Notice boards are playing a very important role in our day to day life. By replacing conventional Analog type notice board with digital notice board we can make information dissemination much easier in a paperless community. Here the admin can control notice board through the internet. So information can be sent anywhere in the world and can be displayed within seconds. Information may be in the form of text, image, pdf etc. PC is used for sending information and Raspberry Pi is connected to the internet at the receiving side. In addition to this, an application which is installed on the admin’s mobile phone can serve the same purpose. This application also contains a speech to text converter. So the admin can send text messages through his/her own voice.
{"title":"Implementation of Digital Notice Board using Raspberry Pi and IOT","authors":"E. Ganesh","doi":"10.13005/OJCST12.01.04","DOIUrl":"https://doi.org/10.13005/OJCST12.01.04","url":null,"abstract":"Notice boards are playing a very important role in our day to day life. By replacing conventional Analog type notice board with digital notice board we can make information dissemination much easier in a paperless community. Here the admin can control notice board through the internet. So information can be sent anywhere in the world and can be displayed within seconds. Information may be in the form of text, image, pdf etc. PC is used for sending information and Raspberry Pi is connected to the internet at the receiving side. In addition to this, an application which is installed on the admin’s mobile phone can serve the same purpose. This application also contains a speech to text converter. So the admin can send text messages through his/her own voice.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web@30: A Vote for Digital Ethics","authors":"K. Jacob","doi":"10.13005/OJCST12.01.01","DOIUrl":"https://doi.org/10.13005/OJCST12.01.01","url":null,"abstract":"","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remote sensors from the Satellite or Aircrafts are generated by huge volume of data which can utilize for impending signification if collected data aggregated effectively incorporates by insight information. Data is collection from simple to hybrid devices, which are continuously working for technology around us and communicate with each other. These devices are transferring huge amounts of real time data daily. The transaction added to the synchronized inaccessible sensing data that is retrieving the useful information in the proficient way of classification in the direction of the severe computational challenges, analyze, the assortment, and accumulate, where gathered data is inaccessible. The real time sensing devices will continuously export data. In this work, we will implement the big data analytics on remote sensing datasets. We utilized BEST software for header analysis of the datasets and retrieving the full resolution image from the dataset. Then retrieved image is divided into smaller blocks for applying statistical. By applying certain rules and conditions in the form of algorithm, determine the land and sea blocks of image dataset. Our end results are proficiently analyzing real-time remote sensing utilizing the land beacon structure. Finally, a comprehensive investigation of the remotely intelligence earth beacon massive information for earth and ocean space are available by utilizing- Hadoop.
{"title":"Performance Analysis of Remote Sensing Application using Area Wise Prediction","authors":"K. Vijayalakshmi, V. V. Kumar","doi":"10.13005/OJCST12.01.05","DOIUrl":"https://doi.org/10.13005/OJCST12.01.05","url":null,"abstract":"Remote sensors from the Satellite or Aircrafts are generated by huge volume of data which can utilize for impending signification if collected data aggregated effectively incorporates by insight information. Data is collection from simple to hybrid devices, which are continuously working for technology around us and communicate with each other. These devices are transferring huge amounts of real time data daily. The transaction added to the synchronized inaccessible sensing data that is retrieving the useful information in the proficient way of classification in the direction of the severe computational challenges, analyze, the assortment, and accumulate, where gathered data is inaccessible. The real time sensing devices will continuously export data. In this work, we will implement the big data analytics on remote sensing datasets. We utilized BEST software for header analysis of the datasets and retrieving the full resolution image from the dataset. Then retrieved image is divided into smaller blocks for applying statistical. By applying certain rules and conditions in the form of algorithm, determine the land and sea blocks of image dataset. Our end results are proficiently analyzing real-time remote sensing utilizing the land beacon structure. Finally, a comprehensive investigation of the remotely intelligence earth beacon massive information for earth and ocean space are available by utilizing- Hadoop.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wireless sensor network (WSN) can be employed in many application areas such as traffic control and industrial automation. In WSNs, clustering achieves energy efficiency and scalable performance. A cluster is formed by several sensors nodes, and one of them is elected as cluster-head (CH). A CH collects information from the cluster members and sends aggregated sensed data to the base station (BS) or another CH. The main task of a routing protocol in a WSN is to forward these sensed data to the BS. This paper analyses the advantages of cluster-based routing protocols vs. flat routing protocols in WSNs.
