whereas they give the feedback and then some modifications or changes are being done if required. e. Upgrade testing: Multiple operating systems, hardware, firmware, devices, etc. are combined to make an IOT device. So when an upgrade is made in the system or other items, regression testing should be carried out and the system should adopt the upgrade and overcome through related issues. Various test cases are performed. 1. Make sure that the IOT device is able to report to the network and the data connection is made successfully or not. 2. Proper time delay should be set after the connection of the first gadget. 3. Check whether all the objects involved are able to register to the network. 4. Only proper authenticator users should be able to connect to the network. 5. The system needs to inform the network about the power status. 6. Check whether it transfers the data in the low power mode or not.

IV. RESULTS

38 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

This is what the actual robot looks like. Finally, the robot is ready. It can go anywhere where human access is not feasible. It can spy every movement of the enemy via the camera fixed in it. We will be able to watch real-time video on screen without moving from the current place. Testing results are given below: 1. The robot can turn in every possible direction i.e. Forward, Backward, Left, right 2. Network connections are notified properly. 3. Live to a stream of video. 4. The ultrasonic sensor works properly and measures the distance and sends the measurement to a remote user. The performance matrix is measured in terms of accuracy for every time frame where the data has arrived. V. CONCLUSION In this paperwork, A Surveillance robot framework is proposed, where the robot is manually controlled with the help of a phone. As our robot is small in size it can reach into areas where human access is impossible. Using this system one can easily monitor and control the robotic activities. This wireless technology has helped humans in many ways, it also reduces human labor. This system is also cost-effective. The problems faced while making this robot are solved with best suitable methods. Nevertheless, in the coming years, a solid change in protocols and application design is required with some advanced technology, to go through issues like short-range communication, information-centric networking, security, etc.

REFERENCES 1. Sweeta Deshmukh, Priyadarshim, Mamta, Madhura Deshmukh, Dr.M.D. Bakhar (IJIRCCE) IOT Based Surveillance Robot 2nd NCRAET_2017. 2. G. Anandravisekar, A. Anto linton, T. Mukesh Raj, L. Naveen (IJERT) IOT Based Surveillance Robot. 3. Mayank Dharaskar, Vtan Gupta, Priyanka Kale, Reeta Chopade, Aayush Jaiswal (IRJET) IOT Based surveillance robotic car using raspberry pi 4. Gaurav S Bagul, Vikram C Udawaant, Kalpana V Kapade & Jayesh M Zope (IJTRD) IOT Based Surveillance robot. 5. Anang Nayyar, Vikram Puri, Nhu Gia Naguyen Smart surveillance robot for real-time monitoring. 6. Adrian McEwen & Hakim Cassimally Designing the internet of things. 7. Chinmay Kulkarni, Suhas Grama, Joseph Antony 2014 1st International Conference on system informatics, Modeling & Simulation (IJSSST) Surveillance robot using arduino microcontroller, Androd API’s & the internet.

39 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

MOBILE TECHNOLOGY IN HEALTHCARE

Mamta G Yadav Kishinchand Chellaram College, Churchgate

ABSTRACT Mobile technology is technology employed in cellular communication. The mobile technology has improved from straightforward device used for telephone and electronic communication into a multi-tasking device (GPS navigation, web browsing, gaming, etc). Nowadays, Mobile technology through transportable computers is getting widespread. When the mobile was first introduced, it was used for SMS, Calls and games. But now it has transformed into a digital world and has made life much easier; marketers now can sell their products with ease through mobiles' technology. With the use mobile it is possible for users to transfer files and other files through Bluetooth and WiFi. The mobile with internet connectivity, makes easy for the user to gain information, and also to download files from the internet. Mobile technology is also changing the health outcomes. For example, proper medication on time, Managing patients in better way. Keywords: Mobile Technology,mhealth, diabetes.

I. INTRODUCTION Mobile technology has impacted our society in different ways. Technology can significantly improve health outcomes. For example, it can help patients to get access to their medical charts via their smartphones anytime. Three ways mobile technology is changing healthcare. 1. Mobile Patient Portals Healthcare portals allow patients to communicate with physicians via their mobile phones to offer a better way to communicate with them. Mobile patient portals provide many advantages to both doctors and patients. This reduces the time for making a phone call. Plus, patients can send messages 24/7. It can also be used to provide education to patients, reminding them of their appointments and sending bills. 2. Mobile Telemedicine With the rapid use of smartphones and tablets, it offers Telemedicine which is beneficial. This technology is extremely helpful in emergency situations, especially in rural areas. It provides an easy way for people who live in rural areas to get assessment, and treatment information as soon as possible. And,it can be used to connect people with specialists and other medical professionals. 3. Remote Monitoring Mobile devices can be used to help monitor patients’ medical conditions. The patients wear a device that is connected to a mobile application. The device collects the patient’s Biometric data and sends the information to their physician. The data is also sent to the mobile app. Patients can also connect with their nurse case manager and can set appointments on their mobile device. Mobile health technology (m health) The term “m health” refers to the use of mobile devices, such as mobile phones, tablets, and smartphones, in medicine and public health. m health can be considered as a subcategory of “ehealth” which makes use of all electronic technologies such as computers in medicine and public health. More than 80% of Americans have mobile phones, and more than 40% own smartphones. The “simplest” forms of m health are voice communication, and text messaging. An advantage of these methods is that they can own at low-cost mobile phones. Voice communication, between person to person. Text- and video-based messages are used in cardiac rehabilitation programs and to support consumer and clinician communication in disease management. II. PROBLEM DEFINITION In earlier times, due to the lack of technology, the individual had to face many obstacles in health related issues, as a diabetic patient, needs to go for a regular visit to the doctor for measuring their blood glucose level. As many people have to visit from far away, for which some of the important work of the Individual needs to be canceled or postponed.But in recent times, the scenario has changed, because of the development of mobile technology. And today's era of internet and with the smartphone, it has made it easy to reach every corner of the world. People living in rural areas can also expect to get the best health services.Mobile health is part of “eHealth”, which uses technology such as computers, mobile phones, mobile health apps and patient monitors for health services and information.Mobile health apps for providers: -Providers use mobile health apps for making clinical decision support when the patient’s visit. Mobile health apps also help the providers to monitor

40 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 and follow up with the patients. For example, some mobile health apps use GPS technology to track a patient’s movement, and generate questions about the patient’s well-being, and include regular reminders to report or measure symptoms for the patient. Patient portals.:-Mobile-enabled patient portals make the communication easy between providers, patients, staff. They allow patients to check test results, refill prescriptions, go through their medical record, and can also check their appointments by using mobile devices. Mobile-enabled EHRs:-Providers can use mobile-enabled EHRs anytime and anywhere on their smartphones, tablets and other mobile devices. Secure text messaging (STM:-.It helps the providers to securely exchange text and picture messages between mobile devices and office workstations. Patient Monitoring device- mobile health apps and wearable sensors can be used for remote health monitoring III. PROPOSED METHODOLOGY Diabetes.M App Diabetes. M is employed to trace, analyze and keep the polygenic disease in restraint. It is designed for each sensible phones and tablets, it helps to manage polygenic disease, and keep it in restraint. whether kind one or kind two, have physiological condition polygenic disease or simply wish to assist and monitor a loved one, this app will be used.

Fig-1: Diabete app The application tracks most aspects of the data and provides careful reports, charts and statistics.

Fig-2: log blood sugar level and other information This application also calculates the insulin doses and bolusbases on the meals the individual have eaten. These reports will then be send to the doctor via email. It conjointly provides several tools, so one will notice the trends in blood sugar levels and may calculate t boluses by using top notch bolus calculator. 41 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-3: calculates the bolus Conjointly features a giant information for nutrition, that helps to stay track of the food intake and nutrition info.

Fig-4: food intake This application also produces the charts and graphs based on the data collected.

Fig-5: Charts and graphs

Fig-6: Logbook 42 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IV. RESULT Similar to many other diseases, diabetes requires multidisciplinary care, and the patient requires education on self-care such as blood sugar monitoring, diet, exercise. As a result of this paper, it can be said that mobile technology plays a major role in healthcare. It has made life simpler by providing many features in one device. Earlier, diabetes blood strips are used for blood glucose testing. Each meter will take one type of the test strip. But now it has become much easier with the use of Diabetes. M app. The patient just need to enter the details and can also send the reports to the doctor directly through the app. V. CONCLUSION Mobile technology represents many opportunities for hospitals to innovate in the direction of reducing costs and providing the same or better standard of patient care. With the use of mobile technology, it is now easy to catch up with everything from the comfort of your home. It has also made possible for an individual to get access to their medical chart with the use of mobile devices. REFERENCES [1] http://mobihealthnews.com/research/the-world-of-health-and- medical-apps/ [2] https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5711785/ [3] https://www.mindinventory.com/blog/advantages-mobile-app-for-healthcare/ [4] https://www.athenahealth.com/knowledge-hub/mobile-health-technology/apps [5] http://www.diabete-m.com

43 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

AN OVERVIEW OF MOBILE TECHNOLOGY: FOCUSING ON MOBILE PHONES

Latifa Zaman1, Rakhi Gupta1 and Nashrah Gowalker3 Student1 and Assistant Professor2,3, M.Sc. I.T. Department, Kichinchand Chellaram College, Mumbai

ABSTRACT The evolving mobile communications technologies provide us with vastly increasing data rates, faster response times and increasingly fluent means to access more content than ever in the history of telecommunications. Cellular communication has seen an evolution which is known by 1G, 2G, 3G, and 4G designations. At the moment, we are in the fourth generation with the emergence of the fifth generation. This paper briefly deals with the knowledge and comparison between the third and fourth generation of mobile networks to see which one is the more ideal one to use. Keywords: Mobile phones, mobile technology, evolution, generation, predecessor, architecture, 3G, 4G, LTE, UMTS.

I. INTRODUCTION In recent decades, mobile technology has been changing tremendously and has been seeing a huge evolution. The Wireless application services are increasing quickly and the service provider is finding it hard to manage the user-requested services. The wireless cellular generation alludes to a change in the basic nature of the service, non-backward compatible transmission technology, and new frequency bands. New generations happen to appear almost every decade from the very first generation(1G) that was invented in 1981 by Nippon Telegraph and Telephone (NTT) in Tokyo. 1G is the first generation of wireless cellular technology based on Analog signals. Due to a few cons of the first generation then the second generation was introduced in the 1990s based on GSM in Finland by Radiolinja. 2G had many advantages as compared to its predecessor, such as text services and latency. Third generation(3G) of mobile network was introduced in the 2000s and was made for multimedia communication with the collaboration of GSM and UMTS. The name of it has been given as such because it is the third generation of the standards of telecommunication hardware. Main components of Universal Mobile Telecommunications System (UMTS):- 1) User Equipment: It is assigned to a single user and contains all the functions needed to access UMTS services. It can contain a mobile station which is a radio terminal that is used to connect the UMTS subscriber with the fixed part of UMTS system via the radio interface Uu. 2) UMTS Terrestrial Radio Access Network (UTRAN): It is a system of base station and controller handling function which handles cell level mobility to mobility. It contains nodes and RNC. - Nodes (Base Stations): It converts the data between Uu radio interface and the Iub interface connecting the nodes with the Radio Network Controllers (RNC). Physical level processing such as channel coding, data interleaving, rate matching, modulation, is performed by it. - Radio Network Controllers (RNC): RNC’s controls and manages radio resources to the nodes. It performs the data-link layer processing and participates in handover operations. It is considered a single access point of UTRAN for the core network. It’s connected to a single MSC to route circuit-switched traffic and to a single SGSN to route packet switched traffic. 3) Core Network (CN): The core network is shared with GSM and GPRS. The CN contains functions for intersystem handover, gateways to other networks and performs location management. It contains: - Home Location Register (HLR) - Mobile Station Controller (MSC). - Gateway MSC: Connect UMTS to external circuit switch network (e.g. PSTN) - Serving GPRS Support Node (SGSN): It serves the packet-switched traffic. - Gateway GPRS Support Node (GGSN): Connects UMTS to external packet-switched. (e.g. Internet) Fourth Generation Long Term Evolution (4G LTE) is a mobile communication standard based on GSM/EDGE and UMTS/HSPA technologies. LTE uses Multi carrier CDMA or OFDM (Orthogonal Frequency Division Multiplexing). 44 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Main components of 4G LTE 1) User Equipment (UE): It is identical to the one used by UMTS and GSM which is actually a Mobile Equipment (ME). The mobile equipment has the modules: - Mobile Termination (MT): Communication functions are handled. - Terminal Equipment (TE): Data streams are terminated. - Universal Integrated Circuit Card (UICC): Also known as the SIM card for LTE equipment, an application known as the Universal Subscriber Identity Module (USIM) is run by it. 2) The E-UTRAN (The access network): The radio communications between the mobile and the evolved packet core are handled by it. It has one component, the evolved base stations, called eNodeB or eNB. Each eNB refers to a base station that controls the mobiles in one or more cells. The serving eNB is the base station that is communicating with a mobile phone. LTE Mobile communicates with one cell and one base station at one time. There are two main functions supported by eNB: - Radio transmissions can be sent and received to all the mobiles using the analogue and digital signal processing functions of the LTE air interface by the use of eNB. - It controls the low-level operation of all its mobiles, by sending them signalling messages; such as the handover commands. Every individual eNB gets connected to the EPC by means of the S1 interface and it can also be connected to nearby base stations by the X2 interface, which is usually used for packet forwarding during handover and signalling. 3) The Evolved Packet Core(The core network): A description of each of the components shown in the above architecture: - The Home Subscriber Server (HSS) component has been carried forward from UMTS and GSM and is a central database that contains information about all the network operator's subscribers. - The Packet Data Network (PDN) Gateway (P-GW) communicates is able to communicate with the outside world which is packet data networks PDN, using SGi interface. An access point name (APN) accesses each of the packet data network. It acts as the same role as the GPRS support node (GGSN) and the serving GPRS support node (SGSN) with UMTS and GSM. - The serving gateway (S-GW) performs as a router, and forwards data between the base station and the Packet Data Network gateway. - The mobility management entity (MME) has the abilities to control the high-level operation of the mobile phone with signalling messages and Home Subscriber Server (HSS). - The last component is responsible for the flow-based charging functionalities in the PCEF are controlled by it, which inhabits in the P-GW. 3G is a circuit and packet switched architecture which is multi-layered with lots of nodes and strands and 4G is packet switched architecture and it has a more optimised stack. II. PROBLEM STATEMENT As we live in a day and age where mobile phones are a prominent part of every individual's life, it is important to be aware of the mobile phone generation which is more absolute to use. The mostly used generations today are 3G and 4G and if we compare both of them we can fare in which one is more efficient out of the two. Choosing a better generation will help you get the benefits that the other one cannot. III. PROPOSED METHODOLOGY The best way to understand the mobile generation that is best to use between 3G and 4G, we need to compare different features of them. Below are some mentioned: Latency – Latency means the time that it takes for a source to reach the receiver from the source. Usually measured in milliseconds, the network performance is deemed better if the latency is lower. 4G was built keeping latency as the priority as it is IP based and 3G was not. As 4G delivers data much faster than 3G, the latency of 4G is lower. The latency of 4G is 99ms and 3G is 44ms.

45 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Bandwidth – Bandwidth refers to the capacity of a wireless network to transmit the maximum amount of data from one point to another in a particular amount of time. When we take data bandwidth into comparison, 3G provides 21 Mbps and 4G offers 1Gbps maximum data bandwidth making 4G's bandwidth more effective. The difference in architecture – The architecture of 4G is much simpler than that of 3G. As 3G is a circuit- switched and packet-switched architecture which is multi-layered with lots of nodes and strands and 4G has only packet-switched architecture which is made simpler by the abandonment of circuit switching. Packet switching in 4G makes it possible to have more phone interactions effectively in the same bandwidth. Speed – The speed of 4G is supposed to exceed 3G. It is said to be ten times faster than 3G in real world use. The maximum download rate and uploading rate of 3G are 21Mbps and 5Mbps respectively and that of 4G are1Gbps and 500Mbps respectively. Scalability: 3G uses WCDMA technology which doesn't support scalable bandwidth and 4G uses OFDMA technology which supports scalable bandwidth. OFDMA is a system in which users can be allocated a string of fundamental units called Resource Blocks which is a time-frequency tile. But on the other hand, WCDMA uses unique spreading code for each user to spread the message over the entire bandwidth achieving high jamming margin and higher SINR. All the users have to use the entire spectrum which makes it not scalable. Reliability: 4G, unlike 3G, enables users to completely enjoy digital media on their mobile phones, including various things like streaming videos, rich multimedia apps, and high-quality music. Long load times and buffering are not a part of the problems when it comes to 4G and any movie can be started in no time. Network coverage – Some areas still do not have 4G network coverage, thus making 3G much more widespread in comparison. As for the operators, 4G requires a number of large base stations for providing coverage to small cells, which can be done using 3G with a lesser number of base stations. The cell site costs are also reduced in this way. Below is a table comparing the two generations on different basis: Basis for comparison 3G 4G Deployment 2002 2010 Bandwidth 2 Mbps - 21 Mbps 2 Mbps - 1 Gbps Max Uploading Rate 5 Mbps 500 Mbps Max Downloading Rate 21 Mbps 1 Gbps Core network Packet network Internet Switching Technique Packet Switching All packet switching Standards IMT 2000 Single Unified standard Wimax and 3.5G HSDPA LTE 3.75G HSUPA Access Wideband CDMA Multi carrier – CDMA or OFDM Technology Digital Broadband Packet Data Digital Broadband Packet Data Stack CDMA 2000, UMTS, EDGE. Wimax2 and LTE Advances. Frequency Band 1.8 – 2.5 GHz 2 – 8 GHz Network Architecture Wide Area Cell Based Integration of Wireless LAN and Wide Area Key services Integrated high-quality audio, video All IP services and data Forward Error Correction 3G uses turbo codes for error Concatenated codes are used for correction. error correction in 4G. Hand over off Horizontal Horizontal and Vertical Latency 99ms 44ms IV. RESULT Even though 3G is the most widespread and it would take some time for an abundance amount of people to switch to 4G, 4G actually happens to be the more efficient mobile network compared to its predecessor. There are many striking features of 4G which ensures to be more promising. 3G has its own benefits but 4G is an all IP standard and thus is an overall better cellular generation when we consider services in regards to the power consumption of mobile phones, wireless internet, bandwidths, bit rates, mobility, service portability, cost, scalability, and so on. So, it can be said that using the fourth generation would benefit one the most. But 4G,

46 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 though is much more advantageous than 3G, has its own disadvantages and it will take time for it to be the most popular network like 3G right now is. V. CONCLUSION Even though every generation of the mobile network gets better than its predecessor, each generation of network brought with it a significant milestone in the development of mobile communications. It can be concluded that each of the wireless networks have their unique importance in particular fields. The mobile generations are an overgrowing field which change every few years and just advance and keeping everything in mind, overall the fourth-generation seems to be the best choice. It does have its own issues with compatibility and battery drainage. But as we move ahead with mobile technology in regards to the wireless cellular generation, hopefully every issue regarding the fourth generation will be solved with the emergence of the fifth generation in the future. REFERENCES [1] https://pdfs.semanticscholar.org/4dfd/40cc3a386573ee861c5329ab4c6711210819.pdf [2] https://www.researchgate.net/publication/327763959_Comparative_Study_of_2G_3G_and_4G [3] https://interferencetechnology.com/mobile-generations-explained/ [4] http://www.eajournals.org/wp-content/uploads/Comparison-Study-of-3g-and-4g-Mobile-Technology.pdf [5] https://techdifferences.com/difference-between-3g-and-4g-technology.html [6] https://pdfs.semanticscholar.org/8e32/4078c7b0848c5e8c573861878cdbe417e89e.pdf [7] https://www.electronics-notes.com/articles/connectivity/3g-umts/network-architecture.php [8] https://www.tutorialspoint.com/lte/lte_network_architecture.htm [9] https://www.ripublication.com/irph/ijece/ijecev6n1_01.pdf [10] https://ieeexplore.ieee.org/document/8057566 [11] https://www.irjet.net/archives/V5/i3/IRJET-V5I3667.pdf [12] http://ijcset.net/docs/Volumes/volume4issue12/ijcset2014041210.pdf [13] https://www.lifewire.com/4g-mobile-networks-pros-and-the-cons-2373260

47 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

QUANTITATIVE COMPARISON BETWEEN NAIVE BAYES AND HAND ROLLED NAIVE BAYES UNDER SENTIMENT ANALYSIS

Rakhi Gupta1 and Nashrah Gowalker2 PhD Research Scholar1, BVDUCOE, Pune Assistant Professor2, K. C. College, Churchgate

1. ABSTRACT The aim of this research is to do a comparison of quantitative parameters between standard naive bayes algorithm and hand rolled naive bayes under sentiment analysis. In this research the data that has been subjected to algorithms, is collected from social media platform Twitter . Also the tweets fetched are monitored over a period of time. A confusion matrix is derived out of the collected data. Various performance parameters are taken into account to infer which category of naive bayes serves the purpose better. Keywords: risk modelling, machine learning algorithms, emotions, sentiment analysis

2. INTRODUCTION Crime with time has evolved and now its presence can be seen on various digital platforms. Crime now is spreading easily and quickly through social media platforms, the most common platforms being twitter and Facebook . These platforms can be easily misused for various types of illegal type of activities as well.[1]. Based on the overall sentiment value generated from final table on which machine learning algorithms applied for comparative study between classifier models. The purpose of this comparative study is to conclude which algorithm works well with the fixed amount of dataset. 3. PROPOSED METHODOLOGY

Fig-1: Block diagram 3.1 Block Diagram The research work is carried to develop a way where huge amount of data is bought into desired format for later being analysed and subjected to work. Level 1. The data is being retrieved from the twitter. Level 2 : The raw data is processed and bought into desired format. 48 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-2: Flow diagram 3.2 Naive Bayes Classifier Naive Bayes has been one of the most pragmatic ways of using machine learning technologies for classifying tweets [4]. This classifier is based on simple theorem of probability for making a probabilistic model of data. The mechanics of NB algorithm are applied to numeric data. [10] The prediction of the parameters needed for classification purpose is done with minimal data set for training.

Fig-3: Confusion matrix for Naive Bayes Attributes Naive Bayes PRECISION 92% RECALL 91% F1-SCORE 90% SUPPORT 11 Table-1: Result based on 150 tweets fetched from twitter. 3.3 Hand rolled Naive Bayes classifier For each tweet, we first replace all occurrences of punctuation marks which are followed by the space character with a single space character. Then we split on whitespace and reject all tokens with 4 characters and less. Later we train two classifiers: one for recognizing tweets about Naxal and others without Naxal. P (token|class)= ( xi+α ) / ( N+α∗|V| ) where xi is the token count in the class, α=1, N is the sum of all token counts in the given class, and |V| is the size of the vocabulary in the entire training set (regardless of class). This is identical to the formula used for the Cross Validated question. The only difference is that it doesn't contain an additional +1 in the denominator. To take care of tokens which are not present in the training set but are there in the test set, we default to using this probability: P(unseen token|class) = 1 / ( N+|V| ) 49 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

When a tweet is passed, each classifier computes the sum of the log likelihood of every token in the tweet. We pass the tweet to both the classifiers and then compare the two log probabilities - the higher one wins and we conclude that the tweet belongs to that class

Fig-4: Confusion matrix for Hand Rolled Naive Bayes. Attributes Modified Naive Bayes PRECISION 94.28% RECALL 95% F1-SCORE 93% SUPPORT 10 Table-2: Result based on 150 tweets fetched from twitter. 3.4 DISCUSSION AND RESULTS 1. Hand rolled Naive Bayes classifier As per as the result of the hand-rolled classifier, it is deduced that the performance of this classifier is comparable, and for small dataset it is even better than the Naive Bayes from the scikit library. 2. Pros and cons of Hand-Rolled Naive Bayes classifier Pros After analysis of testing results, it can be concluded that the performance and results of Modified Naive Bayes are better as compared to results from scikit Naive Bayes. When modified hand rolled is compared for accuracy, precision, recall, and f1-score, it is observed that it gives better quantitative values than scikit NB on each of these above-mentioned parameters. Cons It works best only with a small amount of data. It is a very tedious task to manually collect data and analyze it. Segregating the relevant tweets into words of interest is very laborious. Human error is possible. 3.4.1. Time series data Data has been monitored over 2 years related to the subject i.e. Naxalism issue in Gadchiroli, Maharashtra. Social media platform Twitter, which is an open source system, served the purpose as a repository of real-time data. Tweets related to Naxalism were monitored on a weekly basis which in return gave us the insight of what could happen in upcoming years. The data is mapped into a statistical pattern in order to understand the frequency of tweets delivered by the user daily.

Fig-5: Time series Graph 50 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

3.5 CONCLUSION This research does a comparative performance analysis on the data fetched from the social platform twitter with the main focus towards crime mitigation and risk analysis. A comparative study was performed between Naive Bayes and hand rolled naive bayes. We developed a hand rolled machine learning algorithm i.e. modified Hand Rolled Naive Bayes. In this algorithm, the data which was manually collected from Twitter and on which classification of features had been done is passed through the modified algorithm to predict the accuracy and also confusion matrix is derived. In confusion matrix, the parameters studied are true positive, true negative, false positive and false negative. Under standard metric evaluation, tabulation is also done for precision, recall, f1-score, and support. After analysis of testing results, it can be concluded that the performance and results of Modified Naive Bayes are better as compared to results from scikit Naive Bayes. When modified hand rolled is compared for accuracy, precision, recall, and f1-score, it is observed that it gives better quantitative values than scikit NB on each of these above-mentioned parameters. The results for the same have been displayed. The constraint, however, is the collection of data being manual and tedious task. Also segregating the relevant tweets into words of interest is very laborious. There is also a great risk of the introduction of human error REFERENCES [1] Chirag Kansara , Rakhi Gupta , Dr. S.D. Joshi , Dr. S.H. Patil, “Crime Mitigation At Twitter Using Big Data Analytics and Risk Modelling “ , IEEE International conference on Recent Advances and innovations in Engineering (ICRAIE -2016) December 23-25 , 2016 , Jaipur , India. [2] Anuja P Jain , Padma Dandannavar , “Application of Machine Learning Techniques to Sentiment Analysis “ for 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) , 978-1-5090-2399-8/16/$31.00_c 2016 IEEE [3] Geetika Gautam , Divakar yadav , “Sentiment Analysis of Twitter Data Using Machine Learning Approaches and Semantic Analysis ” for 978-1-4799-5173-4/14/$31.00 ©2014 IEEE [4] Mr. S. M. Vohra, 2 Prof. J. B. Teraiya,” A Comparative Study Of Sentiment Analysis Techniques”, Journal Of Information, Knowledge And Research In Computer Engineering Issn: 0975 – 6760| Nov 12 To Oct 13 | Volume – 02, Issue – 02 Pg 313-317 [5] S Shayaa, NI Jaafar ,S Bahri , “ Sentiment Analysis of Big Data : Methods , Applications , and Open challenges, Vol 6 2018, DOI : 10.1109/ACCESS.2018.2851311, 2169-3536 , 2018 IEEE [6] B. Liu, E. Blasch, Y. Chen, D. Shen, G. Chen,“Scalable SentimentClassification for Big Data Analysis Using Naïve Bayes Classifier.”Scalable IEEE Intl Conf. on Big Data, Oct. 2013 [7] Sentiment Analysis: A Comparative Study On Different Approaches: Devika M D, Sunitha C, Amal Ganesha: Fourth International Conference on Recent Trends in Computer Science & Engineering, Chennai, , India ,1877-0509, Procedia Computer Science 87 ( 2016 ) 44 –49, DOI:10.1016/j.procs.2016.05.124 [8] Techniques for sentiment analysis of Twitter data: Acomprehensive survey: Mitali Desai, Mayuri Mehta: DOI:10.1109/CCAA.2016.7813707 [9] Big Data Analysis: Challenges and Solutions: Puneet Singh Duggal, SanchitaPaul : International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV, pp 269-276. [10] Large-Scale Sentiment Analysis for News and Blogs :NamrataGodbole, ManjunathSrinivasaiah, Steven Skiena : Google Inc. [11] Study of Twitter Sentiment Analysis using Machine Learning Algorithms on Python: Bhumika Gupta, Ph.D., Monika Negi, KanikaVishwakarma, GoldiRawat, Priyanka Badhani : International Journal of Computer Applications (0975 8887) Volume 165 – No.9, May 2017 [12] Comparative Study of Classification Algorithms used inSentiment Analysis : Amit Gupte, Sourabh Joshi, Pratik Gadgul , Akshay Kadam: ISSN: 0975-9646, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5), 2014, 6261-6264 [13] Machine Learning-Based Sentiment Analysis for Twitter Accounts: Ali Hasan, Sana Moin, Ahmad Karim, and ShahaboddinShamshirbTonDucThang: Math. Computer Appl. 2018, DOI :10.3390 [14] Emotion Detection Of Tweets Using Naïve Bayes Classifier: Hema Krishnan, M. SudheepElayidom, T. Santhanakrishnan: International Journal of Engineering Technology Science and Research, IJETSR ISSN 2394 – 3386 Volume 4, Issue 11 November 2017 51 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

[15] Sentiment Analysis on Twitter: Akshi Kumar, Teeja Mary Sebastian: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July2012,, ISSN (Online): 1694-0814 [16] Sentiment Analysis Techniques in Recent Works: ZohrehMadhoushi, Abdul RazakHamdan, SuhailaZainudin, Science and Information Conference 2015 July 28-30,2015, London, UK, DOI: 10.1109/SAI.2015.72371 [17] Emotion Analysis of Social Media Data using Machine Learning Techniques: Sonia XylinaMashal, KavitaAsnani : IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278- 8727 PP 17-20, National Conference On Advances In Computational Biology, Communication, And Data Analytics (ACBCDA 2017) [18] Research On Sentiment Analysis: The First Decade: Oskar Ahlgren: 16th International Conference on Data Mining Workshops, 2016 IEEE, 2375-9259/16 © 2016 IEEE, DOI 10.1109/ICDMW.2016.94 [19] Big Data And Its Technical Challenges: H.V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, YannisPapakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi : DOI 10.1145/2611567, Communications Of The ACM | July 2014 | Vol. 57 | No. 7 [20] A Survey on Sentiment Analysis by using Machine Learning Methods: PengYang, Yunfang Chen: Department of the Internet of Things, Nanjing. 978-1-5090-6414-4/17/$31.00, 2017 IEEE 2nd Information Technology,Networking, Electronic and Automation Control Conference(ITNEC)

52 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

A SURVEY ON IOT ELEMENTS, LAYERED ARCHITECTURES AND SECURITY ISSUES

Varkha Jewani1 and Dr. Prafulla E Ajmire2 Research Scholar1, Computer Science, G S Science, Arts & Commerce College, Khamgaon, Maharashtra Associate Professor2, Sant Gadge Baba Amravati University, Maharashtra

ABSTRACT The use of the Internet is growing rapidly, so another area has developed to use the Internet, called Internet of Things (IoT). It facilitates the machines and objects to communicate, compute and coordinate with each other. It is an empower for the intelligence related to several essential features of the modern world, such as homes, hospitals, buildings, transports and cities. The security and privacy are some of the key issues related to the wide application of IoT. Therefore, these issues prevent the wide usage of the IoT Applications. This paper represents an overview about different layered architectures of IoT and attacks regarding security from the perspective of layers. Also, a review of mechanisms that provide solutions to these issues. Furthermore, a new secure layered architecture of IoT is suggested to overcome these issues. Keywords: Internet of Things (IoT); layered architectures; security; privacy; security attacks; Protection methods; secure architecture

I. INTRODUCTION The Internet has become a basic need of millions of people who use it for many purposes according to their needs. People not only use the Internet from the entertainment (movies, songs and games) purposes but also to fulfil their daily activities, and needs that cannot be done without it. It is surveyed that around 48 percent of the world’s population use the Internet [1,2]. This means number of the people use the Internet due to its popularity and benefits that are provided to them by the Internet. Another aspect of increasing the users of the Internet is that people can communicate and synchronize to other people all over the world via the Internet. Since there are number of benefits of the Internet, another field is growing, that allows objects and machines to connect and communicate to each other with the presence of the Internet, called the Internet of Things (IoT)[3].The main purpose of this new technology is to automate the work and connect the devices via the Internet that users use in daily life. Special types of sensors are attached to each object to capture the information from the physical world to virtual world. Information is analysed by processing methodology to remove the unnecessary data and store the information into local storage. Information is sent from local storage to cloud storage where all objects send their collected and interconnected information. Finally, using the collected information, an appropriate action is taken. It is not compulsory that action is always performed by using this information, but one can also manage and control the objects and machines remotely and use the information to maintain the records for the future use. There are different technologies and sensors are used to implement the idea of IoT. The communication technologies which are used to implement the idea of IoT are radio frequency identification (RFID)[4], near field communication (NFC)[5] and wireless sensor network (WSN)[6] etc. There are a lot of applications in which IoT has deployed as shown in Figure 1The first one is the health care domain where sensors are used to check human’s body temperature, blood pressure and heart beat rate [7]. Second application is smart home because humans use many electronic things like refrigerators, microwave ovens, fans, heaters and air conditioners at home. The sensors are used to detect the problem and tell about the problem to the manufacturing company in order to solve it[8]. The third application of IoT is animal tracking, with the help of GPS sensors to trace them easily [9]. Another IoT application is smart robotics grippers that contact an object directly to collect the sensing information. There are number of sensors and instruments installed in a smart gripper such as touch, motion, vision, optical and force sensors. The smartness level of a smart gripper depends on the equipped sensors because they collect information in a real-time mode and collected information is used to make decisions. Therefore, they must be used by design criteria such as cost, weight and compactness [10]. In addition, there are numerous applications of IoT such as smart transportation, infrastructure management (highways, bridges and railway tracks), manufacturing, smart building, smart agriculture and smart retail, etc.

