International Journal for Research in Applied Science and Engineering Technology
In order to forecast the climate, clouds are essential. Prediction of rainfall is also greatly in... more In order to forecast the climate, clouds are essential. Prediction of rainfall is also greatly influenced by the quantity and nature of clouds in the atmosphere. As a result, the most fascinating and important subject in meteorology is cloud identification, which also draws the most researchers from other fields. The transfer learning method used in this article to forecast rainfall using ground-based cloud images is presented. By classifying the type of cloud using cloud image input, it will be able to forecast the expected amount of rainfall. Based on the associated Precipitation that caused the appropriate Rainfall, the cloud images in the dataset are divided into three groups (classes) labeled as no rain to very low rain, low to medium rain, and medium to high rain. In this paper using CNN the classification of rainfall was done
The successful adoption and operation of any new technology is dependent on the appropriate manag... more The successful adoption and operation of any new technology is dependent on the appropriate management of the risks associated with that technology. This is especially true when that technology is more than an application and is part of the organization’s core infrastructure. And distributed ledger technologies (DLT) like blockchain technology have the potential to be the backbone of many core platforms in the near future. The blockchain is an undeniably ingenious invention – the brainchild of a person or group of people known by the pseudonym, Satoshi Nakamoto. It has become a focus of global attention since its development as banks around the world seek to understand and harness its disruptive potential. Many of the industries has been exploring how to use blockchains across a variety of internal and client facing issues. Blockchain has the potential to transform our world. However, leading into 2018 the focus will move from “how to use a blockchain” to “how to secure a blockchain...
Journal of emerging technologies and innovative research, 2017
Air pollution means the presence into the air of a substance which has harmful or poisonous effec... more Air pollution means the presence into the air of a substance which has harmful or poisonous effects. Traditionally, pollution measurements are performed using expensive equipment at fixed locations or dedicated mobile equipment laboratories. In this paper we introduce IOT Based Air Pollution Monitoring System in which we will monitor the fine-grained Air Quality in real-time over a web server using internet and will trigger an alarm when the air quality goes down beyond a certain level, means when there is sufficient amount of harmful gases are present in Sulpher-Die-Oxide, volume of CO2, detection of leakage of any gas-smoke, LPG, benzene and NH3. It will show the air quality in PPM on the LCD and as well as on webpage so that we can monitor it very easily. We have used MQ135 sensor which is the best choice for monitoring Air Quality as it can detect most harmful gases and can measure their amount accurately. In this IOT project, you can monitor the pollution level from anywhere using your computer or mobile. We can install this system anywhere and can also trigger some device when pollution goes beyond some level, like we can switch on the Exhaust fan or can send alert SMS/mail to the user.
An autonomous car, also known as a driverless car, self-driving car or robot car, is an autonomou... more An autonomous car, also known as a driverless car, self-driving car or robot car, is an autonomous vehicle capable of fulfilling the human transportation capabilities of a traditional car. As an autonomous vehicle, it is capable of sensing its environment and navigating without human input. Robotic cars exist mainly as prototypes and demonstration systems, but are likely to become more widespread in the near future. Expert members of the Institute of Electrical and Electronics Engineers (IEEE) have estimated that up to 75% of all vehicles will be autonomous by 2040. Collision avoidance is the great challenge in the active safety of the road vehicles. In India the total annual deaths due to road accidents has crossed 1.18 lakh, according to the latest report of National Crime Records Bureau (NCRB). In this report we describe part of the work conducted related to the studies of route finding and vehicle collision detection and removal algorithms in a situation where multiple vehicles ...