{"title":"Rethinking Cluster-based Routing in Wireless Sensor Networks","authors":"D. Kanellopoulos","doi":"10.13005/OJCST12.01.02","DOIUrl":"https://doi.org/10.13005/OJCST12.01.02","url":null,"abstract":"A wireless sensor network (WSN) can be employed in many application areas such as traffic control and industrial automation. In WSNs, clustering achieves energy efficiency and scalable performance. A cluster is formed by several sensors nodes, and one of them is elected as cluster-head (CH). A CH collects information from the cluster members and sends aggregated sensed data to the base station (BS) or another CH. The main task of a routing protocol in a WSN is to forward these sensed data to the BS. This paper analyses the advantages of cluster-based routing protocols vs. flat routing protocols in WSNs.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Health Monitoring system using IOT describes the collection and interoperation of Patient data collected from the sensors from the hospitals through IOT Technology. The collected sensor data will support the doctor in the emergency situation for the betterment and improvement of Patient health. The hardware platform to implement the project consists of a sensor and Raspberry Pi 3 Model B equipped in a way to communicate with a doctor through the Internet and Smart Phone. This proposed idea will help doctors to know about the state of patient health and monitor anywhere in the world. In this proposed idea the sensors gather the medical information of the patient that includes patient’s heart rate, blood pressure, and pulse rate Then using the camera the patient is livelily monitored through the Raspberry kit and this information is sent to the Internet and stored in a medical server. The doctor and patient can monitor the patient data from any place of the world through the provided IP server address anytime. The emergency alert is sent to the patient if the sensor value is exceeded by the threshold data. Thus the patient's health parameters are watched lively and regular monitoring through the medical server to a doctor will help to make an effective diagnosis and almost accurate care can be given. The data collected through the IOT will help the patient to recover easily and also enhanced medical care can be given to the patients at a low cost.
使用物联网的健康监测系统描述了通过物联网技术从医院的传感器收集患者数据的收集和互操作。收集到的传感器数据将支持医生在紧急情况下改善和改善患者的健康状况。实现项目的硬件平台由传感器和树莓派3 Model B组成,可以通过互联网和智能手机与医生进行通信。这个提议的想法将帮助医生了解病人的健康状况,并在世界任何地方进行监测。在这个想法中,传感器收集病人的医疗信息,包括病人的心率、血压和脉搏,然后使用摄像头通过Raspberry套件对病人进行实时监控,并将这些信息发送到互联网并存储在医疗服务器中。医生和患者可以随时通过提供的IP服务器地址从世界任何地方监控患者数据。如果传感器值超过阈值数据,则向患者发送紧急警报。因此,通过医疗服务器对患者的健康参数进行实时和定期的监测,医生将有助于做出有效的诊断,并可以给予几乎准确的护理。通过物联网收集的数据将有助于患者轻松恢复,并且可以以低成本为患者提供更好的医疗护理。
{"title":"Health Monitoring System using Raspberry Pi and IOT","authors":"E. Ganesh","doi":"10.13005/OJCST12.01.03","DOIUrl":"https://doi.org/10.13005/OJCST12.01.03","url":null,"abstract":"Health Monitoring system using IOT describes the collection and interoperation of Patient data collected from the sensors from the hospitals through IOT Technology. The collected sensor data will support the doctor in the emergency situation for the betterment and improvement of Patient health. The hardware platform to implement the project consists of a sensor and Raspberry Pi 3 Model B equipped in a way to communicate with a doctor through the Internet and Smart Phone. This proposed idea will help doctors to know about the state of patient health and monitor anywhere in the world. In this proposed idea the sensors gather the medical information of the patient that includes patient’s heart rate, blood pressure, and pulse rate Then using the camera the patient is livelily monitored through the Raspberry kit and this information is sent to the Internet and stored in a medical server. The doctor and patient can monitor the patient data from any place of the world through the provided IP server address anytime. The emergency alert is sent to the patient if the sensor value is exceeded by the threshold data. Thus the patient's health parameters are watched lively and regular monitoring through the medical server to a doctor will help to make an effective diagnosis and almost accurate care can be given. The data collected through the IOT will help the patient to recover easily and also enhanced medical care can be given to the patients at a low cost.