53 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Figure-1: IOT Applications II. PROBLEM DEFINITION There are many benefits provided by IoT, but, on the other side, it also has some challenges suchas no proper management, energy efficiency, identity management, security and privacy [11]. Security and Privacy are the most critical key issues facing in the development of IoT. In IoT, all devices are connected to the Internet because, without the Internet, they cannot perform their tasks. There are many possibilities to attack the confidential information of objects via the internet. The attackers can misuse information in any illegal way according to their needs, which can result in a great loss for users[12]. Privacy has also become an issue for IoT. This means that the information of users must be in secure hands and not be accessible to anyone except authentic users. Therefore, security and privacy should be ensured by preventing unauthorized identification, access and user’s data is under control and no one else can misuse it[13]. III. PROPOSED METHODOLOGY IoT provides many benefits and facilities for users to use them properly, so there is a need for some elements. In this section, elements of IoT are discussed. Figure2 shows the elements needed to deliver the functionality of IoT. The names and details of these elements are as follows. D. IOT Elements

Figure-2: IOT Elements 1. Identification: It identifies each object within network. Identified by two processes; naming and addressing. Naming represents name of the object while addressing is the unique address of specific object. These both terms are very different from each other because two or more objects may have same name but always have different and unique address. The methods available that provide the naming facility to the objects in the network such as electron products codes (EPC) and ubiquitous codes[14].IPv6 is used to assign the unique address to each object,. Earlier, IPv4 was used to assign the address but it could not fulfil the need of addressing due to large amount of IoT devices. Therefore, IPv6 is used because it uses 128 bit number addressing scheme. 54 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

2. Sensing: The information is collected from objects with a process called as sensing. The collected information is forwarded to the storage media. The sensing devices are used to collect the information from objects such as actuators, RFID tags, smart sensors, wearable sensing devices, etc. 3. Communication:It is one of the key component of IoT where different devices are connected to each other and communicate, send and receive messages, files and other information. The technologies that provide facility of communication like Radio Frequency Identification (RFID)[15], Near Field Communication (NFC)[5], Bluetooth,Wi-Fi[6]and Long Term Evolution (LTE)[7]. 4. Computation:The sensors are used to perform computation on collected information from objects to remove unnecessary information that is not needed. Different hardware and software platforms are developed to perform the processing in applications of IoT. For hardware platforms, Audrino, Rasperry Pi and Intel Galileo are used, while, for software platforms, the operating system plays an important role to perform the processing. There are many types of operating systems that are used like Tiny OS,LiteOS , Android, etc. 5. Services: The IoT applications consist of four types of services. The first one is an identity-related service, to identity the objects that have sent the request. Second service is Information aggregation service whose purpose is to collect all the information from objects. Processing is also performed by the aggregation service. The third service is a collaborative service that makes decisions according to the information from storage area and sends appropriate responses to the devices. The last service is ubiquitous service that is used to respond the devices immediately without any rigidity about time and place. 6. Semantics: The users are facilitated according to their performance for assigned tasks. It is the most important element of IoT to fulfil its responsibilities. It acts like the brain of IoT. It provides all information and makes appropriate decisions to send responses to the devices. E. IoT Layered Architectures with Security Attacks The hierarchy of all proposed layered architecture of Internet of Things (IoT) is shown in Figure,3 which shows the layer architectures of IoT consisting of three layers, four layers and five layers respectively.

Figure-3: The layered architectures of IoT (three, four and five layers). 1. Perception Layer:It is also known as a sensor layer. It works like people’s eyes, ears and nose. Its main functionality is to identify things and collect the information from them. There are different types of sensors attached to objects to collect information such as RFID, 2-D barcode and sensors. The sensors are selected according to the requirement of applications. The information that is retrieved by these sensors can be about location, changes in the air, environment, motion, vibration, etc. They are the main target of attackers who wish to utilize resources to replace the sensor with their own [13]. Therefore, the majority of threats are possible on sensors. Common security threats of perception layer are: i. Eavesdropping: It is an unauthorized real-time attack where private communications, such as phone calls, text messages, fax transmissions or video conferences are intercepted by an attacker. It attempt to steal information that is transmitted over a network. Likewise it takes advantage of unsecure transmission to access the information being sent and received. 55 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

ii. Node Capture: It is one of the dangerous attacks faced in the perception layer of IoT. Where attacker gains full control over a key node, such as a gateway node. It may also leak all information including communication between sender and receiver, a key used to make secure communication and information stored in memory. iii. Fake Node and Malicious: In this type of attack an attacker adds a node to the system and inputs fake data. It main purpose is to stop transmitting real information. A node that is added by an attacker consumes precious energy of real nodes and potentially control in order to destroy the network. iv. Replay Attack: It is also called as a play back attack. Where an intruder eavesdrops on the conservation between sender and receiver and takes authentic information from the sender. An intruder forward same authenticated information to the victim that had already been received in his communication by showing proof of his identity and authenticity. The message is in terms of encrypted form, so the receiver may treat it as a correct request and take action desired by the intruder. v. Timing Attack: It is usually used in devices that have weak performance computing capabilities. It permits an attacker to discover vulnerabilities and extract secrets maintained in the security of a system by observing how long it takes the system to respond to different queries, input or cryptographic algorithms. 2. Network Layer: It is also known as transmission layer. It acts like a link between perception layer and application layer. It transmits the information collected from the physical objects through sensors. The medium for the transmission of data can be wireless or wire based. It also takes the responsibility for connecting the smart things, network devices and networks to each other. Therefore, it is highly sensitive from the attacker’s point of view to attack the data. In terms of security issues such as integrity and authentication of information that is being transported in the network [14]. The following are common security threats and problems to network layers are: 1. Denial of Service (DoS) Attack: A DoS attack is an attack to prevent authentic users from accessing devices or other network resources. It is performed by flooding the targeted devices or network resources with redundant requests in an order to make it impossible or difficult for some or all authentic users to use them. 2. Main-in-The-Middle (MiTM) Attack: MiTM attack is an attack where the attacker secretly intercepts and alters the communication between sender and receiver who are under assumption that they are directly communicating with each other. Since an attacker controls the communication, therefore participants can change messages according to their needs. It causes a serious threat to online security because it give the attacker the facility to capture and manipulate information in real time. 3. Storage Attack: The user store information either on storage devices or the cloud. The attacker will try to attack both storage devices and cloud to retrieve user’s information and try to change into incorrect details. There are more chances of attack by different types of people on the replication of information associated with the access of other information. 4. Exploit Attack: An exploit is any immoral or illegal attack in a form of software, chunks of data or a sequence of commands. It mainly focus on security vulnerabilities applicable in an application, system or hardware. It main purpose is to gain control of the system and steals information stored on a network. 3. Application Layer: It defines all applications that use the IoT technology or in which IoT has deployed. The applications of IoT can be smart homes, smart cities, smart health, animal tracking, etc. The main responsibility is to provide the services to the applications. Each application contain different service because services depend on the information that is collected by sensors. There are number of issues in the application layer in which security is one of the key issue. In particular, when IoT is used in order to make a smart home, it introduces many threats and vulnerabilities from the inside and outside. For an IoT based smart home to implement strong security, one of the main issues is that the devices used in smart homes have weak computational power and a low amount of storage such as ZigBee[14].The following are common security threats and problem of application layer are: 1. Cross Site Scripting: It is also known as an injection attack. It permits an attacker to insert a client-side script, such as java script in a trusted site viewed other users. By doing so, an attacker can completely change the contents of the application according to its needs and use original information in an illegal way.

56 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

2. Malicious Code Attack: It is intended to cause undesired effects and damage the system with the help of a code in any part of software. It is not be blocked or controlled by anti-virus tools. It can either requiring a user’s attention to perform an action or be like a program requiring a user’s attention to perform an action. 3. The ability of dealing with Mass Data: It has no ability to deal with data processing according to the requirements due to a large number of devices and a massive amount of data transmission between users, As a result, it leads to network disturbance and data loss. 4. Support Layer: The main purpose to make a fourth layer is the security in architecture of IoT. Because information is sent directly to the network layer in three-layer architecture. Since the information is directly sent to the network layer, the chances of getting threats increase. Due to certain flaws that were available in three-layer architecture, a new layer is proposed. But in four-layer architecture, information is sent to a support layer that is obtained from a perception layer. It has two responsibilities. First it confirms that information is sent by the authentic users and protected from threats. There are different ways to verify the users and the information. The most commonly used method is the authentication. It is implemented with the help of pre-shared secrets, keys and passwords. The second responsibility is sending information to the network layer. The information is transmitted from the support layer to network layer can be wireless and wire based. There are various attacks that can affect this layer such as DoS attack, malicious insider, unauthorized access, etc. 1. DoS Attack: It is related to the network layer. Where an attacker sends a large amount of data to make network traffic inundated. Therefore, the massive consumption of system resources exhausts the IoT and makes the user not capable of accessing the system. 2. Malicious Insider Attack: It happens from the inside of an IoT environment to access the personal information of users. Where an authorized user access the information of other users. It is a very different and complex attack as it requires different mechanisms to prevent the threat. 5. Processing Layer:It is also known as a middleware layer. Its main functionality is to collect the information that is sent from a transport layer. Where it performs processing onto the collected information. It has the responsibility to extracts the useful information while eliminating extra information that has no meaning, it also removes the problem of big data in IoT. Because in big data, a large amount of information is received which can affect performance of IoT[10][15]. The following are numerous attacks that can affect the processing layer and disturb the performance of IoT. Such as: i. Exhaustion: It is to be used to disturb the processing of IoT structure. It occurs as an after-effect of attacks, such as DoS attack in which an attacker sends the victim many requests to make the network unavailable for users. The aim is to exhaust the system resources, such as battery and memory resources. As IoT has a distributed nature; therefore, it does not have a high amount of hazards. It is comparatively easier to implement protecting procedures against it. ii. Malwares: Its main focus is on an attack on the confidentiality of the information of users. It refers to the application of viruses, spyware, adware, Trojans horses and worms to interact with the system. In the form of executable codes, scripts and contents to affect the confidentiality. 6. Business Layer: It refers to an intended behaviour of an application and acts like a manager of an entire system. The main functionality of this layer is to manage and control applications, business and profits models of IoT and also manage the privacy of users. It also has the capability to determine how information can be created, stored and changed. In this layer vulnerability permits the attackers to misuse an application by avoiding the business logic. The problems regarding security are weaknesses in an application that result from a broken or missing security control. Common problems regarding security of business layer are: i. Business Logic Attack: It takes advantage of a faults in a programming. The exchange of information between a user and a supporting database of an application can be managed by this layer. There several common flaws in the business layer, such as improper coding by a programmer, password recovery validation, input validation, and encryption techniques. ii. Zero-Day Attack: It uses a security hole or a problem in an application that is unfamiliar to a vendor. Where the security hole is exploited by the attacker to take control without user’s consent and without their knowledge.

57 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IV RESULT Security is a critical issue that exists in IoT.user cannot use the IoT properly and cannot be able to attain all the benefits that are provided by IoT without security. Therefore the following are some of the existing security mechanisms used to protect the IoT applications from intruders.Security Mechanisms for IoT[11] 1. Encryption and Hashed Based Security: One of the most important part of IoT is Internet .The information flows through a network during the communication where attackers also exist. Therefore, user’s information is not secured on the network. So there should be a mechanism to protect information from the attackers. To make user’s information more secure, a researcher proposed a method whose name is Encryption and Hashed based Security. Its functionality is to provide a facility of encryption in which a message is converted into an unknown form, called cipher text. The message is sent from a sender, it is converted into another form by using a key that cannot be understood to anyone except authentic users. Where key is to be generated according to the length of the message. Hence it is not easy task to break a key because it always contain a key of double length from the message. The key is also forwarded to the receiver. The receiver has the ability to convert the cipher text into an original message by using the key. This method greatly helps with making the user’s information secure, but, due to development in information technology, it is possible to change the contents of cipher text for the attackers. There is a possibility the attacker tries to make a message corrupt for the receiver. Therefore, this method also provides a facility of hash function as a solution. It is used to know and recover the contents of the message that have been changed by the attacker. It is used along with encryption. Which ensures the user that a message has not been altered by an intruder, virus, or by other means with the help of a digital fingerprint and a digital watermark of a message’s contents. 2. Lightweight Cryptographic Algorithms: It is a mechanism that is used to meet the security requirements in Smart devices. There are three types of lightweight cryptography mechanisms such as Symmetric key lightweight cryptographic algorithm, public key lightweight cryptographic algorithm and hash functions. Algorithms are to be used according to the requirements of users and messages that have to be transmitted. The details of these algorithms are as follows: i. Symmetric Key Lightweight Cryptographic Algorithm: It provides an encryption system in which the sender and receiver of a message share a single and common key. It is used to convert the message by a sender into an unknown form, called cipher text. It is also used to convert the message by a receiver from cipher text to the original message. So, the message can only be understood by authentic users. There are various examples of symmetric key cryptography algorithm such as Blowfish, Advanced Encryption Standard (AES), Data Encryption Standard (DES) and Rivest Cipher or Ron’s Code, but the most widely used algorithm is AES. In order to provide security as well as improve efficiency and performance for numerous applications the AES encryption algorithm has become the optimal choice of users. The work presented in proposes a distributed system in order to make data communication of the whole network secure. The communication occurs in two segments: IoT devices to the IoT gateways and IoT gateways to the Internet. So the communication in these segments is secured by applying a symmetric key cryptography algorithm by AES. The main disadvantage of this encryption scheme is that both parties (sender and receiver) have to exchange the key used to encrypt the data between them before they can decrypt it. ii. Public Key Lightweight Cryptographic Algorithm: It is also called as an asymmetric lightweight cryptographic algorithm. It uses both keys: a public key and a private key. A public key converts the messages into cipher text while a private key decrypts them. A Public key represents unique identification of a node that is provided by the certification authority (CA). Instead of symmetric key encryption it requires high processing, high energy consumption and long keys .It has two types: RSA (Rivest, Shamir, and Adleman) and ECC (Elliptic Curve Cryptography). The RSA requires a 1024-bits long key to encrypt the messages. ECC is more effective than RSA. It requires less bits to encrypt the messages than RSA. There is no difference between the RSA and ECC in terms of security because both encryptions provide the same security levels. Thus ECC is considered better and more effective than RSA while having low processing and low energy consumption. iii. Cryptographic Hash Functions: It plays a different role than other cryptographic algorithms. Typically used in many aspects of security, such as digital signature and data integrity checks. Where it take messages, blocks of data or electronic files and generate a digital fingerprint of the contents, called a hash value. The key property of a hash function is that when an attacker changes the input, then it affects the output. Thus, the receiver finds changes in the message. The secret key must be exchanged before using 58 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

an encryption method. Otherwise distribution of secret keys has been problematic until recently. It included face-to-face meetings, use of a trusted messenger or sending the key through an existing channel. The first two are always unsafe while the third depends on the security of a previous key exchange. There are different key agreement protocols that can be used for distribution like polynomial based key distribution protocol, a possible alternative Protocol, etc. V. CONCLUSION The emerging idea of Internet of Things (IoT) is quickly finding its path throughout our modern life, aiming to enhance the quality of life by connecting various smart devices, technologies and applications. Generally, the IoT would allow for the automation of everything around us. This paper presented an overview of the premise of this concept and its applications. It articulated different research about layered architectures of IoT and also described security attacks based on the layers that can affect the performance of IoT. It is surveyed that literature on the existing mechanisms to protect the IoT infrastructure and summarized these security methods on how they address the security issues in the IoT. Paper proposed a new layered architecture having six layers to make secure the infrastructure of IoT[16]. The names of layers of the new proposed architecture of IoT are:  Perception Layer  Observer Layer  Processing Layer  Security Layer  Network Layer  Application Layer REFERENCES [1] Internet Users. Available at http://www.Internetlivestats.com/Internet-users/ (accessed on 14December 2017). [2] Global Internet Usage. Available at https://www.en.wikipedia.org/wiki/Global_Internet_usage/ (accessed on 14 December 2017). [3] Oppitz, M.; Tomsu, P. Internet of Things. In Inventing the Cloud Century; Springer: Cham, Switzerland, 2018; pp. 435–469. [4] Zhang, D.; Yang, L.T.; Chen, M.; Zhao, S.; Guo, M. Zhang, Y. Real-time locating systems using active RFID for Internet of Things. IEEE Syst. J. 2016, 10, 1226–1235. [5] Nagashree, R.N.; Rao, V.; Aswini, N. Near field communication. Int. J. Wirel. Microw. Technol. (IJWMT) 2014, 4, 20. [6] Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Inf. Syst. Front. 2015, 17, 261–274. [7] Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The Internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [8] Khan, I.U.; Shahzad, M.U.; Hassan, M.A. Internet of Things (IoTs): Applications in Home Automation. IJSEAT 2017, 5, 79–84. [9] Memon, M.H.; Kumar,W.; Memon, A.; Chowdhry, B.S.; Aamir, M.; Kumar, P. Internet of Things (IoT) enabled smart animal farm. In Proceedihngs of the 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 2067–2072. [10] Bi, Z.; Liu, Y.; Krider, J.; Buckland, J.; Whiteman, A.; Beachy, D.; Smith, J. Real-Time Force Monitoring of Smart Grippers for Internet of Things (IoT) Applications. J. Ind. Inf. Integr. 2018. [11] Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [12] Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. 59 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

[13] Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [14] Koshizuka, N.; Sakamura, K. Ubiquitous ID: Standards for ubiquitous computing and the Internet of Things.IEEE Pervasive Comput. 2010, 9, 98–101. Sensors 2018, 18, 2796 33 of 37 [15] Want, R. An introduction to RFID technology. IEEE Pervasive Comput. 2006, 5, 25–33. [16] Wu, M.; Lu, T.J.; Ling, F.Y.; Sun, J.; Du, H.Y. Research on the architecture of Internet of Things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 20–22 August 2010; Volume 5, pp. V5-484–V5-487

60 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

ARTIFICIAL INTELLIGENCE IN MEDITATION

Khan Musarrat Begum, Rakhi Gupta and Nashra

ABSTRACT The goal of Meditation Mindfulness is to go beyond the mind and experience our essential natural awareness of experiences in the present moment, produces beneficial effects on well-being and ameliorates psychiatric and stress related symptoms. Mindfulness meditation has therefore increasingly been incorporated into psychotherapeutic interventions. Here we explore some several components through which mindfulness meditation exerts effects. The present review is to go through light upon the role of Meditation in prevention and control of obesity, through: 1. Attention Regulation of release mental disorders of stress hormones, increase metabolism reduce pain . 2. May help fight addictions, promotes emotional health ,Body awareness reduction of harmful behavioral risk.. 3. Development of emotion regulation for healthy lifestyle 4. Enhance self awareness your own thoughts and feelings, peace, happiness, and bliss and the world around you . Keywords: Mindfulness, psychotherapy, anxiety disorders, stress disorders, attention, cognition, depression, suffer physically mentally, anxiety, neuroscience, frustration.

INTRODUCTION Meditation is the practice where everyone uses their techniques such as mindfulness, or focusing their mind on a particular object, thing, thought or some activity to train their mind for some attention awareness, and achieve mentally as well as physically clear and emotionally calm and stable state. Meditation helps to reduce stress levels and alleviates anxiety. A meditative mind is an open mind having tremendous capacity to observe and listen. A meditative mind is capable of having silent communication with nature. It enables us to have a deeper understanding to our inner self and maintain our health. Imagine if you extremely neglect cleaning you’re your junk data which has been stored in your mobile or system for too long then your system may be hang or it gradually becomes weaker the condition gets worse. Suppose your body as a system. A lot of junk stored in your mind, soul body every single day. It may be in the form of negative emotions, feelings, stress depression , thoughts If you do regular meditation this junk can accumulate to toxic levels. This Mindfulness Meditation has been reported to produce beneficial effects on number of psychiatric, functional somatic, and stress related symptoms and has therefore increasingly been incorporated into psychotherapeutic interventions, The large number of research the efficiency of mindfulness based interventions in the treatment of a number of clinical disorders feeling of stress physically, mentally , love emotions, studies, future tension, anxiety and depression can become so great and strong so that they affect the quality of your life. Including furthermore or mindfulness meditation positively influences aspects of physical health, improved immune function, increase metabolism , reduce blood pressure, control cholesterol levels, control imbalance harmones acne naturally and increase telomerase. Meditation is not only benefit for mindfulness successfully been used in the treatment of mental disorders but also improved your physical health. Regular meditation can give you a very good result in the form of peace and calm. Those parts of the brain is responsible for anxiety, depression and poor concentration shrink whereas those regions associated with cognition, happiness, and calmness increases in size . This will be a very rewarding experience in yourself physically. It will improve your health enduring happiness and to gain deep view it will give positive effects on psychological wellbeing and health overwhelmed by negative or stressful feelings about the past or future. Meditation actually rewires the physical brain that will acquire the taste for living in a present moment. The grip of the past image is not very strong at a meditative mind. It has Ability to abide the present moment. A meditative mind has a tremendous capacity to observe and listen .It will likely make calmer and level headed. Meditation helps to rediscover the fragrance of relationship 61 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 that always existed between human being and nature. Meditation helps to rediscover the fragrance of relationship between the human being and nature.

TRADITIONAL MEDITATION VS. MODERN MEDITATION The art of meditation has been around from centuries. This ancient practice has helped individuals of all peace, balance, serenity and even clarity in their lives. It is a state in which the mind is brought to rest, focused only one item not allowed to wander. When this is done, a deep calm pervades body and mind, a state of tranquility which must be experienced to be understood. The one who is doing meditation focuses on is mind upon some items, such as prayer, a certain type of box, a chart, a candle flame, a religious image or whatever excludes all other thoughts and perceptions from his consciousness. The result is a state of rapture which lasts until the one who meditates ends the session of sitting. It is beautiful, delightful, meaningful, &alluring but only temporary. In modern society, numerous studies have been done on the physical, mental, emotional and spiritual benefits of meditation and found that this simple exercise can deliver astonishing results. While meditation has a long history, much like many things in our world today, in recent years there have been many modern takes on the meditation practice. Now “modern meditation” has become a huge trend in the self-improvement sphere and has helped countless people who may not have normally turned to this practice, find guidance through meditation. Modern meditation still operates with the same basic principles as traditional meditation, but it unsurprisingly brings technology in to the fold and is designed to work with the busier, more fast –paced lifestyles that many people lead today.

62 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Those who are interested in meditation find amazing results from both traditional and modern meditative approaches , no matter which way they choose to practice. However the key to finding success with any type of meditation is determining which approach is Best for you, your goals and your lifestyle. The first step in doing this is to understand some of the major difference between traditional meditation and modern meditation. Modern meditation was created to work within these busy, noisy, modern lifestyles and to help people find just a few minutes of quiet during their day. This is why you will see many modern meditation practices focuses on finding just 10 minutes during the day, either in a quiet room at work, in the car somewhere else where the stressors of the outside world can be canceled out.

Lifestyle Traditional meditation was developed 1000 years ago and it was designed to fit the lifestyles of the individuals who first practiced it. In short this meditation is simpler, less noisy & less busy lifestyles in mind. If you go back and see the ancient times meditation you will see that they typically spent their much more time for meditation because they was having much more free time in their hands. They were doing this meditation by going out for gyms, yoga classes. Many people also meditated outside or didn’t struggle to find a quite place to practice as they lived in a quieter environment where there is no disturbance. Modern meditation is still finding that peace and quite environment but it is all about that peace amidst the chaos of our world today. Modern meditation has been created to work within this busy, noisy, and to help people find just a few minutes of quite during their day. This is why our new generation prefer modern meditation focuses finding just 10 minutes and practices during the day either in a quite room at work, in the car, or some other place where the stressors of the outside world can be canceled out. Spirituality Traditional meditation was typically associated with structured religions or traditions. When it was first formed, meditation was linked to religious such as Hinduism Buddhism. While they practiced with the modern meditation, may be spiritual for the individual, there is typically not set religious association it is intended to work for anyone regardless of their religious beliefs. You can make meditation spiritual, or not and no matter from which religion you are, you can always use this technique. Intensions When meditation was first developed in the ancient time it was developed with reaching a higher sense of sprirtuality. This is why meditation was so closely tied to religion in its earlier days. Today modern meditation can be used in so many different aspects , and not only to find mental, emotional, spiritual clarity and balance. Today most of the people practice meditation for decreasing their stress, improving their mood and even to help treat issues like chronic pain, high blood pressure, senses and more. Their is so many scientific benefits for meditation, which is why more and more people choose the path of meditation to improve their health and various areas of their lives. Technique When meditation was first developed over 1000 years ago they use the technique to practiced this art was much more strict and straight forward. Those who wanted to practice typically sat cross-legged and often had mantras that had to introduced in their meditation. This technique still have been used today. 63 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

However the modern meditations technique is much more flexible. In modern meditation we can do meditation by using some of the Artificial Intelligence Apps has created by the top meditation, therapist to relive stress. This technique of meditation can be done by sitting, standing or even walking. Practitioners can meditate with a mantra or in complete silence. They can sit quite or they can listen to music or put even headphones that walks them through the meditation process. The key difference with modern meditation is that it can change and a adapt to fit the needs and preferences of the person practicing it. Today Meditation is seen as much more personal journey. There is no right or wrong way to practice meditation. What is seen an effective meditative practice for one person may not seem like meditation at all to another . It is all about the individual. Meditation has evolve over thousands of year ago. However it, doesn’t mean that traditional meditation is outdated or ineffective its simply a different approach to achieving the same outcome.

BEST MEDITATION AND MINDFULNESS APPS This app was last updated on July 20,2019. There is an app out there for everything these days; Meditation and Mindfulness apps are no exception. Actually there are hundreds of these mindfulness apps are available, promising to help users combat their anxiety, get better sleep, increase their focus , manage their weight and more. But how the one who is doing meditation will know which app is best or right for them. Which is made by the top meditation, therapist & professionals in field as opposed to those who are made up by someone who is new to practice themselves? To help you find the best mindfulness and meditation apps for your specific needs, there are some of the top mindfulness app options, and noted this app might be the right one for you . 64 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Aura This mindfulness app provides the user with daily micro-meditations that last only three minutes apiece. Aura helps users relieve stress and anxiety with a technology advanced, simple, and effective meditation platform. It was created by some of the and most sought-after meditation teachers and therapists, and personalized by Artificial Intelligence. Aura allows users the option to keep a gratitude journal, track moods throughout the day , and listen to the sound of nature. It even makes meditation into a game, as it allows you to level up as you learn and participate in daily challenges . This may be the right app for you if you have limited time throughout the day to participate your meditation. Users loves the simplicity of this app, and its ability to help create a sense of peace and well being within one’s mind. Some people do not like the fact that you cannot replay meditation clips as many times as you want without purchasing the full app, but overall people have found the free version to be very helpful. Breathe Breathe is a free app that follows users throughout the day, from the time they wakeup to the time they go to sleep. It provides them with supportive tools and guidance to help them stay on track with their meditation practices throughout the day. It offers five –minute meditations, along with tips for overcoming pressure, emotions, feeling love , and living with intention and inner peace . it is fully customizable, making it a user friendly app to help support your practice. This app includes a new “My Place” feature that puts all the app’s content at the users fingertips, allowing the user to set favorites, explore any new or popular features, and get relevant recommendations. Buddhify With this mindfulness app, meditation sessions are organized by themes according to where you are in your day. It is widely known to be one of the best apps for anxiety, and is personalized depending on what you ‘re up to, from waking up , commuting or taking a quick break at work to dealing with stress or having trouble feeling asleep . Its comes with over 80 custom meditations for you to explore that have been created by experts in the field. Buddhify is great for people in the modern working world who tend to be on the go. Some users had this app for over three years and still consider it to be their favorite. The options within the app are in high quality, and the professionals who run the app are the greater teachers and leaders, constantly continuing to make improvements to the mindfulness app Smiling Mind Similing mind’s progras are divided by age, starting at 7-11 years. If you have children who are struggling with their emotions, this app may be helpful addition to current methods you and they are using. This app is developed only to create a positive change in the world for every generation. Using the proven benefits of mindfulness meditstion, this app is free incorporates a fun and easy program for both childrewn as well as adults. It is used by over 2 million peoples worldwide , with thousands of those being teachers who use the app during school programs to teach their students. Algorithm

65 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Stop, Breathe & Think Stop, Breathe & Think might be best app for you if you need more structure and motivation to jump start your meditation habit. Using short activities, this app is great for children who are newly introduced to the concept of medittaion and mindfulness, but equally as effective for adults who have been putting off learning about the practice for a long time. This app can be connected to alexa device to allow you to get reminders and help you meditate while you away from your phone. Mindfulness Daily This is the another mindfulness app that will only take a few minutes of your time each day and provide you with invaluable benefits. This app support quik, effective guided practices to reduce stress and anxeity, improve performance, and enhance sleep. This app collaborates with some of the world’s most sought-after scientists, physicians, researchers, trainers, and coaches create their format that works great on mobile devices. This app allows the people who do meditation to fully integrate the method in to their daily life in just few minutes. People using this app they just love this app just because its ability to reduce stress and promote sleep. The extended body scan promotes a sense of relaxation that allows you to set aside your worries from the day and get a good night sleep. Calm This app brings joy, peace and a sense of clarity to your everyday life. Millions of people agree that this app is great for meditation, mindfulness, and changing your life in positive way. Calm provides the relaxing sound of falling rain automatically in the background, but you can also choose to greeted by a cracking fireplace, crickets or something called “celestial” white noise”. Calm also includes some short meditations that you can use during in a busy day. Users of this app say it gives the desire to stay consistent with your meditation practice, and allows people to increase their focus during their everyday life. Millions of people found this app to have amazing results during tumultuous time. Problem definition Proper techniques like postures, breathing, timing etc to get the said benefits out of it. Proposed methodology If you try an app and it doesn't seem right for you, don't be afraid to jump ship and choose another. This will benefit you in the end when you find the app that works for you. You may even want to download a few apps to have on hand so you can switch up your routine a bit throughout the week. The important thing is that you are able to find a system that works for you so you will stick with it. Proposed Methodology The main purpose for meditation is to reduce your stress and maintain their health from various diseases. This mindfulness apps will help the people who is struggling from their future worries by doing yoga or meditation developed by professionals and enthusiasts this is app is most beneficial app for our today’s generation who didn’t get time to do meditation in their busy life. This is apps are most accessible apps offering a descent catalog of meditation tracks with and without narrators. These tracks ranges 10 to 30 minutes, and can be personalized to your individual needs. This apps make the world more friendlier, healthier, and lovable place to be. The present review is to go through light upon the role of Meditation in prevention and control of obesity, through: 1. Attention Regulation of release mental disorders of stress hormones, increase metabolism reduce pain . 2. Body awareness reduction . 3. Development of emotion regulation for healthy lifestyle. 4. Enhance self awareness pay more to the present moment of your own thoughts and feelings and the world around you . 5. Change in perspective in their self which is described as peace, happiness, and bliss. 6. May help fight addictions, of harmful behavioral risk, promotes emotional health.

66 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

RESULT Meditation is result and the process is simplicity purity and intense hunger for themselves .If roots are healthy than flower of meditation will definitely bloom. CONCLUSION Meditation mindfulness had established to be an effective prevention for an acute episodes of anxiety, stress, depression, panic attack. It benefits for long term management proved to be sufficient method in maintaining healthy understanding to self. Enhance relationships with friends and family. Meditation give you the boost that you have always wanted for yourself . If you are a working women, then meditation is must for you. REFERENCES  https://zenfulspirit.com  https://www.developgoodhabits.com

67 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IOT BASED BINS FOR SMART CITIES

Satish P. Rodhe1, Shivtanu Utpal Falguni Ray2 and Somesh R. Dubey3 Faculty1 and Student2,3, M.Sc. I.T., Shankar Narayan College, Bhayandar (E)

ABSTRACT The growth of human population increase urbanization and absence of efficient waste management has caused serious environmental problems and cost issues. Smart City to achieve well-organized system for the cities using advancement technology. The IOT based smart bins consisting of sensors, GSM technologies and cloud computing. Each dustbin with timer will check for the percentage of waste collected and dustbin is not cleaned by their employees on given time then device and sends messages to the garbage monitoring system. Keywords: Internet of Things, IR Sensors, RFID, Smart Garbage, Smart City.

1. INTRODUCTION Solid waste refers to all non-liquid wastes. Solid waste management is the primary service provided by smart city administration and serves as a prerequisite for the wellbeing of its residents. In scientific solid waste management having risk to the environment as well as to the healthy living beings. Growth of human population corresponds to large amount of solid waste produced. A Smart waste management system defined, the waste detection system divided in four categories of subsystem; smart vehicle system, smart trash system, local base station and smart monitoring and controlling hub, the detection of waste to local base station using load and IR proximity sensor, RF transmitter used to send and the local base station decodes the trash bin location and accordingly sends a signal to the monitoring and controlling hub which sends signal to truck about the location of the trash bin.[1][2] 1.1 OBJECTIVES  To eradicate unhygienic condition, deadly diseases and to maintain public cleanliness.  To develop a smart alert system for proper garbage management by intimate to the controlling web server for cleaning of dustbin.  To provide exact location of the garbage using Google map.  To notifies the cleaner when cleaning is required and generates optimized routes for cleaning.  To monitor and analyses the waste generation by each locality under the municipality. 2. SMART CITY What is meant by a 'smart city'? For this there is no standardizations for the universally acceptance of definition. The Smart City concept varies in cities and countries, depending on the development, change and reform, resources and city residents. [3] 1. Smart economy by encouraging free enterprise, new ideas, efficiency and affordability. 2. Smart government by allowing e-government for decision-making and better service. 3. Smart mobility by creating smart transport systems, efficient multimodal. 4. Smart environments to promote development of green technology for waste management. 5. Smart living by improving healthy life. 6. Smart people by smart activities. PROBLEM STATEMENT Smart cities include the building the infrastructure like road sewage system etc. Major problem almost the cities are facing is to manage the waste that is generated daily. Currently emptying of the dustbin by corporation vehicles they need to visit the bin time to time in a day specified route some time bin will be full by the garbage which attracts animals that will make the garbage to spill on the road secondly people won't go near to dustbin to throw their waste due to overfilled dustbins currently there is no dustbin is controlled by remotely system to complete automation is needed to control the dustbins remotely by the system persons and alerting to collecting vehicle to empty the dustbin when its full by doing in these method fuel can be saved.

