Category: Computer Science and Engineering

Mobile Air Quality Monitoring System | ijirt.org

Mobile Air Quality Monitoring System | ijirt.org

Mobile Air Quality Monitoring System is a moving system to monitor air quality in different areas wherever you go, or the area you want to monitor. You just have to put your sensing system at some place in that area or fix it to a surveillance vehicle. This system is able to detect quantity of CO, NH3, SO2, temperature and humidity. This data is displayed on the laptop for the convenience of pollution control authorities.

Indian Researchers solving identifying dishonest vehicles | ijirt.org

Indian Researchers solving identifying dishonest vehicles | ijirt.org

Vehicular ad-hoc network (VANET) provides a unique platform for vehicles to intelligently exchange critical information, such as collision avoidance messages. It is, therefore, paramount that this information remains reliable and authentic, i.e., originated from a legitimate and trusted vehicle. Trust establishment among vehicles can ensure security of a VANET by identifying dishonest vehicles and revoking messages with malicious content. For this purpose, several trust models (TMs) have been proposed but, currently, there is no effective way to compare how they would behave in practice under adversary conditions. To this end, we propose a novel trust evaluation and management (TEAM). The framework created has been tested with the implementation of three types of TMs (data oriented, entity oriented, and hybrid) under four different contexts of VANET based on the mobility of both honest and malicious vehicles. Results indicate that the TEAM is effective to simulate a wide range of TMs, where the efficiency is evaluated against different quality of service and security-related criteria. Such framework may be instrumental for planning smart cities and for car manufacturers.

IOT Based Home Automation System | ijirt.org

IOT Based Home Automation System | ijirt.org

In today’s technologically advancing era, everyone is busy doing their work, no one likes to waste time going to the switchboards turning various tool on or off. Automation is the ability to program and plan a list of events for the tools on the network. With the increase in the usage of power and the human population, there is a vital need to conserve electricity in every possible way. Home automation Structure makes the operations of various home tool more convenient and saves energy. It involves the automatic commandling of all electrical tools at home or remotely by wireless communication. According to surveys by the consumer company The Shelton Group, Americans are willing to pay more than the actual bill to make their home more energy efficient. Keeping in mind all the above problems, we have created such a Structure using Microcommandler, Relay modules, and Bluetooth module through which we can command our homes’ lights, fans, and other equipment. The microcommandler (Arduino) is fixed to a Bluetooth module which helps the smartphone to send and receive data to the microcommandler. The main objective of this project is to automate the maximum home tool to a Bluetooth tool which can be commandled by an Android Application.

Automatic Blood Cell Counting using Morphological Image Processing operations| ijirt.org

Automatic Blood Cell Counting using Morphological Image Processing operations| ijirt.org

The estimation of RBC plays a crucial role in medical diagnosis and pathological study. The main objective of this system is to detect and estimate the number of red blood cells present in the blood smear sample image. The process is initiated by image acquisition and image enhancement process. Morphological operations are applied on the blood image followed by RBC counting and WBC counting. The primary goal of the proposed system is to detect and count all the blood cells and then count RBC including the overlapping ones in the blood smear image.

Network Security attacks on ad hoc wireless networks | ijirt.org

Network Security attacks on ad hoc wireless networks | ijirt.org

Attacks on ad hoc wireless networks can be classified into two broad categories, namely, passive and active attacks. A passive attack does not disrupt the operation of the network; the adversary snoops the data exchanged in the network without altering it. Here, the requirement of confidentiality can be violated if an adversary is also able to interpret the data gathered through snooping. Detection of passive attacks is very difficult since the operation of the network itself does not get affected. One way of overcoming such problems is to use powerful encryption mechanisms to encrypt the data being transmitted, thereby making it impossible for eavesdroppers to obtain any useful information from the data overheard.

