The main objective of this Android project is to provide rich and relevant travel-related information to users on the move. The idea is to create a smart travel guide app that users can access anytime and from anywhere. Since the proposed app is based on request and response, it does not require the continual acquisition of bandwidth. Mca Projects Topics 2022 2023
While visiting new places, tourists often have a complaint that they cannot access and obtain travel information timely and on-the-go. This smart travel guide app seeks to solve that problem by generating feature-rich texts, pictures, videos, and any other guidance-related details requested by the users so that they can explore tourist destinations better. Modules of the app include Find Current Location, Locate in Map, Video Search, Weather Forecast, and Calculate Distance between two Cities,
Mashup technology is used for designing this travel app because Mashups, based on open web APIs, holds the potential to integrate applications and data sources to create unique and situational web services to cater to the needs of users.
Android is an operating system based on a modified version of the Linux kernel, and it was primarily designed for touchscreen mobile devices such as smartphones and tablets. It is known to everyone that building projects in Android play the most important role for any android developer. Becausethebest way to learn Android is by developing some basic projects to some advanced projects.
As one of the longest-running Android-focused blogs, Talk Android is a solid source of information for all news on the Android OS. On this blog, you can find stories about the latest Android news, pieces about the industry, reviews on Android devices, as well as guides to using Android devices. The site covers a wide scope, so it can be good for people that want information that is a little more in-depth.Web Application Project Ideas For Students 2022 2023
As one of the longest-running Android-focused blogs, Talk Android is a solid source of information for all news on the Android OS. On this blog, you can find stories about the latest Android news, pieces about the industry, reviews on Android devices, as well as guides to using Android devices. The site covers a wide scope, so it can be good for people that want information that is a little more in-depth.
Login authentication is a vital process, widely followed by organizations to keep their servers safe by allowing access only to authenticated users. Every website or application demands users to complete the login authentication process to cement their credentials for security and to improve user experience. Working on login authentication web development projects for final-year students is an excellent way to improve one’s development skills.
This is a beginner-level project that is great for honing your JavaScript skills. In this project, you will design a website’s login authentication bar – where users enter their email ID/username and password to log in to the site. Since almost every website now comes with a login authentication feature, learning this skill will come in handy in your future web projects and applications.
Lerdorf, a Danish-Canadian developer, developed PHP, then known as Personal Home Page (PHP) tools, to track the traffic on his personal home page. He released the code to the public by adding new functionalities in 1995. Since then, PHP has come a long way with extensive updates and bug fixes, building a steady and loyal following over almost three decades.
This easy-to-learn and free-to-use language allow developers to choose between different protocols, scripting languages, platforms and databases. Its distinguishing feature is that the PHP code is initially executed in the server, and only then is the result returned to the browser. The client (and the browser) can only view the result of the PHP script but not the code itself. bca mini project topics in php
Learning PHP is secure, and if you’re a beginner who wants to learn web development, then you can start with this language. Flipkart, Facebook, Wikipedia, are some of the websites based on PHP.
It is open-source, so you can use it free of cost.
It is simple, fast, efficient, and, more importantly, secure.
You can embed it with HTML files, and PHP files can also contain HTML codes.
You can run PHP on any device, whether your smartphone, tablet, desktop or laptop.
WITH the cumulative demands for the interior broadband hypermedia wireless spread amenities, the current radio frequency (RF) based keys, such as Wi-Fi, digital television terrestrial broadcasting (DTTB), etc., have to indenture with the serious supernatural overcapacity issues, especially in the massive shopping mall or opaque inhabited buildings. In this framework, visible light communications (VLC), which apply the revealing light-emitting diode (LED)[1] for broadband broadcast, offers a huge and unrestricted bandwidth to handle with crowded radio spectrum for highly-localized communication systems.
Besides, the VLC technology has many other attractive features, such as worldwide availability, contamination free, high-capacity, and etc., and hence is deliberated as an appealing alternate of RF expertise for indoor multimedia coverage. However, VLC must entrance the support system in case of being the alleged ―data remote keyǁ to grasp the memo initiative. The imaginable and spontaneous system charge solution for VLC is relating the LED lamps tothe modem via system chains, which involves great modification of the interior design and is not economical. The Incorporation of VLC and power line communications (PLC) comes from the observation that all the LED lamps are associated to the power line and the power line can logically act as the support for VLC while driving the LED lamp. In this way, it will save the added cables and be tranquil to be connected. The first PLC and VLC integration model was projected in 2003, using only carrier binary phase shift keying (SC-BPSK) accent to provide a low rate transmission. Then orthogonal frequency division multiplexing (OFDM) is realistic in the mixture PLC and VLC system to combat the declining channel and accomplish higher spectral efficiency. However, in the field of PLC and VLC unified systems for interior spreading, there are still some challenges, such as the channel of the whole announcement link can be modeled as How to design the erection of the incorporation grid to diminish the layout modification as well as the linkage decorum complexity; 2) All the samples still endure in the point-to-point and off-line message structure and there are no employment reports of a realistic indoor diffusion system based on PLC and VLC with OFDM methods; 3) Some technical details comprising the channel displaying, coded variety, frequency band slice, network protocol and so on, are needed to be choice and verified. In this paper, we direct a novel and money-making indoor broadband dispersion system based on the deep mixture of PLC and VLC to mainly address those issues listed above, a two-lamp system demo is executed and the routine estimation is carried out in the workshop. The assistances of this paper can be specified as follows. 1) A extremely united PLC and VLC system is probable in this paper for efficient indoor broadband diffusion, where the signal in the power line is amplified and promoted to the LED without translating and all the LED lamps in one group handover the same signal. In this way, the diffusion network could be homogeneous and characterized as a single rate network (SFN), which avoids intricate web switching for the devices roaming concerning different LED lamps. 2) A prototype joined PLC and VLC system thru two LED spots with accretion load data rate over 48 Mbps data rate within 8 MHz bandwidth is caused in the enquiry plant. The length of the power line part is 200 meters and the statement distance of visible light part is 3 meters with the control of the white LED being 1W (in our point-to-point system, the life-threatening communication coldness of evident light part is 8 meters with the same power), of which the act is the best ever in the reported operations. 3) Investigations are accepted out on the demo to evaluate the concert of the proposed system. It can be found that in the future system, multi-path and thus good Recital can be reached over full-grown channel assessment and equalization systems. The rest of the paper is planned as follows, in Section II we have described the system model of the individual placement design of this module, Academic investigation in Section III, March and Implementation in Section IV and Geographies of the recommended system. Section V concludes the paper. Code Shoppy
A.e-Marketing The effective e-marketing strategy is an important element for the success of any type of business [4]. The uniqueness of e-marketing is created using a series of specific function and relational combined with 4P (Price, Product, Place, and Promotion) to form a mix element of e-marketing, which contains a mixed tool e-marketing that provided on the business website to facilitate sales transactions. According to [5], thing that gives uniqueness to e-marketing is the merging of the traditional marketing concept with a series of relational functions with a new formula 2P + 2C + 3S (Personalization, Privacy, Customer Service, Community, Site, Security and Sales Promotion).