68 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

2.1. IoT Based Waste Management for Smart City The System in which Smart dustbins are connected to the internet to get the real time information of the smart dustbins available in the city, low cost embedded device which are easy to identify which dustbins is full i.e. it becomes easy to track the level of the dustbins which are located in the city. Smart dustbins are equipped with micro controller-based system with IR Sensors and RF modules. These details can be monitored by the concern authorities from their area with the help of Internet and an immediate action can be made to clean the bins. In this system, effective usage of smart dustbins or Managing and monitoring can be done by the status of it and accordingly help to take the decision. [3] 2.2. IOT Based Smart alert system using Arduino UNO An embedded based smart alert system is developed for the monitoring and maintenance of the garbage. This system prevents the irregular cleaning of the dustbins by sending alerts to the system at regular intervals. It further improves the system by additionally endorsing the status of cleaning in real time and measure the performance of the team. In addition to this, it also aids to reduce the essential for high human interference in trash upkeep of the town and effluence monitoring system. In this system level of garbage can is detected with provided ultrasonic device which exists interfaced through Arduino UNO to check the level of trash filled in the litterbin and sends the signal to the web member of staff serving at table once if trash is full. Driver checks the task of evacuating the junk with the aid of RFID Tag after spring-cleaning the dustbin as RFID is a work out technology that is used for verification process. This whole process is done with the help of a fixed module combined with RFID and IOT Acceleration. This system also provided real time status of dustbin in addition to aids to yield an action according to it. This is an embedded based system which devised for the proper monitoring and upkeep of the trash as well as averts irregular cleaning of the dustbins by sending alerts to the concerned individual within regular intervals. 2.3. Garbage Monitoring System Using IOT Ultrasonic sensor they give the analyses more accurately, it is presented for trade and industry and efficient garbage collection. 2.4. IOT Waste Management An intelligent waste collection system is based on IoT sensing prototype. It is responsible for measuring the waste level in the waste bins and later send this data (through Internet) to a server for storage and processing. This data helps to compute the optimized collection routes for the workers. Data is used to enhance the system for different kind of wastes, namely solid and liquid wastes. [5]. 2.5. Solar Power Smart Waste Bin Using Arduino Solar power smart waste bin using Arduino consist of ultrasonic sensor, Arduino UNO, GSM/GPRS, solar panel etc. The scheme basically contains of an ultrasonic device that functions as the distance calculator. The ultrasonic sensor attached to the smart waste bin which is placed in public areas are rummage-sale to amount the warmth in front of the bin and if the distance fall below a particular value the presence of humans can be identified. A buzzer can be activated by using H Bridge for indicating the operation and lid can be opened. The entire system works with the renewable solar energy and a constant supply of voltage to charge the battery- operated [11]. 3. INTERNET OF THINGS (IOT) The IOT consist of primary term is “Internet” and the another term is “Things”. The Internet is a universal organization of intersected computer systems that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. IOT is a network of networks that consists of private, public, academic, business, and government networks, of local to global scope, that are linked by electronic, wireless and fiber optical networking technologies [9]. Nowadays many in countries data exchanges through Internet. IOT is maturing and latest model in the IT flora and fauna. IoT has attracted towards by the prominent visualization of a worldwide substructure of networked mental substances, enabling ubiquitous system [10]. The IOT is a worldwide network concept which allows the inter communication between human and things, which provide unique identity [11]. IoT pronounces a flora and fauna wherever everything can be associated and communicated in an intelligent through internet. Greatest of us consider around “being connected” in terms of electronic devices. 3.1. Uses of IOT Based Insolent Garbage A use of IOT Based Smart Debris IOT Constructed specialist care system is helpful for monitoring the garbage in garbage bins. This can be implemented in present days; as solid waste management is big issue throughout the world. The concept helps in reduction of solid waste management problems so that helpful in increasing 69 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 public health safety precautions by Government. This is a small attempt to fulfil the challenges of “Swatch Bharath Abhiyan” (or) “Clean India Mission” [48]. Lone of the chief harms through the IOT based Smart Garbage system remains that it is thus vast and such a broad perception that here is no predicted, unvarying style. In directive designed for the impress of IOT based Smart Garbage system on the road to work, it essential consist of an collection of sensor, network, structures and computing technologies, surrounded through others [9] 4. DISADVANTAGES OF THE EXISTING GARBAGE SYSTEM I. Time overwhelming and fewer effective: automobiles drive and empty containers whether they remain full or not. II. High costs. III. Insanitary Location besides appearance of the town. IV. Odor suppers also might cause complaint to mortal existences. V. Additional stream of traffic and Clatter. 5. PROPOSSED WORKING SYSTEM This paper is to present the current urban waste management scenario and permits a two-way communiqué amongst the substructures deployed in the city and the workers/managers. A consolidated system for real-time observing is our aim to realize. In this way both the community and inhabitant’s assistance from an adjusted coordination which dominoes affect in chief cost hoards and less urban pollution. [2] 5.1 PROCESS 1. The system would be dealing with two types of users, i.e. an official/operator/administrator with privileged rights and a citizen with limited rights. 2. The user's only method to interrelate by means of the system is the web portal. 3. An operative operator might have constitutional rights like examination status of all bins, positioning assortment vehicles and producing data exploration report. Whereas an inhabitant user can only have the veracious to square the bin status of his neighborhood and catalog a criticism if any related with to the system. 4. The possibility of our project is not restricted to any particular environmental area as long as it has the essential IoT substructure. This work of ours can be employed in any city which is big sufficient to be necessary problems concerning to unwanted organization. 5.2 Functional Requirements The Functional requirements of the simulated multivalent based model are highlighted as follows: 1. Waste glassy in a bin shall be created per virtual reality tick in schedules 2. Singular bin waste levels shall nonstop be informed and logged 3. The automobile be about to follow the spawned finest path for excess collection 4. Bin and automobile shall have the maximum capacity for carrying leftover load while keeping the non- functional recital of the virtual model to have appropriate comeback time, and current throughput during the waste collection [4]. 5.3. APPLICATIONS OF SYSTEM: 1. Waste Level detection inside the garbage bins Communication of the info wirelessly to alarmed executives [4]. 2. Structure can be gain access from Ubiquitous. 3. Real-time data communication and contact. 4. Evades the excesses of trash bins. 5. It only is used by private the established order or other private firms to confrontation the current problem of built-up waste throng. 6. This organization has no specific use, but can be used by a city, state or a country. 70 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

7. Using this structure, waste collection would become capable and also lessening in transference costs canister be seeming. 6. FUTURE SCOPE • Additional sensors can be recycled on the way to categories waste. • An automated system can be developed which is able toward pick up and excess in and around the bin. [6] REFERENCES [1] Eunice Likotiko and Dmitry Petrov “REAL TIME SOLID WASTE MONITORING USING CLOUD AND SENSORS TECHNOLOGIES”,(TCJSAT), (JANUARY-2018). [2] Abhishek Dev and Maneesh Jasrotia “IoT Based Smart Garbage Detection System”, (IRJET), (DECEMBER-2016). [3] G. Jenilasree and Dr. N. Shenbagavadivu “A Study on Automatic Solid Waste Management System for Smart City”,(IJCRT), (NOVEMBER-2017). [4] S. S. Navghane and M.S.Killedar “IoT Based Smart Garbage and Waste Collection Bin”,(IJARECE), (May 2016). [5] Nikam Shita and Patil Shubhangi “IoT based Smart Waste Management”, (IJSARSE), (APRIL-2018). [6] Abeesh A I and Amal Prakash P “IOT Based Waste Management, Monitoring & Tracking – SMART BIN”, (IJIREEICE), (March 2018). [7] S. N. Khendad and S.T. Nikam “Domestic Smart Waste Management Using IOT”, (IJRASET), (November 2017). [8] Dr.B. Paulchamy and E. Babu Thirumangai “IOT Based Waste Management in Smart City”, (AJAST), (February 2018). [9] V. Mallikharjuna Rao and Dr. M. Satya Sai Ram “A Review- On IOT Based Garbage Monitoring and Collection System”, (IJAMTES), (2015). [10] Harish S V and Arjun Y K “IoT Based Solid Waste Management System”, (IRJET), (May-2018). [11] Dr. N. Susila and Sruthi Anand “Technology enabled Smart Waste Collection and Management system using IoT”, (IJPAM), (2018).

71 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

“SMART MIRROR”

Rajni Gajbhiye and Saima Shaikh Post-Graduation Student, Kishindchand Chellaram College

ABSTRACT A smart mirror is a system that functions as mirror with additional capability of displaying date, time, current temperature, weather details, news and daily schedule. In this system, we are providing mirror with intelligence. For designing smart mirror we are using IOT circuitry through which we can display daily information directly on the surface of the mirror. User will give commands according to their requirements and the response will be collected visually using raspberry pi 3 model B. This system also provides security for particular user so that each user can only view their own schedule. Keywords: Smart mirror, Internet of things (IOT), Raspberry pi 3, smart devices.

INTRODUCTION In modern world, man has invented various technologies for their comfort life. Mirror is found in most people’s home. We are aiming at combining normal mirror with digital display. The device was to go beyond an ordinary mirror, to have a screen inside that you would be able to interact with by using voice commands and smart phones or other devices. Smart Mirror has many benefits. It makes life easier as the need to look at phone every time we need to check the date or weather is reduced. The smart mirror would be used to merge two or more technology and the need for information into any ones daily schedule. With the mirror in place, the user could interact and obtain the information they want during their normal morning and night routines. System collects real world machine data and the data would be transmitted from the machine and would be managed by the Raspberry Pi. The Smart Mirror implemented as a personalized digital device equipped with peripherals such as Raspberry PI, mouse, keyboard etc. LITERATURE SURVEY Sr. Name of Year of Content No. Paper Publication 1 Smart Mirror Using Raspberry Pi- March- Smart mirror is to increase a user’s International Journal of Engineering and April, 2018 productivity by saving them time. Techniques 2 Smart Mirror Using Raspberry PI - April 2018 To make life easier as the need to look INTERNATIONAL JOURNAL FOR at phones, tablet, PC every time we RESEARCH IN EMERGING SCIENCE need to check the date, time, news or AND TECHNOLOGY weather is reduced. 3 Design of Smart Mirror Based on Jan 2018 The designed intelligent mirror has the Raspberry Pi”, Conference on Intelligent advantages of small size, simple Transportation, massive knowledge & operation, low cost, and is suitable for good town (ICITBS) families, and has broad application prospects.

PROJECT STRUCTURE A. Block diagram of smart mirror Fig 1 shows the basic block diagram of smart mirror with arrow heads showing the input and output control lines and block shows the component required for the smart mirror. The goal of the Smart mirror is to provide a single easy to access location for a person to receive all the information that could affect how they prepare for the day. Through the use of display and a two way mirror, weather, time and date, and news are available at a glance. The microphone is connected to the Raspberry Pi to accept Voice commands, according to the voice commands Raspberry Pi will Show you the result on mirror.

72 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-1: Block diagram of Smart Mirror A user friendly interface, accessible from any Wi-Fi enabled device, allows the user to easily setup the connection to their home Wi-Fi, change the location from which they receive the details of weather, and any source from which to extract the day’s headlines. Additionally, Pi camera is used for security purpose for schedule accessing using face recognition concept. By enabling these features and functionality into a mirror, which most people will already be using in their daily morning routine, it is possible to present this information to the user in such a way that it will seamlessly blend together with the task of morning grooming. B. Conceptual diagram

Fig-2: Conceptual Diagram Fig 2 shows the conceptual diagram of smart mirror. It includes basically IR sensor, Pi camera and a two way mirror. IR sensor is for the detection of any kind of motion in front of it. PI camera is for the face detection purpose and a two way mirror is for the display of output or when there is no output to display it acts as a simple mirror. The IR sensor is placed just above the mirror in order to track a motion of someone who comes in front of the mirror and then starts the processing. The Raspberry PI is also placed behind the mirror interfaced with the camera, monitor and IR sensor. When the user comes in front of the mirror the IR sensor activates and detects the motion of someone coming in front of it. The camera detects the user in front of the mirror using face recognition algorithm and detects the right user who owns the smart mirror. If the user detected is the owner then the mirror will ask whether to show some information or not. According to the users requirement the information will be displayed on the mirror through the monitor interfaced with the Raspberry Pi. The monitor will be off when all the users’ commands will be over and finally the smart mirror will act as a normal mirror. This is the whole working of our project. PROBLEM DEFINITION To develop a system that provide efficient user interface and combine many tasks such as news, weather, date, time etc. in an efficient and enjoyable way to provide time savings for the user. Sensor works as an input to the system. The smart mirror is designed by combining Raspberry pi, sensors, input devices and a smart mirror. According to users requirement smart mirror will show the output. 73 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

PROPOSED METHODOLOGY Fig 3. Shows the schematic view of mirror with all other components placed according to the requirement of our project. The monitor is placed behind the two way mirror and the mirror acts like a display for output when the monitor’s light is on.

Fig-3: Methodology FLOW CHART

74 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

RESULTS a) The result of the Smart Mirror Project is very useful for the user as the user can efficiently take a glance at the mirror and can retrieve important news, time, weather updates and schedule or reminders stored by the user and at the same time get ready for work. b) Smart Mirror provide a user friendly environment thus leading to a better lifestyle. c) It replaces the use of computer peripherals such as mouse by using voice recognition for giving commands. d) It enforces security of schedules or reminders of a person by the use of face recognition. CONCLUSION a) The Smart Mirror designed in this project will provide the user with an enhanced mirror experience. By making use of multiple displays, the user can stay updated on the time, weather, and news headlines while preparing for the day in with the fully functional Smart Mirror. b) Although there are other smart mirror technologies that are available, the Smart Mirror created in this project stresses saving cost and flexible usage. Through an easy to use interface, the mirror can be easily setup to display data that conforms to their desires. c) Mirror is able to connect to the internet and parse the proper data to display. The IR sensor ensures that the mirror will always turn on when a person steps up to use it. d) While the good Mirror can got to be a lot of polished and have a couple of changes created before it are often a viable product to be sold-out, however the good Mirror created during this project meets all the look goals set forth before the project and has all the weather that might be required for a completely practical REFERENCES a) “Smart Mirror exploitation Raspberry Pi,” By, Prof. V. E. Pawar, Pooja Sisal, NeelamSatpute, International Journal of Engineering and Techniques, vol.4,no. 2, pp. 2395-1303, Abbrev. March-April, 2018. b) Prof. P Y Kumbhar, AllauddinMulla, Prasad Kanagi, Ritesh Shah, “Smart Mirror Using Raspberry PI ,” INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY, vol. ED-5, no. 4, pp. 2349–610, April 2018. c) Yong Sun, LiqingGeng, Ke Dan, “Design of Smart Mirror Based on Raspberry Pi”, International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). d) M. Anwar Hossain , Pradeep K. Atrey , Abdulmotaleb El Saddik ,“Smart mirror for ambient home environment”, 2007 3rd IET International Conference on Intelligent Environments. e) MaciejKranz,” Building the Internet of Things”. f) CunoPfister, “Getting Started with the Internet of Things” g) AnikaBinte Habib, Adnan Asad, Wasiq Bin Omar,” Magic Mirror Using Kinect”, BRAC University, December 2015 h) Johannes Moskvil,” The Intelligent Mirror- A Personalized Smart Mirror Using Face Recognition’, Norwegian University of Science and Technology, June 2017

75 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SOIL MOISTURE CONTROL SYSTEM

Vishal Brahmbhatt and Siddhi Korgaonkar Student

ABSTRACT The Fundamental aim of the project is to develop a system that monitors the condition of the soil by controlling the water content of the soil. The system consists of various sensors to sense the moisture of the soil. The water pump will automatically supply water into the soil, if the soil is found dry. The system will also adjust its self if there are chances of rainfall. It is a self-independent automated system that can be used in daily life. Other feature is to give notifications through the mobile application about the changing condition of the soil so as to allow the user to turn ON/OFF the water pump manually if required. Some other aims of the project are to save water by limiting the supply of water into the soil depending on rainfall condition.

I. INTRODUCTION Farming is of great importance in a country like India. The Ratio of Farmers Committing Suicide in India Is Increasing Year by Year Due to Crops Failures and Various Other Reasons.Farmers Usually Work on Large Portions of Land, so it becomes difficulty for a single person to keep a track of the entire farmland. Each crop requires different moisture levels to grow. There aren’t efficient practices done to detect the moisture of the soil which contributes to grow the crop. Sometimes It May Happen That A Given Patch of Land Receives More Water Leading to Water-Logging, Or It Might Receive Far Less or No Water at All Leading to Dry Soil. There is a possibility that the crops get damaged and as a result of it farmers may suffer losses. The system will also eliminate the disposal of water into the farm if there are any chances of rainfall to avoid excessive amount water in the farm. Hence the proposed system will help to detect the temperature and humidity of the atmosphere and moisture of the soil which will indirectly help the farmer grow better quality of crops. It will also be an automated system which will focus on reducing manual work and save time. The main purpose of developing this project is to control water level in the soil and stop of water supply in the farm depending on the conditions of the environment. Which implies that if there is a probability of rainfall the water pump won’t supply water in the farm to avoid excessive water in the soil. Also, using this project the user will get the changing moisture condition of the soil as notifications in the mobile application, which will in turn enable the user to turn ON/OFF the water pump according to the notifications received. The other reason is to avoid water logging due to rainfall. Second major purpose of developing this project is avoiding wastage of water. The other purpose of developing the project is that it can be used in resorts, buildings or hotels with roof top gardens or flower bed balcony. The three main functions of the project are as follows: a) To supply water in farmland. b) Avoid wastage of water. c) Give notifications to the user about changing moisture and temperature of the soil and let the user turn ON the water pump accordingly. II. PROBLEM DEFINITION Farming is of great importance in a country like India. The ratio of farmers committing suicide in India is increasing year by year due to crops failures and various other reasons. Farmers usually work on large portions of land, so it becomes difficulty for a single person to keep a track of the entire farmland. Each crop requires different moisture levels to grow. There aren’t efficient practices done to detect the moisture of the soil which contributes to grow the crop. Sometimes it may happen that a given patch of land receives more water leading to water-logging, or it might receive far less or no water at all leading to dry soil. The above mentioned conditions may contribute to damage of the crops which will thereby affect the farmer. The system will also eliminate the disposal of water into the farm if there are any chances of rainfall to avoid excessive amount water in the farm. The system will prevent the soil from getting damaged or infertile for cultivation. On the other hand, it will also prevent wastage of water and the user can also turn on/off the supply simply through a mobile application. The biggest advantage of having this system is that it tries to reduce the cost of agriculture as least as possible. Hence the proposed system will help to detect the temperature and humidity of the atmosphere and moisture of the soil which will indirectly help the farmer grow better quality of crops.

76 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

III. PROPOSED METHODOLOGY A. Methodology to be adopted In this system the sensor will sense the moisture in the soil and if the soil is dry, it will automatically signal the water pump to start and supply water. The water pump will also be connected to the switch so that the farmer (user) can switch it on or off accordingly whenever required. It will also notify the farmer (user) whenever the motor will start its supply. If the crops need more water than the farmer can start the motor of water supply using the switch. It will make the soil wet and hence the water will be sipped into the soil and thus making the crops of better quality and rich in nutrients. This will make the agricultural practices more effective and less expensive. Thus, it may help in getting a considerable decrease in the suicides rate of farmers in India. B. COMPARITIVE STUDY WHY YOU SELECTED THIS TECHNOLOGY? The project can be done various other technologies also other than the Arduino. Those technologies can be using the other Atmega Controllers, Atmel Microcontrollers or Raspberry Pi. Some reasons why we selected Arduino Over Raspberry Pi for the project are: a. Our aim is to go on Arduino as its cost-effective based project. b. Raspberry Pi is much expensive as compared to Arduino. c. Sensors on Raspberry Pi require drivers which may lead to complications in structure of project. d. Raspberry Pi is used for a wide extent, as per our project requirements Arduino fits best. WHY YOU SELECTED THIS TOPIC? Some reasons why this topic is selected are: a. Our main reason to select this topic is to indirectly help to reduce farmers suicide cases in India. b. To increment the quality of soil to make it effective for agriculture purpose. c. To prevent wastage of water. d. To provide automation service to the soil monitoring activity. e. To reduce manual work and save time. f. To monitor soil moisture levels and temperature. g. To make agriculture practice easy and efficient. h. To develop a system that is cost effective. i. To provide information about the condition of soil to the farmer. j. To develop a self-independent system.

IV. RESULTS It is a system that is simple and cost effective and can be also used in places having various problems related to the soil or scarcity of water. In future, this system can be also used for making a drought place useful for cultivating crops or making the soil reusable for other purposes. Further enhancements can be done by adding various other automations of that area. The implementation will be done using soil moisture and temperature sensors. The system is an automated system and will focus on reducing manual work and save time. The design will include the working of soil moisture sensor, temperature sensor and the working of pump as well as the 77 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 design of the mobile application which will act as user interface. The project will be tested as implemented module by module. Other feature is that if the temperature changes and if there’s a probability of rainfall then the user can wait for some time and stop the water supply manually and if there’s no probability of rainfall in then the user can make the system work on automation. The system is developed in such a way that it can be used in all types of soil conditions and the water pump can be turned ON/OFF by operating through a simple mobile application. By supplying the water only when need will help in solving the water wastage problems. It also focuses on reducing manual work. The Fundamental aim of the project is to develop which will look after the water content of the soil. It will be self-independent automated system which will be used for managing the quality of the soil. Also, the system can be powered ON/OFF automatically as well as manually. Some other aims of developing this system are as follows a) To make agricultural practices in India more efficient and less expensive. b) To make it cost effective. c) It focuses on the main issue of suicides by the farmers in India due to failure of their farm. d) Helps to increment the quality of the soil. e) It manages the supply of water based on the temperature of atmosphere. f) To give the user notification about the status of the water pump as well as the moisture level of the soil. g) To reduce wastage of water. The contributions of the project are a) Computer based automated system that saves time and contributes towards avoiding personal efforts. b) Contributes in saving water and cost of farming/gardening. c) Contributes towards producing better quality crops and enhancing agricultural practice in India. Achievement goals are a) Achieve goal of decreasing the suicide rate of farmers in India. b) Achieve the goal of making the soil efficient for farming. c) Achieve the goal of making good quality crops, Hence for the betterment of the farmer. V. CONCLUSION The project will the farmer(user) in cultivating good quality crops and in efficient way. The project will help the farmer(user) in an cost effective method. If the system is enhanced it will also save the resources by using renewable resources such as solar power which will not only save the electricity usage but also have an eco friendly environment for a better cultivation. The system can also be enhanced to harvest rain water that is it will store the rain water and can use the same water to supply to the field. The implementation of roofs can be done to stop rain water falling on the field and hence store the water for future purposes. Thus using roofs will stop the excessive water being sipped by the field and hence will help in growing better quality crops as the excessive water is not supplied to field. To develop the system, first of all we need to gather the proper information required and plan accordingly. The concepts of working of all the components that are to be used needs to be studied well to start up with. We have also planned for a series of activities that can be carried out in order to accomplish the goals. The series of activities are: a) Gather all the components. b) Feasibility study of the project. c) Create Block diagrams and Circuit Diagrams for all the connections and flow of the system. d) Study the information of how to pass the data from Arduino board to the mobile application. e) Studying about the mobile app. f) Develop the relay module with water pump and give outputs to the water pump by taking user’s input of turning ON/OFF using mobile application. 78 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

REFERENCES  https://create.arduino.cc/projecthub/MisterBotBreak/how-to-use-a-soil-moisture-sensor-ce769b  http://www.circuitstoday.com/arduino-soil-moisture-sensor  https://www.electroschematics.com/6519/simple-soil-moisture-sensor-arduino-project/  https://www.instructables.com/id/Arduino-Soil-Moisture-Sensor/  https://circuitdigest.com/microcontroller-projects/arduino-automatic-plant-watering-system  https://nevonprojects.com/iot-irrigation-monitoring-controller-system/

79 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

A MOBILE DISASTER MANAGEMENT SYSTEM USING ANDROID TECHNOLOGY

Alina Mirza Student, M.Sc. (I.T), K. C. College

ABSTRACT is highly vulnerable to natural disasters and the changing climatic dynamics given its location along the sea coast and with a steep gradient along the slopes of the Western Ghats. Floods are the most common of natural hazard in the state. Nearly 14.5% of the state’s land area is prone to floods, and the proportion is as high as 50% for certain districts. The disaster management system Android application known as “AmritaKripa” for rescue and relief operations during inland flooding. It has been developed for the end users, victims and relief providers. Keywords: Kerala, Disaster Management, Flood, Mobile Technology, Android.

I. INTRODUCTION The great flood of '99 occurred when the Periyar River in Kerala state of India flooded in the month of July 1924. Kerala state received anomalous rains during the month of July 1924. Kerala received 3,368 mm of rain from June to September during the monsoon season, 64 per cent higher than normal and is the highest recorded rainfall. The rivers in the state were in spate and a sudden opening of the Mullaperiyar sluices caused even greater misery. The restriction in flow due to swelling of the Periyar River, blockages formed by debris, changes in the river flow and other related reasons caused flooding even in places like which is 1500m above sea level. [1] This flood ruined the road to Munnar which was a result of a catastrophic landslide at Karinthiri. The whole mountain Karinthiri Mala was washed away. [2] After the Great flood of ‘99 in 1924, Kerala experienced the worst rainfall between June 1 and August 18, 2018. During this period, the state received cumulative rainfall that was 42 per cent in excess of the normal average. The heaviest spell of rain was during 1 August, when the state received 771mm of rain. The torrential rains triggered several landslides and forced the release of excess water from 37 dams across the state, aggravating the flood impact. Nearly 341 landslides were reported from 10 districts. Idukki, the worst hit district, was ravaged by 143 landslides. [3] II. DISASTER MANAGEMENT A. Disaster A disaster is a serious disruption occurring over a relatively short period of time, affecting the functioning of a community or a society as it causes widespread human, material, economic or environmental loss which exceeds the ability of the affected community or society to cope using its own resources. [4] B. Disaster Management Disaster Management can be defined as the organization and management of resources and responsibilities for dealing with all humanitarian aspects of emergencies, in particular preparedness, response and recovery in order to lessen the impact of disasters. The process of disaster management involves four phases: mitigation, preparedness, response, and recovery. The mitigation phase is the attempt to reduce disaster risks by focusing on long-term measures of eliminating disasters. The preparedness phase is the development of an action plan for an upcoming disaster. The response phase is the mobilization of services and relief when disaster strikes and the recovery phase is the restoration of the affected area to its previous state. The term disaster management can be characterized as the scope of exercises to keep control over disasters and crises, and provide a schema to help those in danger, to evade or recuperate from the effect of the disaster. [5] C. AFTERMATH OF KERALA FLOODS 1. 1924 Kerala Floods During the Great flood of ’99, the rain continued for about three weeks. Even a huge mountain called Karinthiri Mala was washed away by this flood and the road to Munnar also went along with it. The destructive flood claimed thousands of lives, animals and birds, and caused severe damages to the crops and property in Kerala. Most of the areas in the erstwhile Travancore and Cochin states, parts of Malabar region were submerged under the floodwater. In Munnar around 4850 mm of rain fall was reported during the flood and wide spread destruction happened. The old Aluva-Munnar route through Kothamangalam-Kuttanpuzha-Mankulam was made unusable due to landslides. Kundala Valley Railway the narrow gauge railway line at Munnar was completely destroyed by the landslides and flood waters.

80 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Official Travancore records says that Aluva- Perumbavoor Road was submerged up to 10 feet of water for the entire stretch. By early August, thousands of refugees and displaced families were being fed at different relief centres: 4000 at Ambalapuzha, 3000 at Alleppey, 5000 in Kottayam, 3000 in Changanassery, 8000 in Parur. [6] 2. 2018 Kerala Floods The tragedy of Kerala floods 2018 claimed more than four hundred lives and forced over fourteen lakh people to seek refuge, the Kerala deluge has been touted as the worst disaster to hit the state in a century. It has been reported that an estimated one-and-a half years will be needed to rebuild public amenities like key road lines and bridges and will cost the state Rs. 5,800 crore. There was massive damage to homes- concrete walls were cracked, mud homes were washed away completely and families were living in fear of snakes and insects that had been washed in with the flood water. Most septic tanks and toilets were overflowing and dirty stagnant water became breeding grounds for water-borne diseases. [7] III. MOBILE TECHNOLOGY A. Use Of Wireless Mobile Technologies Once considered a luxury of the rich, mobile phones are now an everyday gadget for people across the globe. The number of mobile phone users in the world is expected to pass the five billion mark in 2019. Mobile phone users in India crossed 581 million users in 2014 and has been on a steady rise over the last decade. According to a survey by eMarketer in 2015, India is estimated to have over 800 million mobile phone users in 2019. [8]

Fig-1: Indian mobile phone users (2013 - 2019) Mobile phones are the perfect way to stay connected with others and provide the user with a sense of security. In the event of emergency, having a mobile phone can allow help to reach you quickly and could possibly save lives. [9] In Japan, mobile phone companies provide immediate notification of earthquakes and other natural disasters to their customers free of charge. In the event of an emergency, disaster response crews can locate trapped or injured people using the signals from their mobile phones or the small detonator of flare in the battery of every mobile phone; an interactive menu accessible through the phone's Internet browser notifies the company if the user is safe or in distress.[10] B. Disaster Response And Mobile Phones The lack of timely, accurate information about movement and communications of affected populations during natural disasters can limit the effectiveness of humanitarian response. However, the growing ubiquity of mobile phones has revealed new opportunities for accessing such information. Real-time mobile phone data can provide valuable insights about the behaviour of affected populations during a disaster. By examining mobile phone activity data before, during and after a disaster, a baseline understanding of emergency behaviour and capacity to measure the rate of disaster recovery can be established. A research explored how mobile data can be used to understand the impact of floods on human behaviour using the 2009 floods in Tabasco, Mexico. [11] There are also a number of mobile applications available in smart phones that is beneficial in disaster response. Among these are GPS technology, which can be used in the tracking of rescuers and resources, the translator, which can be used for communication, and the field examiner, which can be used to send information to headquarters for assessment of damages. Indeed, the use of a smart phone in a disaster management system is advantageous.

81 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

C. GPS GPS is a space-based satellite route framework that gives area and time data in all climates, anyplace on or close to the Earth, where there is an unhampered observable pathway to four or more GPS satellites. It is maintained by the United States government and is openly available to anybody who wants to act as a GPS recipient. The GPS system gives discriminating abilities to military, common, and business clients around the globe. What's more, GPS is the spine for modernizing the worldwide air activity framework. The GPS venture was created in 1973 to conquer the confinements of past route frameworks, coordinating thoughts from a few forerunners, including various grouped building outline studies from the 1960s. GPS was made and acknowledged by the US Department of Defence (DOD), and was initially run with 24 satellites. It was completely operational starting in 1994. Each satellite constantly transmits messages that the recipient utilizes to focus the travel time of each message and registers the separation to each one satellite utilizing the pace of light. Each of these separations and satellites' areas characterizes a circle. The recipient is on the surface of each of these circles when the distances and the satellites' areas are correct. These separations and satellites' areas are utilized to figure the area of the recipient utilizing the route mathematical statement. This area is then shown, maybe with a moving guide presentation or scope and longitude; rise data may be incorporated. Numerous GPS units show inferred data. For example, heading and rate, figured from position changes. In common GPS operations, four or more satellites must be obvious to acquire a precise result. [12] D. Android Smart Phones The global smartphone market has been dominated by one major operating system with 82.8% of the market share. The market leader in smartphone OS the world over is clearly Android from the Google stable. Smartphones have become ubiquitous to our existence and the driving force behind these smartphones is possibly the Android operating system. There are some salient features of Android that make it so reliable, versatile and scalable. The first reason why Android is so widely used is that it is compatible with all the major browsers within your mobile ecosystem which endears it to the mobile users. Android is an open source platform and which is one of its biggest strengths as compared to any other operating system of the past or the present. It gives immense opportunities for mobile application developers to come up with innovative and path-breaking ideas for developing outstanding smartphone apps. Developing apps for the Android platform is simple thanks to the SDK (Software Development Kit) available which is free for download. Developers can be up and running within no time. The SDK provides the basic platform for the developer community and offers them the right tools for creating the apps and the APIs. Since Android is based on the Linux kernel it helps to get access to the right functionalities and environment for coming with the best mobile apps. Some of the reasons why Android triumphs over other mobile operating systems:  It is easy to create a variety of software that can be loaded on the Android OS thanks to its open source nature.  The developer tools are user-friendly and this has resulted in an overabundance of apps on this platform.  The users can benefit from the high levels of customization providing a whole range of possibilities.  Users can download a lot of free software in order to get the maximum benefit out of their smartphones.[13] IV. PROBLEM DEFINITION The rapid occurrence of flood in Kerala has always caused a lot of problem to the people of Kerala in every way. People have lost their homes, their vehicles, their properties, their lives, etc. Kerala is prone to several natural hazards, the most common of them being landslides, flooding, drought, coastal erosion, earthquakes, tsunami, wind fall and epidemics. In flood prone areas like Kerala disaster management turns out to be a difficult task. In the case, we need a system that can help us reach out to people in various ways such as rescuing them, providing them food, providing them clothes, providing them basic necessities, reporting the number of people missing, etc. V. PROPOSED METHODOLOGY A. AmritaKripa A Mobile App “AmritaKripa” for Rescue and Relief Operations during Inland flooding proving how mobile technology can also save human lives during disasters, an app designed by researchers of Amrita Vishwa Vidyapeetham University for disaster management has helped locate, rescue and provide relief to over 12,000 82 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 people stranded in floods all over Kerala. Amrita Centre for Wireless Networks and Applications (Amrita WNA), a research centre at the Amritapuri campus of Amrita University, has developed a Mobile App “AmritaKripa” f for effective and timely management of relief and rehabilitation efforts during inland flooding. The Director of AmritaWNA is Dr. Maneesha V. Ramesh. [14] The proposed system is an android app and will be used by flood victims. It is designed to perform the following tasks: The user will be able request for rescue, medical help or supplies like food, Clothing, Medicines, or services like Shelter, Water, Electricity, telephone services. The user can report missing people and people found orphaned either conscious or unconscious. In AmritaKripa, the location data is picked up automatically based on user location using real-time GPS data. Users can also enter data to the nearest landmark location, and the app has the capability to automatically identify the user’s location. AmritaKripa works by directly connecting the victim and the rescuer in a post disaster environment using the mobile phones and the website. All these features will be offered through a set of high-performance, user friendly mobile and web applications in multiple languages. [15] TABLE-I: APP INFORMATION [16] Sr. No. Information Value 1 Size 5.9M 2 Current Version 2.4.2095-2019-08-17 01:20 3 Android Version 5.0 and up 4 Released On 29 August 2018 5 Updated On 16 August 2019 6 Offered By Amrita Vishwa Vidyapeetham 7 Interactive Elements Users interact, Shares location 8 Website http://kripa.amrita.edu

AmritaKripa follows agile methodology B. Agile methodology: Agile is a process by which a team can manage a project by breaking it up into several stages and involving constant collaboration with stakeholders and continuous improvement and iteration at every stage. The Agile methodology begins with clients describing how the end product will be used and what problem it will solve. This clarifies the customer's expectations to the project team. Once the work begins, teams cycle through a process of planning, executing, and evaluating — which might just change the final deliverable to fit the customer's needs better. Continuous collaboration is key, both among team members and with project stakeholders, to make fully-informed decisions. The agile software development emphasizes on four core values. 1. Individual and team interactions over processes and tools 2. Working software over comprehensive documentation 3. Customer collaboration over contract negotiation 4. Responding to change over following a plan. [16]

Fig-2: Agile Methodology [17] 83 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Even though AmritaKripa is being developed to deal with inland flooding situations, it can be used in any disaster scenario. The use of smart phones with internet data services is widespread especially in rural areas. Even though the mobile network may get disrupted during a disaster, it gets restored fairly quickly. Also, even though the phone lines may get busy, the data network is seen to be more resilient. By building a robust, durable suite of applications that can be readily deployed in these situations, Amrita seeks to improve the effectiveness, traceability and scalability of such crowd-sourcing efforts manifold. [18] C. Screenshots

Fig-3: AmritaKripa Home page

Fig-4: AmritaKripa Supply request page

Fig-5: AmritaKripa Disaster summary page 84 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

VI. CONCLUSIONS The AmritaKripa application was launched on 29th August, 2018. There were over 3,000 entries in two days, more than 500 real time entries were from people willing to provide relief-and-rescue services. The application was used in tandem with the “Amrita Help Line" set up by students and faculty volunteers at the university’s Amritapuri campus in Kollam district. This application helped locate, rescue and provide relief to over 12,000 people stranded in floods all over Kerala. Currently the app works in Malayalam and English. In the application, location data is picked up automatically based on user location using real-time GPS data. Users can also enter data to the nearest landmark location, and the app has the capability to automatically identify the user’s location. VII. REFERENCES [1] India Today. (2019). Kerala floods: India Today digs rainfall records of 140 years in God's Own Country. [online] Available at: https://www.indiatoday.in/india/story/kerala-floods-india-today-rainfall- records-140-years-god-own-country-1320153-2018-08-22 [2] MovingShoe. (2019). The great flood of 99 (1924 flood) , Which devastated Munnar - MovingShoe. [online] Available at: http://movingshoe.com/the-great-flood-of-99-devastated-munnar/ . [3] ReliefWeb. (2019). Kerala: Post Disaster Needs Assessment, Floods and Landslides - August 2018 - India. [online] Available at: https://reliefweb.int/report/india/kerala-post-disaster-needs-assessment- floods-and-landslides-august-2018. [4] Ifrc.org. (2019). What is a disaster? - IFRC. [online] Available at: https://www.ifrc.org/en/what-we- do/disaster-management/about-disasters/what-is-a-disaster/ [Accessed 7 Sep. 2019]. [5] COPPOLA, D. (2016). Introduction to international disaster management. [Place of publication not identified]: ELSEVIER BUTTERWORTH-HEIN. [6] Roychowdhury, A. (2019). Kerala floods: The deluge of 1924 was smaller, but impact was similar. [online] The Indian Express. Available at: https://indianexpress.com/article/research/year-1099-keralas- great-flood-of-1924-too-affected-same-areas-5317677/ [Accessed 7 Sep. 2019]. [7] Oxfamindia.org. (2019). Road to rebuilding “God’s own country” | Aftermath of Kerala Floods. [online] Available at: https://www.oxfamindia.org/aftermath-kerala-floods. [8] Statista. (2019). Mobile users in India 2013-2019 | Statista. [online] Available at: https://www.statista.com/statistics/274658/forecast-of-mobile-phone-users-in-india/. [9] Stewart, D. (2019). How Cell Phones Have Changed Our Lives. [online] Streetdirectory.com. Available at: https://www.streetdirectory.com/travel_guide/123086/cell_phones/how_cell_phones_have_changed_our_ lives.html. [10] vats, A. (2019). Importance of Mobile Phones!. [online] Streetdirectory.com. Available at: https://www.streetdirectory.com/travel_guide/132870/cell_phones/importance_of_mobile_phones.html [Accessed 7 Sep. 2019]. [11] Unglobalpulse.org. (2019). USING MOBILE PHONE ACTIVITY FOR DISASTER MANAGEMENT DURING FLOODS. [online] Available at: http://www.unglobalpulse.org/sites/default/files/UNGP_ ProjectSeries_Tabasco_Flooding_2014_0.pdf [12] Chowdhury, M. (2014). Location-based Post Natural Disaster Warning and Evacuation System. The Smart Computing Review, 4(6), p.495. [13] https://www.tagmobile.com. (2016). WHY ANDROID IS THE MOST WIDELY USED MOBILE OS TODAY? [online] Available at: https://www.tagmobile.com/blog/why-android-is-the-most-widely-used- mobile-os-today/. [14] Amrita.edu. (2018). Mobile App to Connect Disaster Survivors with Relief Teams | Amrita Vishwa Vidyapeetham. [online] Available at: https://www.amrita.edu/news/amritawna-launched-mobile-app- connect-survivors-relief-providers. [15] Play.google.com. (2018). Amrita Kripa. [online] Available at: https://play.google.com/store/apps/ details?id=edu.amrita.awna.floodevac&hl=en_IN.

