IJMCT

Impact of IoT in Banking Processes

[{“box”:0,”content”:”

n

Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 1-7

n

n

n

n

n

n

By

n

[foreach 286]

Ramani Jaydeep R., Jayesh N. Zalavadia
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Assistant Professor, Associate Professor,Department of Computer Sceince & Engineering, Atmiya University, Rajkot, Department of BBA, Atmiya University, Rajkot,Gujarat, Gujarat,India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n The Internet of things (IoT) represents the next phase of the digital world that is expanding rapidly and transforming the lives of customers. While the Internet does not usually extend beyond the electronic world, connected objects represent the extension of internet of things and places with the adaptations of IOT in personalized services like online banking. Contactless payment technologies are demanding convenient and personalized services in IoT base banking application which provide high quality fast response to their customer anywhere, anytime. Customers are always expecting the highest level of digital security from their banks where machine to machine connectivity helps the organization to collect mass data and exchange of data with the help of sensors and numerous opportunities in banking sector. Banks always need to convert IoT into profitable data which increases their market share and gives better services to their customers. In this study, we would like to find some of the frauds in the banking sector and proposed framework.n

    n

    n

    n

    Keywords: Internet of things (IoT), technologies, internet, sensor, device, cloud

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Ramani Jaydeep R., Jayesh N. Zalavadia Impact of IoT in Banking Processes ijmct July 20, 2023; 01:1-7