B.Consumers Lifestyle The concept of lifestyle patterns and their relationship to the marketing was introduced in 1963 by William Lazer [6]. The lifestyle patterns were defined as a system concept that has broad meaning [6]. The approach that most widely used for measuring lifestyle has AIO (Activities, Interests, and Opinions). Lifestyle as used in lifestyle segmentation research can measure some things. First, community activities, in terms of how they spend their time. Second, their interests, what they overlooked in their surrounding environment. Third, their opinion, in terms of their views about themselves and the world around them. Fourth, some basic characteristics like the stage of their life cycle, income, education, and where they live. The lifestyle classification can be defined as an integrated pattern of three things [7]. First, the activity consists of hobbies, sports, likes and dislikes for shopping, social activities. Second, the interest consists of food, fashion, family, and leisure. Third, the opinion consists of social problems, business, and government. The lifestyle characteristics have a major impact on buying behavior [8]. In a consumer environment, one chooses a product or brand, which seems to elaborate his lifestyle. Consumers can make a choice in the consumption environment in order to determine or actualize their lifestyle, identify through the selected product, or brand. Consumers select, purchase, and consume the intended goods and services, so that they can define, or extend their identity and lifestyle. The result of the research concluded that there is a casual effect on the individual’s lifestyle consumption behavior. Lifestyles affected the purchase decision [9]. The study found that consumers of lifestyles will affect the purchase decision. For example, consumers who like outdoor activities concerned with things that are fashionable, and they have a willingness to pay with a greater attention to experience the brand image, product quality, and notoriety of product brand. Based on the description above, the formulation of the problems in the research on e-marketing, consumer lifestyle and purchasing decision making style focus were limited to issues with the subject as follows : •How does the influence of e-marketing towards the movie tickets purchasing decision making style through the website? •How does the influence of consumer life style towards the tickets purchasing decision making style through the website? •How does the influence of e-marketing and consumer life style simultaneously towards the movie tickets purchasing decision making style through the website? Code Shoppy
C.Consumer Decision Making Style Modern marketers showed a growing interest in research of the consumer purchasing decision making style to understand how an individual makes a buying decision in a competitive environment [10]. This concept is important because it determines the pattern of consumer behaviour and relevant for market segmentation. Most of the previous researchers have adapted to the Consumer Style Inventory (CSI) introduced by Sproles and Kendall in 1986 as a general tool to assess the customer’s decision making style. Reference [11] showed that the product quality, product brand, fashion, recreation, product price, impulsiveness, overchoice confusion, and brand loyalty influence purchasing decisions. It can not be ignored that many young consumer demand in purchasing online, especially the consumer is influenced by the quality of products, brands, and fashion.
Consumers think that online shopping is a leisure experience and recreational values. Consumers also defend their favourite brand. They are critically influenced by peers and friends in shopping online. Other studies [12] indicates that there is a significant relationship between online consumer decision-making styles and comparison shopping proneness. Consumers with perfectionism style need to compare what is being spent in order to get to their “perfect” choices. Consumers also think that the comparison shopping tool will help them. Similarly, consumers searching for the best value in shopping at websites to find appropriate choices. There are seven styles of consumer purchasing decision making, which are Brand Consciousness, Perfectionist, High Quality Consciousness, Recreational, Hedonistic Consumer, Impulsiveness, Price-Value Consciousness, Confused by Over Choice, Novelty-Fashion Conscious Customer [10]. With the identification of problems that have been described previously, the objectives that could be addressed through this study are as follows : •To determine the influence of e-marketing towards the movie tickets purchase decision making style through website. •To determine the influence of consumers’ life style influence towards the movie tickets purchase decision making style through website. •To determine the influence of e-marketing and consumers life style simultaneously towards the movie tickets purchase decision making style through website.
There are a number of past and ongoing research efforts on the development of e-voting systems. These works largely focus on requirements, technical specification and implementation technologies to support different aspects of the elections from registration and verification through balloting to counting and result. A major shortcoming of these studies is their sole focus on technical aspect of e-voting solution wit/lOut significant attention paid to human and environment factors that arguably determine the successful adoption of such e-voting solutions. This paper addresses this design gap in three steps. First, it provides a conceptualization of e-voting system as a socio-technical system. Second, it elaborates a set of principles to guide a socioteclmical design for e-voting. Third, it provides concrete implications of these principles. The paper concludes on the pragmatics of this approach to e-voting adoption particularly in environment such as Nigeria.
E-voting constitutes a very important aspect of ICTenabled democratic governance [1]. E-Voting solutions generally aim at increasing participation, improving the outcomes elections by addressing challenges associated with traditional voting practices. The notion of e-voting in this paper refers to the use of technology to support one or more of the major phases of the electoral process – from registration stage in the pre-voting phase to voting/balloting and verification to counting or tallying after voting [2], [3]. Although, the term is often associated with the use of electronic channels like the Electronic Voting machines or the internet for casting votes, its use for ICT-enabled voter enrollment or registration is gaining popularity particularly in the developing world. Generally, there are mixed sentiments regarding e-voting adoption, particularly in the aspects of vote casting. For example a number of countries like Netherlands, Germany and Ireland moved away from the use of e-voting for balloting after initial adoption [1]. E-Voting using Electronic Voting Machines (EVM) have also remained controversial in the United States. While e-voting is generally perceived as generally risky [4], there is some consensus that the benefits of e-voting outweigh the actual risks. In this light, developing countries have shown significant interest towards the adoption of e-voting. Given that elections in developing countries attract significant controversies and are fraught with several challenges, the idea of trying any credible alternative is a plausible strategy. While not completely oblivious of the risks involved in evoting, research contributions on e-voting in Africa such as [5] and [6] have largely focused on technological design of evoting systems. However, designs espoused in these works largely ignore: the social context in which the e-voting systems will enacted, peculiar needs of different users (e.g. voters) and the organizational context of the Electoral Authority. Direct experiences of the authors based on adoption and implementation of e-voting solution in Nigeria show that these shortcomings significantly impact the effectiveness of the solution and could potentially compromise the outcome of the elections. A way to address this problem is to adopt a Sociotechnical System (STS) design framework for e-Voting systems. Socio-technical systems approaches advocates a human-centric analysis which considers the impact of the technical or computing sub-system on people and how technology can be designed more effectively for people [7]. The goal of an STS system is to collectively optimize the technical, social and environment subsystems [8]. We consider in this paper the design of e-Voting systems as a socio-technical system. Our goal is to augment existing knowledge about requirements and design of e-Voting systems by the specific design principles that must underpin any e-voting solution when considered more holistically as a socio-technical system. For illustration, we highlight implications of these principles for e-Voting solution in the Nigerian context.