85 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

[16] Wrike.com. (2019). What is Agile Methodology in Project Management?. [online] Available at: https://www.wrike.com/project-management-guide/faq/what-is-agile-methodology-in-project- management/. [17] Garg, P. (2017). Agile Methodology: Why Is It Important For Your Start-up? - OpenXcell. [online] OpenXcell. Available at: https://www.openxcell.com/agile-methodology-important-start. [18] Play.google.com. (2018). Amrita Kripa. [online] Available at: https://play.google.com/store/apps/details? id=edu.amrita.awna.floodevac&hl=en_IN.

86 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

APPLICATION ON ONLINE AUCTION SYSTEM

Ashi Jaiswal and Tanvi Pitlekar Academician, B.Sc.IT, K.C College, Mumbai, Maharashtra

ABSTRACT First the auction was done by being at the places where it is taking place, but now it is not like that. The existing system does not provide proper information about the products and the sellers. The system does not provide proper information to the buyer about the products. The buyer thus does not get proper ensurity about the product. The people therefore prefer online auction rather than going for traditional system of auction. This paper gives an overview of how an online auction system has helped people to buy or sell products by just sitting at home. Keywords-Auction, bidder

1. INTRODUCTION Auction is a process where the products can be sold, can be bought or can be bided. The online system provides full information and description about the products. It ensures that there is no scam taking place. The online system also ensures the buyer the guarantee of the product. This system will provide us with products that the seller wants to sell and the customers interested in the products will buy them. The product that is to be sold has a start bid price. The bidding amount will be incremented by a specific value only. We cannot randomly say the bidding price. This system is helpful as you need not be present physically and you can do this by just sitting at home. Auction can be of the following types 1. Absolute Auction states that the highest bid wins, price is not considered here. 2. Minimum Bid Auctions starts at a minimum price stated by the seller. 3. Reserve Auctions allows the seller to accept, reject the bid for any reason. 4. In a Sealed Bid Auction bidders can submit their one best offer privately and seal them in an envelope. 5. Live Auction means to conduct live-on auctions in a meeting hall, conference room. 6. Online Auction states that the product is sold online. 7. English Auction is also known as open ascending price auction. Most commonly used in today’s time. 2. PROBLEM DEFINITON In existing systems the sellers announces the venue and time to the buyers. For this kind of auction the buyers have to meet at a place. This prevents the buyer’s interest in buying the product. As they have to travel and go to a particular place and remove time from their schedule. The existing systems have many difficulties like keeping a track of the financial updates. This makes the process of auction very slow. The existing systems have difficulties even in identifying the fraud buyers. 3. PROPOSED METHODOLOGY Our system will let the seller upload the product with its desired price and details about the product. The buyers can view these products on our site with the product details and specific price of it. There will be a time limit for the auction. Every time the bid increases the bidders interested in the auction will get a notification. As our project is website based the bidders don’t have to meet at a place for the auction they can simply bid online on the website. We don’t have to put limitations for the bidders to buy something. They can purchase a single item twice also. After bidding 3-4 products then only the delivery charges will be applicable. There will be no limitations if a bidder does one high bid. The items will be updates according to the availability of it. The bidders and the sellers can even chat. After the buyer buys a product he can also give a feedback of how the buyer liked the process. This website will make sure that the customer is satisfied. The buyer can buy the product according to his budget. 1. This website will help people to understand what auction basically means. 2. This website is portable as we can just sitting at home buy or sell the products. 3. We can also recognize if there are any fake bidders. 4. If any fraud is happening or not can be caught using this website. 87 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

5. It allows the sellers to give feedback on the products that they have bought. 6. It also allows them to give reviews on how the website is working. 7. It ensures the sellers and buyers that the product being put up for auction is not any spam and every process done is proper and no fraud taking place. 8. It will also generate the appropriate report once the bid is completed in the auction. 9. It will also provide the shill score of the seller. 4. RESULT 1. People are nowadays more dependent on technology. 2. This system will help people to connect more with the technology effectively. 3. The knowledge gained here is the importance of auction and the impact that it has on people. 4. Through this website we get the knowledge of various technologies and learn languages. 5. We get to know various aspects about auction. 6. The project has a great impact on us as we understand what the drawbacks of the existing system are and how to overcome them. 7. The objective of the project is accomplished through this website and helpful for all. 8. The goals maybe fully achieved from this website. 9. The project is a user interactive website and can be used by all. 5. CONCLUSION Online Auction has helped customers relieve from being physically present in the place of auction happening. The auction website provides a lot of information related to products. The products are placed according to the categories of the products perfectly. This categorizing makes it easier for the customers to search for the desired products. This auction does not take place face to face but with anonymous bidders. 6. REFERENCES 1. https://www.referenceforbusiness.com/small/Mail-Op/Online-Auctions.html 2. https://dictionary.cambridge.org/dictionary/english/auction 3. https://www.fredwilsonauction.com/auctions/types-of-auctions/ 4. https://www.biddingowl.com/education/auction-types.cfm 5. https://www.collinsdictionary.com/dictionary/english/auction 6. https://bryanstonauctioneers.co.za/advantages-disadvantages-online-auctions/

88 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IOT HEALTH MONITORING SYSTEM

Alka Mishra Student

ABSTRACT The aim of the project is to monitor the heart rate and temperature of the patient through the sensors. The sensor will sense the change in the body of the patient and will display it through the led screen If any major changes happen and is dangerous to the patient it will send the alert or notification to the respective doctor and the guardian through internet

INTRODUCTION According to the WHO, 4.9 million people died from lungs cancer, over weight 2.6 million, 4.4 million for elevated cholesterol, 7.1 million for high blood pressure. Patients who need a regular monitoring by doctors to discuss the state of health condition, IoT based patient monitoring system is useful for them. The main concept of IoT is defined as the integration with electronic devices that connect with doctors or health monitoring persons. IoT the term was first mentioned by Kevin Ashtor in 1998. IoT can be divided in three sections. 1. Internet – Oriented Middle ware. 2. Things Sensors Oriented. 3. Knowledge Oriented Semantics. First as hardware layer which allow the interconnection by using sensors and technologies. Sensors are used to measure Heart Beat, ECG, and Temperature etc. The main purpose of this IoT is to improve a solution based on ontology with ability to monitor the health status. In low- and middle-income countries, there is increasingly growing number of people with chronic diseases due to different risk factors such as dietary habits, physical inactivity, and alcohol consumption among others. According to the World Health Organization report, 4.9 million people die from lung cancer from the consumption of snuff, overweight 2.6 million, 4.4 million for elevated cholesterol and 7.1 million for high blood pressure. Chronic diseases are highly variable in their symptoms as well as their evolution and treatment. Some if not monitored and treated early, they can end the patient's life. For many years the standard way of measuring glucose levels, blood pressure levels and heart beat was with traditional exams in a specialized health centre. Due to the technological advances in today, there is great variety running sensor reading vital signs such as blood pressure cuff, glucometer, heart rate monitor, including electrocardiograms, which allow patients to take their vital signs daily. The readings which are taken daily are sent to doctors and they will recommend the medicine and workout routines that allow them to improve the quality of life and overcome such diseases. The internet of things applied to the care and monitoring of patients is increasingly common in the health sector, seeking to improve the quality of life of people. The Internet of things is defined as the integration of all devices that connect to the network, which can be managed from the web and in turn provide information in real time, to allow interaction with people they use it. On the other hand, the Internet of things can be seen from three paradigms, which are Internet-oriented middleware, things sensors oriented and knowledge-oriented semantics. The Arduino is a programmable device that can sense and interact with its environment. It is great open source microcontroller platform that allows electronic enthusiasts to build quickly, easily and with low cost small automation and monitoring projects. The combination of IoT with Arduino is the new way of introducing Internet of Things in Health care Monitoring system of patients. Arduino Uno board collects data from the sensors and transfer wirelessly to IoT website I. PROBLEM DEFINITION Old age patient and children with heart problem should be periodically monitored Their loved ones or their consulted doctor need to be informed about their health status from time to time while at work Our proposed system uses sensors that allow to detect heart rate of a person using temperature as well as heartbeat sensor in the form of pendant or watch or any wear off product, to keep track of the patient’s health, even if the

89 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

The iot health monitoring system will be applicable to the people who are high risk of getting sever heart disease or have blood pressure and people cannot be always around them so it will we were help full for such patient. The people can monitor their loved ones even when they are with not them This can also help the hospital which have lot of patients and it became difficult for them to look after all the patient so health monitoring system can monitor the patient for them and also alert the doctor if anything goes wrong with the patient. II. PROPOSED METHODOLOGY A. Requirement Specification The system consists of six major embedded electronics. 1. Heart Beat Sensor 2. IR Sensor 3. GSM Module 4. Arduino UNO. 5. LCD Display. 6. Temperature sensor For power on, 12-volt adapter is using with Arduino and 5-volt adapter attached with GSM module externally. Patient will touch the heart beat sensor, and then the IR sensor’s ray will count the beat from blood flow. After counting beat from blood flow, we will push the button H-Beat and wait for 20 seconds. The result will upload and the heart beat value will show in LCD display. Similarly using UH push button the receiver will get the value in mobile message, web page and android application. After that, the curve will upload in android application and web page. B. Workflow Electrical Component Control unit Arduino provides open source electronics proto typing platform based on flexible, easy to use hardware and software. Arduino Uno is a micro controller develop board on the Atmel AT mega 328 MCU. The Arduino Uno has 14-digit digital input\output (which 6can be used as PWM output) another 6 analog inputs, a 16 MHz crystal oscillator a USB connection, a power jack, an ICSP header and reset button. This Arduino MCU board contains everything needed to support the micro controller. Arduino Uno can be connected to a computer with a USB cable or power it with an AC to DC adapter or battery to get started. It features the AT mega 8 U2 programmed as a USB ti serial converter. Arduino Uno MCU board can be powered via the USB connection or with an external power supply. The power source is selected automatically. 1. In thus project 2 power adapter are using. One is 12v 1amp and another one is 5v 2amp. From those power sources heart beat sensor is getting 12v. 3.3 v power is driven in Temperature sensor if more power is driven in the E sensor it will get damage. The GSM module is driven by 5v. 3.2 System Model Our project is comprised of both hardware and software. In hardware part, heartbeat and Temperature sensor are used. Therefore, Arduino integrates with the GSM Module. When the heartbeat and temperature are measured, GSM module helps to upload it in mobile message, Web and APP server. Moreover, LCD displays the heartbeat result too. C. COMPARITIVE STUDY WHY YOU SELECTED THIS TECHNOLOGY? The project can be done various other technologies also other than the Arduino. Those technologies can be using the other Atmega Controllers, Atmel Microcontrollers or Raspberry Pi. Some reasons why we selected Arduino Over Raspberry Pi for the project are: a. Our aim is to go on Arduino as its cost-effective based project. b. Raspberry Pi is much expensive as compared to Arduino. c. Sensors on Raspberry Pi require drivers which may lead to complications in structure of project. d. Raspberry Pi is used for a wide extent, as per our project requirements Arduino fits best.

90 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

WHY YOU SELECTED THIS TOPIC? Some reasons why this topic is selected are a. To help the hospital with huge amount of patient. b. To reduce the death rate in world. c. To check the temperature without other equipment d. To check the heartbeat with if no doctor is available e. To help the people who cannot afford nurse or someone to monitor all the time f. To keep the patient health in check g. To help the people who cannot afford high quality medical treatment and guidance

Block Diagram III. CONCLUSION Increasing rate of chronic diseases in aging population is becoming a serious concern due to lack of sufficient facilities and extremely high cost. The situation is even worse for the people residing in remote areas far from medical facilities as delay in diagnosis and treatment may lead to death. Timely diagnosis and treatment can solve these issues to a grat extent. The advancements in wireless communications and wearable sensor technology open up the opportunity of real-time healthcare monitoring systems. In this study a real-time heart monitoring system for heart patients located in remote areas has been proposed. The developed system is comprised of wearable sensors, Android handheld device, and web interface. The system is adaptable and has the ability to extract several cardiac parameters such as heart rate, blood pressure, and temperature of multiple patients simultaneously. The extracted data is being transmitted to Android handheld device using Bluetooth low energy which is then transmitted to web application for further processing. Web application processes received data to show medical status of the patient along with personal information such as age, gender, address, and location on web interface. An alarming system based on threshold values has also been designed which sends alert message to the doctor in case of abnormalities such as arrhythmia, hypotension, hypertension, fever, and hypothermia. In order to evaluate and show the practical implementation, the developed system has been used to monitor forty (40) cardiac patients located far away from the designed web application. The data obtained through the developed system is found to be significantly acceptable. Furthermore, for remote monitoring validation the system is tested under Wi-Fi and 3G wireless protocols to find out about time delay, that is, the time taken to send data from patient’s interface to doctor’s interface, and found that the message sending time for both wireless protocols is under acceptable range of medical standards (4 to 6 minutes as per American Heart Association). REFERENCES 1. https://www.hindawi.com/journals/ijta/2015/373474/ 2. https://nevonprojects.com/iot-patient-health-monitoring-project/ 3. https://www.hindawi.com/journals/ijta/2015/373474/fig7/ 4. https://www.academia.edu/13905269/health_monitoring_system

91 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

5. W. Ping, W. Jin-Gang, S. Xiao-Bo, and H. Wei, “The research of telemedicine system based on embedded computer,” in Proceedings of the 27th Annual International Conference of the Engineering in Medicine and Biology Society (IEEE-EMBS '05), pp. 114–117, IEEE, Shanghai, China, January 2006. View at Publisher · View at Google Scholar 6. H. S. Ng, M. L. Sim, C. M. Tan, and C. C. Wong, “Wireless technologies for telemedicine,” BT Technology Journal, vol. 24, no. 2, pp. 130–137, 2006. View at Publisher · View at Google Scholar · View at Scopus 7. A. M. Johansson, I. Lindberg, and S. Söderberg, “Patients' experiences with specialist care via video consultation in primary healthcare in rural areas,” International Journal of Telemedicine and Applications, vol. 2014, Article ID 143824, 7 pages, 2014. View at Publisher · View at Google Scholar 8. Technology in Biomedicine, vol. 14, no. 1, pp. 157–165, 2010. View at Publisher · View at Google Scholar · View at Scopus

92 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SPEECH RECOGNITION FOR TELUGU -ENGLISH MACHINE TRANSLATION

Ravali Bingi, Rakhi Gupta and Nashrah Gowalkar Mumbai

ABSTRACT Speech processing is currently one of the main topics we should consider and is emerged as an essential task in the context of modern communication system as it is an ease normal peoples as well as for people with disability. Mainly it’s beneficial for those who don’t have much command on English language and also some Telugu speaking people who want to learn English. The concept of speech translation deals with the speech signals in a source language A to the target language B. In my work mainly speech to speech translation aiming our local language Telugu to English translation. In this process, first extraction of features and then reducing noise which can further be used to transfer into text form is done. In this paper, deep learning based modelling technique is employed for speech recognition. After conversion of the text, the data is compared with dictionary data as per the transcriptions for language identification. Mapping is used to generate the signals for transcription. The index value of the recognition is used for language identification. After the language is identified the phonetic approach is used for generate the corresponding text to speech signal. Keywords: Deep Neural Networks, Phonetic approach, Speech Recognition, Mapping, Language Identification, ASR, Transcriptions

I. INTRODUCTION Machine translation, sometimes referred to by the abbreviation MT is a sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another. On a basic level, MT performs simple substitution of words in one language for words in another, but that alone usually cannot produce a good translation of a text because recognition of whole phrases and their closest counterparts in the target language is needed. Solving this problem with corpus statistical, and neural techniques is a rapidly growing field that is leading to better translations, handling differences in linguistic typology, translation of idioms, and the isolation of anomalies. Speech is the communication tool between people all around the world. For several decades attempts to build systems for recognizing speech signals and to artificially synthesize speech signals have been made. Speech systems find wide range of applications in medicine, marketing, education, military and cross border operations etc. Language of speech is an important factor to be dealt with in order to complete an effective communication link. Over the past few decades, the need to overcome this language barrier between people belonging to different linguistic backgrounds has been an area of interest in research. Language translation systems have served as a major breakthrough for this issue. As an expansion to this milestone, a speech-to speech translation system (S2ST) is an attempt being made over several institutions across the globe. On an overview, any S2ST system consists of three modules namely, speech recognition, machine translation and speech synthesis. Translation becomes a challenging task when the languages involved have completely different linguistic structures. T. Sakriani Sakti et.al in [4] came up with the first ever network based speech-to speech translation system for Asian languages, which was built by successfully combining the three subsystems using rule-based translation and networking. It was noticed that most of the speech-to-speech translation systems use a rule-based language processing approach by incorporating Natural Language Processing (NLP). There are already existing many freely available Hindi-English machine translation systems like Google Translator, MS-Bing and Babylon. These systems are developed based on different approaches i.e. Rule Based Machine Translation (RBMT), Example Based Machine Translation (EBMT), Statistical Machine Translation (SMT) [6]. But they all not well accurate in handling the challenges of word sense disambiguation, pronoun resolution and idioms translation. The major challenge in the machine translation (MT) between two languages is to identify an inherent translation divergence exist between source and target language. To elaborate more, the divergence can be observed when a sentence in a source language L1 translated to target language L2, in a quite different form [1]. For a robust machine translation (MT) system, it is crucial not only to identify the type of translation divergences but also to resolve them in order to obtain more accurate translation.

93 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

II. PROBLEM DEFINITION Machine translation can use a method based on linguistic rules, which means that words will be translated in a linguistic way – the most suitable (orally speaking) words of the target language will replace the ones in the source language. It is essential that all the languages corpus is used thoroughly. Due to the unavailability of translating applications, it has become difficult to keep up with the pace of increasing languages knowledge and thus many people stay unaware of the new technology emerging in this era. A tremendous quantity of information is collected through the corpus and dictionary during the translation which includes many languages and words similar or unique from one another. The analysis of this information through speech is a tedious task. The analysis is also prone to human error as there maybe some invalid words used by the people, also there maybe some issues with dictionary so we should try to cover each and every word or phrase in that dictionary. III. PROPOSED METHODOLOGY The proposed work is an S2ST system for general expressions which can perform translation between Hindi to English and Telugu to English which is based on statistical machine translation approach.

Fig-1: Proposed Speech to speech translation system. A. Speech Recognition Module Speech recognition systems hold the capability to identify words in a specific language and convert them into text form which can be presented in a machine readable format. It typically uses algorithm through acoustic and language modelling. Acoustic modelling accomplishes the task of bringing out a relationship between linguistic units of speech and the corresponding audio signal. Further, language modelling takes the responsibility of matching sounds with word sequence. This eventually helps to differentiate words with similar sounding. The phenomenon of automatic speech recognition belongs to the class of machine learning principles. It refers to application of computational techniques especially in acoustic speech signals into words and further into machine readable format. There are many real-time applications of this automatic speech recognition system (ASRS) associated with latest wireless communication. Human and mobile device interaction often involves in retrieving data for automated call and other control purpose. The ASRS system plays a vital role where communication is significantly required in natural language. Systems with such facility often were used as useful gadgets in prosthetic electronics to serve blind people for daily activities. A pole zero vocal tract model proposed typically involves in minimizing the log likelihood, ratio cost. Natural language consists of speech features and lexical words which are correlated to each other. As a result the correlation factor can be employed for classification. Hence, it is considered that model based on any one of these canner sufficiently provide performance which is possible in the case where both of them are utilized. This technique is referred as joint acoustic and linguistic modelling [4]. This is based on the maximum entropy principle. In its simple form the speech recognition can be referred as the process of search for a word sequence which has higher likelihood with the sequence from test speech. However, it is concluded in various literatures that are the maximum likelihood canner ensures better classification. 94 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-2: Proposed Block Diagram of speech recognition. B. DNN Deep Neural Networks (DNNs) are considered as a significant tool in machine learning. The tool can be applied to model more effectively. However, the literature states that the process of training the data in DNN is extremely time-consuming. The latest computing techniques are not even at par to accelerate. DNN training is especially slow for tasks with large data sets. Existing approaches for speeding up the process involve parallelizing the Stochastic Gradient Descent (SGD) algorithm used to train DNNs. Even under such conditions it is possible to determine whether DNNs would still be able to produce state-of-the-art results using this low- precision arithmetic. Machine learning is being used to solve problems that are increasingly important in day-to-day life. Machine learning techniques have been applied in fields such as bioinformatics, computer vision, economics, fraud detection, robotics, and speech. Recently, one of the most successful machine learning techniques has been Deep Neural Networks (DNNs). For instance, DNNs have currently been used extensively in the speech recognition community. For Automatic Speech Recognition (ASR), DNN-based models result should relative improve in word error rates over traditional methods. In a speech task that uses 81 hours of speech as training data, the DNN takes more than half a day to train. It is general knowledge that speech recognizers benefit greatly from larger amounts of data; some systems use training sets with thousands of hours of speech. At the present rate, those DNNs would take weeks to train. Worse yet, selecting the best DNN architecture and tuning a DNN’s hyper-parameters typically require training many DNNs. The slow training is a significant impediment to DNN researchers. C. Language Identification Language identification is the task of automatically detecting the language(s) present in a document based on the content of the document. Language identification techniques commonly assume that every document is written in one of a closed set of known languages for which there is training data, and is thus formulated as the task of selecting the most likely language from the set of training languages. In this work, language identification in documents that may contain text for more than one language from the candidate set. This work used index based mapping method that concurrently detects that a document is multilingual, and estimates the proportion of the document that is written in each language. D. Synthesis System: Phonetic Analysis – Generate Text Sound The flowchart of phoneme based text to speech synthesis for words is shown in figure.3.In this part, the input text is considered only syllable word to produce speech as natural. Firstly, the input word is given from language identification. In the next step, it is necessary to convert from word to phonetic transcription which is also called grapheme to phoneme‖ conversion. Dictionary based approach, more exact than rule based approach, is applied in this step. Then, phoneme sounds are concatenated by depending on the phonetic transcriptions of word to produce speech.

95 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-3: Flow chart of phoneme based text to speech approach. IV. RESULT The accuracy of the two models is computed to test the performance of the technique. Training the speech data of 800 sentences consists of 4064 unique words as a training data and the data with 30 sentences consists of total 702 words. The corresponding recognition accuracy using both Sphinx-3 and pocket Sphinx are evaluated. Automated speech recognition (ASR) accuracy is about 87.32% with Sphinx-3 model. While, it is about 92.59 % with pocket sphinx model. Total 702 words are used for this simulation based experiment. The training and testing of timid database Plays a major role in the experimentation with different parameters. The corresponding parameters and their respective magnitudes are tested in Table I. Table-1: Speech Recognition system Accuracy Total testing words ASR accuracy with Sphinx-3 ASR accuracy with Pocket Sphinx 702 87.32 % 92.59 % Table-2: Training and testing accuracy of our technique with timid database Parameter 8-Times 12-Times Total Words 14550 14550 Correct Recognized Words 14107 14205 Errors 512 411 Total Percent Correct 96.96% 97.63% Error Percentile 3.52% 2.824% Accuracy 96.28% 97.17% V. CONCLUSIONS The test data features are efficiently compared with the training. Recognition and further translation into the data set defined language is successfully performed. The performance is evaluated using the ASR accuracy computation and further analysed for language identification and speech translation. The language identification generates each index value for the corresponding speech signal, when is compared with the database signals using indexed based mapping we can get the corresponding language. After language identified the successive phonetic sound is generated for the text at the speech synthesis. Finally we get the corresponding output language as the English for any given input speech as Hindi or Telugu. 96 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

REFERENCES [1] B. J. Dorr, “Machine translation divergences: A formal description and proposed solution,” Computational Linguistics, vol. 20, no. 4, pp. 597– 633, 1994. [2] O. Abiola, A. Adetunmbi, and A. Oguntimilehin, “A review of the various approaches for text to text machine translations,” International Journal of Computer Applications, vol. 120, no. 18, 2015. [3] A Hybrid Approach For Hindi-English Machine Translation Omkar Dhariya∗, Shrikant Malviya† and Uma Shanker Tiwary‡ Department of Information Technology Indian Institute of Information Technology, Allahabad, India 211012 [4] Sakriani Sakti, Thang Tat Vu, Andrew Finch, Michael Paul, Ranniery Maia, Shinsuke Sakai, Teruaki Hayashi, Shigeki Matsuda, Noriyuki Kimura, Yutaka Ashikari, Eiichiro Sumita, Satoshi Nakamura, “ NICT/ATR “,”Asian Spoken Language Translation System for Multi-Party Travel Conversation” NICT Spoken Language Communication Research Group ∗ 2-2-2 Hikaridai, Keihanna Science City, Kyoto 619- 0288, Japan. [5] Sneha Tripathi, Juran Krishna sakhel, “Approaches to Machine Translation” in: Annals of Library and Information in Studies, vol 57, December 2010, page 388-393. [6] N. Sharma, “English to hindi statistical machine translation system,” Ph.D. dissertation, THAPAR UNIVERSITY PATIALA, 2011.

97 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SMART CAR PARKING SYSTEM

Khushbu Oswal and Preety Kumawat Post-Graduation Student, Kishinchand Chellaram College

ABSTRACT During this aggressive economy, the number of car users will increase exponentially hard to please additional parking zone. Pervasive presence of good phone encourages users to like mobile application based mostly solutions. The growth of IoT has paved method for the integration of mobile devices, wireless communication technologies, and mobile applications. This paper proposes associate IoT based mostly good parking system that integrates with mobile Application. It provides a comprehensive parking answer each for the user and owner of the parking zone. options square measure provided for reserving a parking zone, authenticating a reserved user, distinguishing nearest free area counting on the dimensions of the vehicle, navigating to the parking slot and computes account info on daily, weekly and monthly basis. IR sensors square measure wont to determine if a parking spot is free. availableness of a free slot with its location info is transmitted exploitation LAN module technology, microcontroller and wireless communication technology to the server and is retrieved although a mobile application. RFID tag hooked up to a vehicle is employed to demonstrate a user World Health Organization reserves the parking slot on an hourly, daily, weekly or monthly basis. A planning algorithmic rule is employed to spot the closest free slot supported the dimensions of a vehicle. The owner of the parking zone will get the analytics of the quantity of free and on the market slots for a given amount, the pct on weekdays and weekend and therefore the quantity collected for a given amount and might use it for fixing variable parking fees. Optical Character Recognition to produce (designed to provide) security exploitation Arduino. Keywords: Good Parking, Internet of Things IoT, Mobile Application, RFID, Analytics.

INTRODUCTION The fast industrial growth within the world is mirrored in the hyperbolic variety of cars on the roads globally. it's expected that the number of cars within the world can increase considerably from 841 million cars in 2008 to over one.6 billion cars in 2035. Nowadays, the shortage of obtainable automotive areas is obvious in several public places like stadiums, market areas, hospitals, searching malls and airports, hence, governments square measure trying to enhance their existing transportation systems and infrastructures. However, the slow progression of planning has broaden the difficulty even additional. Finding unoccupied parking areas could be a common downside in modern cities, particularly throughout peak times of varied festivals. This downside seems principally within the trendy cities; people come back by their cars, leading to a high variety of cars competitory for a couple of unoccupied parking areas and security for his or her position cars. Moreover, in indoor automotive parks, most of the time is wasted on sorting out unoccupied parking place that additionally creates hold up. things become worse once there square measure multiple parking slots in each parking lane. Another issue is that the pollution caused by cars in halt, be it within the outside or indoor automotive parks. additionally, most of the population use their cars for traveling, that ends up in additional congestion in cities that successively delays the method of finding associate unoccupied parking zone for the remainder of the drivers. a very important issue to be thought-about is the way to cut back such knowledge transmission value and the way to avoid wasting energy furthermore as offer period info quickly - these problems need imperative resolution. the thought of good automotive parking systems is recently attracting additional attention in several countries because of the requirement for a replacement method of finding on the market parking places. The IoT provides the capability to modify such challenges, because it is often designed to capture sensors knowledge for observance points of interest in good cities. The devices can be tracked, controlled or monitored exploitation remote computers connected through net. The good parking system that we tend to propose is enforced by employing a mobile application. The main purpose of a good parking system is to scale back time to find the parking areas, therefore thereto reduces fuel consumption. Sensors would be deployed within the parking lot and through the mobile app, user books for the parking slot and that we use RFID reader that could be a device that reads the RFID tag and authenticates the user info. Developing countries like India, face downside for giant free parking zone management. standard parking management systems use sensors and alternative communication module, however, doesn't address answer for each open and closed parking zone. Mobile application that square measure wont to notice a parking slot uses GPS connect through the Google map API to search out free parking zone location, however, it doesn't notice the free parking slot location precisely. the most drawbacks of parking zone detection systems square measure low accuracy, light-weight, and weather. 98 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 during this work, methodology to implement Mobile application to search out parking zone use IR device to search out vacant slot. BENEFITS Permits the driver to instantly find the best parking spot on the market Eliminates the effort of circling a garage in search of a parking spot Can prompt forgetful drivers on wherever their cars are located. Regulates traffic flow to avoid driver and pedestrian accidents Save human resources and time PROBLEM DEFINITION 1] Valuable time wasted from inconvenient and inefficient parking tons. 2] Tons of fuel consumed inactivity or driving around parking tons, leading to tons of CO2 emission being created. 3] Potential accidents caused by an abundance of moving vehicles in unsystematic parking tons PROPOSED METHODOLOGY The projected system consists of phases:  Development of humanoid app  Free house Identification  Authenticating user vehicle  Classify parking slot  Navigating to parking Slot To enable a user to use the sensible parking system, users have to be compelled to register with user ID with vehicle varieties. User will find out the default payment possibility in his account settings. The android app is made for booking parking slot and payments. The applying is employed to seek out the free slot and user have to be compelled to specify the calculable time of arrival and parking slot usage begin and finish time. The IR sensors accustomed to determine the parking slot is free or occupied. Parking slot is empty light-emitting diode shows slot variety N (empty), D (occupied). Once booking without charge parking slot, if the vehicle enters the doorway gate, it's assumed that every automotive has in-built RFID card and RFID reader verifies the vehicle and is attested. The parking slot could also be assigned for little vehicle and enormous vehicle. Navigating to parking Slot Android application having GPS location to navigate the assigned parking lot to engaged user. It diagrammatically navigates from the current location to the parking lot location. Online page shows lane details date and time, booking time lane standing, user detail and user feedback. Automatic car place Recognition. This is supported by Optical Character Recognition (OCR). This method has three necessary stages: Car place Detection, Character Segmentation, Character Recognition RESULT AND DISCUSSIONS The sensible automotive parking system provides thanks to save energy and minimize the transmitted knowledge over the network. There are a variety of benefits to this technique. The primary advantage is to assist users to avoid wasting time by providing the proper direction of the free automotive parking zone. It additionally helps to point out users several on the market parking areas getting ready to users' locations besides because of the traffic state of affairs. Another positive facet is that the system is machine-driven that doesn't need any user intervention. extra feature within the humanoid application is that the Text to Speech module which can make sure that users don't have to be compelled to investigate their phones whereas driving for the aim of safety and reservation service for the on the market automotive parking areas. what is more, it might give users the knowledge regarding parking areas in a wider zone just in case that a user is traveling and wish to grasp a lot of regarding the on the market parking areas and also the traffic state of affairs within the destination. CONCLUSION This designed automatic sensible parking system that is straightforward, economical and provides an effective answer to scale back carbon footprints within the atmosphere. it's well managed to access and map the standing of parking slots from any remote location through browser. therefore it reduces the chance of finding the parking slots in a very parking lot and additionally it eliminates excess traveling of vehicles across the stuffed 99 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 parking slots in a town. Therefore, it reduces time and it's value-effective additionally. This system includes RFID technology with humanoid application that provides a computer program for system and vehicles. the common waiting time of users for parking their vehicles is effectively reduced during this system. The best answer is provided by the projected system, wherever most of the vehicles notice a free parking zone with success. This sensible parking system provides higher performance, low value and economical giant-scale parking system. Security lives to confirm that the users don't misuse the parking system are often enforced. In this work, IOT primarily based sensible parking system has been projected that integrates many physical devices to see the parking slot availableness. The mobile app permits the user to find and reserve a parking extract on-line, navigation from the entrance gate to the market parking slot is additionally the projected system reduces the driver's effort and time to go looking parking zone. model is made for a single storage parking slot. Here, we've utilized Arduino that appeared to be value economical with simple installation and maintenance. FUTURE WORK In future we'd develop application for iOS, BlackBerry and additionally with video game and check its workability in a very real-time setting and cloud-primarily based sensible parking system that uses Internet of Things (IoT). This model is often extended for multi-storage parking zone.

100 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SMART ORDERING SYSTEM USING RESTAURANT’S TABLET

Priyanka Talreja, Girish Budhrani, Rakhi Gupta and Nashrah Gowalkar B.Sc.IT, K.C. College, Mumbai

1.1 ABSTRACT Nowadays, our life is all about digital so here is the smart ordering system which says that the customer can now place their order with the help of the tablet/cell and that tablet will be situated on the table itself and that order will get display on the chef's LCD and then according to the table no order of that customer will get served and at the end the bill get generate on their respective tablet. It provides an efficient system and also the user friendly system.

 Restaurants are having lack of efficiency due to the less waiters like(some of them are ill, the one who’s not coming for any reason)it can cause the poor management in the restaurant.

 This system is developing to reduce the employees/waiters in the restaurant.

 To overcome the problem of paper ordering because it is the traditional method of placing order where the waiter/captain writes the customer's order on the paper.

