Abstract—This paper proposes a solution to the drawbacks of traditional e-voting Blockchain technology. E-voting is more cost-effective and convenient than the traditional pen and paper method, but it is considered unreliable due to the possibility of physical tampering and a lack of security for voters. By using decentralized Blockchain technology, this research aims to create an e-voting system that guarantees protection of voter identity, secure data transfer, and verifiable results through an open and transparent voting process.
{"title":"Implementation of Decentralized Blockchain E-voting","authors":"Prof. Amruta Sankhe","doi":"10.55041/isjem00423","DOIUrl":"https://doi.org/10.55041/isjem00423","url":null,"abstract":"Abstract—This paper proposes a solution to the drawbacks of traditional e-voting Blockchain technology. E-voting is more cost-effective and convenient than the traditional pen and paper method, but it is considered unreliable due to the possibility of physical tampering and a lack of security for voters. By using decentralized Blockchain technology, this research aims to create an e-voting system that guarantees protection of voter identity, secure data transfer, and verifiable results through an open and transparent voting process.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The smart home system has become increasingly popular due to its convenience and security benefits. The advantages of the smart home system in terms of convenience and security have made it more and more popular. It is, nevertheless, vulnerable to security lapses and cyberattacks.In this article, we suggest a method for protecting a smart home system using PIR sensor, Node MCU, Arduino Uno, LCD screen, buzzer, and Telegram software are all included. The suggested system is made to recognize and react to potential security concerns like infiltration, unauthorized access, and motion detection. The NodeMCU board receives a signal when the PIR sensor detects motion. The ESP32-CAM module and the Node MCU board then communicate in order to take photos, which are subsequently sent to the user's Telegram account for visual confirmation. Additionally, the system has an LCD display and a buzzer to offer Keywords- IOT (Internet of Things),Arduino,ESP8266,
{"title":"COMMANDFENCE FOR SECURING SMART HOME SYSTEM","authors":"Dr. T Annalakshmi","doi":"10.55041/isjem00433","DOIUrl":"https://doi.org/10.55041/isjem00433","url":null,"abstract":"The smart home system has become increasingly popular due to its convenience and security benefits. The advantages of the smart home system in terms of convenience and security have made it more and more popular. It is, nevertheless, vulnerable to security lapses and cyberattacks.In this article, we suggest a method for protecting a smart home system using PIR sensor, Node MCU, Arduino Uno, LCD screen, buzzer, and Telegram software are all included. The suggested system is made to recognize and react to potential security concerns like infiltration, unauthorized access, and motion detection. The NodeMCU board receives a signal when the PIR sensor detects motion. The ESP32-CAM module and the Node MCU board then communicate in order to take photos, which are subsequently sent to the user's Telegram account for visual confirmation. Additionally, the system has an LCD display and a buzzer to offer Keywords- IOT (Internet of Things),Arduino,ESP8266,","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the increasing challenges of parenting, particularly for working mothers, continuous monitoring of a child has become difficult. To address this issue, a smart baby monitoring system based on IoT and machine learning has been developed to provide real-time intimation to parents. The system monitors room temperature, humidity, cry detection, and facial recognition using various sensors, and the data is transmitted to the Adafruit server through controllers with an Internet connection. The machine learning model is used to detect the facial emotions of registered babies. Parents can monitor the live activities and emotions of their child through an external web camera and remotely swing the baby cradle upon cry detection using their web application. Real-time room temperature and humidity levels can also be checked. In case of abnormal actions, the system sends notifications to the parent's web application, providing a relief for all working parents to efficiently manage their time while taking care of their babies.