The notion of e-Voting as an STS makes its inherent complexity more apparent. For instance, the need to operate evoting system across different boundaries such as geographical, cultural and temporal boundaries, characteristic of complex systems [8] are not discussed in technical designs of e-voting. These principles make them explicit, for instance see principle #2 in Table 1 above. Omission in this respect creates potential source of failure for e-voting system. Congruent with the principles elaborated here, Chevallier et al [15] identified three core success factors for the Geneva’s evoting project – the role of politics, organization of trials involving voters and other stakeholders and having an interdisciplinary team comprising Legal experts, security CERN, sociologist and political scientists. However, along the clear benefits for the adoption of a STS approach to e-voting design, we must point out some inherent challenges in operationalizing such approach, particularly in the developing country context. For instance, the classical STS approach requires iteration between design implementation and operation to enable continuous improvement and shaping of solution. The practicality of this in terms of participation of stakeholders and resource implication may be limited. Thus, there will be the need to carefully identify principles that could be supported in different context and under the prevailing temporal constraints for the overall election process. View More
This article illustrates college sports management system and its characteristics, and also put forward some issues on implementation of college sports computer application management system. Meanwhile, the paper presents the ideas on the application of computer management according to the trend of development in colleges’ managements.
FEATURES OF COMPUTER APPLICATION MANAGEMENT SYSTEM FOR COLLEGE SPORTS
A more complete college sports computer application system should include the following sections (sub-system) as figure 1. Computer application management system for college sports has the following characteristics. A. Be OverallComputer application management system for college sports includes the college physical education, training, scientific research and logistics management and other aspects, and various sub-systems are constructed by a number of modules, such as physical education management system constituted by student attendance, physical fitness, and performance of “National health standards for physical fitness of students,” and etc, with a function of statistical analysis, which makes sports management computer so that scientific and systematic.
B. Be Recurring The data processing and analysis of college sports daily work, teaching and the group work should be recurring and continual. In a sense, computer could provide faster, more comprehensive, more accurate and timely services which could save us a great deal of manual work on searching, aggregation, tabulation, printing, inquiry, editing, and storage and so on. For example, if anyone wants to inquire his P.E. results, he could simply enter his school ID or faculty, classes and his name and the computer will print out the results of his, physical performance and physical health achievements.
The develosoci ty. We have already entered the informatione completion of the information superhighway anblishment of e-education network, which will certainly influence our traditional education in all over the last hundreds of years. This article illustrates college sports management system and its characteristics, and also put forward some issues on implementation of college sports computer application management system. Meanwhile, the author presents his ideas on the application of computer management according to the trend of development in colleges’ managements. We must fully understand the drawbacks of the traditional education and management and then use modern information and computer technology to change them in an educational revolution. Click Here
The rapid development of the Internet has increased the number of users shopping online. Many sellers thus focus on the shopping behavior on online environment. In this competitive environment, managers must understand factors that affect the online purchase behavior of customers to increase and maintain their competitive advantage. Therefore, this study aims to explore antecedents of online shopping behavior. Based on the social cognitive theory, this study proposes a research model of online shopping behavior. Code Shoppy This study argues that trust positively affects online shopping behavior; perceived website complexity negatively and directly affects online shopping behavior, and indirectly affects trust online shopping behavior via trust. These research results can be seen as references by future scholars and practical suggestions for platform managers to improve their businesses.
The number of online shoppers has increased in recent years. Reference [1] indicated that more than 60% of American consumers shop online at least once a month; only 1% has never shopped online. Reference [2] showed that in the past 12 months, more than 70% German and Finnish users have used the Internet to shop, and over 80% English users shop online. Reference [3] indicated the Internet enables companies and consumers to interact with each other through electronic commerce. In the wake of the enormously profitable online market, the competition among shopping websites is keen. Understanding the issue about online shopping is important for online sellers.
Thus, this study focuses on the determinants of online shopping behavior. Purchasing is the main method of obtaining actual products, regardless of product type (physical or digital) [4]. A variety of explanatory models have been developed and aimed at predicting and explaining online purchasing behavior based on user acceptance theories such as the technology acceptance model (TAM) and the theory of planned behavior (TPB). Such studies have improved understanding of why individuals purchase products/services online [5]. Recent studies have demonstrated that the environmental factors are important for fostering shopping behavior [6]. For example, store environment may influence product evaluation and store choice. However, previous studies, such as TAM and TPB, less concern the influence of environmental factors on online shopping behavior. In social cognitive theory, there is a triadic mechanism among personal characteristics, such as cognitive states, psychical features, such as external environment factors, and behavior [7]. Social cognitive theory is a strong theory that accounting for the human behavior argued by [7]. There are many studies adopting social cognitive theory to explain the online customer behavior. Reference [8] used social cognitive theory to assess the determinants of internet banking adoption. The results shown that websites’ social feature, trust, compatibility with lifestyle and online customer services have a significant effect on customers’ intentions to adopt Internet banking. Reference [9] adopted social cognitive theory to consider the role of personal factors and environmental influences in individual behavior. The results of these studies are shown that social cognitive theory is a powerful theory for validating individual behavior. Reference [10] indicated that using the social cognitive theory proposed by [11, 12] is a novel and useful starting point to guide future research in sustainable consumption. However, few studies have employed social cognitive theory to explain the antecedents of online shopping behavior. Social cognitive theory, which is developed in social psychology, has received little attention within in online purchase field. Most of prior researches which employed social cognitive theory as a theoretical framework focus on the specific aspect of social cognitive theory, such as the self-efficacy and outcome expectancy [9]. The core concepts within the social cognitive theory, in particular environmental and personal dimensions are less concerned. For further understanding the issue about online shopping behavior, this study adopts social cognitive theory to explore the antecedents of online shopping behavior by considering personal factors and environmental factors. In social cognitive theory, regarding on personal factors, [7] expressed that cognitive state is a kind of personal characteristics. On a shopping website, trust is a key factor influencing consumer decision [13]. Trust can be defined as the trustor perceives that the trustee has the ability, integrity, and benevolence features to bring benefit to the trustor [14]. That is, in this study, trust can be regarded as a cognitive state of social cognitive theory. Reference [8] indicated that website features are essential in determining the usage of a website. The layout, design, features, and characteristics of websites are considered as website design. Thus, this study adopts perceived website complexity which is proposed by [15] as an environmental factor of social cognitive theory. This study explores the determinants including trust and perceived website complexity of online shopping behavior. The results can be seen as practical suggestions for platform managers to improve their business.
