{"title":"Restaurant Inventory Management System","authors":"M. Sasikanth, Dr. D. R. Krithika","doi":"10.48175/ijetir-1217","DOIUrl":"https://doi.org/10.48175/ijetir-1217","url":null,"abstract":"The Restaurant Inventory Management System (RIMS) is a sophisticated solution tailored to the unique needs of the food service industry. With real-time inventory tracking capabilities, RIMS enables restaurant staff to monitor stock levels accurately, ensuring timely replenishment and minimizing stockouts. Automated features streamline processes such as recipe management, cost analysis, and supplier communication, optimizing operational efficiency and reducing overhead costs. By leveraging data-driven insights, RIMS empowers restaurant owners to make informed decisions, improve profitability, and promote sustainability through effective waste reduction strategies. With its user- friendly interface and comprehensive reporting tools, RIMS revolutionizes inventory management, enhancing transparency, and driving success in the competitive restaurant landscape. Furthermore, RIMS offers scalability to accommodate the diverse needs of restaurants, from small cafes to large chains, making it a versatile and indispensable tool for modern food establishments seeking to stay ahead in an ever-evolving industry landscape","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141677877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parking Slot Prediction and Face Recognition Based Parked Vehicle Theft Prevention in Smart System using Deep Learning","authors":"N. Mohan Raj, P. Kavitha, S. Kamalakkannan","doi":"10.48175/ijetir-1214","DOIUrl":"https://doi.org/10.48175/ijetir-1214","url":null,"abstract":"More than a million cars are on the roadways of a contemporary major city, but more parking spots are needed to accommodate them. Locating vacant parking places in most contemporary cities might take time, especially during busy periods like festival seasons. In the traditional parking system, drivers face considerable losses in terms of money, productivity and time which is wasted in search of parking spots in densely populated areas. Hence, it can be said that the traditional parking systems are not capable of providing a smooth parking experience to the drivers along with reducing the parking search traffic on the roads. This highlights the rationale of adopting advanced technologies to make the urban transport system modern and ease the problem faced by the drivers. This project proposes a Smart Parking System utilizing Edge Computing and Deep Learning algorithms to seamlessly link multiple parking stations into a unified network, establishing a shared parking system. To address security concerns in highly restricted areas such as residential zones, military bases, and government buildings, the system functions as a centralized automatic vehicle identifier for owner verification. Deep Learning algorithms, such as Convolutional Neural Networks used to recognize the driver/owner face of a vehicle during the departure phase, fortifying security measures and thwarting potential vehicle theft","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sign Up Wallet a Block Chain based Personally Identifiable Information (PII) Masking using Lookup Substitution","authors":"T. Mukilan, P. Kavitha, S. Kamalakkannan","doi":"10.48175/ijetir-1215","DOIUrl":"https://doi.org/10.48175/ijetir-1215","url":null,"abstract":"Digital identity is a user’s online identification, similar to a physical identification card such as a passport or driver’s license. A digital identity contains characteristics or attributes of the user. As we access apps and websites, organizations are dominantly using centralized and federated identity management systems (e.g. signing in with a Google or Facebook account) by default. The centralized system puts data at risk of large scale hacks and breaches while the federated model enables companies to track user data without their knowledge. Existing identity management systems either use a centralized authentication server or rely on identity providers to authenticate users for gaining access to various services. These systems have failed to safeguard user data privacy and do not encourage the portability of identity data. A trustworthy and reliable system is needed so that individuals can interact and network digitally and securely. These problems are motivated the development of the Sign Up Wallet a blockchain and machine learning based Self-Sovereign Identity model to manage digital identities. The emerging blockchain technology enables self-sovereign identity management, a decentralized identity management model that eliminates identity providers as a trusted third party and machine learning is used to find the trusted service provider. In this proposed system users store their digital identity in a Sign Up Wallet with cryptographic keys. When registering with a trusted service provider, a Unique Personal Identifier (UPI) Code is submitted for direct credential verification. Logistic Regression is used for predicting whether a website is trusted or not. If the service provider is untrusted, a masked credential is generated using a Lookup Substitution Algorithm, preserving privacy during verification. This masked credential is then provided to the service provider, allowing verification