    n

    How to cite this URL: Ramani Jaydeep R., Jayesh N. Zalavadia Impact of IoT in Banking Processes ijmct July 20, 2023n {cited July 20, 2023};01:1-7. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=114769/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Perera C, Ranjan R, Wang L, Khan S, Zomaya A. Privacy of big data in the internet of things era. IEEE It Professional Magazine. 2015 Feb; 17(3): 32–39.
    2. McAuley D, Mortier R, Goulding J. The dataware manifesto. In 2011 IEEE 3rd International Conference on Communication Systems and Networks (COMSNETS 2011). 2011 Jan 4; 1–6.
    3. Mistry D. What the Internet of Things brings to banking. [Online]. Available from: https://www.temenos.com/wp-content/uploads/2019/08/What-Internet-of-Things-brings-banking-whitepaper-21-Aug-2019.pdf
    4. Perera C, Zaslavsky A, Christen P, Georgakopoulos D. Context aware computing for the internet of things: A survey. IEEE Commun Surv Tutor. 2013 May 3; 16(1): 414–54.
    5. Zaslavsky AB, Perera C, Georgakopoulos D. Sensing as a service and big data in International Conference on Advances in Cloud Computing. ACC-2012, Bangalore, India. 2012 Jul; 219.
    6. Atzori L, Iera A, Morabito G. The internet of things: a survey. Comput Netw. 2010; 54(15): 2787–2805.
    7. Lindsey Tamsin Morton. (2018 Sep 29). Industry Perspectıve Enablıng The Internet of Thıngs: Why Banks Should Be Part of The Fabrıc of The Iot. [Online]. Available from: https://silo.tips/download/industry-perspective-enabling-the-internet-of-things-why-banks-should-be-part-of
    8. AURIGA. The Internet of Things in the world of banking: potential or reality? – A white paper by Auriga. [Online]. Available form: https://thefsforum.co.uk/wp-content/uploads/2016/12/White-Paper_Auriga_IoT.pdf
    9. Wünderlich NV, Wangenheim FV, Bitner MJ. High tech and high touch: a framework for understanding user attitudes and behaviors related to smart interactive services. J Serv Res. 2013 Feb; 16(1): 3–20.
    10. Xiaojun C, Xianpeng L, Peng X. IOT-based air pollution monitoring and forecasting system. In 2015 IEEE international conference on computer and computational sciences (ICCCS). 2015 Jan 27; 257–260.
    11. Khanboubi F, Boulmakoul A. A roadmap to lead risk management in the digital era. Morocco: LIM/Innovative Open Systems, FSTM, Hassan II University of Casablanca, BP. 2018; 146.
    12. Giripunje ML, Sudke S, Wadkar P, Ambure K. IOT Based Smart Bank Locker Security System. International Journal for Research in Science & Engineering Technology (IJRASET). 2017; 5(11).
    13. Cuomo S, Di Somma V, Sica F. Analysis of a data-flow in a financial IoT system. Procedia Comput Sci. 2017 Jan 1; 113: 508–12.
    14. Khanboubi F, Boulmakoul A, Tabaa M. Impact of digital trends using IoT on banking processes. Procedia Comput Sci. 2019 Jan 1; 151: 77–84.
    15. Code for billion. (2017). Evolution of Internet of Things(IoT). [Online]. Blogger. Available from: https://codeforbillion.blogspot.com/2017/10/evolution-of-internet-of-thingsiot.html
    16. Bajracharya A, Harvey B, Rawat DB. Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). 2023 Mar 8; 0368–0374.
    17. Sundmaeker H, Guillemin P, Friess P, Woelfflé S. Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things. Brussels: European Commision; 2010 Mar 3; 3(3): 34–36.
    18. Govinda K, Saravanaguru RA. Review on IOT technologies. Int J Appl Eng Res. 2016; 11(4): 2848–53.
    19. Nicola M, Alsafi Z, Sohrabi C, Kerwan A, Al-Jabir A, Iosifidis C, Agha M, Agha R. The socio-economic implications of the coronavirus pandemic (COVID-19): A review. Int J Surg. 2020 Jun 1; 78: 185–93.
    20. Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Al Jawarneh IM, Zanni A. How Fog Computing Can Support Latency/Reliability‐sensitive IoT Applications: An Overview and a Taxonomy of State‐of‐the‐art Solutions. In: Fog Computing: Theory and Practice. Wiley; 2020 May 5; 139–213.
    21. Sia-partners. (2023). Transformation de la Fonction Finance. [Online]. Available from: https://www.sia-partners.com/fr/nos-expertises/services/transformation-de-la-fonction-finance
    22. Joyce L. (2018). The Four Pillars of Digital Transformation in Banking. The Financial Brand. [Online]. Available from: https://thefinancialbrand.com/news/digital-transformation-banking/four-pillars-of-digital-transformation-banking-strategy-71733/
    23. Perera C, Liu CH, Jayawardena S, Chen M. A survey on internet of things from industrial market perspective. IEEE Access. 2014; 2: 1660–79.
    24. Alf D, Gossy G, Haider L, Messenböck R. (2018 Jun 7). Four ways banks can radically reduce costs. [Online]. https://www.bcg.com/en-ca/publications/2018/four-ways-banks-can-radically-reduce-costs
    25. Gledhıll D. Transforming a Bank by Becoming Digital to the Core. McKinsey & Company; 2018 Apr.
    26. Khanboubi F, Boulmakoul A, Tabaa M. Impact of digital trends using IoT on banking processes. Procedia Comput Sci. 2019 Jan 1; 151: 77–84.
    27. Singh C, Pattanayak D, Dixit D, Antony K, Agarwala M, Kant R, Mukunda S, Nayak S, Makked S, Singh T, Mathur V. Frauds in the Indian banking industry. IIM Bangalore Research Paper. 2016 Mar 2(505).
    28. Capgemini. (2015 Mar 4). Enterprise Fraud Management: How Banks Need to Adapt. Enterprise Fraud Management: How Banks Need to Adapt. [Online]. Slideshare.net. Available from: https://www.slideshare.net/capgemini/fraud-management-in-banking-pov

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received May 29, 2023
    Accepted June 3, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nn

    nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Impact of IoT in Banking Processes

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 1-7

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Ramani Jaydeep R., Jayesh N. Zalavadia
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Assistant Professor, Associate Professor,Department of Computer Sceince & Engineering, Atmiya University, Rajkot, Department of BBA, Atmiya University, Rajkot,Gujarat, Gujarat,India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n The Internet of things (IoT) represents the next phase of the digital world that is expanding rapidly and transforming the lives of customers. While the Internet does not usually extend beyond the electronic world, connected objects represent the extension of internet of things and places with the adaptations of IOT in personalized services like online banking. Contactless payment technologies are demanding convenient and personalized services in IoT base banking application which provide high quality fast response to their customer anywhere, anytime. Customers are always expecting the highest level of digital security from their banks where machine to machine connectivity helps the organization to collect mass data and exchange of data with the help of sensors and numerous opportunities in banking sector. Banks always need to convert IoT into profitable data which increases their market share and gives better services to their customers. In this study, we would like to find some of the frauds in the banking sector and proposed framework.n

    n

    n

    n

    Keywords: Internet of things (IoT), technologies, internet, sensor, device, cloud