Based on social cognitive theory, this study proposes a research model to explore the relationships among trust, perceived website complexity, and online shopping behavior. Besides, previous studies have indicated that online store environment is a key factor influencing online purchase [23]. However, perceived website complexity is less considered. Thus, this study regards perceived website complexity as an environmental factor and explores the relationship between perceived website complexity and online shopping behavior. Understanding this issue will contribute to online shopping research agenda and will help online shopping managers to obtain advantages in the face of environmental stresses. Future works can collect and analyze empirical data to verify this research model.
Nowadays almost all highways toll plazas are manually operated, where an operator collects cash from the driver and provides a receipt. Since this procedure can be slow, we often encounter traffic jams at the toll plazas on busy highways. Automatic process of toll collection will save time, effort, and man power. In this work propose a low cost and efficient technique called Electronic Toll Collection using RFID modules that automatically collects the toll from moving vehicles when they cross the toll plaza. We also assume that an owner maintains a prepaid account, so that toll tax is deducted automatically from the driver’s account at toll plaza. If the balance in the owner’s account is low or if the vehicle is not equipped with an RF system, the toll gate remains close. In such a case vehicle owner will have to pay the toll tax in cash and collect the receipt. The owner receives an SMS message on his/she mobile about the details of the payment and there is no need for him to stop the vehicle. How many vehicles passing through the toll gate stored in a database. We can also find out a vehicle how many times passing through the toll gate in a day. Through this process of toll collection will save time, effort and man power.
The automatic toll e-ticketing system is the approach used for the vehicle when it reaches the toll plaza, this is detected by using Infrared Proximity Sensor. RFID tags are used to read each vehicle with the help of RFID reader. An IR receiver is used to receive these pulses and sends it to a controller (MSP 430 Launch pad), which then transmits the vehicle number through the RF transmitter located in vehicle. We assume that vehicles have 16-bit identification numbers. The RFID [3] tags to readers read the signal and information about vehicles owners. These RF signals are received by an RF receiver at the toll plaza, which send data to a computer’s parallel port. A software program running on the computer retrieves vehicle details from its vehicle database. Depending on this information, appropriate toll tax is deducted from the pre-paid account of the vehicle’s owners [8]. The owner receives an SMS message on his/her mobile about the details of the payment [1]. If the balance in the owner’s account is low or if the vehicle is not equipped with an RF system, the toll gate remains close. Next method proposes a very simple method for enhancing the performance of infrared electronic-toll-collection systems, in such a case, the vehicle owner will have to pay the toll tax in case and collect the receipt, Figure 2 explains the concept in the form of a block diagram. We need a system for handling violation and acknowledgement when a vehicle does not have an RFID module installed, a vehicle’s ID number is not found in the database, or a driver has insufficient funds to pay toll [9]. If an acknowledgement is not received in a predefined time from the database, the toll plaza gate remains closed. Existing automatic toll collection techniques incur power loss since the receiver is continuously turned on, even when no vehicle arrived at a toll plaza [2].In our technique, only the IR sensor is turned on to detect the arrival of vehicles. Only when a vehicle is detected, RFID Tag to RFID reader reads the data.
SOFTWAREIMPLEMENTATION A.MICROSOFT ACCESS For secure and easy access of the database, we used Microsoft Access which is relational database management system from Microsoft Corporation.Microsoftaccess is supported by Visual Basic for Applications, an object-based programming language that can reference a variety of objects including DAO (Data Access Object). B.VISUAL BASIC Visual Basic 6.0 was used to interface the microcontroller with the personal computer in the e-toll plaza. The inputs from the microcontroller are given to the PC’s parallel port and this Data is retrieved by VB 6.0 software program, which manages the database. On receiving the input from the MSP430G2553 microcontroller, the program deducts the toll amount from account balance, returns success or failure acknowledgement to the controller and runs an executable file to send the transaction statement as SMS to the owner’s mobile number from the database. See figure8 which show the GUI. C. SENDING SMSWe made use of SMS send, Message to be sent are register in “SEND_SMS”. The transmission is activated by setting the START_SMS parameter once an open source software which helps connect the mobile phone as a GSM modem to the computer via a data cable. The software uses the SIM card in the mobile phone to send the SMS. The mobile is connected to the computer via COM. The operations of the software are automated using a Message Loop (default). It is wise to call this function many times per second in a loop; otherwise, you will have a slow or unresponsive GUI. COM extensions provide a common interface for working with software applications in a Microsoft environment. Applications have defined COM objects that can be used in AutoIt (and other programming languages) to manipulate the applications and perform tasks within them. To use COM objects, you must know the object name and its properties and methods. C.IAR Workbench IAR Workbench Kick start version provided by Texas Instruments was used to develop the microcontroller programs as it was user friendly and has both simulation and debugger mode. This also makes the process of loading the programs to the controller faster and easier.
The security at the toll booth will improve in this system and it will become possible to detect stolen vehicles. Since cars do not have to stop at the toll booth, savings on fuel from repeated stops for vehicles, and reduction in accidents. There are several limitations of the proposed system. It requires a user to have a dedicated prepaid account. Since the infrared proximity sensor is used in detecting the arrival of vehicles, there can be interface from external source of light. Since highways are operated in two directions, If computer of the toll plaza are connected in a network, then a vehicle from one state can use the automated facility of a toll booth in another state. The unique identification number of vehicle can be increased to larger number. Vehicle theft can be prevented by anti-theft alarm along with this kit.