{"title":"BABY MONITORING SYSTEM THROUGH FACE DETECTION USING IMAGE PROCESSING","authors":"Sreeja Vijay, D. S, B. N, U. B","doi":"10.55041/isjem00415","DOIUrl":"https://doi.org/10.55041/isjem00415","url":null,"abstract":"Due to the increasing challenges of parenting, particularly for working mothers, continuous monitoring of a child has become difficult. To address this issue, a smart baby monitoring system based on IoT and machine learning has been developed to provide real-time intimation to parents. The system monitors room temperature, humidity, cry detection, and facial recognition using various sensors, and the data is transmitted to the Adafruit server through controllers with an Internet connection. The machine learning model is used to detect the facial emotions of registered babies. Parents can monitor the live activities and emotions of their child through an external web camera and remotely swing the baby cradle upon cry detection using their web application. Real-time room temperature and humidity levels can also be checked. In case of abnormal actions, the system sends notifications to the parent's web application, providing a relief for all working parents to efficiently manage their time while taking care of their babies.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajay K. Gaikwad, Dipankar Sen, Sourabh Patil, Prof Ujvala Patil
Disease anticipation systems are the better alternatives, to avoid the human errors in disease diagnosis and also assist in disease interference. Nowadays, the number of heart disease patients is increasing so we need an optimal heart disease prediction and treatment suggestion system. Heart disease dataset preparation, prediction system’s process flow design, process execution and results evaluation are the most common life cycle modules of any heart disease prediction system. Input dataset attributes modeling, attribute risk factor calculation; threshold determination and achieving the high accuracy in disease prediction are the major limitations of the existing heart disease prediction and treatment proposal systems. Keywords: Machine learning, Decision tree, Logistic regression.
{"title":"Heart Disease Prediction and Treatment Suggestion Using Machine Learning","authors":"Ajay K. Gaikwad, Dipankar Sen, Sourabh Patil, Prof Ujvala Patil","doi":"10.55041/isjem00354","DOIUrl":"https://doi.org/10.55041/isjem00354","url":null,"abstract":"Disease anticipation systems are the better alternatives, to avoid the human errors in disease diagnosis and also assist in disease interference. Nowadays, the number of heart disease patients is increasing so we need an optimal heart disease prediction and treatment suggestion system. Heart disease dataset preparation, prediction system’s process flow design, process execution and results evaluation are the most common life cycle modules of any heart disease prediction system. Input dataset attributes modeling, attribute risk factor calculation; threshold determination and achieving the high accuracy in disease prediction are the major limitations of the existing heart disease prediction and treatment proposal systems. Keywords: Machine learning, Decision tree, Logistic regression.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122336084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Correction of a single error Double Error Detection (SEC-DED) and Double Adjacent Error Correction (DAEC) are prominent error correction algorithms used in computer memory systems to detect and fix errors that arise during data transfer. In this research, we want to put these ideas into practice and assess how well they work through simulations and experiments. We will research the trade-offs between these strategies' efficiency and reliability and contrast them with other error correction techniques. Our research will involve designing and putting error detection and correction procedures into circuits and algorithms for DAEC and SEC-DED. We will also investigate other methods, including parallel processing and error checking mechanisms, to enhance the performance of these strategies. Our findings may also have applications in other domains where error correction is important, such as communication systems and medical equipment. They will help us understand and enhance error correction techniques used in computer memory systems.
{"title":"Implementation of SEC-DED-DAEC Codes using Mentor Graphics","authors":"D. S. Kumar","doi":"10.55041/isjem00361","DOIUrl":"https://doi.org/10.55041/isjem00361","url":null,"abstract":"Correction of a single error Double Error Detection (SEC-DED) and Double Adjacent Error Correction (DAEC) are prominent error correction algorithms used in computer memory systems to detect and fix errors that arise during data transfer. In this research, we want to put these ideas into practice and assess how well they work through simulations and experiments. We will research the trade-offs between these strategies' efficiency and reliability and contrast them with other error correction techniques. Our research will involve designing and putting error detection and correction procedures into circuits and algorithms for DAEC and SEC-DED. We will also investigate other methods, including parallel processing and error checking mechanisms, to enhance the performance of these strategies. Our findings may also have applications in other domains where error correction is important, such as communication systems and medical equipment. They will help us understand and enhance error correction techniques used in computer memory systems.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114990516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In previous years, the ambit of “Intellectual Property Rights” has broadened & increased to a point that it now has a significant part into the growth of the world commerce. A number of wealthy nations have by themselves reinforced the legislative structures in this direction since the early 1990s. Many more were on the verge of doing the same. The successful conclusion of the international talks is also important. The “World Trade Organization's Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) IPR Protection and Enforcement” have been elevated to an extent of a worldwide commitment. The newly emerged world order pertaining to protection of intellectual property rights has advantages and disadvantages. Intellectual Property is a wide field. Its embodiment as “Copyright, Patent, Trademark, and Design” as “Intellectual Property Rights” is quite famous & has been recognized for a long time. Some of the new forms of protection are also coming together, fueled in part by new advances in technology and science related pursuits. This study session gives students a thorough understanding of the numerous types of intellectual property rights, their importance, and commercial implications in today's evolving global public and private laws. Aside from that, the students will be familiarized with the most important international intellectual property instruments and its relation with the public and private laws.