In this paper a new symmetric key cryptographic algorithm has been designed. The algorithm is enr... more In this paper a new symmetric key cryptographic algorithm has been designed. The algorithm is enriched with various calculations through which the ciphertext becomes unpredictable and breaking the security by eavesdropper becomes harder. In terms of properties of Petri net and the analysis technique of reachability tree, the protocol was proved to be boundedness, deadlock free and liveness. KeywordsCryptography, Symmetric key, Petri Net, Reachability Tree, Compression
Our modern day era faces an inevitable problem of securing our most integrated data and messages.... more Our modern day era faces an inevitable problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Most of the traditional techniques probably in-use today, emphasizes on keys that are generated by generic function, algorithms or in random key generators. But question remains whether this key is unique and authentic in nature. Moreover how can these keys be unique to one and one person only? The answer to this would be Biometric Cryptosystems. Biometric Cryptosystems are the newest members in the field of security. The very basis of this Biometric Cryptosystem lies on the very fact that some features of human body are significantly unique to each and every human in the world, such as fingerprint, DNA sequence, Iris, etc. Using those biometric we can generate an exclusive key that will be unique for each and every individual. Now having generated these keys we can u...
Network connectivity is considered one of the most important aspects in Wireless Sensor Networks ... more Network connectivity is considered one of the most important aspects in Wireless Sensor Networks (WSN). Due to their low power configuration, WSN often suffers from disrupted connectivity resulting in data lose and significant energy loss of the whole network. The disruption in connectivity, referred to as network cut, divides the whole network into multiple components. In this article, we propose a low overhead scheme of detecting cuts in a WSN named Energy Efficient Approach on Cut Detection in WSN. The algorithm allows each node to detect whether a node is communicating or not. If a certain node is not communicating, the information is passed to the Base Station through other nodes which then takes the decision whether there is a cut or not. The algorithm is distributed and asynchronous in the sense that every node communicates within its communication range. Although the algorithm is iterative and involves only local communication, its convergence rate is quite fast and is indep...
A Brief Overview of Clustering Schemes Applied on Mobile Ad-hoc Networks
Mobile ad-hoc networks (MANETs) are a definite kind of wireless networks that can be quickly arra... more Mobile ad-hoc networks (MANETs) are a definite kind of wireless networks that can be quickly arranged without pre-existing infrastructures. They are used in many contexts such as collaborative, medical, military or embedded applications. However, MANETs raise new challenges when they are used in large scale network that contain a large number of nodes. Then, many clustering schemes have been proposed for ad hoc networks. Clustering is an important research area for mobile ad hoc networks (MANETs) because clustering makes it possible to assure basic levels of system performance, such as throughput and delay, in the presence of both mobility and a large number of mobile terminals. MANETs has drawbacks due to both the characteristics of the trans-mission medium (transmission medium sharing, low bandwidth, etc.) and the routing protocols (information diffusion, path finding, etc.). Clustering in mobile ad hoc networks plays a vital role in improving resource management and network perfo...
This work propose a petri net model based approach for emergency situation handling in a Hospital... more This work propose a petri net model based approach for emergency situation handling in a Hospital area. In a hospital it is always need to maintain quiet and satisfactory situation for patients. But often some unwanted emergency situation occurs may be due to natural calamity or accidentally. To handle this type of scenario a petri net based model has been proposed . In this investigation the Well-Formed PetriNet models have been used to construct the emergency situation handling. Finally the structural reachability also has been examined.
Microcontroller based automated room light and fan controller
We all know that we are slowly moving towards automation which is one of the trending topics. So ... more We all know that we are slowly moving towards automation which is one of the trending topics. So basically in this project we will be controlling the devices of a room according to the needs. Devices such as fan and lights will get turned on as soon as somebody enters the room and if the room is empty then it will get turned off. Above that, the speed of fan will be controlled according to the temperature of the surroundings. The system will get the temperature from the temperature sensor and it will control the speed according to the temperature, set by the user. In this project, microcontroller forms the processing part, which firstly senses the temperature and the controller then compares the data with the set temperature. If the current temperature is greater than the set temperature the controller turns ON the fan and the set speed will be proportional to the difference between the set temperature & the current temperature. If the current temperature is less than the set temper...
Uploads
Papers by Sayani Chandra