In this Paper, the concept of Automated toll e-ticketing using MSP430 Launch pad. We have used an innovative approach where a traveler will be able to pay the toll while in motion using RFID communication technology. Through this process of toll collection will save time, effort, and man power. How many vehicles passing through the toll gate stored in a database. We can also find out a vehicle how many times passing through the toll gate in a day. The improvement can be done to develop a multi vehicle amount deducted and send a SMS at a time multi vehicle. View More
This paper studies the problem of secure transmis-sion in dual-hop cooperative networks with untrusted relays,where each relay acts as both a potential helper and an eavesdrop-per. A security-aware relaying scheme is proposed, which employsthe alternate jamming and secrecy-enhanced relay selection toprevent the confidential message from being eavesdropped by theuntrusted relays. To evaluate the performance of the proposedstrategies, we derive the lower bound of the achievable ergodic se-crecy rate (ESR), and conduct the asymptotic analysis to examinehow the ESR scales as the number of relays increases
Recently the applications of Physical-Layer Security(PLS) techniques in cooperative networks have attractedconsiderable attention. Among the candidate PLS solutions,cooperative jamming (CJ), which exploits the cooperating usersto transmit the artificial noise, is a promising tool to combateavesdropping [1], [2]. To harvest the diversity gain whileguaranteeing the security requirement, great efforts have alsobeen devoted to combine CJ and relay selection [3]–[5].Common to [1]–[5] is that all of them assume the relays aretrusted, and the eavesdroppers are external entities in additionto legitimate parties. However, in some applications, the relaysthemselves areuntrusted, from which the transmitted messagesmust be kept secret. For example, in heterogeneous networks,the relays may have a lower security clearance (and thus alower level of information access) than the source-destinationpair. The research on untrusted relay systems was pioneeredby He and Yener in [6], where the non-zero secrecy rate isproven to be achievable by enlisting the help of the destinationwho performs jamming. In [7], the joint beamforming designat the source and the relay was proposed for MIMO untrusted relay systems. In [8], the secrecy outage probabilities of severalrelaying schemes were analyzed. Code Shoppy In [9], the power allocationpolicy was developed for amplify-and-forward (AF) untrustedrelay systems.Although diverse results on untrusted relay systems havebeen reported, the majority of existing works deal with the sim-ple model with only one relay node. For multi-relay networks,[10] analyzed the relationship between the system secrecycapacity and the number of untrusted relays. Reference [11]proposed to use relay assignment and link adaptation to realizeboth secure and spectral-efficient communications. However,[10] and [11] only considered the information leakage prob-lem during the first phase of any two-hop transmission. Thissimplifies the protocol design, but may not hold in practice.Unlike [10] and [11], we in this paper try to secure thetransmissions of both the first and the second phases, and ourcontributions are threefold: First, an alternate jamming methodis introduced to prevent information leakage. Second, both opti-mal and sub-optimal secrecy-enhanced relay selection policiesare proposed. Third, the lower bound of the achievable ergodicsecrecy rate (ESR) is derived, and the asymptotic analysis ofthe ESR is given as well.
A.AIM:Currently Exam cell activity mostly includes a lot of manualcalculations and is mostly paper based. The project aims tobring a centralized system that will help both the students andexam cell staff members to manage exam cell related activitiesin a very easy and efficient way by using an automated systemfor exam cell i.e.” E – Exam Cell”. B.OBJECTIVE:As we already know that our traditional system dependsmostly on paper work, so our main purpose is to replace theactivities easily. It will allow the students to register and enrol themselves into our system by sharing all the details with thesystem. Code Shoppy It will allow only registered students to login which willprevent unauthorized access. It aims to provide an easy way tofill any exam related forms, KT forms and traditional manualsystem of colleges to an automated system that will handle theentire exam cell related also to generate hall ticket and marksheets by remotely accessing the system without wasting anytime.
As discussed earlier there are lot of problems in the existingsystem of our college as it requires a lot of manual paper workand manual calculations. Due to this manual process the examcell activities are very slow and requires a lot of time of bothstudents and exam cell staff and it is also very difficult forrecord keeping purpose of students. The current system requiresmanual entry of each student’s personal details, subjects to beappeared, also K.T has to specify if students have one. Also, asper the new examination pattern the marks has to calculatedbased on CGPI/SGPI of each student which is also very tediousjob and requires a lot of time. The exam cell staffs have to fillall this details personally in their system for maintaining thestudent’s information. Also, processing of all this details is verydifficult and requires a lot of precious time. The students alsohave to fill the exam form, K.T form, Revaluation form etc. andalso for hall ticket the students have to fill the hall ticket formwith photo and later have to verify in each semester. This is alsoa very hectic job for students as they have to collect the formpersonally by standing in a long queue and then fill the formmanually. After verification of form(s), it has to be submittedin office. Hence there is a need of a better system which willhandle this entire problem remotely and which will ease theprocess of filling forms, submission of forms, collecting halltickets and mark sheets.
Current exam cell activities are mostly done manually andit requires of lot of paper work and also to maintain studentsrecord is very tedious and hectic job to do with our college’sexisting system. So, to overcome all this issue there is a need ofan automated examination cell system which will solve all thisproblem. Hence by keeping in mind all the problems addressedin previous system we have introduced an automated system forexam cell i.e. “E – Exam cell”. Students have to register for thefirst time with our system to enrol themselves by providingpersonal details, uploading photo and sign etc. which willgenerate a unique id for each student. The students can alsomodify/edit their details in future if required. Once registeredstudents can login to our website through their registered id andpassword and can fill various forms like Exam form, K.T form,Revaluation form without have to stand in a long queue. Aftersuccessfully filling and submitting the form the students canview or take print out of the form and can come later to examcell for verification and also our system will notify the registered students about any notices regarding Exam relatedactivities. The E – Exam cell admin can verify students formthrough his/her login id and can modify the students form ifstudents have made any mistake during filling the form and bychance submitted it. The hall ticket is also generated by oursystem and the exam cell admin can generate various marksheets of each student. Record keeping and maintenance with E – Exam cell is very reliable, secure, effective, scalable and easethe work of Exam cell staff. Thus, E-Exam cell is very usefulsystem for both students and Exam cell staff members.