Full Article

Fire Alert using GSM and GPS | ijirt.org Volume 6 Issue 1

Fire Alert using GSM and GPS | ijirt.org Volume 6 Issue 1

The fire incidences in trains are among the most serious disasters to human lives and the property of Railways. Thus prevention of train fire has become a serious concern for Railways. There are many cases of fire consequences like damages to human lives and property in which many of them are of avoidable nature which can be eliminated by proper attention and awareness. Therefore, it becomes imperative that all required steps are taken to prevent and control fires has made efforts in this direction by incorporating information on probable causes, preventive measures during manufacturing and maintenance of Railway coaches. This project is designed to demonstrate advance features which can be implemented in trains for Passenger safety and security. The purpose of our developed system is to minimize the effect of fire accident and also alerting the far-off property-proprietor accurately through sending Short Message (SMS) with live location by means of GSM (Global system for mobile) network and GPS (Global Positioning System). The prototype train model is equipped with few sensors. At critical condition or in case of emergency, Voice module will playback voice messages for Passengers alert. We will have proper controlling action to blow off fire. We can thus track live location from where the fire is being occurring.

Parking problem : Solved |  E-Parking System | ijirt.org

Parking problem : Solved | E-Parking System | ijirt.org

We propose a futuristic “E-Parking” system for an urban environment. The system allocates and reserves an optimal parking space based on the driver’s cost function that combines nearest to destination and parking cost. It also allows the customers to view the parking status. The system is developed because the problem of congestion and collision of the vehicle in parking area is increases day by day with population. Therefore the project aimed at solving such problems by designing a web based system that will enable the customers to make a reservation or booking of available parking space before one hour prior to his expected arrival. The customer can pre-book a slot in the area he desires if it is available. The proposed project is a smart online parking booking system that provides customers an easy way of reserving a parking space online using web portal. Customers can view various parking spaces and select nearby or specific area of their choice to view whether space is available or not. If the booking space is available, then customers can book it for specific time slot this system provides an additional feature of cancelling the bookings.

Full Article

How to open a phone with our finger print? | ijirt.org

How to open a phone with our finger print? | ijirt.org

Super-resolution (SR) technique reconstructs a higher-resolution image. For more than three decades SR has been developed, both multi-frame and single-frame SR have significant applications in our daily life.Finger print recognition system is used as an application of super resolution in forensic department. Latent fingerprints have been used as an important evidence to identify criminals in law enforcement agencies for more than a century.Prior to feature extraction, fingerprint enhancement is necessary to remove noises and enhance the clarity of ridge structures in latent fingerprints. First, the total variation model is applied to decompose into cartoon and texture components. The cartoon component with most of the nonfingerprint patterns is removed as the structured noise, whereas the texture component consisting of the weak latent fingerprint is enhanced in the next stage..A multiscale patch-based sparse representation method is used for the enhancement of the texture component. Gabor elementary functions use dictionaries to capture the characteristics of fingerprint ridge structure, and multiscale patch-based sparse representation is iteratively applied to reconstruct high-quality fingerprint image.

How to do Social Media Ads for your business? : Tips and tricks | ijirt.org

How to do Social Media Ads for your business? : Tips and tricks | ijirt.org

Social media are computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. The variety of stand-alone and built-in social media services currently available introduces challenges of definition; however, there are some common features Social media are interactive Web 2.0 Internet-based applications User-generated content, such as text posts or comments, digital photos or videos, and data generated through all online interactions, is the lifeblood of social media. Users create service-specific profiles for the website or app that are designed, and maintained by the social media organization Social media facilitate the development of online social networks by connecting a user’s profile with those of other individuals or groups.

Full Text

Human Computer Interaction | Full Research paper on ijirt.org

Human Computer Interaction | Full Research paper on ijirt.org

This paper talks about the exploration that has been done in the field of Human Computer Interaction (HCI) identifying with human brain science. A brief outline of HCI is displayed. Particular samples of examination in the ranges of symbols and menus are then looked into. The consequences of these tests and the forecasts they make about general human brain science and particular human connection with computer is examined. Mental models of client interface cooperation are talked about and contrasted with mental models of certifiable article. At long last, future headings for exploration are proposed.

Full Article