Online Catering System for College Canteen using Firebase
International Journal for Research in Applied Science and Engineering Technology
: Although they have long been a well-liked option for quick and practical meals, cafeterias are ... more : Although they have long been a well-liked option for quick and practical meals, cafeterias are not without problems. Customer dissatisfaction can be caused by long lines, sluggish payments, a lack of food options, and lengthy preparation periods, which can also have an impact on the cafeteria business's overall effectiveness and profitability. In order to address these issues, this survey paper outlines the creation of a cafeteria application utilising Flutter and Firebase as a backend and a recommendation system. This study investigates how Flutter and Firebase can be used to develop a scalable, reliable, and effective application that offers users a smooth experience. The article also looks at how integrating a recommendation system might improve customer happiness and loyalty by enhancing the customer experience.
In rapidly growing countries like India train transportation is majorly used due to the cost effe... more In rapidly growing countries like India train transportation is majorly used due to the cost effective solution of transportation. The train transportation depends on the rails or tracks. If there is break or crack or any other fault present over the track it creates a serious problem.. Railways track failure is big issue and to recognize the failure before the train travels on the same track is under development using Voltage Standing Wave Ratio technique. Project laid on development system for processing VSWR (Voltage standing wave ratio) signals received from VSWR meter. In the wireless transmission system the reflected power and voltage standing wave ratio figures are having importance related to its best performance.. These waves can be captured using VSWR meter/through line power meters and makes its online analysis. The electronic system is used to capture and further processing of signals. The proposed system in this paper is used to rectify all these problems. Typically thi...
Visual Secret Sharing scheme (VSS) is used to encryption of secret image into n shares, which are... more Visual Secret Sharing scheme (VSS) is used to encryption of secret image into n shares, which are distributed to n participant. Secret image is converted into binary format that having no visual meaning which hinder the objective of visual cryptography. The obtained binary image is further divided into n shares of random pattern. We can able to obtain secret image by superimposing qualified subset of shares but unable to obtain by superposition of forbidden subset. With the help of Visual cryptography we can decrypt secret image without knowledge of cryptography & complex computation. With the help of new advanced Techniques, shares carries visual information to viewer& also obtained visual quality is better than any other method. Visual Cryptography can be used in number of applications such as access control, authentication, identification, copyright protection and watermarking.
Content based image retrieval is an application of computer vision technique used to solve the pr... more Content based image retrieval is an application of computer vision technique used to solve the problem of searching images in large databases. The paper introduces three different techniques tested with two different datasets in order to compare the retrieval efficiency and accuracy. The feature vector is formed using Color and texture information extracted. The color information extraction process includes separation of image into Red, Green and Blue planes. Then each plane is divided into 4 blocks and for each block row mean vectors are calculated. This system uses Cosine transform to generate the feature vectors of the query and database images. Cosine transform is applied over a row mean vector of each block separately, which gives a set of feature vector of size 15elementsin the first technique. In the second
Now a days Smartphone plays a important role in a day to day life. In recent market there are man... more Now a days Smartphone plays a important role in a day to day life. In recent market there are many mobile companies introducing their mobile devices. But the selection of mobile on better performances looks, brands etc. are difficult to choose. In any mobile device the main ingredient is operating system, like Android, IOS, Windows Blackberry etc. Due to large availability in last few years in mobile companies. The selection of mobile device with its operating system is very difficult. Proposed paper focused on TOPSIS approach which provides the feasible and approximate solution for the Selection of mobile operating system with Ideal solution optimization. TOPSIS method considers both the Ideal solution and Negative ideal solution.
International Journal of Computer Applications, 2015
Content based image retrieval is an application of computer vision technique used to solve the pr... more Content based image retrieval is an application of computer vision technique used to solve the problem of searching images in large databases. The paper introduces three different techniques tested with two different datasets in order to compare the retrieval efficiency and accuracy. The feature vector is formed using Color and texture information extracted. The color information extraction process includes separation of image into Red, Green and Blue planes. Then each plane is divided into 4 blocks and for each block row mean vectors are calculated. This system uses Cosine transform to generate the feature vectors of the query and database images. Cosine transform is applied over a row mean vector of each block separately, which gives a set of feature vector of size 15elementsin the first technique. In the second technique first 60 coefficients are considered for feature vector formation. In the third technique after extraction of Red, Green and Blue components, they are divided in...