A.WORKING OF THE SYSTEME-Exam Cell have database regarding students and theirresults and also other examination related information. Thereare Two main characters in this system which are as follows: 1.Students2.Exam Cell Department Staff(Admins)1.STUDENTSAll the students have to register themselves which formsregarding examination like Exam Form, creates a studentdatabase. Once all the students are done with the registrationprocess information is verified and username and password isassigned to each student which they can change it later on asper their convenience. Students have access to fill all theRevaluation Form, KT Form and so on. Role of student in thissystem is to enter information related to their semester. Studentcan also choose the elective subjects from here. In case of anyimproper information is uploaded by student then the studentcan contact the admin to resolve the problems. 2.EXAM CELL DEPARTMENTExam cell Department has the authority over all thedatabases which they can check and update according to theresults of the student. Main job of exam cell department is togenerate results and verify the student’s information. Studentsfrom all the branches need to get their documents, Exam forms,etc. verified by the admin. Admins are responsible for HallTicket generation, Results generation keeping track of numberof KT heads upon students if no of KT heads exceeds the limitthen the student is declared Drop. Students once getting Dropsare allowed to appear of the course if they clear their KT’s andbecome eligible for admission. Results of the examination willbe displayed by the admins either on the website or on thenoticeboard. Students will be getting notification regarding theRevaluation results which will save the time of students bywhich they did not need to rigorously read the notice board.
A.Existing Equipment 1)Major Items Of the total of A$104.6M existing major items, items with a value of A$64.3M required replacement within the 5 year planning period and were subject to prioritisation, while items with a value of A$6.5M did not require replacement as they were either backup units or redundant, were likely to be funded by leasing, or were funded by research grants. Aside from replacement, a further A$6.0M would be required for anticipated upgrades to existing equipment within the 5 year period.
2)Minor Items Using the BME inventory as a complete record of all equipment, each major item was identified in this inventory and removed. This process included identification of all system components and aggregates. The remaining list of equipment therefore consisted of Minor items. The replacement value of this stock of Minor items was determined to be A$26.2M. Assuming an average 10 year life expectancy for this equipment, approximately A$2.62M would be required to allow for ongoing replacement of minor items throughout the hospital each year. https://codeshoppy.com/shop/product/hospital-management-mobile-app/
B.Additional Major Items During interviews with departments, details of equipment required for normal service expansion and growth over the 5 year planning period was collected and prioritised. These results are summarised in Table 3. A number of strategic projects were also underway or anticipated within the 5 year period. These projects were redevelopment of the ICU, the opening of a dedicated day surgery and short stay treatment unit, a proposal for a dedicated neurosurgery operating theatre, a proposal for the introduction of a Tomotherapy unit for Radiotherapy, and the transfer of some currently outsourced medical imaging services to in-house operation. Additional equipment required for these projects was documented but not prioritised since equipment for each project was to be funded from separate budgets.
C.Discussion Many “views” of this data were prepared for the project’s final report. The more significant and revealing views are presented here. Figure 1 shows a pie chart of the existing equipment stock, and illustrates that Major items covered 80% of the total equipment stock by value. The method of dividing the equipment stock at the A$50,000 threshold in this case resulted in detailed planning information being collated for a very large proportion of the equipment stock. Figure 2 shows a histogram of replacement years for the existing major equipment. Items to the left of the current year (2007) were deemed overdue for replacement, and termed “backlog”. To the right of the current year it can be seen that expenditure requirements vary significantly from year to year. Figure 3 shows the breakdown of the existing major equipment stock by equipment category. It can be seen that medical equipment clearly dominates the equipment stock, with approximately 83% of the total value of equipment. However, other categories of equipment are also held in significant amounts. Code Shoppy
Figure 4 shows the existing major equipment stock holdings for each department. Standardised department names have been used to allow grouping of certain department with smaller equipment stocks. For example, the departments of Renal Dialysis, Vascular Laboratory, and Respiratory Medicine, (and others) are all grouped into Specialist Medical Departments. The main equipment stakeholders in the hospital are, not surprisingly, Medical Imaging, Radiotherapy, Operating Theatres, and Pathology. By combining the requirements for a) Routine Replacement of Existing Major Items, b) Planned Upgrades for Existing Major Items, c) Routine Replacement of Existing Minor Items, and d) Acquisition of Additional Major Items, the total expenditure requirements for the hospital for all equipment types for the 5 year planning period amounts to A$112.5M. This excludes additional equipment required for strategic projects, and assumes all equipment will be replaced or acquired as scheduled, and that the existing major equipment backlog is eliminated over this period. An overall equipment budget of approximately A$22.5M per year would therefore be required.
The deliverables for this project consist of the detailed final project report which provides a number of views of the existing major equipment data collated. Such management information provides an understanding of the existing equipment stock and the future outlook when current funding levels are continued. The prioritised equipment lists provide an invaluable starting point for consideration of possible equipment replacement options when funding opportunities arise. The prioritisation process provides an open and transparent method of measuring an item’s importance using a predefined set of criteria. As the data for the report is based on survey work involving identification and documentation of actual equipment items, it provides a convincing argument for the levels of funding required to adequately maintain the equipment stock and allow for normal growth. Such a view is absolutely necessary for the appreciation of the extent of reliance on technology has grown in modern health care facilities.