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"180 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133970304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The biometric system plays the most important role in this current century. Finger print identification is one among the foremost distinguished and familiar identity verification system due to its individuality. Security within the hostel is one of the foremost repetitive issues. To keep up day by day attendance verification is sophisticated and time consuming system for the hostel management. There are number of existing attending systems are available for college students, for hostel students it must improve. Within the existing system wardens are manually maintain the attendance for hostel students. This paper deals with, avoid of an entire problem in hostel management system together with this monitoring system also proposed. The administrator of this system was college principal or warden. Biometric system is used to accommodate a large number of students within the hostel. This system makes automatically to monitor the entry and exit of students from hostel and offers alert SMS to parents for their safety.
{"title":"Hostel Management System Based on Finger Print Authentication","authors":"G. Rajkumar, T. Sundari","doi":"10.13005/OJCST11.04.08","DOIUrl":"https://doi.org/10.13005/OJCST11.04.08","url":null,"abstract":"The biometric system plays the most important role in this current century. Finger print identification is one among the foremost distinguished and familiar identity verification system due to its individuality. Security within the hostel is one of the foremost repetitive issues. To keep up day by day attendance verification is sophisticated and time consuming system for the hostel management. There are number of existing attending systems are available for college students, for hostel students it must improve. Within the existing system wardens are manually maintain the attendance for hostel students. This paper deals with, avoid of an entire problem in hostel management system together with this monitoring system also proposed. The administrator of this system was college principal or warden. Biometric system is used to accommodate a large number of students within the hostel. This system makes automatically to monitor the entry and exit of students from hostel and offers alert SMS to parents for their safety.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131063301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Mohanan, Afaq Ahmad, Sayyid Samir Al-Busaidi, Lazhar Khiriji, Amir M. Abdulghani, Muhammad Al Nadabi
In the past couple of decades, the number of vehicles has increased radically. A statistic which presents the number of cars sold worldwide from 1990 through 2017, forecasts for 2018, some 81.6 million automobiles are expected to be sold by the end 2018. With this continuous increase, it is becoming very tedious to keep track of each vehicle for the purpose of security, law enforcement and traffic management. This phenomenon of rapidly increasing vehicles on the road highlights the importance for a vehicle number plate recognition system. By recognizing the car plates, the drivers of the vehicle can be identified from the database. Number plate detection system are used in various applications like traffic law maintenance, traffic control, automatic toll collection, parking systems, automatic gate openers. This paper presents a unique algorithmic procedure for detecting vehicle plate number which is based on the concept of mathematical morphology. The developed algorithm is simple, efficient and flexible. The algorithm is capable of working satisfactorily even in different constraints such as like rain, smoke and shadow. This user-friendly software tool is developed on MATLAB platform which is one of the common and efficient image processing analysis tools.