without exposing the raw data and maintaining user security","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141678195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Attendance Monitoring System using Facial Recognition","authors":"Natarajan S, Dr. H. Jayamangal","doi":"10.48175/ijetir-1209","DOIUrl":"https://doi.org/10.48175/ijetir-1209","url":null,"abstract":"All Standard institutes of learning place high priority on class attendance that if the criteria is not met by the student, the student will not be granted access to sit for his/her examination conducted by the school. This makes class attendance an important activity for the student. Over the years, class attendance has been conducted manually and is still taking place currently in almost 80% of Nigerian Universities. Manual monitoring of attendance by the university's lecturer has become a hectic one for most lecturers and students. With the advancement of technology, manual marking of student’s attendance has been replaced by biometric concepts. Though many researchers have made provisions on some biometric functions like fingerprint scanner, iris recognition, hand and finger geometric. In this paper we will propose a facial recognition concept as a means of verification in marking student’s attendance and store it into the database once verified. The system made use of a dlib library OpenCv library in successfully carrying out facial recognition. Images are read into directory, and these images are encoded so as to generate 128 facial measurements like distances between the nose, ear, and eyebrow etc. This encodings will be used in making comparisons with images read from camera or from live streaming videos in other to find best matches. For the real time attendance system, we created a web application using python flask. Here we used bootstrap framework for frontend design, python as the programming language and Mysql for database design","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Fruit Calorie Measurement using Machine Learning","authors":"M. Nithish, P. Kavitha, S. Kamalakkannan","doi":"10.48175/ijetir-1216","DOIUrl":"https://doi.org/10.48175/ijetir-1216","url":null,"abstract":"Food is undeniably a fundamental necessity for all living organisms on Earth. Humans, in particular, seek freshness, purity, and standard quality in their food. To ensure these standards are met, the food processing industry has implemented rigorous standards and automation processes. With a growing global awareness of the impact of diet on health, individuals are increasingly mindful of their dietary choices. An imbalanced diet can lead to various health issues such as weight gain, obesity, and diabetes. Consequently, there has been a surge in the development of systems aimed at analyzing food images to determine calorie and nutrition levels. In this paper, a food portion recognition system is employed to accurately measure calorie and nutrition values. Users simply need to capture a picture of the food, which is then analyzed to detect the type of food portion. This is achieved through segmentation techniques, including skull stripping, followed by classification using support vector machine algorithms. This comprehensive approach ensures precise determination of calorie content, as well as identification of the type of energy present in the food.Overall, this system represents a significant advancement in the field of dietary assessment, offering a seamless and accurate means of monitoring food intake and nutritional values","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141677098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Image Forgery Detection through Machine Learning","authors":"Waship W, Dr. H. Jayamangala","doi":"10.48175/ijetir-1210","DOIUrl":"https://doi.org/10.48175/ijetir-1210","url":null,"abstract":"Digital Image Forgery can be done by deceiving the digital image to mask some meaningful or important data of the image. It is usually difficult to spot out the manipulated region of the original image. To sustain the uprightness and legitimacy of the image, the detection of forgery in the image is mandatory. Acclimation of the modern way of life and advancement in photography gadgetry has made exploitation of digital image easy with the help of image editing software. Therefore, it is crucial to detect such image forgery operations in the images. The image forgery detection can be done based on object removal, object addition, and unusual size modifications in the image. Images are one of the powerful media for communication. In our project we have used algorithms such as Copy Move Technique (CMT) as existing and Multi Support Vector Machine (MSVM) as proposed systems and both will be compared in terms of accuracy","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI based ID Card Fraud Detection using Deep Adversarial Network","authors":"Sowmiya. K, Dr. D. R. Krithika","doi":"10.48175/ijetir-1220","DOIUrl":"https://doi.org/10.48175/ijetir-1220","url":null,"abstract":"ID cards are official documents issued by government authorities or institutions to verify a person's identity. Educational certificates are official documents awarded by educational institutions, such as schools, colleges, and universities, to individuals who have successfully completed a specific program of