Along-track multichannel synthetic aperture radaris usually used to achieve ground moving target detection andimaging. Nevertheless, there is a design dilemma between azimuthhigh resolution and wide swath (HRWS). To solve this problemin HRWS mode, we introduce a virtual multichannel (VMC)scheme. For each virtual channel, the low real pulse repetitionfrequency (PRF) improves the ability of resolving range ambiguityfor wide-swath, and the high virtual PRF improves the capabilityof resolving Doppler ambiguity for azimuth high resolution. Formultiple virtual channels, strong ground clutter is eliminated bythe joint VMC processing. Furthermore, a detailed signal modelof a moving target in the virtual channel is given, and the specialfalse-peak effect in the azimuthal image is analyzed. Moreover, wepropose a novel ground moving target processing method basedon the VMC scheme and the clutter suppression interferometry(CSI) technique, which is called VMC-CSI. https://codeshoppy.com/shop/product/location-based-garbage-management-system-for-smart-city/ The integration ofdetection, location, velocity estimation, and imaging for groundmoving targets can be achieved. Accounting for the unresolvedmain peak and false peak for a moving target, in the VMC-CSImethod, we adopt a two-step scheme to estimate the radial velocityand along-track velocity, namely, rough estimation and precise es-timation. Meanwhile, considering the same interferometric phasesof the main peak and the false peak, we use false peaks first for therobustness of initial azimuth location estimation and remove falsepeaks afterward. Numerical simulations are provided for testingthe effect of the false peak and the effectiveness of VMC-CSI
Concept of VMCFig. 1(a) shows an along-track three-element SAR array,used for ground moving target indication (GMTI), where PRFdenotes the real PRF of the SAR system. The middle ele-ment indicates a multiplexing element used for transmittingand receiving. In a T/R snapshot, three spatial samples areformed, in which the numbering of “11,” “12,” and “13” denoteround-trip signification from the first transmitting element tothe first receiving element, the second receiving element, andthe third receiving element, respectively. Note that the loca-tion of the spatial sample can be approximately taken as anequivalent phase center that is positioned midway between theseparate transmitting and receiving elements [27], [39], andit is defined as the location of the virtual element. Hence,we can obtain three data channels in multiple T/R snapshots.Fig. 1(b) shows an MPC-SAR array for the purpose of HRWSstatic-scene imaging. Similarly, in a T/R snapshot, it receivesthree spatial samples. However, they are jointly processed, anda virtual channel is reconstructed for the MPC-SAR system.To simultaneously achieve GMTI and static-scene imaging in HRWS mode, VMC can be divided in a manner shown inFig. 1(c). The numbering of “21,” “22,” and “23” denotesround-trip signification from the second transmitting elementto the first receiving element,the second receiving element,and the third receiving element, respectively. The low realPRF ensures no range ambiguity in wide swath. Moreover, ineach virtual channel, temporal sampling is replaced with spatial sampling, and this overcomes the contradiction between wideswath and high azimuthal resolution. In addition, the unitedprocessing among the VMCs can realize detection and imagingfor the ground moving target in HRWS mode. It is noticed thatalthough a MIMO-SAR array in Fig. 1(c) is used to illustratethe VMC concept, the VMC can also be reconstructed by theexisting along-track multichannel SAR array at the price ofmore receiving elements.
First, the three virtual channels are gen-erated as shown in Fig. 1(c). Then, the strong ground clutteris suppressed by the displaced phase center antenna (DPCA)technique. Second, the interferometric phase information of thetwo cancelation channels after clutter suppression is extractedand used to estimate the initial location of the moving target. Code Shoppy In theory, the real main peak and the false peaks have thesame interferometric phase. Therefore, the mean of multipleinterferometric phases can be used to improve the locationprecision. Third, Doppler centroids corresponding to the realmain peak and false peaks are taken as candidates to betested. Together with the initial location information, a set ofradial velocity is obtained. Then, the phase error compensationfunction is constructed. The image entropy or image contrastis taken as the criterion, and the 2-D real velocity is unitedestimated. Finally, the multiple estimated parameters of thetarget are used to compensate for the error signal and constructthe azimuthal matched filter of the moving target. Eventually,this accomplishes the focused image.
According to [5], food waste is a significant issue around the world. It is predicted through a survey that more than 58 percent of food that people produce for consumption is wasted every day. Whereas, more than 60 percent of people in the third world countries are dying in malnutrition without proper food for a living. Therefore, the technologically developed countries are emphasizing more on this issue.
Therefore, that less food can be wasted and can be distributed to the needy people. According to [6] in the age of modern era, where we are developed through artificial intelligence, people are more dependent on the smartphone. There are various applications, which are developed to control the huge wastage of food, and it provides the opportunity to send that extra food to the people who need it. There are multiple applications, which control food waste. The most useful food waste application for android and apple are discussed below:
A.Food waste application of Singapore (11th Hour) Tan Jun Yuan who is a food stall hawker from Singapore felt very bad noticing that people waste so much food in every year. He saw many vendors with leftover foods in a day. The quantity was 10 to 15 bowl of pork ribs served including other foods that he served the customers per day. He also saw that more than 35 percent of food he made every day was left as extra. Therefore, he created the application named 11Th Hour. This application provides the left and unused foods at the half of their original price before the restaurants are closed. After the creation of this application, there were almost 20000 downloads of this application [7].
B.Food waste reduction application from Netherlands (NoFoodWasted) August de Vocht, a citizen of Netherlands developed this application to reduce the amount of food waste. This application makes collaboration with the supermarket so that people can be aware of the foods that will be expired very soon. According to [8], it helps the users to upload their grocery items, which will expire soon so that people who are in need of food can buy them at a reduced price and use them. It helps to stop the wastage of excessive foods. More than 20000 people have found this application useful, and it has reduced the amount of food wastage in the Netherlands.
C.An application to control food waste by UK and Ireland (FoodCloud) This application has been declared as one of the useful food wastage application in the United Kingdom as well as Ireland. This application notifies the supermarkets about their surplus food so that the charitable societies can collect them and reduce the chances of food wastage. This application works as an intermediate that provides the type of foods and arranges the pick-up for the charities. It also collects and stores the food so that the charitable societies can collect the food according to their requirements. According to [9] more than 1200 business hubs and 3000 charitable societies work under this application to provide excess foods to the homeless people.
D.Food wastage Reduction Application from Africa (Cheetah) Some researchers from the University of Twente have developed this application to reduce the number of food wastages in Africa. It is seen that various fruits and vegetables lose their ability to be consumed due to poor road circumstances, less refrigeration in Africa. This application is created to gather those food items before they get rotten and distribute it to the needy malnutrition people of Africa. Dutch Ministry of Foreign Affairs helped the researchers in the development of this application. Mostly, farmers, the food transporters use this application, and it also helped them to reduce the chances of food bribing in Africa. It is expected that the public version of this application will be released within May, next year [10].
E.Indian Food Wastage Reduction Application (No Food Waste) No Food waste is an application from India that allows the restaurants, food stalls and parties to inform about their excessive leftover foods so that needy people can collect them for their usage. This application collects those foods and distributes those among the homeless people, slum dwellers and orphanages as well as nursing homes. Code Shoppy According to [11], the users can also notify them by showing hunger points, and they will distribute the foods to there. The only requirement is they take foods only if it is prepared two hours before. These applications have changed the use of artificial intelligence by providing food to the needy people. It is considered one of the best uses of software development. However, food wastage is still a bad habit. According to [12], people need to be more careful while preparing or ordering food because many people around the world do not get to eat. Food wastage reduction has decreased a lot due to the usage of this application, but people need to be more sensitive and careful so that a better world can be created where no food is wasted.