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Ramani Jaydeep R., Jayesh N. Zalavadia Impact of IoT in Banking Processes ijmct July 20, 2023; 01:1-7

    n

    How to cite this URL: Ramani Jaydeep R., Jayesh N. Zalavadia Impact of IoT in Banking Processes ijmct July 20, 2023n {cited July 20, 2023};01:1-7. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/22063545-1-7-impact-of-iot-in-banking-processes-1-1.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Perera C, Ranjan R, Wang L, Khan S, Zomaya A. Privacy of big data in the internet of things era. IEEE It Professional Magazine. 2015 Feb; 17(3): 32–39.
    2. McAuley D, Mortier R, Goulding J. The dataware manifesto. In 2011 IEEE 3rd International Conference on Communication Systems and Networks (COMSNETS 2011). 2011 Jan 4; 1–6.
    3. Mistry D. What the Internet of Things brings to banking. [Online]. Available from: https://www.temenos.com/wp-content/uploads/2019/08/What-Internet-of-Things-brings-banking-whitepaper-21-Aug-2019.pdf
    4. Perera C, Zaslavsky A, Christen P, Georgakopoulos D. Context aware computing for the internet of things: A survey. IEEE Commun Surv Tutor. 2013 May 3; 16(1): 414–54.
    5. Zaslavsky AB, Perera C, Georgakopoulos D. Sensing as a service and big data in International Conference on Advances in Cloud Computing. ACC-2012, Bangalore, India. 2012 Jul; 219.
    6. Atzori L, Iera A, Morabito G. The internet of things: a survey. Comput Netw. 2010; 54(15): 2787–2805.
    7. Lindsey Tamsin Morton. (2018 Sep 29). Industry Perspectıve Enablıng The Internet of Thıngs: Why Banks Should Be Part of The Fabrıc of The Iot. [Online]. Available from: https://silo.tips/download/industry-perspective-enabling-the-internet-of-things-why-banks-should-be-part-of
    8. AURIGA. The Internet of Things in the world of banking: potential or reality? – A white paper by Auriga. [Online]. Available form: https://thefsforum.co.uk/wp-content/uploads/2016/12/White-Paper_Auriga_IoT.pdf
    9. Wünderlich NV, Wangenheim FV, Bitner MJ. High tech and high touch: a framework for understanding user attitudes and behaviors related to smart interactive services. J Serv Res. 2013 Feb; 16(1): 3–20.
    10. Xiaojun C, Xianpeng L, Peng X. IOT-based air pollution monitoring and forecasting system. In 2015 IEEE international conference on computer and computational sciences (ICCCS). 2015 Jan 27; 257–260.
    11. Khanboubi F, Boulmakoul A. A roadmap to lead risk management in the digital era. Morocco: LIM/Innovative Open Systems, FSTM, Hassan II University of Casablanca, BP. 2018; 146.
    12. Giripunje ML, Sudke S, Wadkar P, Ambure K. IOT Based Smart Bank Locker Security System. International Journal for Research in Science & Engineering Technology (IJRASET). 2017; 5(11).
    13. Cuomo S, Di Somma V, Sica F. Analysis of a data-flow in a financial IoT system. Procedia Comput Sci. 2017 Jan 1; 113: 508–12.
    14. Khanboubi F, Boulmakoul A, Tabaa M. Impact of digital trends using IoT on banking processes. Procedia Comput Sci. 2019 Jan 1; 151: 77–84.
    15. Code for billion. (2017). Evolution of Internet of Things(IoT). [Online]. Blogger. Available from: https://codeforbillion.blogspot.com/2017/10/evolution-of-internet-of-thingsiot.html
    16. Bajracharya A, Harvey B, Rawat DB. Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). 2023 Mar 8; 0368–0374.
    17. Sundmaeker H, Guillemin P, Friess P, Woelfflé S. Vision and challenges for realising the Internet of Things. Cluster of European research projects on the internet of things. Brussels: European Commision; 2010 Mar 3; 3(3): 34–36.
    18. Govinda K, Saravanaguru RA. Review on IOT technologies. Int J Appl Eng Res. 2016; 11(4): 2848–53.
    19. Nicola M, Alsafi Z, Sohrabi C, Kerwan A, Al-Jabir A, Iosifidis C, Agha M, Agha R. The socio-economic implications of the coronavirus pandemic (COVID-19): A review. Int J Surg. 2020 Jun 1; 78: 185–93.
    20. Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Al Jawarneh IM, Zanni A. How Fog Computing Can Support Latency/Reliability‐sensitive IoT Applications: An Overview and a Taxonomy of State‐of‐the‐art Solutions. In: Fog Computing: Theory and Practice. Wiley; 2020 May 5; 139–213.
    21. Sia-partners. (2023). Transformation de la Fonction Finance. [Online]. Available from: https://www.sia-partners.com/fr/nos-expertises/services/transformation-de-la-fonction-finance
    22. Joyce L. (2018). The Four Pillars of Digital Transformation in Banking. The Financial Brand. [Online]. Available from: https://thefinancialbrand.com/news/digital-transformation-banking/four-pillars-of-digital-transformation-banking-strategy-71733/
    23. Perera C, Liu CH, Jayawardena S, Chen M. A survey on internet of things from industrial market perspective. IEEE Access. 2014; 2: 1660–79.
    24. Alf D, Gossy G, Haider L, Messenböck R. (2018 Jun 7). Four ways banks can radically reduce costs. [Online]. https://www.bcg.com/en-ca/publications/2018/four-ways-banks-can-radically-reduce-costs
    25. Gledhıll D. Transforming a Bank by Becoming Digital to the Core. McKinsey & Company; 2018 Apr.
    26. Khanboubi F, Boulmakoul A, Tabaa M. Impact of digital trends using IoT on banking processes. Procedia Comput Sci. 2019 Jan 1; 151: 77–84.
    27. Singh C, Pattanayak D, Dixit D, Antony K, Agarwala M, Kant R, Mukunda S, Nayak S, Makked S, Singh T, Mathur V. Frauds in the Indian banking industry. IIM Bangalore Research Paper. 2016 Mar 2(505).
    28. Capgemini. (2015 Mar 4). Enterprise Fraud Management: How Banks Need to Adapt. Enterprise Fraud Management: How Banks Need to Adapt. [Online]. Slideshare.net. Available from: https://www.slideshare.net/capgemini/fraud-management-in-banking-pov