{"title":"An analysis of Property Right using the Public Private Law Divide","authors":"S. Pandey","doi":"10.55041/isjem00417","DOIUrl":"https://doi.org/10.55041/isjem00417","url":null,"abstract":"In previous years, the ambit of “Intellectual Property Rights” has broadened & increased to a point that it now has a significant part into the growth of the world commerce. A number of wealthy nations have by themselves reinforced the legislative structures in this direction since the early 1990s. Many more were on the verge of doing the same. The successful conclusion of the international talks is also important. The “World Trade Organization's Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) IPR Protection and Enforcement” have been elevated to an extent of a worldwide commitment. The newly emerged world order pertaining to protection of intellectual property rights has advantages and disadvantages. Intellectual Property is a wide field. Its embodiment as “Copyright, Patent, Trademark, and Design” as “Intellectual Property Rights” is quite famous & has been recognized for a long time. Some of the new forms of protection are also coming together, fueled in part by new advances in technology and science related pursuits. This study session gives students a thorough understanding of the numerous types of intellectual property rights, their importance, and commercial implications in today's evolving global public and private laws. Aside from that, the students will be familiarized with the most important international intellectual property instruments and its relation with the public and private laws.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Here we propose IOT based theft detection project using Raspberry Pi where we use image processing on live video to detect theft using motion and also highlight the area where motion occurred. This system secures offices/homes from theft by instantly detecting theft as well as allowing user to view the theft details thereby highlighting the theft details and saving the video in a usb drive. In this system we use a camera along with raspberry pi along with a circuit with LCD display IR for night vision and USB drive for storage. The system is powered y a 12V power supply. As soon as camera motion is detected in camera footage the system uses image processing to detect exact area of motion ccurrence and highlights it accordingly. The system now transmits the images of the occurance over IOT to be viewed by user online. We here use IOT Gecko to develop the online system. Also it stores the footage in a USB drive for further reference. The user can now decode the data sent online using IOT Gecko IOT system to view the images of the motion occurance live remotely over internet. Thus the system provides an innovative approach to theft detection using IOT.
{"title":"IOT Theft Detection Using Raspberry Pi!","authors":"D. V","doi":"10.55041/isjem00371","DOIUrl":"https://doi.org/10.55041/isjem00371","url":null,"abstract":"Here we propose IOT based theft detection project using Raspberry Pi where we use image processing on live video to detect theft using motion and also highlight the area where motion occurred. This system secures offices/homes from theft by instantly detecting theft as well as allowing user to view the theft details thereby highlighting the theft details and saving the video in a usb drive. In this system we use a camera along with raspberry pi along with a circuit with LCD display IR for night vision and USB drive for storage. The system is powered y a 12V power supply. As soon as camera motion is detected in camera footage the system uses image processing to detect exact area of motion ccurrence and highlights it accordingly. The system now transmits the images of the occurance over IOT to be viewed by user online. We here use IOT Gecko to develop the online system. Also it stores the footage in a USB drive for further reference. The user can now decode the data sent online using IOT Gecko IOT system to view the images of the motion occurance live remotely over internet. Thus the system provides an innovative approach to theft detection using IOT.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132698888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Learning Management System (LMS) is a web-based application that enables organizations and educational institutions to manage and deliver online courses and programs. This system facilitates learning and training by providing a variety of tools such as video lectures, assignments, quizzes, and progress tracking. The LMS Php project aims to develop a web-based platform for managing and delivering online courses and programs. The system will be designed to provide an interactive and engaging learning experience for users.