 The main goal of this project is to attract many customers and provide efficiency in the restaurant

 It makes easy for the customer in the order point of view because in the menu thoroughly information will be provided in simple words description and reviews will also be there so it makes convenient for the customer to place an order

 This system is proposing a new way that how the people can acquire the information of food items. There are some keywords which are there in the abstract 1. Smart ordering system 2. Reduce waiters/captains 3. Tablet 4. Chef’s LCD 5. Convenient 6. Attract many customers 7. Description of food items

1.2 INTRODUCTION Restaurants are one of the favourite places for the humans. Customers will wait until the waiter/Captain comes to place the order from the customer and then customer have to wait for the ordered meals. In the traditional method it is common that the customer is not satisfied with the services provided by the restaurant .The customer feels dissatisfied for many of the reasons including for entertained late in terms of listing the order late and the errors caused by the waiter or by the customer. This issue can be solved in this project with the advanced technology. This study names the system as Smart Ordering System for Restaurant Using Android .This project will help customer by enabling to immediately make orders on their own selves. This will minimize the number of minutes to wait for the meal serving .This project deals with Smart ordering system for restaurant. This topic includes scope of the project, Overview of the project. Scope of the project includes features that can be implemented. Overview of the project includes the detail information reading the Smart ordering system for restaurants

101 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig 1.1 Overview of the smart ordering system The main goal of this project is to attract customers and also adds to the efficiency of maintaining the restaurant’s ordering and billing sections. We propose a new way on how people acquire information. Our research is to explore new ways of technology to stay informed. we designed a system for Smart restaurant for ordering and serving food in the restaurant. This system replaces paper work with digital devices such as tablets/smart phones. 1.3 PROBLEM DEFINITION The limitation occurs in this project are:  Customer have to wait for the Waiter/captain to place the order

 There is a tons of paper that wasted while listing the order

 Delay can be occur because the waiter/captain can also take several orders at the same time.

 There is also a possibility that the order lists gets disarranged.

 There is no detail information available for the specific food item.

 The comments and the reviews are not available.

 There is a possibility that the waiter/captain has listed the wrong food item.

 At the end customer have to wait for the bill also. This old method uses a paper and pen to make a list of the food item ordered by the customer. This manual list keeping in the organization has been characterized by a lot of problems, such as:

 Data losses: There is a quite possibility that paper is misplaced by the waiter or the chief

 No database to store information: by using Paper and Pen system, loss of data perhaps will happen.

 No backup: The data which is misplaced cannot be backed up and also we cannot access the old data easily as there are no filters available The problem’s with the present system is that the offers that are provided by the restaurant to the customer are not fully explained in this application customer are explained with each and every offers that are available on that time .Then as we have already discussed the customer are waiting for the waiter/captain to place the order then too after waiting the customer are not provided with the service i.e. with the correct description of the respective food. After that the customer have to wait for the waiter again for the bill. Customer is also not provided with the images of the each and every food item which makes difficult for the customer to order a new item as the plating place an important role in the restaurant. 1.4 PROPOSED METHODOLOGY If we compare a traditional system of the restaurant then it is very time consuming and there is a possibility that the order gets mismatch due to human errors. The restaurant services are more popular in the metro cities. And on the other hand the under developing cities are lagging from services and this can also cause a delay here many a times. A smart ordering system in android will help us to reduce the work of the restaurant and the manpower of the restaurant and it reduce the cost of the restaurant. In this the customer orders using android app and chief receive that order in the LCD Display.

102 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Fig-1.1: Diagram of prototyping process The software methodology that chosen to develop this system by prototyping. Prototyping model is especially useful when the project needs are poorly laid out. It serves as evidence that something can indeed be done in terms of systems and strategies. This model is used for certain projects and then eventually be discarded after the project has been completed. Prototyping is also known as close-ended prototyping because it is implemented through the creation of prototypes and it gets gather afterwards and take feedback from end users to check if there they want any changes or not. It leads to get a better understanding of the actual needs of customers before a product or service is developed and delivered. The reason behind choosing prototyping model is to develop the system in a short time compare with other software methodology and user might not clearly understand that what they exactly require in their system. Therefore, prototyping is very useful where the objective to develop the system rapidly and also to understand that what user is to be required and hence to develop a better requirements definition for the system. So basically prototype concentrates on experimenting with the user requirements that are poorly understood. 1.5 RESULT AND DISCUSSION  What if there is some error in the device? Then the customer will not be able to place the order and due to which the order list also cannot gets delivered to the chief as the customer is not able to place the order.  What if the customer doesn’t have the working internet due to some issue? Then in this condition again the customer will not be able to place the order.  What if the customer is not able to operate/understand the application? In this case the customer feels that the UI of the application is hard to operate(In this case the waiter/captain can help in this situation.  In this restaurant owner/admin can view the overall performance of the restaurant in graphical user interface/chart report.  The report of the restaurant can generate according to the time period and time period can customized by user 1.6 CONCLUSION This software project is successfully worked as the objectives of the project. This project helps the waiter/captain to take the orders form the customer and deliveries it to the chef .It also reduce the lateness while the food ordering and the error caused by the waiter by the customer. By using this system the complaints regarding the services are reduced .This project overcomes the traditional method’s pen and paper, which saved the paper while listing the order and billing. It saves the lot of restaurant’s time. It reduces the manpower required to run the restaurant. This project also accept the real time feedbacks which help other customers to order a food 1.7 REFERENCE 1. Wikipedia Article on Automated Restaurant Available: https://en.wikipedia.org/wiki/Automatedrestaurant 2. http://www.ijste.org/articles/IJSTEV2I9045.pdf 3. https://www.irjet.net/archives/V3/i12/IRJET-V3I1213.pdf

103 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

STOCK CARE

Kajal Swarup and Pranjal Pawar Student, K.C. College, Mumbai

I. ABSTRACT Managing and controlling stock is evidently responsible for the profit or loss of a business. Small-scale businesses do not get the privilege to use advance technology in their work structure in order to lead an effective business due to the complex and high-priced software available in the market. ‘STOCK CARE’, unlike the other applications delivers an easy way to manage stock with five simple options including sales prediction, stock prediction and restock alert. It is built with the vision to help small-scale businesses operate efficiently and construct their desired goal effortlessly. Keywords: stock, sales prediction, stock prediction, restock alert

II. INTRODUCTION Every business that deals with stock must work around numerous paperwork, that is, from writing down the orders till we complete the order. Stock is an essential part of the inventory businesses. Especially, small scale industries need a free and easy way to lead a business. The simple work of measuring in an inventory business goes a long way. As said by James Sinegal, “We want to turn our inventory faster than our people.” because if you have counted all your assets, you will always show profit. A stock is a supply of things that a shop has for sale or an amount of something that has been kept ready to be used. Managing inventory is one of the crucial tasks for small scale as well as large scale businesses. The stock is an asset as the inputs and outputs of the products are the core of a business. The storage of stock in a business is prejudicial. Therefore, the control and track of stock is mandatory for an effective and efficient business. The various applications available in the market view stock only in the sales point of view. They give importance to the sales of the stock and not how many products of a category needs to be stocked up. These platforms will now be countermanded for the several reasons that the small-scale business industries face while managing the inventory. STOCK CARE is a platform built with the vision to provide numerous services for small scale business individuals with a convenient and functional way to manage the stock and lead a successful business. Stock Care, as the name suggests, is a project based on the stock aspects of a business. It takes care of all the angles that need to be approached for a functional inventory in an effective business. III. PROBLEM DEFINITION When we initiate the process of researching for the reasons of this project and why we chose to develop such an application - we did so because we came across the need for a platform fitting for the small-scale businesses. In a modern world where technology is a prime member of any business why should one limit it only for large scale business. The small godowns, shops and large-scale businesses should be commended equally. Hence, Stock Care gives a free and convenient way to manage the small-scale businesses, that is, godowns and shops. Most of the quality inventory-based applications and software are single user based and are built for large scale businesses, but Stock Care is a multiuser based application for small scale businesses that is each business individual will have his own database for his stock. Stock Care delivers an easy user interface in five simple options along with wide range of customization of the products. Stock Care yields the business of the user by sales prediction, stock prediction and restock alert. Managing stock is an imperative task and cannot be neglected. You can only sell something if the item is present in the stock and if for any reason the inventory wasn't restocked your business encounters a loss. STOCK CARE completely understands how important a stock is for your triumph as it helps you view the predicted Sales, predicted Stock levels and Alerts you to Restock so that your inventory never goes out of stock. The stock is a valuable asset as the inputs and outputs of the products are the core of a business. Every business that deals with stock has to work with several files, that is, from noting down the orders till the order is completed. The threshold of a business is defined by the inventory of the industry. Hence, the need for an appropriate platform that understands the value of stock in a business is required. The various applications available in the market neglect some key aspects essential for managing the stock. Some of the problems in the existing system are displayed in the chart below: 104 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Complexity The applications available in the market have a complex user interface. That is, small scale business individuals are unable to understand the multiple choices which leads to lack of interest in managing the inventory properly. Premium In order to use more features of an application or to use the application in general, we have to pay after a particular period of time. Most of the superior applications and software that deal within the inventory areas are single user based. Location Based Only These applications focus on locating the product instead of actually managing the stock. Sales of the product They give importance to sales of the stock and not how many products of a particular category needs to be stocked up. I. PROPOSED METHODOLOGY A. OBJECTIVES - The main objective of this project is to maintain a smooth business. - Another objective of this project is to build a user interface that is user friendly and easily accessible by small scale business individuals. - Stock Care is a multiple user based application, that is, each business individual has his own database aka inventory. - The easy management of the stock is enabled by 5 simple options. - This platform provides Sales Prediction in the graphical representation format. - This platform also provides Stock Prediction. - Stock Care also obtains the required stock level for each month and alerts the user to restock his inventory. B. REQUIREMENTS The requirements entailed by this application are enlisted below and are further categorized as follows : Functional Requirements - To provide an interface for the user to register and login. - To provide a platform for the user to customize the categories. - To provide a platform for the user to customize the products. - To provide a platform for the user to customize and organize the incoming as well as the outgoing orders. - To develop a graphical representation of how many products of a particular category were sold in a month for predicting the sales. - To generate the calculations for predicting stock level. - To prompt an alert to the user for restocking the inventory. Non-Functional Requirements - To ensure the security of the data of the business individuals using the application 105 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

- To make sure that the proposed application is user friendly. - To assure that the sales and stock predictions produced are accurate. - To keep the system robust and definitive. C. TECHNOLOGY The survey of technology determines the technologies that will be considered to build this project and attain the complete desired application. The main purpose to build STOCK CARE is to deliver an application to the small-scale businesses to meet customer needs, so that the products are available when customers want them. A proper technique of stock management can maximize profits for small business owners while reducing potential loss and overcoming the common misinterpretations of overstock or under stocking the inventory. Hence, to develop a relevant and suitable application the use of an appropriate technology is essential. Stock Care is built on Android Studio which is a piece of software called IDE (Integrated Development Environment) which comes packaged with the Android SDK. Android Studio is used for developing applications exclusively for Android platform. Android Studio comprises of a well-built editor tool for developing creative and user-friendly user interface. Why choose android studio? An instant push feature is used by android studio to push code and resource changes to a running application. A code editor helps the developer to write the code and offers code completion, refraction, and analysis. Applications built in Android Studio are then compiled into the APK format. Android Studio Provides more efficient features than Eclipse. FRONT END: XML: XML is used in the frontend of our project. A front end includes layout, buttons, images, input fields, drop down boxes etc. XML is known as self-defining, which means that the structure of data is embedded with the data. Elements defined by tags are the basic building blocks of XML. It takes large chunks of information and reinforce them into an XML document - meaningful pieces that provide structure and organization to the information. BACK END: MySQL: MySQL is used as the backend of the project. MySQL is a relational database management system based on Structured Query Language (SQL). As STOCK CARE contains separate database for each business individual, therefore, to access ones data on the android application, MySQL is used for the development of database. JAVA: Java language is also used as backend for the project. Java language is simple and easy to understand. It is a object oriented programming language used to use object oriented concepts to process user inputs and compute results. This application is written in java using an IDE called Android studio. D. OPTIONS INCLUDED IN THE APPLICATION

106 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Stock Care provides five simple options in the application to deliver a productive business: Category: A user can add, view or update his category of stock. The Category ID will be auto generated. Product: A user can add, view or update his products in the stock. The Product ID will be auto generated. Order: The order option is further divided into INCOMING and OUTGOING orders. Both Incoming and Outgoing orders will provide the users to add, view, update and view the previous orders. Predict Sales: It will show a graphical representation of how many products of a particular category were sold in a month. Predict Stock: It is further divided into PREDICT STOCK LEVEL and RESTOCK ALERT where predict stock calculates the stock level for each month and restock alert, alerts the user to restock once a particular product hits the minimum stock level. The minimum stock level will be calculated by the following formula: Minimum Stock Level = Reorder Level (i.e. the quantity of the product that can be in stock and help the business continue until it is restocked) – (Normal Consumption X Normal Reorder Period) V. CONCLUSION Stock Care delivers an easy user interface with five simple options along with wide range of customization of the products. It yields the business of the user by sales prediction, stock prediction and restock alert. Stock Care understands how significant the stock is for a successful business. This platform is applicable to the businesses that include stock management. Technology has found its way into businesses but is more popularly used in large scale businesses. This application allows and helps a new individual to start an organized and productive business. Often small-scale businesses like small warehouses of food production and other small- scale businesses count and organize stock by writing it on a paper which is nothing but piles of paper, waste of money and a struggle to find the required information. Stock Care delivers a hassle-free way to run the business systematically because being properly prepared is one of the biggest assets in business. VI. REFERENCES [1] A composition from debitoor.com [2] Essentials of inventory management – book by Max Muller – 2002 [3] Yourarticlelibrary.com [4] Accountingformanagement.org [5] An article from smallbusinesses.chron.co

107 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SECURITY OVER COMPUTER COMMUNICATIONS

Pankaj Vanjani, Rakhi Gupta, Nashrah Gowalkar Student, K.C. College, Mumbai

ABSTRACT This paper tells us about computer communications security issues. It highlights the need for protecting data during transmission. The techniques for proper prevention of data are also mentioned to deal with attacks like Data tampering, Eavesdropping or Data theft. In today’s situation of gigabytes and terabytes of traffic moving over the Internet, the detection of terrorism and crime-related attacks is a rapidly growing challenge. Keywords: Controlling Access within the network, Data Tampering, Eavesdropping and Data Theft, Encrypting data for network transmission, Firewalls, Secure sockets layer protocol.

INTRODUCTION THE security of data transmission is an important problem in communication networks. A communication system is reliable until it provides a high level of security. Usually, users exchange personal and sensitive information or important documents. In this case; security, integrity, authenticity, and confidentiality of the data exchanged should be provided over the transmission medium. Nowadays, internet multimedia is very popular and widely used; a significant amount of data is exchanged every second over an unsecured channel, which may not be safe. Therefore, it is important to protect the data from attackers. Data can be protected from attackers by controlling access within the network, encrypting data for network transmission, Secure Sockets Layer Protocol and by using Firewalls. We have discussed about these techniques in this research paper. Further data can also be protected by using encryption techniques such as cryptography and steganography. Cryptography is the science of storing the transmitted data secure. It provides data encryption for secure communication over computers. The encryption process is done before transmission, and the decryption process is done after receiving the encrypted data. Steganography is the science of writing a hidden message inside a different digital content; it conveys the data by concealing it in another medium such as an image or audio which is known as a cover object. The information hiding process is applied before transmission of data and the extraction process is applied after receiving. The main difference between the cryptography and steganography is based on the existence of the secret messages. In cryptography, the message is encrypted before transmission; anyone can observe the encrypted message, but is very difficult to be understood, especially if it has been encrypted with some strong cryptographic algorithm. Steganography conceals the existence of a secret message by hiding it in a cover object. The cover object can be further classified as Text-Based Steganography in which the secret message is embedded in a text file, Audio Steganography is used to hide the secret messages in an audio signal and Image Steganography is used to embed the secret data in an image. PROBLEM DEFINITION Computer communications play an important role in this era of technology. The main objective should be maintaining security over computer communications. Different types of attacks are evolving day by day as almost everything is done over the internet. Most of the attacks take place during data transmission i.e. from one computer to another via the internet. Below are some of the attacks that take place during data transmission that can be a major problem in the world of security. They are as follows: - DATA TAMPERING Privacy of communications is important to make sure that data cannot be modified or viewed in transit. Distributed environments and technologies bring with them the chance that a malicious third party can perpetrate a cyber crime by tampering or changing with data as it moves between sites. In a data modification attack, an unauthorized person on the network intercepts data in transit and changes vital parts of that data before retransmitting it. An example of this is changing the dollar amount of a banking transaction from $10 to $1,000. In a replay attack, a full set of valid data is repeatedly interjected onto the network. An example would be to repeat, one or two thousand times, a valid $1000 bank account transfer transaction. EAVESDROPPING AND DATA THEFT Data must be stored and transmitted securely over a network, so that information such as debit card numbers or passwords cannot be stolen.

108 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Over the Internet and in some Wide Area Network environments, both public and private network companies often route some parts of the network through unsecured landlines, extremely vulnerable satellite links or several servers. This situation leaves valuable data open which can be visible to any interested party. In Local Area Network environments within a campus or building, insiders with access to the physical wires can potentially view data not intended for them. Network sniffers software can easily be installed to eavesdrop on network traffic. Packet sniffers can be created by attackers to find and steal usernames and passwords.

PROPOSED METHODOLOGY The following sections describe the technology available to ensure data privacy and integrity during transmission of data and to get a secure computer communication from attacks like Data Tampering, Eavesdropping or Data Theft, etc:  Controlling Access Within the Network  Encrypting Data for Network Transmission  Secure Sockets Layer (SSL) Protocol  Firewalls CONTROLLING ACCESS WITHIN THE NETWORK Following are the different techniques to control access within the network: - MIDDLE-TIER CONNECTION MANAGEMENT We can configure a middle tier that manages and controls the connections of very large user populations. To support a good number of users, you can configure and set up multiple instances of Oracle Connection Manager. This product multiplexes multiple user network sessions through a single network connection to the database, increasing the total number of connections. It is also possible to filter and sort on the source, destination, and hostname. Thus, you can ensure that connections only come from a physically secure channel, or an application web server with a known IP address. In this way you can allow connections from IP addresses too, connecting to host pc for payroll. NATIVE NETWORK CAPABILITIES (VALID NODE CHECKING) In the case of a sensitive and critical database, you may want to make sure that connections only come from certain points in the network. For example, a company might have a security policy saying that user Pankaj can access the payroll database, but only when he is present at work. DATABASE ENFORCED NETWORK ACCESS We can also use Virtual Private Database to control access to the database from particular network nodes. Note that you would not want to make IP address the main way of authenticating or authorizing users or clients since IP addresses can be faked. However, you can use an IP address as an additional means of controlling data access for unauthorized users. For example, user Pankaj may have access to the employee table, but company policy may dictate that he is not allowed to access employee data unless he is inside the corporate intranet. ENCRYPTING DATA FOR NETWORK TRANSMISSION Sensitive information in transit over an intranet or the Internet can be protected by encryption. Encryption is the change of information into a form readable only with a decryption key. Encryption is a powerful and dependable security mechanism because it can make decryption mathematically infeasible if you do not have the decryption key.

109 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Consider, for example, an Internet buyer who wishes to purchase some product by using a credit or debit card securely. The buyer's credit or debit card number is encrypted with an encryption key. The encrypted credit card number is sent across the network to the related database. Encryption scrambles the message, making it unreadable for anyone but the recipient. The server decrypts the message with a decryption key and reads the original credit card number. Note that the secrecy of encrypted data depends upon the existence of a secret key that is shared between the communicating parties. Providing and maintaining these secret keys is known as key management. In a multiuser environment, a secure key distribution maybe not easy; public-key cryptography was invented to overcome this problem. Encryption must address all communications or transactions with the database, including transmissions from clients and transmissions from middle tiers. It must also provide security to all protocols into the database. Encryption Algorithms The table below shows encryption algorithms that have become the industry standard for the encryption and decryption of data. Algorithm Characteristics RSA Data Security RC4 Permits high-speed encryption for data privacy. By using a secret and randomly generated key which is unique to each session, all network traffic is fully safeguarded which includes all data values, SQL statements, and stored procedure calls and results. The client, server, or both, can request/require the use of the encryption module to ensure that data is protected. Data Encryption Uses symmetric key cryptography to protect network communications. Standard (DES) DES is mandatory for financial and many other institutions. Triple DES (3DES) It is used to encrypt message data with three passes of the DES algorithm. 3DES provides a superior degree of message security. However, it involves a performance penalty, the magnitude of which is relied upon the speed of the processor performing the encryption. 3DES typically takes three times as long to encrypt a data block as compared with the DES algorithm.

Data Integrity Checking In addition to encryption, there are integrity checking algorithms which can guarantee that data has not been tampered with or packets replayed. A database can make use of these algorithms to detect corruption in data blocks. The table below shows industry-standard integrity algorithms. Algorithm Characteristics MD5 Checksum It provides data integrity by hashing and sequencing to ensure that data is not changed or stolen as it is transmitted over a network. Secure Hash Algorithm (SHA) Similar to MD5, but creates a larger message digest, for greater and better security.

SECURE SOCKETS LAYER (SSL) PROTOCOL The Secure Sockets Layer protocol which is developed by Netscape Corporation is an industry-accepted standard for transport layer security in a network. SSL is supported by almost all currently available Web servers and Web browsers. It is also gaining approval for other protocols, including LDAP and IMAP. The SSL protocol supplies authentication, data encryption, and data integrity, in public key infrastructure (PKI). SSL overcomes the problem of protecting user data exchanged between tiers in a three-tier system. By providing strong standards-based encryption and integrity algorithms, SSL provides system developers/programmers and users with confidence that data will not be leaked on the Internet. Unlike password-based authentication, which is used to authenticate a client to server only, SSL can authenticate the server to the client as well as the client to the server. This is a useful aspect when developing web-based three- tier system architecture since users/clients often stand firm on authenticating the identity of an application web server before they supply the server with confidential information such as debit card numbers or passwords.

110 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

FIREWALLS To exclude important weak points in the network infrastructure, we may choose to pass data from protocol to protocol without the complications of decryption and re-encryption. To do so in a secure manner, we must have some way to securely transmit data across network protocol boundaries. The Internet provides you to connect your corporate intranet to a broad public network. Although this capability provides a lot of business advantages, it also entails risk to our data and our computer system. One way of securing the privacy and integrity of our system is to place a firewall between the public network and our intranet. A firewall is a single point of control on the network which is used to stop unauthorized clients from reaching the server. It acts as a filter that screens out unauthorized network clients from using the intranet. It is done by applying access controls based on the contents of the packets of data in transit and can protect against attacks on individual protocols and applications. Firewalls are completely rule-based. They have a list of rules that define which users can connect, and which cannot connect. They can check and compare the client's hostname or IP name with the rules, and either provide the client access or not. RESULT By using the above-mentioned technologies, we can easily get rid of attacks during Data Transmission such as Data Tampering, Eavesdropping or Data Theft. As we are aware, Security issues become more complex in a network environment. We must make sure that access to the network is controlled and monitored, and that data is not vulnerable to critical attacks during transmission across the network. Many technologies are available to encrypt data and can help to ensure their privacy and integrity. They ensure that:  Data remains confidential.  Data cannot be modified.  Data cannot be replayed.  Lost packets can be detected. When multitier system architectures are involved, network access becomes even more complicated. Users/clients may access the network from a middle tier, in which case only the middle tier is known to the database: the individual client's authorizations may be lost. To guarantee confidentiality, the database must be able to recognize the actual user who is accessing it from a middle tier. CONCLUSION Security over computer communications can easily be maintained by controlling access within the network, encrypting data for network transmission, Secure Sockets Layer Protocol and using Firewalls. Communications can be secured and privacy will be maintained using these techniques. Finally, we can protect the data during transmission from the attacks like Data Tampering, Eavesdropping or Data Theft. REFERENCES [1] http://airccse.org/journal/cnc/5313cnc10.pdf [2] http://www.iaeng.org/publication/WCE2010/WCE2010_pp480-484.pdf [3] http://www.csl.sri.com/users/neumann/senate96.html [4] https://www.researchgate.net/publication/3503119_Methodology_for_Network_Security_Design [5] http://m.scirp.org/papers/83677 [6] https://en.wikipedia.org/wiki/Secure_communication [7] https://en.wikipedia.org/wiki/Information_security [8] https://docs.oracle.com/cd/B10501_01/network.920/a96582/overview.htm [9] https://docs.oracle.com/cd/B10501_01/network.920/a96582/protnet.htm#1656

111 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

AUTONOMOUS CAR

Navin Bhatotra and Nashrah Gowalker Student, K.C College

ABSTRACT A Scale down version of self-driving system using a RC car, Raspberry Pi and open source software. The system uses a Raspberry Pi with the camera and an ultrasonic sensor as input, a processing computer that handles steering object recognition (stop signal and traffic light), distance measurement and Gesture Control Parking. An autonomous or self-driving car is a vehicle that must be able to navigate, to certified as autonomous, without human input to a pre-established destination over a path that have not been adopted for it use. It makes its own driving decisions, able to cope with all situation and continuously keep learning from its environment and decisions on that environment to maximize its output over time. A fully automatic car is able to handle all driving task in all driving mode and under all environmental condition just like human driver.

I. INDTRODUCTION Autonomous cars development is apprising rapidly in automotive industry. They are increasing the catching attention worldwide because perspective of this technology is clear as it will dramatically change transportation by minimizing traffic jam increasing effect efficiency and allowing faster speed. Autonomous cars are predicted to increase traffic flow and lower fuel consumption which will reduce contamination in urban area by improving driving and significantly reducing need for parking space. In addition, autonomous cars will speed up people and freight transportation, as well as increase the security, specifically a significant reduction in traffic collision by reducing the human error. Despite the various benefit to increase vehicle auto main automation there is a lot more work to be done before self-driving Cars are ready for mainstream. As the self-driving car is a collection of network computer wirelessly connected to the outside world the most daunting challenge is keeping the system safe from intruders i.e. Cyber security. Semi largely dispute concerning liability, driving safety despite unclear landmark on recognizing traffic lights that are not working. Other obstacle can be missing driver experience in potentially dangerous situations, ethical problem is situation where autonomous car software dispose during an unavoidable crash to choose between multiple harmful courses of action and possibly insufficient adaptation to respond to spoken command or hand signal from pedestrian or Highway safety employees. Autonomous car today is intelligent enough to drive around the city with very low chances of crashing, that is great but there is some limitation which they are bounded with, is that they are limited to GPS and ground truth of the Earth i.e. Google Maps of similar. If we remove that which is common in mountains, forest on new area the car is zero and then you have to drive yourself. Machine learning is a type of artificial intelligence that provides computer with ability to learn without being explicitly programmed. Machine learning focuses on the development of computer program that can change when exposed to new data. The machine learning is process is similar to the data mining. Both systems search through data to look for patterns have instead of an extracting data for human compensation as is the case in in data mining application machine learning uses that data to detect pattern in data and adjust program action accordingly. Machine learning implements feed-forward artificial neural network or, more particularly multi-layer perceptron the most commonly used type of neural network machine learning perceptron’s consists of the input layer output layer and one or more hidden layer. Each layer of MLP include one or more neural directional linked with the neurons from the previous and the next layer the example below represents a 3-layer perceptron with 3 inputs to output and hidden layer include find neurons. II. PROBLEM DEFINITION The purpose of autonomous car to get a maximum efficient in the Optimum Mannes. To reach from location A to B. To remove human error which cause an accident. To increase safety for people. Make comfortable driving experience. It's obey the traffic rules. This self-driving car which is invented for best user driving experience. This car using the sensor with the help of this we can drive this car safely in under any environment. Front of the car having camera which help in predicting the steering on the lane. The purpose of this autonomous car is to help people by self-driving on the 112 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 road the car can automatically drive on the basis of the camera prediction. This autonomous car having sensor on the basis of that this car remove the human errors while driving the car. Having a features front collision detection which helps car by crashing. i. Maximum Efficiency While driving the car we get maximum efficiency because of the all sensors which work as together that's make an autonomous car. Because of the L293D IC we can control the Motors of the car on the basis of the detection in the front of the car. Which helps in collision detection of the car. This all things help in self-driving car to make it successful driving. ii. Remove Human Error In autonomous car which helps to remove human errors which occurs while driving the car. By using Pi camera, we can predict the steering of the car which helps car to take perfect turns. Is used to take pictures on the basis of that the steering prediction is done. This is done because of the OpenCV (computer vision) library. iii. Increase Safety By using the sensors and the open source library which helps in self-driving and which help in people safety. Because of this which increase the safety of people which work on sensors and open source library. Because of this it's increase in safety of the people because the car will run on the basis of the sensor and that will avoid the collision. iv. Comfortable Driving This self-driving car which gives client to perfect comfortable driving experience while driving car. This all is done because of the OpenCV library and machine learning. This self-driving which is comfortable driving experience on long road. v. Obeys Rules Using the Haar Cascading technique we can make car to follow the rules and regulation of the traffic control. Using this technique, the accident problem will be solved because all the cars and vehicles follow the rules. If following rules and regulation, then there will be no accidents as compared to user driving. III. PROPOSED METHODOLOGY Deep RC car a simplified self-driving radio control car platform that is a controlled by Deep neural networks. This car takes image for main front facing this describes the entire process of its creation from hardware requirement, through the design of the control system up, to the selection and training of the convolutional neural network that's manage its driving decisions. The network was trained in an end-to-end manner and learn to recognise useful Road features, such as lane marking, when only camera image and corresponding steering angle were represented during training. A vehicle must be able to navigate to certified as an autonomous without human input to a pre-established destination over part that have not been adapted for it use. It makes its own driving decisions, able to cope with all situation a continuously keep learning from its environment and decision on that environment to maximize it output over time. A fully automatic car is able to handle all driving task in all driving model mode and under all environment condition, just like human drivers.

IV. RESULTS Prediction on the testing samples written and accuracy of 85% compared to the accuracy of 96% that the training sample Returns. In actual driving situation prediction are generally about 10 minute is second (streaming rate roughly 10 frames per second). Haar feature by nature are rotation sensitivity in this project, however, rotation is not a concern as both the stop signal and traffic light are fixed object, which is also a general case in Real world environment. 113 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Measuring result in fact as long as we know the corresponding number to the actual distance we know when to stop the RC car experimentally result of detecting distance using Pi camera. In this project the accuracy of distance measure using monocular vision approach called by influenced by the following factors. (1) Error in actual values measure (2) Object bounding box variation in detecting process (3) Error in camera calibration process (4) Non-linear relationship between distance and camera co-ordinate The further the distance the more Rapid change of camera calibration, thus the greater the error. Overall, The RC car successfully navigate on the try with the ability to avoid front collision and response to stop signal and traffic light accordingly. V. CONCLUSION A self-driving car is on demanding now a day. There are different hardware components and their assembly are clearly described for using all components value to compute the prediction. A novel method to determine the uneven, marked or unmarked road edges is explained in details relying upon OpenCV. Using ultrasonic sensors, the collisions with obstacles is avoided. The algorithm mentioned in the paper has been successfully implemented on a small autonomous car. The work is enhanced by improving the algorithm by adding artificial intelligent to it. The present algorithm performs the operations on all the frames. It is accurate but its efficiency could be further enhanced if it starts learning by itself and avoid unnecessary calculations of the regions which are already known or familiar. Once the car starts travelling on the roads, it determines the obstacles (mainly static) on the way and note their characteristic features. While driving car every time the car stores some values into XML file.  The distance between the two nodes.  The number of roads diverging from a particular node.  The number of speed breakers are there on the road and other fixed obstacles on the road joining two different nodes.  The distance of speed breakers and other static obstacles from a specific node.  Height and the width of an obstacle. All the information is stored in the XML file that helps the car understand and remember the path (lane) being going to next steps. VI. REFERNCES [1]. OpenCV https://www.youtube.com/watch?v=kdLM6AOd2vc&list=PLS1QulWo1RIa7D1O6skqDQ-JZ1GGHKK-K [2]. Scikit Learn https://www.youtube.com/watch?v=URTZ2jKCgBc&list=PLQVvvaa0QuDd0flgGphKCej-9jp-QdzZ3 [3]. Arduino https://www.theengineeringprojects.com/2018/06/introduction-to-arduino-nano.html [4]. Haar Cascading https://pythonprogramming.net/haar-cascade-object-detection-python-opencv-tutorial/ [5]. OpenCV Documentation – Haar Features- based Cascade Classifier for object Detection. [6]. OpenCV Documentation – Image Processing and Storing into Numpy Array.

114 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SMART GLASS

Suraj Yadav Student, K.C College

ABSTRACT This project, SMART GLASS, is wearable computing device. This is an additional device which users’ need to mount to the normal wearing glass and wear it. The objective of this project is to take the basic information from users’ smart phone and display it in front of wearers’ eye. Basic information includes call notification, text message notification, date and time. The requirements of this project are Arduino, Bluetooth module, OLED display, mirror, lens, jumping wires, push button, frame etc. it requires an application installed on smart phone for transferring data. Keywords: head mounted display (HMD), wearable computing devices, smart glass

I. INTRODUCTION As we know the technology is rapidly changing in all aspect of human life. Nowadays one of the technology trends is wearable computing devices. It may be a smart watch, smart glass etc. The aim of wearable computing device is to assist human life by augmenting them with some extra basic knowledge. Recently, due to the Google glass project HMD (head mounted display) has gained more interest of people towards itself. So inspired by the Google glass, I decided to make this project that can function quite similar to that of Google glass. The cost of this project is less than that of the Google glass project, parallely the features of this project is also limited than Google glass project. Flow diagram of the system is given below

Firstly the application will send the encoded data to the arduino with the help of Bluetooth module. The data would be processed by the arduino and the result is sent to the OLED display. Then the output of the OLED display is reflected with the help of mirror. The mirror image is sent to the magnifying lens to increase the size of the data. And at the last, the final output is shown on a transparent glass in front of the wearers’ eye. II. PROBLEM DEFINITION Since this project is inspired by Google glass project. The problem with Google glass project is its cost. It is high costly. The cost of Google glass is around 80,000 INR which is very costly for a normal person to purchase it. The cost of Google glass is high due to its advance technology and lots of features available in it. It provides face recognition technology, can be used in medical field etc. which are not important for normal human beings but if they purchase they need to pay for it too. Other drawback of Google glass is that the person who wears glass already cannot wear Google glass. This means Google glass is not for those who have any problem with their eye and them wearing glass already. Since the cost of Google glass is very high you need to take care of it very carefully. If somehow it breaks, it would be lot of loss for users. Suppose the situation when you are performing some important task and your both hands are busy. You have kept your phone inside your pocket or bag. Someone calls you or you receive any text messages in your phone, then in this situation you need to take off your phone just to check who is calling you, whether it’s an important call or message or not. But when you use smart glasses, all the call notification and text message notification comes directly on your glass in front of your eye after then you can decide is it important call or message? Should I reply to this call or message? 115 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

This project will show the current date in front of wearers’ eye. Users need not look for calendar or in mobile phone for current date. It also displays current date in front of users’ eye. III. METHODOLOGY Methodology defines the process flow of the project. It describes how the data would flow between different equipment. Flow diagram of the system is given below:

when the system will start, first of all it is checked whether there is any new notification received in the smartphone or not. If there is any new notification then number is transferred to the arduino else date and time is transferred to the arduino which is then processed and displayed on the OLED display. IV. RESULT This is a wearable computing device which is used to display the information in front of the wearers’ eye. It is an additional device that is attached with the wearing glass to be used. It shows information like call notification, text message notification, date and time. This project consist of the arduino, Bluetooth module, reflecting mirror, magnifying lens, transparent glass, push button etc. the cost of the project is around 1200Rs to 1500Rs. V. CONCLUSION This is a prototype which has the limited features. This prototype can be used to develop a large project with multiple features. It shows the how a smart glass can be used to assist human life with extra information. As the technology is increasing, it is one of the highly demanded technologies for future use. VI. REFERENCES  https://en.m.wikipedia.org/wiki/Head-mounted_display  https://www.rs-online.com/designpark/basics-of-arduino-nano  https://components101.com/wireless/hc-05-bluetooth-module  https://electronics.howstuffworks.com/bluetooth2.htm  https://www.google.com/amp/s/en.softonic.com/articles/security-how-safe-is-bluetooth-transfer%3famp=1  https://learn.adafruit.com/adafruit-all-about-arduino-libraries-install-use  https://core-electronics.com.au/tutorials/spi-arduino-tutorial.html  https://lastminuteengineers.com/oles-display-arduino-tutorial/amp/  https://randomnerdtutorials.com/guide-for-oled-display-with-arduino/  https://blog.hostonnet.com/advantages-disadvantages-of-google-glasses 116 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

APPLICATION OF MOBILE TECHNOLOGY FOR MARKING ATTENDANCE USING WHATSAPP

Ramsuraj Basudeo Yadav and Prof. Rakhi Gupta MSc IT Student, K C College, Mumbai, Maharashtra

ABSTRACT The present study will carry out to assess the usage of WhatsApp application in an organization for the attendance marking system. It will enable the employer to keep the live data of employees to maintain their (employees) attendance in the organization. Because attendance is the most important aspect of an employee in an organization, which will be later used for calculating their gross salary, working hours at the end of the month. The organization also needs to choose such a device for maintaining the attendance or marking the presence of the employee which is cost-effective and provides the best results within a short time with accurate data. Keywords: WhatsApp, Organization, Attendance, Employee, Device.