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received May 29, 2023
    Accepted June 3, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; }n .flx {display: flex;margin: 2px;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 75%; background-color:white; padding:4px 20px 4px 20px; margin:0 10px 0 0; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.w25p {width: 25%; background-color:white; padding: 4px 10px 4px 10px; margin: 0 0 0 10px; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Instant Response Garbage Disposal Using Android Application

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 18-24

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, Student, Student, Professor,Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani,Maharashtra,, Maharashtra, Maharashtra, Maharashtra,India, India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n Solid waste is a major concern for government bodies and is a consequence of development, modernization, and urbanization. It refers to anything that is not a gas or liquid and poses a serious threat to the natural environment. Solid waste is a type of refuse that can accumulate in a certain area for an extended period of time if not properly managed. The waste can persist in the environment until it is removed, incinerated, or carried away by natural forces such as water. Solid waste needs to be disposed of appropriately to prevent environmental pollution and threats to human and animal health. In order to lessen the harmful effects of solid waste on the environment and human health, proper waste management is crucial. This makes it a significant matter in front of sustainable development. Reusing, reducing, and recycling waste is essential for a sustainable society. Waste collection has always been a problem in developing countries because of inadequate infrastructure, and inappropriate route planning. Artificial intelligence can help protect people from hazardous waste. For countering this very issue, we introduce to you our approach towards Solid waste Collection. A Mobile App which gives you a platform to register your complaints and further segregates those complaints on the basis of the severity. The solution focuses on enhancing the current process of municipal bodies and without changing their current work flow. The functionalities of actually giving the validation in the hands of the user makes the solution unique and gives government bodies complete data for tracking the worker as well. Other advancement which we provide countering the existing system is directly connecting the user with the cleanliness workers and hence gives us a working efficiency and removes the middle layer which connects them. Overall performances of our users are well organized and maintained.n

    n

    n

    n

    Keywords: Garbage collection, cleaning, android studio, google cloud, firebase

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal Instant Response Garbage Disposal Using Android Application ijmct July 20, 2023; 01:18-24