{"title":"Use of Mathematical Morphology in Vehicle Plate Detection","authors":"N. Mohanan, Afaq Ahmad, Sayyid Samir Al-Busaidi, Lazhar Khiriji, Amir M. Abdulghani, Muhammad Al Nadabi","doi":"10.13005/OJCST11.04.04","DOIUrl":"https://doi.org/10.13005/OJCST11.04.04","url":null,"abstract":"In the past couple of decades, the number of vehicles has increased radically. A statistic which presents the number of cars sold worldwide from 1990 through 2017, forecasts for 2018, some 81.6 million automobiles are expected to be sold by the end 2018. With this continuous increase, it is becoming very tedious to keep track of each vehicle for the purpose of security, law enforcement and traffic management. This phenomenon of rapidly increasing vehicles on the road highlights the importance for a vehicle number plate recognition system. By recognizing the car plates, the drivers of the vehicle can be identified from the database. Number plate detection system are used in various applications like traffic law maintenance, traffic control, automatic toll collection, parking systems, automatic gate openers. This paper presents a unique algorithmic procedure for detecting vehicle plate number which is based on the concept of mathematical morphology. The developed algorithm is simple, efficient and flexible. The algorithm is capable of working satisfactorily even in different constraints such as like rain, smoke and shadow. This user-friendly software tool is developed on MATLAB platform which is one of the common and efficient image processing analysis tools.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131713796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, Kumari et al., pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” has several drawbacks and does not provide any session key agreement. Hence, they proposed an improved remote user authentication scheme with key agreement based on Chang et al.’s protocol. They claimed that the improved method is secure. However, we found that their improvement still has both anonymity breach and smart card loss password guessing attack which cannot be violated in the ten basic requirements advocated for a secure identity authentication using smart card by Liao et al. Thus, we modify their protocol to encompass these security functionalities which are needed in a user authentication system using smart card.
{"title":"Revisiting the “An Improved Remote user Authentication Scheme with Key Agreement”","authors":"Yalin Chen, Jue-Sam Chou, I. C. Liao","doi":"10.13005/OJCST11.04.03","DOIUrl":"https://doi.org/10.13005/OJCST11.04.03","url":null,"abstract":"Recently, Kumari et al., pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” has several drawbacks and does not provide any session key agreement. Hence, they proposed an improved remote user authentication scheme with key agreement based on Chang et al.’s protocol. They claimed that the improved method is secure. However, we found that their improvement still has both anonymity breach and smart card loss password guessing attack which cannot be violated in the ten basic requirements advocated for a secure identity authentication using smart card by Liao et al. Thus, we modify their protocol to encompass these security functionalities which are needed in a user authentication system using smart card.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this research a developed web–based balanced scorecard performance evaluation system proposed for the case study of Ethiopian organizations and supports both English and Amharic languages. The system incorporates evaluations of individual performance (both in activity and behavior), major activity performance, objective performance, perspective performance, unit/ department performance, and the organization/institute as a whole based on time, cost, quality and quantity. Object oriented software engineering and ASP.NET 4.0 platform is employed to develop the system. Reviewing the overall results from the usability test, questionnaires and interviews, it is concluded that all production and extensive public service providing organizations prefer to use the implemented application but other organizations comparatively didn’t want to use it as it seems it doesn’t facilitate their daily duties. But the overall functionality of the system is being agreed by the users.
{"title":"Developed Web-based System for Performance Evaluation based on Balanced Scorecard Model: Case Study in Ethiopian Organizations","authors":"Worku MEKONNEN TESSEMA","doi":"10.13005/ojcst11.04.07","DOIUrl":"https://doi.org/10.13005/ojcst11.04.07","url":null,"abstract":"In this research a developed web–based balanced scorecard performance evaluation system proposed for the case study of Ethiopian organizations and supports both English and Amharic languages. The system incorporates evaluations of individual performance (both in activity and behavior), major activity performance, objective performance, perspective performance, unit/ department performance, and the organization/institute as a whole based on time, cost, quality and quantity. Object oriented software engineering and ASP.NET 4.0 platform is employed to develop the system. Reviewing the overall results from the usability test, questionnaires and interviews, it is concluded that all production and extensive public service providing organizations prefer to use the implemented application but other organizations comparatively didn’t want to use it as it seems it doesn’t facilitate their daily duties. But the overall functionality of the system is being agreed by the users.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}