I. INTRODUCTION This research paper will be able to explain, how we need to save money and time from expending in investing for attendance system. Also, it will guide you how we can achieve our maximum output from employee in digital era. One of the most important technologies that have widespread and accelerated diffusion among people in the last decade is the cell phone. The nature and type of phone technology are undergoing drastic changes to suit different types of users. From a luxury status, a cell phone is rising to be a need of every person. As the policies made by the government like transactions of different types and cashless transfer of money, the role of the mobile phone has grown beyond the connectivity through “talking” alone. But the most important for better usage of a cell phone is the best mobile application which can provide the security, accuracy, efficiency and easy to use to the users. These cell phones can also be used for marking the presence of employees in an organization as an attendance marking system. Nowadays WhatsApp is a popular mobile application for providing instant messaging service in smartphones. It uses Internet services to communicate the different types of text and multimedia messages between users or groups. Its users worldwide have crossed the figure of one billion in February 2017.

Fig-1: WhatsApp application while opening on smart phone Although not as popular in the US, WhatsApp is prominent in Latin America, Europe, and Asia. The impact of WhatsApp on our lives, culture, and society keeps on increasing. It is also becoming a popular tool for marketing in businesses and publicity in politics. This growth has attracted the attention of researchers compelling them to understand the implications and effects of WhatsApp on its user’s social and personal life. The users in India made a slow shift from all social networking sites to WhatsApp in a quick period.

Fig-2: WhatsApp application users and time are directly proportional 117 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

II. OBJECTIVES To understand the usage of social media app “WhatsApp” as an attendance marking system. After using WhatsApp as an attendance marking system these could be the benefits achieve: A. Cost reduction B. Time reduction C. Performance and accuracy will increase D. Security III. PROBLEM DEFINITION The biometric authentication process consists of several stages: signal processing, measurement, decision making, and pattern matching. Measurement involves while recognizing biometric characteristics and is necessary both for the creation of the reference model and for each authentication trial. For example, when fingerprint verification is utilized, this stage involves sensing one’s fingerprint through a biometric device. Then the digital data are mathematically modeled. When the user needs to be authenticated, the machine checks the received data to the user model and makes a decision mostly based on pre-calculated stored data. In organizations, they keep many distinct ways of maintaining the attendance of their employee for many purposes like calculating working hours, salary, PF, ESIC, salary bonus, etc. after that there is chances of failure occurred in many organizations to get accurate calculated data. A biometric machine is a security identification and authentication machine. Such machines use automated methods of verifying or identifying the identity of a living person based on a physiological or behavioral characteristic. These features include fingerprints, facial images, iris, and voice recognition.

They keep the biometric device at the respective office if the organizations have more than one office to take a fingerprint of the employee twice every day for coming in and outgoing time, according to that time-bound the organizations mark them presence for that day according to their job working timing. Accuracy is a major issue with biometric recognition. Passwords are still extremely popular, because a password is static, while biometric data can be subject to change (such as one's voice becoming heavier due to puberty, or an accident to the face, which could lead to the improper reading of facial scan data). When testing voice recognition as a substitute to PIN-based systems, Barclays reported that their voice recognition system is 95 percent accurate. This statistic means that many of its customers' voices might still not be recognized even when correct. This uncertainty revolving around the system could lead to slower adoption of biometric devices, continuing the reliance on traditional password-based methods. But also if an employee working for the organizations out of the office that day the biometric machine is not a good option for the attendance marking system. Authentication is the process of determining whether a person is whom he or she claims to be. This process can occur in two ways: 1) Verification asks that Is this the person who herself or himself claims? and consists of a single comparison. 2) Identification makes a one-to-N comparison and tries to determine if the person is one of the N people. 118 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Several factors, such as what you know, have, or are can be used for authentication, with all three options having strengths and weaknesses. For advanced security, it is advisable to use more than one factor, if possible. Biometric authentication systems are not 100% always accurate. There are 2 types of errors in a typical biometric system. A false reject (FR) error is a type of rejection to an authorized person. A false accept (FA) error is the acceptance of a person who is not in fact whom he or she claims to be. These two types of errors are the opposite of each other and in general, can be controlled by a confidence threshold. To increase the security of a system, the threshold can be increased, which decreases false accept errors and increases false reject errors. Accountability Accessing a biometrically secured physical facility requires the presence of an authorized individual following a biometric scan. This generates reliable and auditable logs of accessing the facility. Users cannot deny these logs as they are proof of wilful access. It improves user accountability. Sometimes there is a need that authorized person has gone for an important meeting or see had stuck in traffic or his health is not good hence he is admitted in the hospital that time to attend the office for his is impossible. If in such a scenario that person is the only person, who can open the office systems or gate then all other employees cannot be able to do their duty. Security IDs and other printed identity documents can be counterfeited; passwords or PINs can be guessed, stolen or hacked, but biometric identifiers can neither be counterfeited nor be stolen. Some security researchers have shown that fingerprints or facial recognition systems can be hacked with spoofs, however, newer systems are equipped with more advanced spoofing-proof technology that does not accept anything less than a live biometric identifier device, making biometric devices securer than other identification methods. Performance and population coverage Many factors can affect the performance of a biometric system, e.g. environmental factors, user behavior, badly maintained system, etc. The technology used may also have some limitations. Performance metrics of the biometric system are taken into account before releasing biometric identification products. However, they may still offer less than expected performance due to several other factors depending on user behavior, environment, etc. Population coverage is another big challenge in front of biometric identification devices. Biometric identifying technology is yet to reach the point where it can be called a universal method of identification. When you deploy a biometric solution (e.g. fingerprint recognition), there is no guarantee that all subjects in the target population will have minimum quantity and quality of biometric identifiers. Physical labor, diseases, accidents may cause biometric identifiers to deteriorate, which can cause a biometric system to fail to enroll or identify a subject. Cost Despite being cheaper than ever, biometric systems can still be expensive to implement for the specific use cases or smaller outfits. Owing to this fact, the biometric system may not best the best idea for applications where the number of people to identify is very less and can be managed with manual methods. Regular maintenance of biometric systems is also important to ensure optimum performance, however, it also incurs an additional cost. Technical complexity While most of the deployment and implementation of a biometric device is taken care of by its delear, biometric systems may require the administrator to have a certain level of tech-friendliness to use, maintain and perform day-to-day back-end operations. Some organizations may not be comfortable with maintaining and perform day-to-day back-end operations and may find biometric systems too complex for them to use. Disadvantages • Probably the most criticized method due to association with criminal identification. • Population coverage may be a problem with old age people with skin disease. 119 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

• Performance can fluctuate to dry, wet, dirty fingers. • Need to install at every branch of the organization which raises the overall cost of maintenance of the system. • It is difficult to insert big data in it if there is any correction required for the maintenance department. • Also, the system needs to interact one to one to takes their inputs which leads to a time-consuming system. Conclusion As it is the case with most technology-powered systems, biometric identification has its own set of advantages and disadvantages. However, it always depends on a particular use case that it will be more advantageous or disadvantageous if deployed. In most cases, using biometric identification has proved to be more beneficial in the long run. As more and more biometric systems are deployed, they are expected to become even cheaper with increased production and economy of scale. And with advancements in technology and security, many disadvantages of biometric systems are expected to cease to exist. After getting all the necessary knowledge of a biometric system we have reached a problem wherein certain scenario biometric systems are not effective for an organization even though investing such a big amount on such type of system. Let’s have another problem which can be occurred in the organization while using biometric devices as an attendance system, ‘In an organization, Shyam is working, his work is mostly out of the office (like a salesperson). To mark their presence for a day he needs to punch in when he reaches office and needs to punch out when he left the office. From this activity, their attendance is marked in the organization. As we know for he and the organization will continue their working together till they get his earned salary on time. For an organization to calculate his gross salary, they need to know how many days he is present in the office which can be determined by the biometric device record, which they had used for the entire month for the punch in and out. Because the accounting department calculates the salary of an employee by biometric device record only. So how the accounting department will get aware of that if Shyam didn’t come to the office on a day and gone for work which is out of office (like client meeting). Let’s this assumption that when Shyam has gone for meeting that time he has informed his senior and senior manager has informed to account department, for that day Shay marked as present as his senior has informed the accounting department on the same day. If the senior manager forgot to inform that Shyam had gone for this meeting to this place to the accounting department on the same day or within 2 weeks then how they will know after a long time that he (Shyam) had attended a meeting on those days. If Shyam tells the senior manager that I had gone for that meeting to that place then how senior manager will able to remember a long back incident that Shyam whatever saying is right or wrong? Because the senior manager is overall responsible for all the activity going on the organization, for him it difficult to approve that Shyam had really attended the meeting or not. Also it important for Shyam, whatever work he has done out of the office for the organization, he should get paid in the salary for that workdays.

Fig-3: Employees attending meeting out of office from their client place 120 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IV. METHODOLOGY In an organization almost, all people own a cell phone and using a popular app called WhatsApp. All employee in the organization uses the WhatsApp for personal usage and they open it frequently to check that some message received from their collogue and also opens for viewing their status of the day. All these acts of employee effect in the work efficiency for their organization. Also, they need these things for their lifestyle. We know that most of our lifestyle dependence on the surrounding activity done by others in our society. We do not aware that approx. our 75% of the things are not even used in our daily life still we keep those things for future use, which is waste of money and time behind them and when we need those things, we are not able to get those things on time because we do not maintain them in a proper manner with tag so that whenever we need we can get it for the direct use.

Fig-4: Employees common where they will send in and out message for a day WhatsApp is a popular app that can be also used in the organization for maintaining its employee attendance system. Though useful for private communications, WhatsApp is also being used by employees, and by even some organizations for business-related communications. Users can send messages and manage complex communications with speed and ease. When integrated into the workplace, WhatsApp can enhance employee productivity for the organization for many purposes like selling or promoting. A. Let’s understand how it can be used? Employers of the organization need to create a common group with respective department employees. From this what they can do, whenever they reach office all employees need to send a message on their common group which will represent their in time for the day and another message whenever they left the office after completing the regular work of the day. Now, employers need to just maintain an excel sheet in which they(employer) need to explicitly enter in and out timing for the day of an employees from WhatsApp, as we know whenever we send a message on WhatsApp, the message will get a timeline tag which tells that when the message has been posted on the group. All employees have posted them in and out time on the group from which, we will get the accurate working hours of an employee after entering it in the excel sheets. If any kind of mistake done by the accounting department while entering in and out timing for a particular day of an employee in the excel sheet, then the all employees can show their message from the common group as evidence that the actual timing of their working on a particular day is not correct. The employer does not worry about the system error because sometimes what happen if the employer had installed any kind of biometric system and the fingerprint or facial does not accept due to any issue has happened with the employee skin like any cuts due to any accident then-employer need explicitly mark present his or her attendance in the system but in case of WhatsApp messaging system employer does not worry about that employee can handle it by his or her self by just sending a message on the common group because while sending a message on WhatsApp platform does not require any verification like other devices need. These data can also be used for different purposes in the organization like calculating the gross salary of the employee and working hours, PF, ESIC and for bonus provided to the employees from the organization.

121 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

This organization will cut the cost of maintenance and actual purchase cost of the biometric system as they do not require to use it at all, hence we can say that WhatsApp is much cheaper than any kind of device which will be used for maintaining the employee's attendance data. In big organization what happens, all employee in a department working from a different location if the organization have more than one branch then its need of the employee to know that when an employee reaches at one office so that other employee from another office can assign any work if they want to give. If the employer wants to announce some notice to their employees then he just needs to send a simple message on groups from that they will get that notice awareness in such a popular digital platform. Digital technologies are radically transforming business practices in the workplace as organizations become more mobile and virtual. Led by the increased prevalence of smartphones and BYOD (Bring Your Device) in organizations, more and more employees are turning to consumer messaging apps to collaborate with their colleagues and customers. Although an organization can benefit from this adoption, this also generates a huge amount of unstructured data outside of the technical platform managed by the organization. However, It takes time before a recordkeeping solution vendor can catch up with the fast development of technologies and make a proper solution available in the market to manage WhatsApp records. For most users, their concern is probably how to make the best use of technical tools to support their business efficiency and effectiveness. They are less concerned about the compliance issues and risks the use of the application might bring. They may focus on achieving their goals on behalf of the organization, but they may not be aware that in the process of doing so, they risk compromising the recordkeeping, accountability and sensitive information protection of their organization that may bring irreversible reputational damage to the organization. Describe the scope of use of the application in business • Define the records appraisal criteria • The process for capturing records in the record management system need to improve • Define the roles and responsibilities in managing the chat messages and records • Emphasize the importance to pay special attention to the security and privacy of the information on mobile devices • Configure the recordkeeping system and transitory storage To allow the consistent and coherent management of WhatsApp records throughout their lifecycle, it is necessary to analyze the business functions and activities WhatsApp chats or group chats are associated with classifying the information security level of each, and then set security access rights accordingly. The information obtained from the business unit will enable the proper configuration of transitory storage and record management system to accommodate and manage the records. B. Appraise the content in the WhatsApp Chats Not all chat messages have records value. The review and assessment shall be carried out to determine the value of messages based on the information contained in the text message and the context in which it was sent or received per to the organization’s records management policy. Delete messages irrelevant to official business or the ones which are informal, transitory or have trivial value. Records that have administrative, financial, legal, information value shall be identified for backups to save those sensitive data and also save space in the storage. Install the organization’s data storage system on the smartphone like google drive where the employees can get the backups of the chat for future calculation and past history from their smartphone which will act as storage on their respective mobile. C. Export chat contents The export of chat messages should be performed regularly and the old content may be deleted from the mobile device, if necessary, to save the storage space. D. Capture participant contact information Chat history records would not be complete or meaningful without identity information on the sender of the text message. It is important to compile and maintain comprehensive and up-to-date contact information of all participants of WhatsApp chats and store in the recordkeeping system, linking to the chat records, to preserve the contextual information of the records. 122 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

E. Export chat group member information While chat messages are shared within the group, information about all members in the group must be captured alongside the chat records, the employer needs to maintain their chat recipient. In summary, peer consumer messaging applications are increasingly being used by organizations and employees as communication tools. The records management professional shall not only advocate the recordkeeping compliance requirements and risks but also engage in developing processes and devising solutions to integrate the application into the organization’s recordkeeping system. This is to ensure the management of the organization’s key information assets of discussions, deliberations and decision making on mobile devices to the best it can while waiting for the availability of a mature recordkeeping tool. The records management professional shall take pro-active actions to support the organization to harness the information from the application, to mitigate as many risks as possible and to achieve the organization’s overall objectives.

Fig-5: Employer need this setting on their common group V. RESULT Even though the employee had gone for client meeting they can send a text message on the group saying that he/she is attending so and so meeting and those text message will be available for a long time as a piece of evidence for the employee is present at that day worked from that place. And the other employee aware of it that he is not in the office so if they need any help to assign a task to that employee is not possible, so they will now do that task by themselves. Also, the organization will save a lot of money for those expensive systems whose purpose is to maintain the attendance of all employees in the organization. The organization has full faith in the data received from the WhatsApp common group because they cannot able to cheat the employers anyway. The organization also saves big money to maintain those biometric systems and also saved the environment. As our PM Narendra Modi is promoting for digital India if this type of steps taken by the organization then they save environment, money, and time.

Fig-6: Employer and employees can take backup of their data from above shown method 123 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

For organizations, there could be alternative ways to save the cost of installing the biometric system which is more expensive compared to the usage of WhatsApp. These will also save the environment because there is no need for an external device to be installed for using this technology to get the benefits of this technology. VI. CONCLUSIONS It will be a positive approach to the social media app. Because employees are using their WhatsApp for checking messages, images or videos sent by them & collogue or trying to attend the call. Now onward even they are doing their usual work they are also making their important task by sending a short message on the group to assure their attendance in the organization and from this activity of employee give the grantee of accurate calculation. They can calculate their salary on the message sent by them on the WhatsApp group and can raise their voice to the accounting department if they get less amount of salary. Now they need not worry about the fault calculation of salary or working hours which they had done. No one can cheat them for the attendance that you are not present on this day or that day. They can directly Ashow the text message to the respective team and mark their present if the system does not show his/her presence on a day. Even though if someone has deleted the message which he has sent from their phone still his phone maintained that message for future requirement. REFERENCES [1] www.engpaper.com [2] https://www.bayometric.com/advantages-disadvantages-biometric-identification/ [3] https://www.sestek.com/2016/11/advantages- disadvantages-biometric-authentication/ [4] https://www.sestek.com/2016/11/advantages-disadvantages-biometric-authentication/ [5] https://dpconline.org/blog/idpd/whatsapp-records-capture [6] https://www.researchgate.net/publication/316892755_Survey_Analysis_on_the_usage_and_Impact_of_ Whatsapp_Messenger

124 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

WEBSITE “THE PRADHAN MANTRI YOJANAS”

Saloni Jain Student, BSc.IT, K.C. College, Mumbai, Maharashtra

ABSTRACT There has been a steady increase in the government services all over the world. This reflects in a large number of people yet to take advantage of the government services. Though of this advancement of government policies and schemes for the betterment of the Citizen of India the people are not able to take advantages of these policies known as PRADHAN MANTRI YOJANAS and hence building a website which can reach and cover a large amount of Indian population can be better option to make them aware of the yojanas made for them and hence avail the benefits of the yojana to themselves through just few clicks and saving time. Keywords: Pradhan Mantri Yojana, Citizen of India, Government Services.

I. INTRODUCTION Indian history is replete with instances of Governments who were extremely conscious of their duty to provide services to their citizens. Continuous efforts were made by them to set up systems of good governance through various schemes and laws. These systems were however largely based on records, files and transactions which were generally physical. It has been only in recent years that the concept of citizen centric e-Services has come to the force. These efforts are heavily dependent upon the efficient use of technology and as a result technology is increasingly being used to transform learning, economy and citizen services delivery mechanisms. The reach of mobile network, internet and electricity is expanding its reach to remote areas, thereby ensuring that the marginalised sections of the society are also brought into the mainstream. This digital transformation is facilitating the ease of access for citizens with disabilities as well and empowering them to access various products and services despite mobility constraints. Yojanas are basically schemes provided to the people by the government But ever since the concept of Yojanas started the youth is still unaware of it and the people who know about it have issues regarding the registration of the Yojanas and hence to enjoy the benefits of the Yojanas provided by the government this website is built which contains all the most important Yojanas which are highly preferable by the citizens of India. In this website the Yojanas are already divided into different sections so that the people need not waste time in finding the Yojanas best suited for them. If the user is homeless then instead of searching and wasting time in reading about all the Yojana he can simply fill in his details and can get the details of the Awas Yojana related to the details provided by him. If the person is poor and doesnot have a bank account he can fill in his details and can register himself in Jan dhan Yojana. Pradhan Mantri Awas Yojana Pradhan Mantri Awas Yojana is an initiative by Government of India in which affordable housing will be provided to the urban poor with a target of building 20 million affordable houses by 31 March 2022. Pradhan Mantri Jan Dhan Yojana Pradhan Mantri Jan Dhan Yojana, is financial inclusion program of Government of India which is applicable to 20 to 65 years age group that aims to expand and make affordable access to financial services such as bank accounts, remittances, credit, insurance and pensions. So, basically this website can be the best way to get the benefits of the government provided services for the citizens of India at minimal cost with just few clicks. decrementing the efforts made by the people to go to bank and post offices and various other government centres to consult about the PARDHAN MANTRI YOJANAS. II. PROBLEM DEFINITION Unawareness: Since there are people who already have eligibility to use the benefit of Pradhan Mantri Yojanas but are unaware of the Yojanas. Confusion: Whereas there are some people who are eligible for registering themselves for Yojanas but are confused between the various options. 125 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Time Efficiency: So, designing a website where all the citizens of India are getting benefit of saving time by just registering themselves on the website and knowing the Yojanas best suited for them by taking into consideration the constraints of the Yojanas. In my website the constraints of the existing website is removed and hence a website which provide maximum benefit to the user is built. EXISTING SYSTEM It basically contains information about limited Yojana and eliminating the rest of the Yojana. The existing system also don’t have the feature for showing the user the most relevant Yojana for them and hence the user has to surf through every Yojana and find out the best situated Yojana for them and hence a lot of time is waste. III. PROPOSED METHODOLOGY Rapid advancements in the field of technology it’s most basic form, think of a website as being an online brochure or catalogue that can be updated at any time. It is much easier and quicker to update information about your products and services on your website than it is in a print brochure or catalogue. In my website the constraints of the existing website is removed and hence a website which provide maximum benefit to the user is built. In this website the Yojanas are categorized according to some constraints and the user is only shown the Yojana best suited according to the eligibility criteria provided by them during the registration and hence a lot of time is saved because the user doesn’t have to go through each and every Yojana and search for the Yojana in which they want to enrol. The website contains various modules based in various categories in which our society is divided and so making it easy for the people to just see the Yojana and know about the Yojana made for them. The modules can be distinguished as follows: A. Common Registration form The main component of registration form will help to distinguish between various Yojanas and provide the user with the best suited Yojana for them. The components are: 1. Gender: his field of the registration form will help the website to provide the user with the options of the gender related Yojanas. For example if the user is a female then the website will provide the Beti Bachao Beti Padhao Yojana or Janani Suraksha Yojana and so on. 2. Aadhar Card Number: This field will help to categorize the user into different age groups and hence provide them with better options of Yojana. For example, if the user falls into the category of youth then the options of Rozgar Yojana, PM Kaushal Vikas Yojana and many more can be provided. 3. Occupation: This field will collect the information of the occupation of the user and will show the details accordingly of the yojana. For example, if the user is a farmer and belong to agricultural field then options such as Fasal Bima Yojana, Soil Health Card Scheme and many other options can be provided. B. Pradhan Mantri Yojana 1. Categories of Yojana: In this the various yojanas are divided and categorized into different categories. For instance, Yojana related to children and health is kept into the Health and Children Yojana category and likewise yojanas related to senior citizens are kept in Senior Citizen Yojanas category and so on. 2. Senior Citizen Yojanas: In this module of the website all the schemes related to senior citizens are provided the user can read as well as can also register with the yojana. Yojanas such as Vaya Vandana Yojana (VVY), Integrated Programme for Old Persons (IPOP), Indira Gandhi National Old Age Pension Scheme (IGNOAPS) and so on. 3. Health and Children: In this module of the website all the schemes related to health and children of the country are provided the user can read as well as can also register with the yojana. Yojanas such as Central Government Health Scheme, Integrated Child Development Services and many more. 126 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

4. Agriculture and farmers: In this module of the website all the schemes related to people involved in agricultural practices are provided. The user can read as well as can also register with the yojana. Yojanas such as Fasal Bima Yojana, Krishi Sinchayee Yojana (PMKVY) and so on. 5. Unemployed Youth Yojana: In this module of the website all the schemes related to jobless youth are provided. The user can read as well as can also register with the yojana. Yojanas such as Rozgar Yojana, PM Kaushal Vikas Yojana and so on. 6. Landless Yojana: In this module of the website all the schemes related to citizens who are homeless are provided the user can read as well as can also register with the yojana. Yojanas such as Indira Awas Yojana (PMAY), Gramin Awas Yojana (GAY) and so on. 7. Other Yojana: In this module of the website all the schemes which donot fall in any of the above categories are provided the user can read as well as can also register with the yojana. Yojanas such as Rajiv Gandhi Grameen Vidyutikaran Yojana, Amrut and so on. C. Bank and Post Office In this part of the website the user will be provided with details of the bank and post offices which will provide them more financial benefits and have a greater rate of interest if any of the yojana needs the user to open a bank account in the bank or in the post office. For example, the PM Jan Dhan Yojana need the user to have a bank account so this module of the website will provide the details of the banks and post offices giving the user maximum benefits. IV. RESULT Engaging technology in the government services will make it work more frequently and on a large scale as it is a technology oriented environment. Technology will reduce the paper work load of the government and create a healthy working environment. The websites have concurred almost every field of the market and are well known and also commonly used way to reach out to people therefore conveying knowledge and artefacts of information through technology is more appreciable then simple newspapers and magazines. Since there are people who already have eligibility to use the benefit of Pradhan Mantri Yojanas but are unaware of the Yojanas. Whereas there are some people who are eligible for registering themselves for Yojanas but are confused between the various options. So, designing a website where all the citizens of India are getting benefit of saving time by just registering themselves on the website and knowing the Yojanas best suited for them by taking into consideration the constraints of the Yojanas. V. DATA ANALYSIS AND INTERPRETATION The survey was conducted to know about the awareness of yojanas and schemes provided to the people with the help of a verbal interview, the following data were found and interpreted. 1. Participants

100 80 80 60 40 20 20 0 0 Male Female Trans

Interpret Number of Male = 80% Number of Female = 20% Number of Trans = 0% 127 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

2. Age Group

Interprets Below 20 = 10% 20 to 30 = 53% 30 to 40 = 20% 40 to 50 = 13% Above 50 = 4% 3. Occupations

Interpretation Occupation Number Percentage Student 41 41% Employee 22 22% Profession 16 16% Businessman 17 17% Housewife 4 4% 4. Income

128 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Interpretation Income Bracket Number of people Percentage Below 100000 63 55.75% 1L to 2L 9 7.96% 2L to 3L 7 6.19% 3L to 4L 12 10.62% 5L to 6L 8 7.08% Above 6L 14 12.40% VI. CONCLUSION This website can be the best way to get the benefits of the government provided services for the citizens of India at minimal cost with just few clicks and hence decrementing the efforts made by the people to go to bank and post offices and various other government centres to consult about the PARDHAN MANTRI YOJANAS. VII. REFERENCES [1] The Times of India newspaper and Hindustan Times. [2] Wikipedia Article on Awas and Jan Dhan Yojana  Available :https://en.wikipedia.org/wiki/awas yojana  Available :https://en.wikipedia.org/wiki/jan dhan yojana [3] Yojana archive website  Available: http://yojana.gov.in/Recent_archive_main.asp [4] Yojana Magazine  Available: https://www.vajiramandravi.com/yojana-summary.php [5] Group of people from thane district.

129 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

SOFTWARE BOTS - ROBOTIC PROCESS AUTOMATION LED BY HUMANS

Simone Coelho K.C. College, Mumbai University

ABSTRACT Automation is the buzzword in today’s business landscape because it will increase value, increase accuracy, decrease execution time whereas increasing security and confidentiality of business operations and by doing that increasing potency and providing a lift for higher business performance. The automation landscape consists of many verticals and one that's a hot topic today is Robotic Process Automation (RPA) because it will support speedy automation of enterprise business processes. This paper aims to explain the automation landscape, what RPA is and the way it will approach to facilitate corporations to extend their performance and maintain their competitive advantage in an exceedingly dynamic economic atmosphere. The challenges and therefore the risks of RPA adoption also are incorporated in the paper. RPA may be a key element for automating humans dependant arenas and robots can work along with humans for the benefit of society. Keywords: RPA, workforce automation, performance management.

I. INTRODUCTION The fast pace environment is forcing organizations to reinvent themselves quicker than a decade ago with lesser time to market new products and services. Today, organizations need to increase revenue while keeping expenses under control. Automation is an answer to all these and is a powerful approach for any organization nowadays with more and more companies investing huge budgets on this approach. In RPA, software robots mimic and integrate human actions within digital systems to optimize business processes. A process would need lesser people to handle when RPA is applied. But it does not automatically render workers jobless. It is like understanding the difference between driving a car with manual transmission, driving an automatic car, and driving a self-driving car—the driver is there in all cases. RPA automation captures data, runs applications, triggers responses and communicates with other systems to perform a variety of tasks. These robots interact with applications and systems through a graphical user interface or command-line interface to carry out routine tasks. A new credit or loan application, for example, requires data to be accessed from a form, bank documents in PDF format, credit score which is accessed online, etc. If these steps can be automated through RPA, you can process credit applications faster, leading to higher efficiency and lower costs. RPA helps humans by taking out the drudgery of monotonous tasks and frees the human to do higher value tasks. Not all processes can be automated to an extent that it does not require any human intervention. In the RPA world, we call it “attended RPA", which includes scenarios where decision making and/or user input is required, such as desktop automation. These software robots work at an employee’s workstation and are triggered by either a user’s command, or the robots need input from the user to continue a task. An unattended bot runs a process in the background when something triggers that process. It can be triggered by time, a transaction, or handover from another bot. It can be hooked into business processes or enterprise resource planning systems or website responses. It completes the process, then sits idle and waits until something else triggers it. The attended bot is about bringing the human into the loop, and it becomes a productivity tool. For example, today we all use spreadsheets in business but, in time, we will use a work bot and a home bot, doing repetitive tasks. The myth that robots will eliminate jobs continues to circulate. But that’s not actually the case. Bots are generally well-received by employees, who are learning how to use automation to enhance existing processes and are setting up RPA to act as a personal 24/7 assistant to handle tedious tasks. Resistance to change still exists among those who believe bots lead to job cuts. In reality, bots are simply changing the way we work, similar to the way machines and power tools replaced hand tools during the Industrial Revolution. RPA merely shifts the demand for jack-of-all-trades employees to those with a more particular set of skills. Now, if the environment in which the automation runs is more dynamic than expected, then the RPA tooling must incur additional complexity to make sure it can continue to operate in an ever-changing environment and still produce the right outcomes 130 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Again, that kind of defeats the purpose. If a process requires decision-making on a case-by-case basis, you still want humans closely involved. Tasks involving creative thinking, brainstorming, interacting with the physical world (like pulling papers from a filing cabinet) are better handled by people. This doesn’t mean you can’t automate any pieces of these processes – a workflow automation tool can help handle the repetitive steps of a process that also requires human decision-making and skill. And the workflow automation tool and RPA can work in concert. The idea is to only leave the human work for the human to perform. RPA is good at following instructions; it’s not good at learning on its own or responding to unexpected events, a distinction some people don’t make since they join RPA together with AI. One of the most common examples is changes in the target user interface. To put this into perspective, if an RPA bot has been set up to go to a web page and click on the top-left corner to reach a sign-up page, it can do that as long as the bot is able to find that particular button in the top-left corner of the page. A problem arises if you move that sign-up button to the middle of the page – or anywhere other than the top-left corner, for that matter. The RPA sequence will halt because the bot will keep looking for it in the top left. It’d be wrong to call this an RPA failure; it’s really a human error. The bot is working exactly the way it was told to, it just didn’t expect such a roadblock. This tends to be a bigger issue than some people realize when they first deploy RPA. Like any technology initiative, you need metrics to measure the results and ensure that RPA is meeting its intended goals. RPA solutions are very consultative deployments and require lots of professional services to deploy, on board, and maintain going forward. This is very labour- and resource-intensive and requires lots of manual work.” “Lots of manual work” is what RPA is intended to reduce, II. PROBLEM DEFINITION A bank has been proactive in using digitization across its various functions, from on-boarding customers to managing records and overall delivery of banking services. With over 500 branches spread across 19 states, the bank needed a solution that could drive its long term goal of inclusive digital banking. They wanted to create a strong backend IT infrastructure that could be seamlessly connected with the digital interface for better speed, accuracy and efficiency in services. Before the deployment of RPA, each service request was manually executed. A service desk ticket was created in the system, and service agents were allocated these tickets for processing. This was a cumbersome and time- consuming way of doing things. In the case of ID management, for instance, every time the user forgot his password, the agent would have to first log into the system, unlock the ID and send an email for new password generation. Considering that there were 300-400 such requests to reset passwords daily, at least 3-4 hours were spent every day on just managing passwords. Similarly, for Credit Bureau reports, one had to login to the Credit Bureau agency portal and upload the required Know your customer (KYC) details through an XML file. The reports were then manually downloaded and assessed to decide whether the loan applications should be accepted or rejected based on the credit ratings. The entire activity took about 2-3 days as it involved manual analysis on multiple Excel files. The bank needed a solution to reduce the manual effort in such activities. III. PROBLEM METHODOLOGY Unlike traditional automation that requires writing codes for every process, RPA platform follows an easy-to- use drag and drop methodology. The tool is even useful in cases where you may not want to automate the entire process as it allows you to automate only the parts required. Processes to be automated  ID Creation, Deletion and Unlock & Reset

 Credit Bureau report Generation and Verification RPA journey has 5 stages: PoC (Proof of Concept), RPA assessment, RPA implementation, production roll-out and maintenance.