    n

    How to cite this URL: Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal Instant Response Garbage Disposal Using Android Application ijmct July 20, 2023n {cited July 20, 2023};01:18-24. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=114756/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Mohanty SP, Choppali U, Kougianos E. Everything you wanted to know about smart cities: The Internet of things is the backbone. IEEE Consum Electron Mag. 2020 Jul; 5(3): 60–70.
    2. Yorozu Y, Hirano M, Oka K, Tagawa Y. Electron spectroscopy studies on magneto-optical media and plastic substrate interface. IEEE Transl J Magn Japan. 1987 Aug; 2(8): 740–741. (Digests 9th Annual Conf. Magnetics Japan. 1982; 301).
    3. Singh CP, Manisha M, Hsiung P-A, Malhotra S. Automatic Waste Segregator as an integral part of Smart Bin for waste management system in a Smart City. In 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), Pune, India. 2019 Sep; 1–5.
    4. Borozdukhin A, Dolinina O, Pechenkin V. Approach to the garbage collection in the “Smart Clean City” project. In2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) 2016 Oct 24 (pp. 918–922). IEEE. .
    5. Dolinina O, Pechenkin V, Tarasova V. Dynamic graph visualization approaches for social networks in educational organization. Vestnik SSTU 4 (62), 239–242 (2011). Saratov.
    6. Uk (2013 Oct). Global Innovators: International Case Studies on Smart Cities. Research paper number 135. [Online]. Available from https://www.gov.uk/government /publications/smart-citiesinternational-case-studies-global-innovators.
    7. Toppeta D. The Smart City Vision: How Innovation and ICT Can Build Smart, “Livable”, Sustainable Cities. The Innovation Knowledge Foundation. 2010; 5: 1–9. Available from http://www.intaaivn.org/images/cc/Urbanism/background%20documents/Toppet a_Report_005_2010.pdf
    8. Kumar N, Swamy C, Nagadarshini K. Efficient Garbage Disposal Management in Metropolitan Cities Using VANETs. J Clean Energy Technol. 2014 Jul; 2(3): 258–262.
    9. Badii C, Bellini P, Cenni D, Difino A, Nesi P, Paolucci M. Analysis and assessment of a knowledge based smart city architecture providing service apis. Future Gener Comput Syst. 2017; 75: 14–29.
    10. Borozdukhin A, Dolinina O, Pechenkin V. Approach to the garbage collection in the smart clean city project. In Information Science and Technology (CiSt), 2016 4th IEEE International Colloquium on. 2016; 918–922.
    11. Carlos BL, Rengifo A, Escobar M. Automatic waste classification using computer vision as an application in colombian high schools. In6th Latin-American Conference on Networked and Electronic Media (LACNEM 2015) 2015 Sep 23 (pp. 1–5). IET.
    12. Buck NT, While A. Competitive urbanism and the limits to smart city innovation: The uk future cities initiative. Urban Stud. 2017; 54(2): 13–43.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Original Research

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received April 18, 2023
    Accepted June 22, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nn

    nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Instant Response Garbage Disposal Using Android Application

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 18-24

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, Student, Student, Professor,Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani, Computer Science, Pillai HOC College of Engineering and Technology, Rasayani,Maharashtra,, Maharashtra, Maharashtra, Maharashtra,India, India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n Solid waste is a major concern for government bodies and is a consequence of development, modernization, and urbanization. It refers to anything that is not a gas or liquid and poses a serious threat to the natural environment. Solid waste is a type of refuse that can accumulate in a certain area for an extended period of time if not properly managed. The waste can persist in the environment until it is removed, incinerated, or carried away by natural forces such as water. Solid waste needs to be disposed of appropriately to prevent environmental pollution and threats to human and animal health. In order to lessen the harmful effects of solid waste on the environment and human health, proper waste management is crucial. This makes it a significant matter in front of sustainable development. Reusing, reducing, and recycling waste is essential for a sustainable society. Waste collection has always been a problem in developing countries because of inadequate infrastructure, and inappropriate route planning. Artificial intelligence can help protect people from hazardous waste. For countering this very issue, we introduce to you our approach towards Solid waste Collection. A Mobile App which gives you a platform to register your complaints and further segregates those complaints on the basis of the severity. The solution focuses on enhancing the current process of municipal bodies and without changing their current work flow. The functionalities of actually giving the validation in the hands of the user makes the solution unique and gives government bodies complete data for tracking the worker as well. Other advancement which we provide countering the existing system is directly connecting the user with the cleanliness workers and hence gives us a working efficiency and removes the middle layer which connects them. Overall performances of our users are well organized and maintained.n