study. They typically include the individual's name, photograph, date of birth, a unique identification number, the name of the institution, the degree or qualification earned, the date of completion, and sometimes additional details like the program of study or academic honours Both documents play important roles in various aspects of an individual's life, including employment, education, and official identification. Presentation attacks on ID cards and educational certificates encompass a range of deceptive tactics employed by individuals with malicious intent to undermine the authentication and validation processes associated with these documents. These attacks can have diverse objectives, from gaining unauthorized access to secured areas to securing employment or admissions under false pretences. In the case of ID cards, common presentation attacks involve forgery, counterfeiting techniques, photo substitution, tampering, and even the pretext of having lost one's ID card. On the other hand, educational certificate presentation attacks include utilizing diplomas from diploma mills, falsifying academic transcripts, resume fraud, and even compromising credential verification systems","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141678580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Parking Management System","authors":"Anpr Camera, HD 1280X","doi":"10.48175/ijetir-1219","DOIUrl":"https://doi.org/10.48175/ijetir-1219","url":null,"abstract":"The Smart Parking Management System (SPMS) is a cutting-edge solution that effectively tackles the persistent issues encountered in urban parking environments. By incorporating advanced technologies like Internet of Things (IoT), data analytics, and machine learning, the SPMS aims to optimize parking space utilization, mitigate traffic congestion, and improve overall user satisfaction. This abstract provides a comprehensive overview of the SPMS, outlining its key features such as real-time parking availability updates, seamless reservation capabilities, and integration with navigation apps. Furthermore, it highlights the system's contribution to sustainability efforts through the provision of electric vehicle charging infrastructure.In today's fast-paced world where time is of the essence, finding a suitable parking spot in urban areas can be quite daunting. The Smart Parking Management System (SPMS) comes as a breath of fresh air with its innovative approach to solving this problem. By utilizing state-of-the-art technologies like Internet of Things (IoT), data analytics, and machine learning algorithms, the SPMS aims to revolutionize how we park our vehicles in cities.At its core, the SPMS is designed to optimize parking space utilization while reducing traffic congestion. Through real-time updates on available parking spots via mobile applications or digital displays at car parks entrances/exits; drivers can effortlessly locate vacant slots without wasting precious time circling around aimlessly looking for one","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 28","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"X-Noiseguard Intelligent Noise Reduction for High-Fidelity X-Ray Imaging","authors":"Harish G, Dr. H. Jayamangala","doi":"10.48175/ijetir-1212","DOIUrl":"https://doi.org/10.48175/ijetir-1212","url":null,"abstract":"The presence of noise in images produced by medical imaging equipment is common and unavoidable. Image noise can obscure and stimulate pathology, even sometimes to the extent of making them diagnostically unusable. To minimize noise in medical images, it is essential to comprehend the sources of noise and how they occur. In this project, we have reviewed different sources of noise that are present in images produced in radiography and tomography imaging techniques, the causes, effects and the various ways that are employed in their reduction. In order to completely eliminate noise in radiological imaging systems, we recommend that detectors that are free from noise should be designed and incorporated into future imaging systems. For segmentation and classification if we need a better result we need to target a preprocessing technique which involves removal of noise. For better PSNR we will be using Gaussian filtering technique for noise removal","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 58","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141680433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voice Based E-Mail System for Visually Impaired using Hidden Markov Models","authors":"Supriyaa C, S. Anu Priya","doi":"10.48175/ijetir-1203","DOIUrl":"https://doi.org/10.48175/ijetir-1203","url":null,"abstract":"The paper aims to develop a voice-based email system utilizing Hidden Markov Models (HMMs) for speech recognition. In an era where multitasking and hands-free interaction are paramount, this system offers a convenient and intuitive way for users to manage their emails through natural spoken commands. Leveraging a diverse dataset of voice recordings and corresponding text transcripts, HMMs are trained to recognize various email related commands such as composing new emails, reading inbox contents, replying to messages, and more.","PeriodicalId":341984,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":" 29","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}