Dynamic vehicle detection and tracking can provide essential data to solve the problem of road planning and traffic management. A method for real-time vehicle detection and tracking using deep neural networks is proposed in this paper and a complete network architecture is presented. Using our model, you can obtain vehicle candidates, vehicle probabilities, and their coordinates in real-time. The proposed model is trained on the PASCAL VOC 2007 and 2012 image set and tested on ImageNet dataset. By a carefully design, the detection speed of our model is fast enough to process streaming video. Experimental results show that proposed model is a real-time, accurate vehicle detector, making it ideal for computer vision application.
Introduction
In today’s society, more and more vehicles are taking to the highways every year, which makes a push to monitor and control the traffic more efficiently. The real-time vehicle detection and tracing is essential for intelligent road routing, road traffic control, road planning and so on. Therefore, it is important to know the road traffic density real time, especially in mega cities for signal control and effective traffic management. For a long time, several approaches[1,2] in the literature have been proposed to resolve the problem of various moving vehicles; Nevertheless, the aim of real-time fully-automatic detection of vehicle is far from being attained as it needs improvement in detection and tracking for accurate prediction with faster processing speed. Zheng et al. use brake lights detection through color segmentation method to generate vehicle candidates and verify them through a rule-based clustering approach. A tracking-by-detection scheme based on Harris-SIFT feature matching is then used to learn the template of the detected vehicle on line, localize and track the corresponding vehicle in live video [2]. It is a good measure to extract vehicle areas, however, it needs a relatively ideal background. Wei Wang et al. have presented a method of multi-vehicle tracking and counting using a fisheye camera based on simple feature points tracking, grouping and association. They integrates low level feature-point based tracking and higher level “identity appearance” and motion based real-time association [1]. However, the average processing time of it is around 750ms, which is not fast enough to achieve the real-time processing. System based Convolutional Neural Networks (CNN) can provide the solution of many contemporary problems in vehicle detection and tracing. CNN currently outperform other techniques by a large margin in computer vision problems such as classification [3] and detection [4]. The training procedure of CNN automatically learn the weights of the filters, so that they are able to extract visual concepts from raw image content. Using the knowledge obtained through the analysis of the training set containing labelled vehicle and non-vehicle examples, vehicle can be identified in given images. In general, Convolutional Neural Networks show more promising results. In this paper, we propose a method of real-time vehicles detection and tracking using Convolutional Neural Networks. We present a network architecture, which create multiple vehicle candidates and predict vehicle probabilities in one evaluation. Our architecture uses features from the entire image to create vehicle candidates. Firstly, we use convolutional layers of the system to extract features from the raw image. Secondly, we use four kinds of inception modules. Thirdly, we add Spatial Pyramid Pooling (SPP) layer between convolutional layers and fully connected layers, which is able to resize any images into fixed size. Lastly, the fully connected layers predict the probability and coordinates of vehicles.
Comparison of Periodic Behavior of Consumer Online Searches for Restaurants Based on Search Engine
Increased knowledge about the online search behavior of restaurant consumers is valuableto restaurant management and marketing professionals. However, people in different countries may demon-strate distinctive online search behaviors. There has been a lack of cross-cultural research on the online searchbehavior of restaurant consumers. In this paper, the periodic nature of online search behavior demonstrated byrestaurant consumers from U.S. and China is analyzed and compared using Fourier transform and Parseval’stheorem. The search interest records from Google and Baidu, respectively, are used. The results reveal thatthe online search behavior of restaurant consumers in the U.S. is strongly governed by weekly cycles but lessdependent on annual cycles; however, the analogous consumer behavior in China exhibits less dependenceon weekly cycles. The theoretical and practical implications of the research are discussed.
As culture so clearly shapes consumer behavior [36], hos-pitality and tourism researchers have sought to identify andunderstand cultural differences to provide useful informa-tion to industry practitioners [39]. For example, Moneyand Crotts [38] indicated that consumers from differentcultures tended to seek out travel and planning infor-mation from different sources; Baeket al.[60] (2006)reported that consumers from different cultures used dis-tinct restaurant selection criteria. Consumers have madeextensive use of search engines to seek out commercialinformation. This makes internet marketing very impor-tant [2], [28], [42], [43], [47], [53], [54], [57] and leadssellers and marketers to compete for higher search enginerankings and to increase their bids for internet advertisementspace. An optimal marketing strategy should consider con-sumer search behavior [17], [29], Nica, [61] (2013). It is thusvery meaningful to study and compare the patterns of onlineinformation search behavior among consumers from differentcountries. However, there has been a lack of research withsuch a focus.In this study, the periodic nature of consumer online searchbehavior, as it applies to restaurant searches in the UnitedStates (U.S.) and China, is analyzed and compared. Thesearch interest records from Google and Baidu, the most pop-ular search engines in the U.S. and China, respectively, areused to generate the material for analysis. Parseval’s theoremis used to quantify the weight of the periodic componentsin the whole search dynamic system obtained by discreteFourier transform (DFT). The results indicate that periodicpatterns exist in the behavior of consumer online searchesfor restaurants in the U.S. and in China, but consumers fromthe U.S. and China exhibit distinctive periodic patterns ofbehavior for online restaurant searches. The cyclic patterns ofconsumer behavior for online restaurant searches identified inthe two study countries are useful to international restaurantmanagement personnel and online marketing professionals.Following this brief introduction, the rest of the study is presented in the following order: literature review, datadescription, method, results, discussion, and conclusion.
In this research, the cyclic consumer behavior of onlinerestaurant searches in the U.S. and China was analyzed.Parseval’s theorem was used to quantify the weight of cyclicpatterns in the whole searching dynamics. The study showedthat consumers in both the U.S. and China follow cyclicpatterns for online restaurant searches with the same periods,but Americans are more likely to arrange dining activities ona weekly basis, while the Chinese do not arrange this activityas regularly as Americans. This finding agrees with the Hofst-ede’s original finding of an uncertainty avoidance differencebetween the two countries. This work is expected to be usefulfor international restaurant management personnel and onlinemarketing professionals. Future work aimed at analyzing thecyclic patterns of online restaurant search behavior in othercountries is needed.