131 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

In the PoC stage a process is chosen, a small automation team is built, a technology is chosen from the available ones in the market and a process is automated. The purpose of PoC is to validate both the technological approach and the benefits of running RPA. The risk in this stage is to start a PoC for the wrong reason. What an organization wants is to validate its business case assumptions. When in RPA Assessment stage the organization tries to answer to the following questions: - Which process has the highest potential for automation? - Is it properly documented? - Is it standardized across business units and regions? - Is it optimal or does it need redesign? The danger in this stage is to try to automate the wrong process that is too complicated, unstable, with multiple exceptions included, desired by management but not thoroughly followed by people. Once a process or a list of processes that are truly fit for automation is established we move to the next stage which is RPA implementation. In RPA implementation stage an automation team will build the RPA project, deploy that in nonproduction environment and test it thoroughly before moving on to the production roll-out. When in production roll-out stage IT is going to become the operational owner of the RPA virtual workforce and manage it as any other business application in the company. ID Management and Credit Report Generation were the two areas identified to start the RPA journey. Some of the processes of ID Management involved approvals. Standardization of templates for request as well as approval messages was opted for. The business logic was built into the ID creation process to ensure that duplicate IDs were not created. In case of Credit Report analysis, it had to gather all the acceptance rules to classify a borrower/co-borrower as “Cleared” or “Rejected”. The business logics were incorporated into the script so that robot could do the validation of the borrower/co-borrower’s score and classify them as “Accept” or “Reject” and update the Loan application in CRM accordingly. With the deployment of RPA, the bank has been able to significantly bring down the time and effort required for ID management. The activity that was being managed by 4 to 5 people earlier is now almost entirely handled by a Robot working round the clock. Time taken to reset passwords has been reduced from 3-4 hours to less than an hour, which means a saving of almost 65-70%. In case of Credit Report Generation, the cycle time has been reduced from 2-3 days to one day. Moreover, automation has also brought in more accuracy, and efficiency at every step. Employees can focus their energy on more engaging tasks and utilised in critical activities while the monotonous tasks that do not require much intelligence can be entrusted to a robot. IV. RESULT RPA Platform was deployed for ID Management and Credit Report Generation & Verification, and was able to achieve 65-70% reduction in turnaround time (TAT). Apart from the savings in time, the processes have also been streamlined to ensure better results. With the standardization of certain templates for approvals and requests, the workflow itself has become more efficient, thereby resulting in better overall performance. With the successful deployment of the first Robot, the bank now plans to expand the usage to other functions as well. Eventually, the Bank intends to use at least one Robot at every branch office so that benefits can be spread across the entire organization. V CONCLUSION RPA is the next revolution after the first introduction of industrial robots. RPA itself cannot solve organizational issues and doesn’t guarantee itself a performance increase. However proper analysis performed at the beginning of such a project can allow the management of the company to discover the proper processes to be handled by RPA. The processes to be automated need to be repetitive, standardized and management by exceptions should be an exception and not the rule. Processes are not going to be redesigned often after they are redesigned. Therefore the first stage should be analyzing which are the best candidates for automation, then performing business process reengineering to maximize the outcomes and only after that proceeding further with RPA. Removing clerical work is one step while the other is repositioning and training employees for higher value tasks. RPA allows cost-cutting, increase efficiency and free employees to focus on creativity, reasoning to increase the value they add to organizations. Software robots don’t get tired and scaling them is not difficult. Once robots are implemented new human employees will not need to know the details of the processes being already automated which leads to a long term lack of knowledge if employees that implemented RPA leave the company. To mitigate this proper documentation and audit of the RPA implementation needs to be in place from day one. The next stage of evolution for RPA is the introduction of Artificial Intelligence features for 132 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 decision making processes. This will lead to more automated processes and eventually force another percentage of the medium qualified human workforce to professional reconversion. The positive aspect of this evolution is that it has the potential to define and introduce new highly skilled and in the same time high added value jobs in the labor market. The major obstacle in moving to an RPA implementation are social acceptance and the impact on the labor market as society can stand against such an initiative due to the risk of cutting jobs with few options of professional reconversion. Technical knowledge is another important factor as without a center of employees to be specialized in RPA a full roll-out is hard to achieve. Larger adoption of RPA will allow a higher pace of standardization in this field and will also increase the pressure for organization to move to new territories that are powered by Artificial Intelligence. REFERENCES  Schatsky, D., Muraskin, C., & Iyengar, K. (2016). Robotic process automation: A path to the cognitive enterprise. Retrieved June 12, 2017, https://dupress.deloitte.com/content/dam/dup-us- en/articles/3451_Signals_Robotic-processautomation/DUP_Signals_Robotic-process-automation.pdf UiPath Forum. Retrieved May 22, 2017, from https://forum.uipath.com/t/how-to-take-a-screenshot-of-selected-area- on-the-screen/1785.  Kearney, A.T. (2016). On the eve of disruption: 2016 A.T. Kearney Global Services Location Index. Retrieved February 7, 2017, from https://www.atkearney.com/digitaltransformation/article?/a/2016-global- services-location-index-Institute for Robotic Process Automation and Artificial Intelligence (2017). What is Robotic Process Automation. Retrieved May 15, 2017, from http://irpaai.com/what-is-robotic-process- automation/  https://www-uipath-com.cdn.ampproject.org/c/s/www.uipath.com/blog/5-key-takeaways-challenges-of- rpa?hs_amp=true  Adrian-Mihai ZAHARIA-RĂDULESCU1  Luigi Pagliarini Retrieved from http://alife-robotics.co.jp/homepage2018/members2017/icarob/data/ html/data/IS_pdf/IS-1.pdf  https://www.uipath.com/solutions/customer-success-stories/jana-small-finance-bank  https://www-uipath-com.cdn.ampproject.org/c/s/www.uipath.com/blog/rpa-use-cases-for-attended-robots- automation?hs_amp=true

133 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

MALWARE DETECTION AND RMMI

Shaikh Aafreen, Khan Anam, Rakhi Gupta and Nashrah Gowalkar K. C. College, Mumbai, Maharashtra

ABSTRACT This research focuses on creating an Android malware analysis lab environment with assistive services that helps the prediction of malicious applications from a given large set of both benign and malicious Android applications. Malware analysis is the process of determining the functionality and potential impact of a given malware samples such as virus worms, Trojan horse, rootkit. Malware is computer software intended to harm the host operating system or to steal sensitive data from users, organization or companies. Keywords: Malware, Virus, Worms, Trojans, Rrotkits.

I. INTRODUCTION VAPT is the proactive approach to cyber security and cyber defense. This is carried out in banks/financial institutes to check the security of the organization (internet facing applications). It is important to strengthen this process make it a lively process by examining its varying aspects in the every changing cyber environment. It’s testing approach help to find security bugs within a software program or a computer network. VAPT is often misunderstood as two different types of testing techniques. Conversely, these two should be combined together to yield better results. The objective of Vulnerability Assessment is entire to search and find bugs. Penetration Testing is performed to see whether the vulnerability exists by exploring and exploiting the system. Malware analysis is the art of dissecting malware to understand its behavior such as, what changes it makes in the system files, how to identify it, and how to defeat/eliminate it etc., Static analysis relies on features extracted without executing code, while dynamic analysis extracts features based on code execution (or emulation). In general, static analysis is more efficient, while static analysis is often more informative, particularly in cases of highly obfuscated code. Static analysis of an Android application can rely on features extracted from the manifest file or the Java bytecode, while dynamic analysis of Android applications can deal with features involving dynamic code loading and system calls that are collected while the application is running. Due to a large volume of Android applications being developed and distributed every day through third party application stores, it is difficult to detect a set of Android applications which might potentially indicate malicious behaviors. This situation results in high inefficiency in performing the manual analysis of applications that are uploaded to Android application stores II. PROBLEM DEFINITION The popularity of android system has led to a huge increase in spreading of Android malwares.Play Store is an official app market by google. It is an open platform on which anyone can upload his application. Playstore cannot guarantee that all the listed applications are threat free. With android being an open source platform where anyone and everyone can uploads applications on playstore and torrents it is needed to check for application for being secured.the application can have malicious code, malwares or even vulnerabilities. III. PROPOSED METHODOLOGY To perform malware analysis on a suspicious application and generate report on it. To perform vulnerability assessment and penetration testing on the apps from playstore and hybrid analysis. To generate a malicious payload through msfvenom and then analyze it. Vulnerability Assessment Vulnerability assessment (VA) is a systematic technical approach to find the security loopholes in a network or software system. VA is entirely a process of searching and finding, with the objective that none of the loopholes are missed. It primarily adopts a scanning approach which is done both manually and performed by certain tools. The outcome of a VA process is a report showing all vulnerabilities, which are categorised based on their severity. This report is further used for the next step, which is penetration testing (PT). VA is usually a non- intrusive process and can be carried out without jeopardising the IT infrastructure or application’s operations. Penetration Testing A penetration test (PT) is a proof-of-concept approach to actually explore and exploit vulnerabilities. This process confirms whether the vulnerability really exists and further proves that exploiting it can result in damage to the application or network. The PT process is mostly intrusive and can actually cause damage to the systems; hence, a lot of precautions need to be taken before planning such a test. The outcome of a PT is, 134 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 typically, evidence in the form of a screenshot or log, which substantiates the finding and can be a useful aid towards remediation. As a summary, shown below are the steps involved in the VAPT process. Scanning the network or application • Searching for security flaws • Exploiting the security flaws • Preparing the final report of the test Differences between VA and PT VA and PT differ from each other in two aspects. The VA process gives a horizontal map into the security position of the network and the application, while the PT process does a vertical deep dive into the findings. In other words, the VA process shows how big a vulnerability is, while the PT shows how bad it is. There is one more subtle difference. Due to the nature of work involved in each process, a VA can be carried out using automated tools, while a PT, in almost all cases, is a manual process. This is because PT essentially simulates what real hackers would do to your network or application. VAPT tools While there are multiple tools available in the market, those listed below are well-known for their usability. Although these tools are mentioned as VAPT tools, most of them essentially provide VA only and leave the PT part to the ethical hackers to be done manually. There are a couple of tools, though, which are powerful PT tools, and are mentioned as such in the list below. • Nmap • Acunetix • Nessus • OpenVAS • Nexpose • BurpSuite (PT) • Metasploit (PT) There are two important terms that an ethical hacker must know, especially while using these tools. These are: false positive and false negative. A false positive is when a vulnerability actually does not exist, but it gets reported. A false negative is when a vulnerability actually exists but it is not reported. A false positive can be a nuisance resulting in a waste of time for an ethical hacker, whereas a false negative can be really dangerous, leaving a network or application susceptible to attack, while giving an illusion that everything is alright. It has been observed that automated tools tend to exhibit false positives as well as false negatives. This brings us to the next important question of which method is better—the automated VAPT or manual VAPT? 4.6.5 Automated vs manual VAPT The shortest answer is that the manual VAPT is always better and, hence, is a more widely used approach. This is because the automated tools are based on simple logic, which checks either for signatures or behaviour. To understand this, let’s go to the basic difference between a software program and the human mind. Listed below are the steps a typical ethical hacker performs for a VAPT. • Enumerates a vulnerability • Performs an attack manually • Analyses the results of the attack • Performs similar or different attacks based on previous findings • Assimilates the results to create a customised attack • Exploits the vulnerability further to see if more attacks are possible • Repeats the above steps for all vulnerabilities Each network or application is different, resulting in a very wide range of vulnerability scenarios. From the above steps, it becomes clear that there is a lot of complexity involved in VAPT, wherein, the results of one test decide the actions of the next one. This makes VAPT a process of cascaded intelligence, where you cannot predict the next step and also need to apply years of experience to reach a conclusion. No tool can do this, at least, not as of today, and hence it must be performed manually. An ethical hacker’s job can be made less stressful by automating certain tasks of vulnerability assessment; however, the proof-of-concept part in penetration testing mostly relies on manual ways of exploiting the loophole and gathering the required evidence. Given below are the benefits of manual penetration testing. • Mimics the behaviour of real life hackers • Brings a great deal of accuracy to the results • No false positives • Provides evidence, enabling the replication of problems • Helps in fixing a product’s security design issues VAPT is a methodical approach to risk management. IT heads should, as a matter of strategy, incorporate VAPT in their budgets and risk governance processes. It should be a periodically executed process, and the frequency should depend upon the data’s confidentiality and risk impact. While there are multiple tools to perform vulnerability assessment, penetration testing is a manual process, and should be handled by professional and highly experienced ethical hackers. This will ensure genuine cyber security as opposed to an illusion of being secure. Static analysis There are various tools to perform static analysis .it can be performed manually or automated.dex2jar is a tool that converts der file to jar file through which one can view the code and perform the static analysis.

135 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Go to usr/share/dex2jar open terminal in this directory and type d2j-dex2jar .sh classes.dex (copy and paste classes.dex file application into this folder) After that it will create a jar file to run this file type jd-gui classes-dex2jar.jar. Mobsf is the automated tool where you run manage.py file to start mobsf server.then after then you can go to browser and type localhost and the port (localhost: 8000) and then you can upload your apk file.after sometime it will load and give you the option to download report. Dynamic Analysis Wireshark and burpsuit are the 2 most popular tool for analyzing traffic. For burpsuit first we need to set the ip address and the port number in the wifi section under modify network section.type the ip address of the machine on which the burp suit is running and then under the proxy tab in options tab type port number and select All Interface.the download the burp certificate on the emulator.now the busrp is ready for intercepting http traffic. For wireshark simply on the wireshark and on the application on the emulator it will display the traffic. Technology Used Android Tamer Android Tamer is a Linux based distribution developed for Android Security Professionals. This distribution is based on Ubuntu 10.04LTS, which includes various popular tools available for Android Development, Penetration Testing, Malware Analysis, ROM Analysis and Modification, Android Forensics, etc. GENYMOTION -2.12.0 Genymotion is an easy-to-use Android emulator that has been designed to help app developers test their products within a safe, virtual environment. The developers provide running on an actual device. The interface is easy to navigate and it is fairly intuitive. Regarding your chosen VM, Genymotion, helpfully downloads, and then deploys automatically, all the necessary configuration files that are required for each virtual device. The app also comes with an array of extra tools that are available to assist virtual navigation. These can typically be found on the right hand side of the main window. Genymotion emulations run on a VirtualBox engine, which need to be installed on our PC before running the app. First the virtual box needs to be on,only after getting ip address in the virtual box we can start the emulator. IV. RESULT We foresee and our analysis specifications as enabling technologies that will open new doors for application certification. Malware detection techniques that use either static detection techniques that can be easily obfuscated or those that use only dynamic detection techniques also do not provide the complete solution. These techniques are combined to overcome the drawbacks in detecting malicious applications. Malware detection techniques and tools should be improved as the malware families are increasing with the increase in the number of smartphone user. The hybrid analysis is becoming popular because it produces more accurate results in detecting malware applications. V. CONCLUSIONS a) Smartphones are rapidly becoming a dominant computing platform. Low barriers of entry for application developers increases the security risk for end users. b) In this paper, we decompiled source code to perform a study of both dangerous functionality and vulnerabilities. c) Our analysis framework allows us to observe not only the existence of dangerous functionality, but also how it occurs within the context of the application. d) In future work a detailed study with the tools of android malware detection can be done. e) Smartphone users need to be aware enough so they read and understand the permissions requested by the application before agreeing to grant access.

136 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

REFERENCES WEBSITES a) https://www.infosecinstitute.com b) www.google.com c) www.github.com d) www.hybridanalysis.com e) www.youtube.com f) www.stackoverflow.com

137 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

RESEARCH PAPER FOR GESTURE CALL

Sunil Mandal and Manoj Pillamari K. C. College

ABSTRACT Our project is a Software-based project in which we are going to develop the application that can be used on all Android Smartphones which has a version of 6.0 or more. We will be developing the application for making the call using Gestures inside the application. Software which will be going to use in our project are Android Studio, Java JDK, Apache Cordova that needs to be installed, Firebase or MySQL. When it comes to developing an Android Application the post preferred Software for beginners is Android Studio. Application will be developed using Java language, Apache Cordova or Kotlin. Hardware requirements for the project are a Laptop or PC for developing the application, Android Smartphone, 5GB HardDisk Space, Minimum 4GB of Ram in PC or Laptop.

INTRODUCTION Gesture is a hand-drawn shape on a touch screen phone. Gesture is mostly used in robotics where we control robots using gestures. Gestures is an easy concept and used in many Industries also. Our application will run only on Android Smartphones. User can create as many as gestures as needed. Gestures can be drawn in two ways and they are Grid Format and Free Hand Draw. In Grid Format the Gestures are drawn on the fixed points whereas there are no fixed points in the Free Hand Draw. As there are very few applications developed in the market so it is a good opportunity for us to learn this new concept. PROBLEM DEFINITION  There are only very few applications developed with this feature.  Sometimes call does not gets connected in current system although if we have drawn the perfect gesture. So we will try to avoid this problem.  Sometimes in Free Hand Draw Format the gesture co-ordinates may not get match so the call will not take place. So we will be giving the proper points i.e. we need to use Grid Format as there will be fixed points that has to be connected.  In our application we just need to give a specific gesture to a number and we can call that person by drawing gesture in the app.  Our app allow users to quickly access contacts on your android device by just drawing gestures on the screen.  We will be developing this application to avoid for searching a contact from the contact list.  Grid Format will be used and easy to draw for the users whereas in Free Hand Draw Format it may be possible of line or stroke going wrong. PROPOSED METHODOLOGY We will be developing this project using “Waterfall Model” to develop the application. Steps involved in project implementation: 1. First we need to do all coding part. 2. We need to install that application on our Android Phones. 3. Open the application and assign a specific gesture to a contact person. 4. Now go into the application and draw the gesture for making a call. Every step has to be definitely completed to go into the next step in the Project Development. Following is the Sequence followed by the User for getting the final output of this Project.

138 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

We will be using Firebase or MySQL for Database to store the gesture data of the Application. Java or Kotlin Language will be used to develop this project. Java was developed in 1995 by Sun Microsystem. Java is the official language for Android development. Kotlin is a cross-platform language. Kotlin is fully interoperating with Java. A User can create multiple gestures on the given fixed points but, one contact can have one gesture only. So that User can differentiate all the Gestures related to the specified contact. As we said Gestures can be drawn in two forms and they are as follows, 1. Grid Format Draw:

2. Free Hand Draw:

139 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

RESULTS AND DISCUSSION Main feature of the Application is to call a person using Gestures and it will be only possible if the user has registered that Gesture previously in the Application. As there is rapid changes taking place in the Technology so it may be possible that Gesture will be getting important in the Android Smartphones also. As Gestures are less used in Day-to-Day life so it will be interesting for those people who research on the new technologies development. For getting the final output an Android Smartphone is must as the operation will be taking place in the Application and Android System(to make call). As of now we are thinking to add this app feature on Screen Lock i.e. to draw gesture on Screen Lock only to call the person. But we will be doing it in as a Future enhancement to the application. CONCLUSION Can easily make the call in emergency time just making the gesture in the app rather than searching for the contact. No need to search for a number in the contact list to call a person if gesture is already stored in the Gesture Call Application. It will save time by drawing registered gestures associated with its contact number in the Application. REFERENCE  Methods Syntax from https://developer.android.com/docs  Firebase Details gathered from https://firebase.google.com/  Basic knowledge about gesture at https://www.youtube.com/watch?v=L27EhVTLcng  Basics about Gesture Recognition at https://www.youtube.com/watch?v=YSXRRzhOnjQ&t=26s  https://www.tutorialspoint.com/android/android_gestures

140 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

IOT BASED HEARTBEAT MEASURING AND ANALYSIS

Aditya Srivastava and Vimala Rani Department of Computer Science, K. C. College, Churchgate, Mumbai, Maharashtra

ABSTRACT The Internet of Things (IoT) is inter-communication of implanted devices using an arrangement of technologies. In this paper, proposing a remote sensing parameter of the human body which consists of a heartbeat. It will also tell whether a person is facing any heart disease or not. The parameters that are used for sensing and analysing will forward the information through wireless sensors. Research outcomes will prove the proposed system is user-friendly, reliable, and economical. Keywords: IoT, Machine Learning, Image Processing

I. INTRODUCTION IoT is also used in Internet of Medical Things (also called the internet of health things) is an application of the IoT for medical and health-related purposes, data collection and monitoring for research, and analysing. This 'Smart Healthcare', as it is also called, led to the creation of a digitized healthcare system, connecting available medical resources and healthcare services. IoT devices can be used to enable remote health monitoring and emergency alert systems. This monitoring device can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, Fitbit electronic wristbands, or advanced hearing aids. E.g. few hospitals have begun applying "smart beds" that can detect when they are empty and when a patient is attempting to get up. It can also regulate itself to ensure appropriate pressure and support is applied to the patient without the physical interaction of doctors. II. PROBLEM DEFINITION Today many countries, Human-Healthcare is routinely defined as a serious problem. i.e., almost as much as 8% of the population who can have access to 20% of the country’s medical resources? This impairment to access proper Human Healthcare for rural populations paired with rapidly increasing cardiovascular disease rates poses a serious problem. III. PROPOSED METHODOLOGY The introduced Human-Wellbeing checking/watching system includes patients, Human-Wellbeing observing units, cloud for information maintenance and secure. With the assistance of some equipment units, different sensors and gadgets with android app association . The system functionality is divided into major three modules; they are: 1) Sensing module 2) The Main module and 3) Interaction module. A. Pub Nub Initialization In my Android application, the phone’s camcorder will be operated to capture the heartbeat. When the application user/patient pin his/her finger against the camera, an image processing algorithm takes the red component on the finger image to sense the blood flow and then calculates the reading of blood flow. The reading is averaged at the time span of one minute, and the heart rate is determined. After calculating the heart rate, the application rills the data in real time to a monitoring dashboard. At the start, the Main Activity on the Android app triggers Pub Nub initialization followed by doctor’s ID registration. Users can key in a ID to associate with a profile for sending their healthcare data, in this case, the heart rate monitor. B. Monitoring The Preview Callback ( ) function will perform the background image processing on the camera image to sense the heart rate. The camera captures the frames for a duration of 10 seconds.

141 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

The algorithm within PreviewCallback( ) measures the deviation in the average RED color intensity in the frames captured, multiplies that value by six, to arrive at the approximate reading for beats per minute. Once the reading is taken, it is published over PubNub using PubNub Data Streams to the real-time dashboard which live updates as new information comes through. C. Analysis There are 14 columns in the dataset, where the id column is a unique and random identifier. The 13main features are described in the below section.  Slope_of_peak_exercise_st_segment (type: int): the slope of the peak exercise ST segment, an electrocardiography read out indicating quality of blood flow to the heart  Thal (type: categorical): results of thallium stress test measuring blood flow to the heart, with possible values normal, fixed_defect, reversible_defect  Resting_blood_pressure (type: int): resting blood pressure  Chest_pain_type (type: int): chest pain type (4 values)  Num_major_vessels (type: int): number of major vessels (0-3) coloured by fluoroscopy  Fasting_blood_sugar_gt_120_mg_per_dl (type: binary): fasting blood sugar > 120 mg/dl  Relax ekg outcomes (type: int): resting electrocardiographic results (values 0,1,2)  Serum_cholesterol_mg_per_dl (type: int): serum cholesterol in mg/dl  Oldpeak_eq_st_depression (type: float): oldpeak = ST depressioninduced by exercise relative to rest, a measure of abnormality in electrocardiograms  Sex (type: binary): 0: female, 1: male  Age (type: int): age in years  Maximum heart_beat_achieved (type: int): maximum heart rate achieved (beats per minute)  Exercise_induced_angina (type: binary): exercise-induced chest pain (0: False, 1: True

IV. RESULTS It will give the result in binary form 0-for person is healthy and 1-person is not healthy. V. CONCLUSION I will built a simple heart rate monitoring application for Android without using any external components. This Application gives you a good idea of how to combine the functionality of an Android smartphone with real-time data streams for healthcare applications. VI. REFERENCES  https://www.pubnub.com/blog/tutorial-realtime-android-heart-rate-monitor-and-dashboard/  https://medium.com/@dskswu/machine-learning-with-a-heart-predicting-heart-disease-b2e9f24fee84.  IoT based Heart Attack Detection, Heart Rate and Temperature Monitor.( International Journal of Computer Applications (0975 – 8887))

`

142 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

GPS FRIEND FINDER

Kajal Tejwani, Girish Narsinghani, Rakhi Gupta and Nashrah Gowalkar K. C. College, Mumbai, Maharashtra

1.1 ABSTRACT In India the rate of crime reports is increasing every year in very numerous manner.Crimes like rape,murder,kidnap etc. In this 21st century called digital era.This application gps friend finder have many benefits like parents don’t have to worried about their childrens if they are going out somewhere at late night.So without calling them you can see the of your child. The purpose of this application is that only to trace the location of childrens,friends and family.For friends you want to know where they are and what they are doing so without calling them you can see where they are if your family is coming from out so you can also check where they have reach at what time they can be arrived you can guess that according to that you can do preparations. So as we can see this application helps a lot.In day to day life teenagers may be disguided than this application is used in protective manner also. This application may not completely guarantes to reduce all the crimes that are happening but it will definitely help to reduce them up to great extent. As we know that women are now equal to man.We can see are working at late at their job for their security purpose it is best application to use. • Location can be trace at anytime anywhere. • safety of childrens,family and friends. • Profile can be manage by adding or removing friends. • Without permission of user no one can track the location. • Reduce the crime report up to great extend. • Mostly useful for women and children when they are out at late night.

1.2 INTRODUCTION As increasing crime in our country day by day has given the stress to everyone specially parents as parents are always worried about their children if they are out. The need to ensure security of children this application can be used like teenage is the age of roaming going at parties and all and also in ganesh utsav festival childrens are out for whole night so the situation can give stress to parent’s that where are they , they are safe or not, is there is any problem these types of question can arrive in parent’s mind. So to overcome this application help to parent can see their current location.This application provide the current location of them. This system is also provide current location and as well as the previous locations of the contacts. 1.3 PROBLEM DEFINITION Battery low This is the main problem if the user has low battery the user will not give the permission to access the location track.As this is the big disadvantage. Net issue Net issue can give the problem to accessing the location tracking.If there is net issue user may has arrived at their location but in our map it shows the previous location where the user previously visited. Net should always be on:- Net is working properly but GP is off and gps should be compulsory on.

143 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Security issue Women and children in the society have become a very big concern for everyone so incases of net issues it create a problem. 1.4 PROPOSED METHODOLOGY In before application cannot trace the location of friends because of that there are possibility a friend can say lie to us.This application help us to overcome this problem by tracing the location of friend.Gui is not so good in older application but now because of new technologies the gui is also good than older applications.Easy to use compare to older application.After proper methodology the latest software is better than the previous software as they are not made by proper methodology. The software methodology that chosen to develop this system by incremental model.

Fig-1.1: Diagram of incremental model Incremental model is a process of software development. It involves breaking the system down into small components which are then implemented and delivered in sequence. It has many advantages like feedback from early increments can influence the later stages and possibility of changes in requirements is reduced. User get benefits earlier than with a conventional approach. In incremental plan steps typically should consist of 1% to 5% of total project. An increment should take one month or less and should never take more than three months. 1.5 RESULT AND DISCUSSION What if the users not able to operate/understand the application? In this case the user feels that the UI of the application is hard to operate(In this case help option is available in application). 1.6 CONCLUSION The main role of our project is to trace the location of friends.And also the one can trace the location of friend or family at anywhere anytime.But the internet is compulsory and gps in mobile should be on.if the user login for the first time he/she has to first register and if user has account he/she can directly access after all we can trace the current location of family,friends or childrens. 1.7 REFERENCE  https://1000projects.org/friend-finder-android-application.html

144 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

FIX MY ‘SHIP

Abuzarali Peerbhai and Shahdawala Student, K. C. College Mumbai, Maharashtra

I. ABSTRACT The project titled “Fix My ‘Ship” is designed using ReactJS as front end and NodeJS & MongoDB as back end which works in any browser with JavaScript support. The coding language used is JavaScript. This project is aimed at developing online forum for the people. This is a web-based tool. Any user can post issues and can reply for the other user issues. This is helpful for those who are going through something in their life. Facility to share the resources & post articles that can be viewed by registered user. Keywords: problems, anonymous discussion, safe space, fix relationships, everyday issues

II. INTRODUCTION As name indicates this is short form of “Repair My Relationship”. It is a website where users can post about their issues, and others can chime in with advice on how to fix their problems. If you have experienced the fine communities on sites like 4chan, Reddit or 9gag then you know that, there are plenty of people willing to donate a few minutes of time to help out. The next time you’re struggling with something, you can remember that you’re not alone. It helps you a lot to know that you’re not alone with anything in life. The worst part about struggling & being frustrated is feeling like you’re alone and no one understands. There’s no one that can help you. You’re stuck in a place with this problem no one can solve & no idea what to do. The start to having it be better begins with knowing that you’re not alone. Once you realize that you’re not alone with your problems you can seek help. There are places one could go where one could talk to people with problems exactly like theirs. You could talk to them about their problems and they could talk to you and you all can help each other. They say a problem shared with others is a problem halved. When you share your problem with someone and they share theirs with you, then both problems seem easier. This is where Fix My ‘Ship comes in, it will offer a portal for people to do exactly that and more. III. PROBLEM DEFINITION When They say a problem shared with others is a problem halved. When you share your problem with someone and they share theirs with you, then both problems seem easier. There are places one could go where one could talk to people with problems exactly like yours. You could talk to them about their problems and they could talk to you and you all can help each other. If you told someone everything you’re dealing with, there’s 1000+ other people who are dealing with similar things. If you all sat together and explained your problems, you will definitely come to a solution. It’s amazing when you look at the world from other’s point of view. When you don’t share your problem and think that this is a unique problem given to you, you will feel like only you’ve got this problem and you’re all alone with this problem. But when you hear other people share what they’re struggling with, it’s kind of all sounds the same. That helps you to recognize the same thing in yourself. This is where Fix My ‘Ship comes in, it will offer a portal for people to do exactly that and more. IV. PROPOSED METHODOLOGY A. OBJECTIVES - The A post/comment system similar to Reddit or Quora. - An upvote system for both posts & comments - An opportunity for the user to post what they actually tried with their significant other & what results ensued - A badges or karma system to reward frequently upvoted users and to verify their trustablitiy. - A user account system for those that want to reply or post an issue, similar to Reddit. - A premium feature where users can get into live sessions with certified therapists. B. REQUIREMENTS The requirements entailed by this application are enlisted below and are further categorized as follows: 145 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Functional Requirements - To provide an interface for the user to register and login. - To provide a platform for the users to anonymously discuss their issues. - To provide a platform for the users to help each other solve their issues. - To provide a platform for the users to see that they are not alone with the issues in the world. - To develop a community for people who want to get better with their issues. Non-Functional Requirements: - To ensure that there is complete anonymity for all users. - To make sure that the proposed application is user friendly. - To assure that their issues can be solved or eased by others. - To keep the system robust and definitive. C. TECHNOLOGY The survey of technology determines the technologies that will be considered to build this project and attain the complete desired application. The main purpose to build FIX MY ‘SHIP is to deliver an application to everyone to vent their troubles with ease and anonymity. A proper platform to discuss their troubles and get them solved by the community of people itself with complete privacy. Hence, to develop a relevant and suitable application the use of an appropriate technology is essential. Fix My ‘Ship is built on MERN stack which is a modern JavaScript stack that allows you to develop a scalable & robust application. It consists of MongoDB, ExpressJS, ReactJS, NodeJS where the database is MongoDB, backend is made out of ExpressJS & NodeJS and the UI is beautifully made from ReactJS. Why choose MERN stack? The main advantage for developers using the MERN stack is that every line of code is written in JavaScript. This is a programming language that’s used everywhere, both for client-side code and server-side code. With one language across multiple tiers, there’s no need for context switching. For tech stack with multiple programming languages, developers have to plan out how to interface them together. With the JavaScript stack, developers only need to be proficient in JavaScript and JSON. Overall, using the MERN stack enables developers to build highly efficient web applications. FRONT END React was originally created by a software engineer at Facebook, & was later open-sourced. It is supported by Facebook, as well as a community of development companies & individual developers. The React library can be used for creating pages rendered in HTML. React pages are declarative. This means that programmers do not have to think about managing the effects of changes in the page’s state (the object that determines how components behave) or changes in the data. Instead of relying on templates to automate the creation of repetitive HTML or DOM (Document Object Model) elements. React uses a full-featured programming language (JavaScript) to develop repetitive or conditional DOM elements. With React, the same code can run on both the server & the browser. React anchors the MERN stack. In a way, it’s the deciding feature of the stack. It’s the one component that differentiates MERN from MEAN, another popular JavaScript stack that uses AngularJS (a front-end web application framework) instead of the React library. BACK END Express is a web application framework for NodeJS, another MERN component. Instead of writing full web server code by hand on Node.js directly, developers use Express to simplify the task of writing server code.

146 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

There’s no need to repeat the same code again, as you would with the Node.js HTTP module. The Express framework is designed for building robust web applications & APIs. It’s known for its quick speed & minimalist structure, with many features available as plugins. D. METHODOLOGY ADOPTED

As you see in the Figure there are five main activities in FDD that are performed iteratively. The first step is the Develop An Overall Model, the initial result being a high-level object model and notes. In the beginning of a project your goal is to identify and understand the fundamentals of the domain that your system is addressing, and throughout the project you will develop this model out to reflect what you're building. The second step is Build A Features List, grouping them into similar sets and subject areas. The majority of the effort on a project built with FDD, roughly 75%, is comprised of the fourth and fifth steps: Design By Feature and Build By Feature. These two activities are exactly what you'd expect, they include tasks such as detailed modelling, programming, testing, and packaging of the system. V. CONCLUSION FIX MY ‘SHIP delivers an easy user interface with features to easily discuss issues with complete privacy. We understand how significant privacy is and Fix My ‘Ship offers complete anonymity for users to comfortably discuss their woes. This platform is applicable to anyone who wants to discuss their troubles and get a solution from the community itself. Technology has found its way into every place anyone can think of and this too is an example of it. This application allows and helps a new individual to help others and get his/her troubles solved as well. Fix My ‘Ship delivers a hassle-free portal for people to do exactly that and more. VI. REFERENCES [1] A composition of FDD from http://agilemodeling.com/essays/fdd.html [2] Stack Research done from https://www.suffescom.com/blog/lamp-vs-mern-introduction- and-web-stack- comparison/ [3] Research for topic done by surfing www.reddit.com [4] An article from https://www.webmd.com/depression/guide/what-is-depression helped in finalised this topic as there was no online portal to discuss such topics.

147 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

ANALYSIS OF APPLICATIONS OF BLOCKCHAIN: IN INDIAN CONTEXT

Santosh Bhashani and Geeta Brijwani* Department of Computer Science, K. C. College, Churchgate, Mumbai, Maharashtra

ABSTRACT A blockchain based solution to the problems of a low-trust country like India can save a lot of money, time and human resource. Using Blockchain the sectors of Education, Medicines and Law can benefit a lot. The proposal is to create Government regulated blockchains to manage data in a more better and secure way, easing out restrictions and increasing the trust between the people through secure algorithms and contracts.