Journal of emerging technologies and innovative research, 2019
Localization of wireless nodes is one of the basic aspects of wireless sensor networks. For Indoo... more Localization of wireless nodes is one of the basic aspects of wireless sensor networks. For Indoor localization the RSSI (Received signal strength indicator) based target tracking is mostly used because it is very economical, no any additional hardware required, and it is very easy to understand. But the problem with pure RSSI scheme is the RSSI value get fluctuated by the environmental conditions and also due any other physical disturbances. So to improve the accuracy of system we use the kalman filter and unscented kalman filter. This paper presents the results of all these filters implementation for target tracking. IndexTerms–WSN,RSSI,Kalman filter,Extended kalman filter.
Proficient Content Based Image Retrieval system is a much needed system for plenty of image retri... more Proficient Content Based Image Retrieval system is a much needed system for plenty of image retrieval supporting applications, which retrieve images more rapidly from giant image databases. Block Truncation Coding (BTC) is one of the prominent and simple techniques used most of the time. This method is built on color properties of an image for image retrieval. In this paper a novel Static Thepade's Ternary Block Truncation Coding with degree values (varied as n=1 to 5) and Dynamic Thepade's Ternary Block Truncation Coding are proposed. Total 36 variations of proposed image retrieval methods, using five degree values for Static Thepade's Block Truncation Coding and Dynamic Thepade's Block Truncation Coding with six color spaces (RGB, LUV, YCgCb, YCbCr, YUV and YIQ) are experimented on image database having 1000 images in 10 different categories. Experimental results have shown better performance in YCbCr color space followed by YUV. The best image retrieval is by Dyna...
Key Aggregate Searchable Encryption for Sharing Data in Group with User Revocation
Imperial journal of interdisciplinary research, 2016
: The shared data which was encrypted lead to data leakage and security concern in public cloud. ... more : The shared data which was encrypted lead to data leakage and security concern in public cloud. Data was shared among groups but the keys (i.e. encryption and decryption) were needed to be stored securely, this was not efficient. Also it lacked in secure communication and storage management, so to overcome this problem, we address the concept of key aggregate searchable encryption (KASE) with user revocation. In this, the data owner only needs to submit a single key instead of number of keys over large number of documents and the data user submits a single trapdoor for searching the documents. Our proposed scheme has been secured due to user revocation concept.
Video compression is nothing but compression of video, it involves compression of video size, aud... more Video compression is nothing but compression of video, it involves compression of video size, audio format. In other words we can state video compression as one of the encoding format of video that it can have less memory size than the original video file. One of the basic need for video compression is nothing but, if video size less is then it is easy to transmit over the air i.e. on internet. Video compression is done by removing repetitive frames and audio effects so, mainly it will reduce all unimportant data or it will reduce it from video file. There are different algorithms for compression of video. We are going to use LZW compression algorithm to do effective compression of digital video. LZW is dictionary based algorithm. This paper implements one of the advanced video compression technique by providing less data loss by using LZW algorithm. IndexTerms Image Processing, Video Processing, Video Compression, Video Quality, Decompression.
1Professor, Dept. of Computer Engineering, ABMSP’s APCOER Pune, Maharashtra, India 2,3,4,5,6Stude... more 1Professor, Dept. of Computer Engineering, ABMSP’s APCOER Pune, Maharashtra, India 2,3,4,5,6Student, Dept. of Computer Engineering, ABMSP’s APCOER Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In recent few decades digital video compression technologies have become a necessity for the designing, communication and utilization of visual information. Users today have gotten used to taking and posting photos and videos to record daily life, share experiences. According to recent reports, Instagram users have been posting an average of 55 million photos and videos every day. How to store, backup and maintain these amount of photos and videos in an efficient way has become an urgent problem. Video compression techniques plays a vital role in storage and transmission of data through the limited bandwidth capability. This review paper introduces advance technology ...
Smart phone based Mobile Application to protect human being from hazardous gases present in an enviornment
International Journal of Modern Trends in Engineering and Research, 2016
Automated Gas Monitoring Mobile Application is basically used for measuring and displaying the am... more Automated Gas Monitoring Mobile Application is basically used for measuring and displaying the amount for different types of gases with its level (in ppm) within an environment. Proposed system mainly use various types of gas sensors, temperature sensor, microcontroller, Bluetooth modem and Smartphone. For experimental purpose four types of sensors are tested that are Temperature sensor, Alcohol(C2H5O) sensor, H2 sensor and Methane(CH4) sensor. These different types of gas sensors are communicating with advance microcontroller ATMega328P. Sensors not only detecting the presence of gases, but also measures the amount of gases available in the environment. Afterword it sends corresponding output on microcontroller. The microcontroller read the data from sensors through on-chip ADC (Analog to Digital Converter) and send it serially to Bluetooth modem(HC 05). Now this data is forwarded to the developed android application, it consist a GUI (Graphical User Interface) through which we can...
Uploads
Papers by Anil Lohar