{"title":"LEARNING MANAGEMENT SYSTEM","authors":"Mrs. N. Amutha, Gokul Prasath","doi":"10.55041/isjem00449","DOIUrl":"https://doi.org/10.55041/isjem00449","url":null,"abstract":"A Learning Management System (LMS) is a web-based application that enables organizations and educational institutions to manage and deliver online courses and programs. This system facilitates learning and training by providing a variety of tools such as video lectures, assignments, quizzes, and progress tracking. The LMS Php project aims to develop a web-based platform for managing and delivering online courses and programs. The system will be designed to provide an interactive and engaging learning experience for users.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132199897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moving on, this car rental project system project in PHP focuses mainly on dealing with customers regarding their car rental hours and certain transactions. Also, it displays all the available cars on the home page whereas the users cannot view unavailable cars until and unless the user returns the rental car. The project is divided into two categories: Customer Login and Employee Login. In an overview of this web app, the employee has full control of the system. Talking about the project, a customer can simply log in or register their accounts. He/she can view available cars, select any one and proceed for rental after selecting various conditions, dates, etc. After all, the customer can rent a car by filling up the given forms. The customer can view all his rental records and history once after logging onto the system. In addition, the customer needs to return the cars using the system because all the records are carried throughout the system. At last, the system prints an invoice stating all the information with total costs. Keywords:car, re
{"title":"Car Rental Web Application","authors":"Sadhana K","doi":"10.55041/isjem00413","DOIUrl":"https://doi.org/10.55041/isjem00413","url":null,"abstract":"Moving on, this car rental project system project in PHP focuses mainly on dealing with customers regarding their car rental hours and certain transactions. Also, it displays all the available cars on the home page whereas the users cannot view unavailable cars until and unless the user returns the rental car. The project is divided into two categories: Customer Login and Employee Login. In an overview of this web app, the employee has full control of the system. Talking about the project, a customer can simply log in or register their accounts. He/she can view available cars, select any one and proceed for rental after selecting various conditions, dates, etc. After all, the customer can rent a car by filling up the given forms. The customer can view all his rental records and history once after logging onto the system. In addition, the customer needs to return the cars using the system because all the records are carried throughout the system. At last, the system prints an invoice stating all the information with total costs. Keywords:car, re","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: With a significant detrimental impact on the environment and society, the fashion industry has emerged as one of the most polluting and resource-intensive sectors of the global economy. This research paper explores the necessity for sustainable fashion, how it will assist to address the aforementioned issues, and how we, as a community, can positively impact the fashion industry and change it. The paper will cover a variety of subjects and provide a comprehensive overview of the environmental impacts of the fashion industry, including its impact on waste generation, greenhouse gas emissions, and water contamination. Fast fashion's societal impacts are discussed, including subpar working conditions, employee exploitation, and violations of human rights. Further investigation is done into the meaning and practises of sustainable fashion, as well as its potential benefits, such as its capacity to enhance the social and economic conditions in the industry and minimise its unfavourable environmental consequences. In order to create a sustainable fashion future, the paper promotes cooperation among businesses, consumers, governments, and civil society. It highlights the pressing necessity for the fashion sector to make the switch to more environmentally friendly practises. Purpose: The purpose of this research paper is to study consumer attitudes and behaviour towards purchasing sustainable fashion in India and further examines the current scenario of fast fashion and how deeply rooted it is in the mind of consumers.
{"title":"A Study on the Awareness and Perception towards Sustainable Fashion","authors":"Dr. Seema Sambargi, Manish Tripathi","doi":"10.55041/isjem00421","DOIUrl":"https://doi.org/10.55041/isjem00421","url":null,"abstract":"Background: With a significant detrimental impact on the environment and society, the fashion industry has emerged as one of the most polluting and resource-intensive sectors of the global economy. This research paper explores the necessity for sustainable fashion, how it will assist to address the aforementioned issues, and how we, as a community, can positively impact the fashion industry and change it. The paper will cover a variety of subjects and provide a comprehensive overview of the environmental impacts of the fashion industry, including its impact on waste generation, greenhouse gas emissions, and water contamination. Fast fashion's societal impacts are discussed, including subpar working conditions, employee exploitation, and violations of human rights. Further investigation is done into the meaning and practises of sustainable fashion, as well as its potential benefits, such as its capacity to enhance the social and economic conditions in the industry and minimise its unfavourable environmental consequences. In order to create a sustainable fashion future, the paper promotes cooperation among businesses, consumers, governments, and civil society. It highlights the pressing necessity for the fashion sector to make the switch to more environmentally friendly practises. Purpose: The purpose of this research paper is to study consumer attitudes and behaviour towards purchasing sustainable fashion in India and further examines the current scenario of fast fashion and how deeply rooted it is in the mind of consumers.","PeriodicalId":285811,"journal":{"name":"International Scientific Journal of Engineering and Management","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}