I. INTRODUCTION Blockchain is a technology which was first characterised by Stuart Habert and W. Scott Stornetta in 1991 in their paper titled "How to time-stamp a digital document"[1] and was later in 2008 conceived first by a person/group called Satoshi Nakamoto in the research paper named “Bitcoin: A Peer-to-Peer Electronic Cash System”[2] focused on establishing a secure and trusted distributed p-to-p network without any third parties. This research is to analyse various ways in which blockchain can be used to solve major problems faced by a country such as India where there is low-trust which results in waste of money, time or human resource. This Research is focused on three major problems of three important sectors Education, Medicine and Law. II. PROBLEM DEFINITION I. Document authenticity verification In a diverse country like India the education sector is very complex and large with each state having its own School Boards/Universities and then a Central Board i.e. CBSE and then there are other International Boards such as ICSE and then hundreds of Universities, all this in a low-trust country results into a complete mess during admission especially the verification of documents which makes it very difficult, time consuming and stress full for students to take admission while shifting from one board/university to another board/university. Also there is a big problem of fake documents pertaining in the country. Here are some reports which show the depth of this problem- • Du-bring-forensic-test-for-admissions-this-year [3] • Engineering-for-rs-75000-law-certificate-for-rs-2-lakh-how-the-fake-degree-market-flourishes.l[4] II. Counterfeit Medicine A Country like India which is a hub for medical tourism and also a very big exporter of medicines to other countries there is a very big problem of counterfeit medicines harming the patients. Here are some reports which show the depth of this problem- • Fake drugs constitute 25% of domestic medicines market in India: ASSOCHAM[5] • Fake anti-cancer drugs made in bathroom found circulating in China and India.[6] III. Evidence Management In a country like India which ranks 78th on the global corruption list there is a big problem of changing of evidence by the police or anyone who can access the documents/physical evidence resulting in lack of trust between the people and for law in the country. III. PROPOSED SOLUTIONS Here are the proposed solutions of the above problems using Blockchain- I. Government regulated blockchain to solve the Educational document verification problem– A government regulated blockchain where every Board, university, school and college has to register and every year a transaction will be saved in the blockchain, if student remains in the school/college then old and new codes are supposed to be put same. The structure of the block is shown below-

Hash of previous block NAME OF THE STUDENT GRADE(CLASS EX 7TH )

148 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

TIME STAMP OLD SCHOOL/COLLEGE CODE OLD BOARD/COLLEGE CODE NEW SCHOOL/COLLEGE CODE NEW BOARD/UNIVERSITY CODE PERCENTAGE CERTIFICATION NUMBER

II. Government regulated blockchain having smart contracts to solve the Counterfeit medicine problem– A government regulated blockchain having smart contracts where every medicines registration number is the contract id where every Drug/medicine maker, seller, reseller, chemist will have to register on it – There will be two transactions one the generation of contract when the medicine is made and the other the completion of contract when the medicine is purchased. The structure of the suggested contract blocks is mentioned below –

CONTRACT GENERATION Hash of previous block Medicine registration number Time stamp manufacturing Company code Number of tablets/pieces

CONTRACT COMPLETION Hash of previous block Medicine registration number Time stamp manufacturing Company code Number of tablets/pieces Chemist id Buying time stamp

III. A GOVERNMENT REGULATED BLOCKCHAIN FOR EVIDENCE MANAGEMENT A digital fingerprint of each document/ picture of the evidence etc should be stored in the blockchain, every police station will register on it and soon as they find evidence they put the picture/audio/evidence in a database and its digital signature on the blockchain. Structure of the proposed block-

EVIDENCE Hash of previous block Database Location Time stamp

149 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

Evidence Digital fingerprint/hash Type of Evidence(ex Audio)

V. DISCUSSION and COMPARISON There are other methods being used/proposed for above problems, this is to compare and see why The Blockchain way is better- I. EDUCATIONAL DOCUMENT VERIFICATION AUTHENTICATION Comparison with NAD(National Academic Depository) – Security As compared to the proposed solution NAD is less secure as it is a centralised depository, so the problems faced like editing and etc can still happen in case of hacking while on the other hand in Blockchain it is next to impossible to edit a block without hacking every single of PC in the network. Scalability The NAD As less scalable since it is a centralised govt owned as compared to a govt regulated blockchain, multiple nations can share the blockchain making it more and more easier to study abroad. II. Counterfeit Medicine COMPARISON WITH TRADITIONAL METHOD There doesn’t exist any full-proof method till now for this problem, just raids by police on suspicion or complaint resulting in decrease of trust on medicines manufactured in India. III. Evidence management Comparison with TRADITIONAL METHOD Most of the evidence stored is either in physical (Written) or in centralised digital repositories, which makes it easier to change and edit the evidence, that is the reason the above proposed solution will make it more secure and increase the trust of people on LAW. VI. CONCLUSION I have analysed and am proposing the solution to these three problems which can make a drastic change in a low- trust country like India also increasing the easiness and trust of people on the government, and saving a lot of money, time and human resource. All the above mentioned proposed solutions can easily be applied using the resources available in present. VII. REFERENCES [1] S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991. [2] Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008. [3] https://www.indiatoday.in/education-today/news/story/du-bring-forensic-test-for-admissions-this-year- 1537222-2019-05-29 [4] https://www.news18.com/news/india/engineering-for-rs-75000-law-certificate-for-rs-2-lakh-how-the-fake- degree-market-flourishes-2289559.html [5] https://www.downtoearth.org.in/news/fake-drugs-constitute-25-of-domestic-medicines-market-in-india- assocham-45393 [6] http://www.globaltimes.cn/content/1161966.shtml

150 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

MEDIFY (MEDICINE REMINDER + NOTIFICATION)

Niki Choksi and Taiba Habshi Student, K. C. College, Mumbai, Maharashtra

ABSTRACT The idea of digital world where different types of sensors and local processing connected to share information is used in many industries nowadays. There are various products which are developed based on these ideas. Healthcare industry is one where lot of improvements is taking place. Medicines play important role for prevention and cure for most of the diseases. Many Harmful and risky diseases can be cured through proper medication. The proposed system consists of an IoT enabled medication reminder system and it gives timely alerts for the patients about their medication time. It alerts the patient to take medicines at proper time by providing audio-visual alert. The system helps to monitor whether patient has taken the medicine and its healthcare data. 1. Smart Medicine Pill Reminder Project is an IOT based Electronics mini project. The main aim of developing this Kit is to remind medicines just like an alarm. 2. We have an LCD also to display that, the main intention before developing this project is to usually remind the medicines which have to be taken in the daily schedule and it is especially useful for old age people, patients, and busy people. 3. This Arduino based project can send notification using email or via message. 4. An emergency sensor is used to help the patient in case of a panic situation. 5. In this Smart Alarm Ringing Project, RTC DS3231 is interfaced through I2C protocol with Arduino Uno. RTC DS3231 also has inbuilt 32k memory which can be used to store additional data. Keypoints: Internet of Things, Arduino Module, Medical Reminder System

I. INTRODUCTION The project Medify is a hardware project. The major hardware component used is Arduino UNO and some sensors. The technology which we have adopted in our project is Arduino microcontroller. The language which will be used for coding is C language. The major concern for adoption of technology is what is Arduino? Arduino is an open source computer hardware and software company, project, and user community that designs and manufactures single-board microcontrollers and microcontroller kits for building digital devices and objects that can interact and sense and control objects in the physical world. It is used to set an alarm for multiple medicines and timings including date and time. A notification is sent to the users through email or message inside the system. There are different category of patients involving human beings-teachers, students, businessmen, housewives, children and all of us have a busy hectic schedule. Today’s life is full of responsibilities and stress. It is our duty to make ourselves stay fit and healthy. If the patient is at home, then he may get someone to look after him/her but when one is not at home, is out of the city or state then it becomes very difficult for the family members to call them and remind them their dosage timings every time. BACKGROUND 0 RTC module is powered through the 3.3V pin of Arduino UNO. A 16*2 LCD display is interfaced using SPI. A buzzer is used to alert and remind that it’s time to take medicine. Four push buttons are used where each has a different feature. Four buttons are used. The first push button is used for reminding to take medicine once per day. The second push button is used to remind twice per day and the third push button is used to remind thrice per day. The fourth push button is used to stop the buzzer when user has heard the alert. The components required are 1. Arduino Uno 2. RTC DS3231 module 3. 16x2 LCD Display 4. Buzzer

151 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

5. LED (any color) 6. Breadboard 7. Push Buttons 8. 10K Potentiometer 9. 10K,1K Resistors 10. Jumper Wires 11. Sensors OBJECTIVES The major objective of this Project is to make an attempt to remind and make aware our loved ones to take their medicines on time. At hospitals there are many patients and it is difficult to remind every patient to take medicine on time. The aim of this project is to enhance the use of technology and to make human work easier using advance technology. there are many ways to remind. Some of them are listed below: 1. Show it on a display 2. Send notification on email or phone 3. Buzz alarm 4. Get a call 5. Remind for next medicine time while reminding current time. The application of Smart Medicine Reminder is very wide and can be used by patients at home and at many other places. The Smart Alarm is powered using 5V supply. When it first boots up, it shows a welcome message as "Welcome". The LCD screen is set to cycle in three screens. The 1st screen shows message as “Stay Healthy, Get Well Soon”. The second screen is a help screen which tells to press select push button to select any one time-slot to remind (once/twice/thrice in a day). The time slot is changeable in program and can be configured accordingly. Right now, we have fixed this into three durations i.e. 8am, 2pm, and 8pm. II. PROBLEM STATEMENT The simple medicine reminder using Arduino reminds to take medicines one or two or three times a day. The time slot can be detected using push buttons then also, it shows current date and time. The major problem statement is that in the existing systems there are reminder, but our project will show it on a display. It will also make human task easier. The major functionalities of the system are The IoT enabled system will generate an alert so that the patient can take required medicine at proper time. There is one confirmation key provided in the system, by pressing that key caretaker of the patient will came to know that the medicine has taken, otherwise SMS to the caretaker of the patient will be send. III. SOFTWARE INTERFACES Arduino Software (IDE) Arduino Software has text editor for writing code and the programs, called as sketches. Once the sketch is written that can be uploaded to the Arduino board. The Arduino IDE software will display a message if the upload is successful or it will display an error. IV. PROPOSED SYSTEM The Medicine reminder system consist of pill box provided with a set of compartments. It is designed in such a way that normal people can use it easily for their medication. The control system of pill box consists of LEDs for giving the visual alerts to the patient for medicine. There is buzzer in the system which alerts the patient in audio form. It will buzz for particular time, within that time only the person has to press the key by taking the medicine, otherwise the alert will be given in the form of SMS to the caretaker of the patient by GSM that patient has not taken the medicine at the time prescribed by the doctor. The buzzer and LEDs are giving the alerts at the proper time set by the caretaker. The additional part which we are adding in our project is the LCD display and adoption of technology for communication through Arduino. The use of sensors which helps to monitor health takes our project to help meet our sustainable goals. 152 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

V. EXISTING SYSTEM The term Existing System refers to a system which is already present or in simpler terms a system which is predefined. Whenever a new hardware or software is built there is an existing system which reminds us of the things which are already present. In order to enhance it we add some new features which makes it more advance. Adding these new features and modules not only enhances the quality and technology but gives a new phase to the existing system. In our Medify project which is a pure hardware-based project. The existing system can be classified as: 1. The existing system did not contain an LCD display 2. The existing system had no new technology such as sending notifications through phone 3. There was no feature such as availability to call a doctor in case of emergency through Arduino 4. A buzzer which will buzz in case of emergency 5. Time to time reminder for taking medicines 6. Reminder for next medicine time while reminding current time. VI. RESULT The purpose of this project is to make a small attempt to remind the patients to take their medicines on time and will also help them to stay fit and healthy. With the rapid increase in the usage of smart phones this advance technology will help to enhance the quality of life. As the use of Internet of Things is in a great rise the usage of its smart components is an upcoming future. With the development of such projects there is a chance of addition of some new features in future scope. This can make the future more dynamic and richer. While, describing the purpose of this project it is an approach to the use of smart technology which can change the phase of next generation in a great way. Basically, this project is done to help patients to follow their medication properly and increase their quality of life by falling ill rarely. VI. CONCLUSION This system prevents wrong dosage of the patient and also safe to the patient. It will reduce the effort of patient as well as the caretaker of the patient in remembering medicine and patient will get alert of medication along with medicine name at appropriate time. VII. BIBLIOGRAPHY 1. M.C. Sokol, K.A. McQuigan, R.R. Verbrugge, and RS. Epstein. "Impact of medication adherence on hospitalization risk and healthcare cost" 2. "American Heart Association, Statistics You need To Know," http://www.americanheart.org/presenter 3. We browsed the detail study of Arduino system through https://www.arduino.cc/en/guide/introduction

153 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

REVIEW OF SECURITY FEATURE IN BLOCKCHAINING

Raghav Thakur Student, Computer Science, Vivekanand College

1. ABSTRACT Distributed Ledger Technology (DLT) is said to have a huge impact on the financial industry in upcoming years. And Blockchain is considered one of the most disruptive technology of this era. Blockchain is a decentralized transaction and data management technology developed first for Bitcoin Cryptocurrency. The interest in Blockchain Technology has been increasing since the idea of Blockchain Technology was coined in 2008 [1]. The main reasons for the interest is all because of its central attributes that provides Security, Anonymity, and Data Integrity without any third party organization in control for transaction .In this paper our main aim is to trace the security of the Blockchain technology. Also study the different domain on which Blockchain Technology is implemented i.e. in the banking sector, smart contracts, agriculture, etc. I have done a systematic mapping study with the goal of collecting all relevant research on Blockchain Technology and survey on blockchain. The main objective of this study is to trace the development and deployment of the technology used in Transaction management and its security. Keywords: Blockchain, Decentralize, Financial, Distributed Ledger Technology, Security.

2. INTRODUCTION Over the last 50 years, information technology has been fundamental to the transformation of the financial services industry. The technology likely to have the greatest impact on the next few decades has arrived and it’s not social media, not a robotics it’s not even AI buts it’s an underlying technology of digital cryptocurrency Bitcoin is called the Blockchain [2]. It is now the next generation of the internet. In the past few decades we have the internet of information. By allowing digital information to be distributed but not copied, Blockchain technology created the backbone of the new type of internet. Since the 1960s, banks have been using information technology to replace physical recordings with digital data. “The Blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value.” – Don & Alex TapScott, authors Blockchain Revolution (2016) [3] . Nowadays, there are many technologies which drives the financial services development. And the one which has attracted lots of attention is Distributed Ledger Technology (DLT) also known as Blockchain. The principal theories of DLT were first outlined in the whitepaper of the cryptocurrency Bitcoin written under the pseudonym Satoshi Nakomoto in October 2008.At first, Bitcoin and the Blockchain technology were often used as synonyms. But that’s not what it is, actually Bitcoin is and the first use case of Blockchain Technology. It has been considered as part of the fourth industrial revolution since the invention of steam engine, electricity, and information technology (Chung and Kim 2016; Schwab 2017) [4]. It has the potential to transform the current Internet from “The Internet of Information Sharing” to “The Internet of Value Exchange.” Blockchain technology is expected to revolutionize the operating modes of commerce, industry, and education, as well as to promote the rapid development of knowledge-based economy on a global scale. Blockchain technology has become a hot topic for more and more countries, institutions, enterprises, and researchers. A World Economic Forum report estimates that 10% of global GDP will be stored on blockchain technology by year 2027 [5]. Many cities around the world have reported blockchain related initiatives, such as those in Australia, China, Denmark, United Arab Emirates, Estonia, Georgia, Ghana, Honduras, Malta, Russia, Sweden, Singapore, Spain, Switzerland, United Kingdom, Ukraine, United States (US) [6]–[7]. Even India is also started its initiatives on blockchain based system. Further we will discuss, what the blockchain technology is, and what its properties that make it so unique. 3. LITERATURE SURVEY Distributed Ledger Technology has attracted a lot of attention in the financial services industry in the past years. There exists a vast amount of articles that shows the potential to disrupt the established financial system to DLT. Possible applications range from distributed exchanges over alternative venture capital financing to new payment and clearing & settlement systems. (Brennan & Lunn, 2016; Citi GPS, 2016; Euro Banking Association, 2015; Micheler & von der Heyde, 2016; Morini, 2016; Peters & Panayi, 2015; World Economic Forum, 2016; Zhen et al., 2016). Blockchain, mostly known as the underline technology runs the Bitcoin 154 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 cryptocurrency, is a public ledger system maintaining the integrity of transaction data [8]. Blockchain technology was first used when bitcoin cryptocurrency was introduced. Till now, Bitcoin is the most commonly used application using Blockchain technology. Blockchain not only disrupt the financial sector but also sector like agriculture, electricity and many more. The main feature of the Bitcoin is to maintain the value of currency without any organization and governmental administration in control. Blockchain technology uses asymmetric cryptography which uses a key pair [9]. Every transaction that is executed on the blockchain is digitally signed by the sender using their private key. This signature ensures that only the authorized holder of the account can move money out of the account. This type of design makes the network withstand as it does not have any single point of vulnerability and immutable. Blockchain is considered as the disrupter of the existing technology such as financial, supply chain management, agriculture, government, voting, education, etc. Banking system is the backbone of the economy and Information Technology (IT) in turn has become the backbone of banking activities. Technology, which was playing a supportive role in banking, has come to the forefront with the ever-increasing challenges and requirements. Banking system is a centralized system where the government or organization controls or runs the system. The data are recorded and stored in a centralized database. If someone wants to know the history of the past transaction, then that person should contact or request to its bank. As it is centralized it is prone to be hacked. Transferring huge amounts of money from one person to another will cause a lot of paperwork or time consuming even if you buy a home there are lots of intermediaries which comes into the picture such as banks, insurance companies, clearing and settlement. The whole process will take up to a week or even more. These are some of the major problems in the current system and need to be solved. 4. COMPARATIVE APPROACH OF THE STUDIES 1.What is the Blockchain?

The blockchain is a distributed peer-to-peer network of computer nodes that maintain the distributed transactional database, secured by cryptography and governed by a consensus mechanism. For the first time in human history people from everywhere can trust each other and can transact peer-to-peer and without third party intervention. A Blockchain is essentially a record of digital events. A Blochchain not only stores, manage money but also music and everything of value and that is all without the powerful intermediaries. These records in a distributed database is immutable. In order to understand the concept of Blockchain we need to divide the “Blockchain” word in “Block” and “Chain”. A Block consists of 3 things that are Data, Hash and Hash of previous block.

155 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

 Hash: In a block hash is used to identify the block. It acts as a fingerprint of the block.  Data: Data of the transaction i.e. Sender data, Receiver data and amount that has been transacted.  Hash of previous block: This is the main functionality of blockchain system, it consists of hash of the previous block. Due to this functionality it creates a chain in system. 2. The Working of the Traditional Banks System 1. A person has an account and account number at a bank. 2. So have a way of proving that they control that account number—for example, a PIN code of an ATM. 3. The bank, in turn, has a data record of how much money is attributable to that account number, thereby keeping score of the person’s money on a private internal database or ledger. 4. The person can then use an electronic communications system to identify themselves to their bank as the authentic account holder, and can request for the money associated with their account number be transferred to someone else’s account at a different bank. 5. This then led the bank to edit their ledger of accounts—changing the person’s score and to tell the recipient’s bank to do the same. The process is a little more complex than this, but in effect the money moves via a series of private databases being edited. The normal bank payments system thus works by a limited set of private intermediaries editing private databases that they control, and then informing the account holders that the transactions have occurred (e.g. “Your new balance, recorded in our data centers, is Rs1,240”). I found that 78.30% of the people think that the current banking system is not so secure enough.

In the past few years, there is a huge loss in banking sector. As the banking system is centralized one, What if the whole system got hacked? What if the whole system gets failed? What if the system gets corrupted? Then there would be a great loss. A large number of public-sector banks, 14 out of 19, posted consecutive losses in 2018-19 although their pre-provisioning operating profits (PPOP) were reasonably strong. The losses resulted from heavy provisioning requirements for stressed assets and eroded the bottom-line. The 14 public-sector lenders, which included five banks, still within the prompt corrective action framework, posted an aggregate loss of Rs 74,277.77 crore for FY19 against Rs 65,723.52 crore in FY18, based on figures available on the CapitaLine Database. This loss was in spite of the state-run entities posting a positive aggregate PPOP of Rs 63,645.05 crore for FY19 and Rs 62,371.47 crore for FY18 [10]. These are major challenges that need to be fixed by the current system. And this is going to be done by introducing decentralize DLT system instead of centralized system. Blockchain is one of the decentralize DLT systems which will disrupt the financial system in the future. Therefore the most of the banks started to implement their system on blockchain technology. 1. Blockchain based Bitcoin Transaction System: The Bitcoin system is just like the normal banking payment system is used to move or do transaction of Bitcoins between the people. There are two main differences in bitcoin system. First, the database that is used to record the transaction history is publicly available rather than privately held account database in banking system. Second, the one who makes changes in database are decentralized network of people and people are called “miners”, rather than banks running their own private system. 156 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

When a transaction is conducted, is posted on millions of millions computers in the world. There are groups of people called miners, they have massive computing power and they do a lot of work. The transaction information is encrypted in a block. In every 10 minutes, it’s like a heartbeat of a network a new block is created that has all the transaction in the past 10 minutes. Now, the miners have to do the tough work by solving the highest level of algorithm. They compete with each other and the one who solves or find out the truth or validate the block is rewarded with some amount of bitcoin in case of bitcoin blockchain transaction. And finally, that block is linked with the previous block and that block is with its previous block and forms a chain of block. In this, timestamp plays a key role with each block. 2. Features of the blockchain technology There are four main features of the blockchain technology. They include decentralization, traceability, immutability, and currency properties. Decentralization refers to the processes of data verification, storage, maintenance, and transmission on blockchain which are based on a distributed system structure. In this structure, the trust between distributed nodes is built through mathematical methods which provides a better transparency rather than the centralized organizations. Traceability means that all transactions on blockchain are arranged in chronological order, and a block is connected with two adjacent blocks by a cryptographic hash function. Therefore, every transaction is trackable by examining the block information linked by hash keys. One can anytime check the past transaction history but cannot tamper with that block.

157 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

There are two reasons that blockchain technology is immutable. On the one hand, all transactions are stored in blocks with one hash key linking from the previous block and one hash key pointing to the next block. Tampering with any transaction would result in different hash values and would thus be detected by all the other nodes running precisely the same validation algorithm. On the other hand, blockchain is a shareable public ledger stored on thousands of node, and all ledgers continue to sync in real time timestamp. Successful tampering would need to change over 51% of the ledgers stored in the network (Tschorsch and Scheuermann 2016). The nature of blockchain is peer-to-peer transaction, no third party involved which means all transactions will be done without the intervention of third parties. There is a fixed number of digital cryptocurrency in case of bitcoin currency based on blockchain technology. The maximum and the total number of bitcoins that can ever exist is 21 million. Out of which only 3.7 million bitcoins left to be mined. There is no exact answer but about 3-4 million bitcoins are lost forever. On an average estimation 144 blocks are mined per day, and there are 12.5 bitcoins per block. 144 x 12.5 = 1800, so that the average amount of new bitcoins mined per day. 5. SECURITY CONCERN IN BLOCKCHAIN BASED BITCOIN CRYPTOCURRENCY: i.Transparency One of the most interesting and misunderstood concepts in blockchain technology is “transparency.” a person’s identity is hidden via complex cryptography and represented only by their public address. So, if you were to look up a person’s transaction history, you will not see “Bob sent 1 BTC” instead you will see “1MF1bhsFLkBzzz9vpFYEmvwT2TbyCt7NZJ sent 1 BTC”. ii. Hashing Hashing is used to create a digital identity of a block. So there should be highest level of algorithm and cryptography should be used to produce a hash. In bitcoin blockchain it uses SHA1, SHA2, SHA256, out of which SHA256 is the best one. SHA256 is used to produce the fixed length of output of a given input. Every hash of a block is different and tempering with the cause change in the hash. iii. Double spending In a Bitcoin type of crypto currency payment network, a malicious party may attempt to pay the same units of crypto currency simultaneously to two different parties. This is called a double-spending attack. In general, the network needs to make sure that once one of those transactions is accepted, the other one will be rejected in order to prevent double spending. Double spending is of the major challenges for the cryptographer. This problem is solved using blockchain technology which prevents double spending. The transaction in bitcoin blockchain is consistent which means one cannot reverse it iv. 51% attack An attacker could compromise the blockchain by trying to obtain overwhelming resources. In the case of proof- of-work, owning 51% of the computing power would control more than half of the block validator opportunity and also significantly improve the success possibility of other attacks such as double spending. A sufficiently large network deters the 51% attack by the enormous amount of resources required to launch it. v. Consensus Protocol Bitcoin blockchain is a decentralized system, thus it does not require authorization from trusted third party. However, there should be some consensus between the nodes of the blockchain network. To add a new block in a blockchain, every miner must follow a set of rules specified in the consensus protocol. In the case of bitcoin the consensus is achieved by using Proof Of Work (PoW). This consensus concerns with the participants require no authentication to join the network also concerns with the computational resource wastage, which make bitcoin model scalable In terms of supporting thousands of network nodes. There are various other types of consensus which are used on different blockchain platform are Proof Of Stake (PoS), Proof Of Authority (PoA), Proof of Elapsed Time (PoET), Practical Byzantine Fault Tolerance(PBFT) , Federated Byzantine Fault Tolerance(FBFT) , Proof of Storage. c) Ethereum : An Emerging Blockchain based Application In November 2013: Vitalik Buterin publishes the Etherum in white paper. Wipro, Infosys, Microsoft and IBM all offer blockchain based solutions for a wide variety of purposes. Ethereum is a publicly deployed blockchain based platform that support smart contracts. Ethereum is maintained by a Swiss non-profit organization known as Ethereum foundation. Etereum can hold cryptocurrency, auctions, secure applications with a constitution enforced by the blockchain,that cannot be violated. Ethereum is a global, decentralized platform for money and new kinds of applications. On Ethereum you can write a code that controls money, and build applications accessible anywhere in the world. 158 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019 ci) Industries Disrupted By Blockchain Technology: i. Ending the Remittance rip-off: Sending money to the family from one country to another country could takes weeks to reach and huge amount of interest through international bank. But assume it with blockchain application person A sends $300 to person B through mobile device without going through intermediaries person B checks his wallet with added money. This whole process took just a few minutes with cost of 2%. In order to make this work, there needs to be a liquid market for both dollars-to-bitcoins, and bitcoins-to-pesos. An example in Kenya is BitPesa. ii. A Decentralized Blockchain help secure data privacy: A person’s data often stored in various databases and some of these data changes over time and therefore it’s not the same across the databases. The results is that multiple “digital clones” of an individual exists across different databases. In case of Blockchain, it stored data in decentralize, trusted and immutable manner. It ensures that user’s single identity is stored in a secure and incorruptible manner. And this single digital identity can always be up-to-date with the latest user information. IBM and SecureKey Technologies are also launching blockchain based digital identity network for customers. iii. Ensuring the compensation for the creators of value: In case of music, suppose a person write a hit song and got millions of views but he didn’t get the fair compensation. Imogen Heap a song writer puts her song on the blockchain based application called mycelium. In this music is surrounded with smart contract like an intellectual properties. From there you can put that music in movies and do many more things with it. iv. Agriculture with Blockchain: Most of the time if you own a land it’s not get recorded in the government database .If you don’t have a valid paper to your land you can’t get finances for all the inputs that the farmers want. With the help of blockchain and fractional ownership douzen of farmer together brought one tractor. This could reduce some amount of factors that causes farmers life. v. Blockchain in Education: Blockchain technology contributes to reducing degree fraud. In the past, there were numerous cases of degree fraud. However, it can be avoided by employing blockchain in granting and managing student’s degree now. The data matched with users ID and stored in blockchain are checked, validated, and maintained by the miners from all over the world. Blockchain distributed ledger is immutable and trustworthy. Thus, the reliability and authority are both ensured, which will significantly reduce degree fraud. 8. CONCLUSION Blockchain technology creates a new market place which will disrupt the current market and established a trust and provide the security between the people around the world. It has a vast scope in future due to its incredible features. Blockchain is essentially a distributed ledger technology, which uses cryptography techniques and distributed consensus algorithms to create the features of decentralization, traceability, immutability, and currency properties. In every sector Blockchain playing its role from money to music everything is getting on the blockchain. Blockchain based Bitcoin cryptocurrency becomes the financial center of attraction and it has the potential to take over the current system. Eliminating the intermediaries is the core part of the blockchain technology. In 21st Century security, privacy, trust can be implemented by blockchain technology. Security refers to the protection of valuable properties and important information. Even nowadays some people have their properties but they don’t have their proof of ownership. This may lead to intellectual disputes or it may lead to conflicts with others. Blockchain technology is used to check the record in database to prove the ownership properties. As for trust, blockchain technology can transform people’s ways of constructing trust from building it by the third-party institution to building it by technology. On comparing the traditional banking system transaction and the blockchain based bitcoin transaction system it seems that traditional banking system are doing pretty much good work but could not provide the security as much as the blockchain system does. As the blockchain eliminates part of middleman or the intermediaries will give rise to the small man to come up and gain the actual profit of their work. Although blockchain technology is in growing phase there are lots of areas which will need blockchain technology. V. REFERENCES [1] https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0163477

159 International Journal of Advance and Innovative Research ISSN 2394 - 7780 Volume 6, Issue 3 (V): July - September, 2019

[2] https://www.ted.com/talks/don_tapscott_how_the_blockchain_is_changing_money_and_busin ess?language=en [3] https://intellipaat.com/blog/tutorial/blockchain-tutorial/what-is-blockchain/ [4] https://www.researchgate.net/publication/306140901_The_Internet_Information_and_Techno l ogy_Research_Directions_based_on_the_Fourth_Industrial_Revolution [5] World Economic Forum, ‘‘Deep shift technology tipping points and societal impact—Global agenda council on the future of software & society—FUTURIUM—European Commission,’’ Tech. Rep., 2015. [Online]. Available: https://ec.europa.eu/futurium/en/innovation4eu/ library [6] M. Jun, ‘‘Blockchain government—A next form of infrastructure for the twenty-first century,’’ J. Open Innov., Technol., Market, Complex., vol. 4, no. 1, p. 7, Dec. 2018. [Online]. Available: http://link.springer.com/article/10.1186/s40852-018-0086-3 [7] H. Hou, ‘‘The application of blockchain technology in e-government in China,’’ in Proc. 26th Int. Conf. Comput. Commun. Netw. (ICCCN), Jul./Aug. 2017, pp. 1–4. [8] Swan M. Blockchain: Blueprint for a New Economy. “ O’Reilly Media, Inc.”; 2015 [9] The National Institute of Standards and Technology (NIST), Federal InformationProcessing Standards (FIPS) Publication 186-4, Digital Signature Standard, July2013. https://doi.org/10.6028/NIST.FIPS.186-4 [10] https://www.financialexpress.com/industry/banking-finance/provisioning-pressure-14-psbs-post-los ses- for-2-consecutive-years/1599129/ [11] S. King and S. Nadal, “Ppcoin: peer-to-peer crypto-currency with proof-of-stake,” Available: http:// peercoin.net/ assets/ paper/ peercoin-paper.pdf, Tech. Rep., Aug. 2012. [12] M. Castro and B. Liskov, “Practical byzantine fault tolerance and proactive recovery,” ACM Trans. Comput. Syst., vol. 20, no. 4, Nov. 2002. [13] A. Miller, A. Juels, E. Shi, B. Parno, and J. Katz, “Permacoin: Repur-posing bitcoin work for data preservation,” in 2014 IEEE Symposium on Security and Privacy, May 2014, pp. 475–490. [14] B. Sengupta, S. Bag, S. Ruj, and K. Sakurai, “Retricoin: Bitcoin based on compact proofs ofth retrievability,” in Proceedings of the 17 International Conference on Distributed Computing and Networking, ser. ICDCN ’16. ACM, 2016, pp. 14:1–14:10.  https://enterprisersproject.com/sites/default/files/the_truth_about_blockchain.pdf  https://www.worldscientific.com/doi/pdf/10.1142/S242486221850015X  https://pdfs.semanticscholar.org/ee1e/fd77e8b6287438d312b244177bb143f7a072.pdf

160

MANUSCRIPT SUBMISSION

GUIDELINES FOR CONTRIBUTORS 1. Manuscripts should be submitted preferably through email and the research article / paper should preferably not exceed 8 – 10 pages in all. 2. Book review must contain the name of the author and the book reviewed, the place of publication and publisher, date of publication, number of pages and price. 3. Manuscripts should be typed in 12 font-size, Times New Roman, single spaced with 1” margin on a standard A4 size paper. Manuscripts should be organized in the following order: title, name(s) of author(s) and his/her (their) complete affiliation(s) including zip code(s), Abstract (not exceeding 350 words), Introduction, Main body of paper, Conclusion and References. 4. The title of the paper should be in capital letters, bold, size 16” and centered at the top of the first page. The author(s) and affiliations(s) should be centered, bold, size 14” and single-spaced, beginning from the second line below the title. First Author Name1, Second Author Name2, Third Author Name3 1Author Designation, Department, Organization, City, email id 2Author Designation, Department, Organization, City, email id 3Author Designation, Department, Organization, City, email id 5. The abstract should summarize the context, content and conclusions of the paper in less than 350 words in 12 points italic Times New Roman. The abstract should have about five key words in alphabetical order separated by comma of 12 points italic Times New Roman. 6. Figures and tables should be centered, separately numbered, self explained. Please note that table titles must be above the table and sources of data should be mentioned below the table. The authors should ensure that tables and figures are referred to from the main text.

EXAMPLES OF REFERENCES All references must be arranged first alphabetically and then it may be further sorted chronologically also.  Single author journal article: Fox, S. (1984). Empowerment as a catalyst for change: an example for the food industry. Supply Chain Management, 2(3), 29–33. Bateson, C. D.,(2006), ‘Doing Business after the Fall: The Virtue of Moral Hypocrisy’, Journal of Business Ethics, 66: 321 – 335  Multiple author journal article: Khan, M. R., Islam, A. F. M. M., & Das, D. (1886). A Factor Analytic Study on the Validity of a Union Commitment Scale. Journal of Applied Psychology, 12(1), 129-136. Liu, W.B, Wongcha A, & Peng, K.C. (2012), “Adopting Super-Efficiency And Tobit Model On Analyzing the Efficiency of Teacher’s Colleges In Thailand”, International Journal on New Trends In Education and Their Implications, Vol.3.3, 108 – 114.

 Text Book: Simchi-Levi, D., Kaminsky, P., & Simchi-Levi, E. (2007). Designing and Managing the Supply Chain: Concepts, Strategies and Case Studies (3rd ed.). New York: McGraw-Hill. S. Neelamegham," Marketing in India, Cases and Reading, Vikas Publishing House Pvt. Ltd, III Edition, 2000.  Edited book having one editor: Raine, A. (Ed.). (2006). Crime and schizophrenia: Causes and cures. New York: Nova Science.  Edited book having more than one editor: Greenspan, E. L., & Rosenberg, M. (Eds.). (2009). Martin’s annual criminal code:Student edition 2010. Aurora, ON: Canada Law Book.

 Chapter in edited book having one editor: Bessley, M., & Wilson, P. (1984). Public policy and small firms in Britain. In Levicki, C. (Ed.), Small Business Theory and Policy (pp. 111–126). London: Croom Helm.

 Chapter in edited book having more than one editor: Young, M. E., & Wasserman, E. A. (2005). Theories of learning. In K. Lamberts, & R. L. Goldstone (Eds.), Handbook of cognition (pp. 161-182). Thousand Oaks, CA: Sage.

 Electronic sources should include the URL of the website at which they may be found, as shown: Sillick, T. J., & Schutte, N. S. (2006). Emotional intelligence and self-esteem mediate between perceived early parental love and adult happiness. E-Journal of Applied Psychology, 2(2), 38- 48. Retrieved from http://ojs.lib.swin.edu.au/index.php/ejap

 Unpublished dissertation/ paper: Uddin, K. (2000). A Study of Corporate Governance in a Developing Country: A Case of Bangladesh (Unpublished Dissertation). Lingnan University, Hong Kong.

 Article in newspaper: Yunus, M. (2005, March 23). Micro Credit and Poverty Alleviation in Bangladesh. The Bangladesh Observer, p. 9.

 Article in magazine: Holloway, M. (2005, August 6). When extinct isn't. Scientific American, 293, 22-23.

 Website of any institution: Central Bank of India (2005). Income Recognition Norms Definition of NPA. Retrieved August 10, 2005, from http://www.centralbankofindia.co.in/ home/index1.htm, viewed on

7. The submission implies that the work has not been published earlier elsewhere and is not under consideration to be published anywhere else if selected for publication in the journal of Indian Academicians and Researchers Association.

8. Decision of the Editorial Board regarding selection/rejection of the articles will be final.