    n

    n

    n

    Keywords: Garbage collection, cleaning, android studio, google cloud, firebase

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal Instant Response Garbage Disposal Using Android Application ijmct July 20, 2023; 01:18-24

    n

    How to cite this URL: Vedant Pingale, Tanuja Patil, Palash Walali, J.W. Bakal Instant Response Garbage Disposal Using Android Application ijmct July 20, 2023n {cited July 20, 2023};01:18-24. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/3dd46079-18-24-instant-response-garbage-disposal-using-android-application-2.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Mohanty SP, Choppali U, Kougianos E. Everything you wanted to know about smart cities: The Internet of things is the backbone. IEEE Consum Electron Mag. 2020 Jul; 5(3): 60–70.
    2. Yorozu Y, Hirano M, Oka K, Tagawa Y. Electron spectroscopy studies on magneto-optical media and plastic substrate interface. IEEE Transl J Magn Japan. 1987 Aug; 2(8): 740–741. (Digests 9th Annual Conf. Magnetics Japan. 1982; 301).
    3. Singh CP, Manisha M, Hsiung P-A, Malhotra S. Automatic Waste Segregator as an integral part of Smart Bin for waste management system in a Smart City. In 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), Pune, India. 2019 Sep; 1–5.
    4. Borozdukhin A, Dolinina O, Pechenkin V. Approach to the garbage collection in the “Smart Clean City” project. In2016 4th IEEE International Colloquium on Information Science and Technology (CiSt) 2016 Oct 24 (pp. 918–922). IEEE. .
    5. Dolinina O, Pechenkin V, Tarasova V. Dynamic graph visualization approaches for social networks in educational organization. Vestnik SSTU 4 (62), 239–242 (2011). Saratov.
    6. Uk (2013 Oct). Global Innovators: International Case Studies on Smart Cities. Research paper number 135. [Online]. Available from https://www.gov.uk/government /publications/smart-citiesinternational-case-studies-global-innovators.
    7. Toppeta D. The Smart City Vision: How Innovation and ICT Can Build Smart, “Livable”, Sustainable Cities. The Innovation Knowledge Foundation. 2010; 5: 1–9. Available from http://www.intaaivn.org/images/cc/Urbanism/background%20documents/Toppet a_Report_005_2010.pdf
    8. Kumar N, Swamy C, Nagadarshini K. Efficient Garbage Disposal Management in Metropolitan Cities Using VANETs. J Clean Energy Technol. 2014 Jul; 2(3): 258–262.
    9. Badii C, Bellini P, Cenni D, Difino A, Nesi P, Paolucci M. Analysis and assessment of a knowledge based smart city architecture providing service apis. Future Gener Comput Syst. 2017; 75: 14–29.
    10. Borozdukhin A, Dolinina O, Pechenkin V. Approach to the garbage collection in the smart clean city project. In Information Science and Technology (CiSt), 2016 4th IEEE International Colloquium on. 2016; 918–922.
    11. Carlos BL, Rengifo A, Escobar M. Automatic waste classification using computer vision as an application in colombian high schools. In6th Latin-American Conference on Networked and Electronic Media (LACNEM 2015) 2015 Sep 23 (pp. 1–5). IET.
    12. Buck NT, While A. Competitive urbanism and the limits to smart city innovation: The uk future cities initiative. Urban Stud. 2017; 54(2): 13–43.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Original Research

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received April 18, 2023
    Accepted June 22, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; }n .flx {display: flex;margin: 2px;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 75%; background-color:white; padding:4px 20px 4px 20px; margin:0 10px 0 0; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.w25p {width: 25%; background-color:white; padding: 4px 10px 4px 10px; margin: 0 0 0 10px; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 25-29

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Ayush Srivastava, Preeti Singh, Alka Singh
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, Assistant Professor, Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow,Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow, Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow, Assistant Professor,Uttar Pradesh, Uttar Pradesh, Uttar Pradesh,India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n This research focuses on the effects of online proctoring in facilitating the online test procedure for prospects, as well as how these tools affect engagement and learnability, as well as a retrospective investigation of other online examinations now in demand and a comparison of both. As a researcher, we learned that online proctoring is essential not only for a smooth examination process, but also for the cautious management of a student’s career. This study was conducted as a result of the trends in the field of online examinations, which necessitates mentorship for students so that they remain aware of the importance of the knowledge they require for their careers and provide an honest exam. This is also the motivation for this study; for each student to perform well in exams, they must acquire knowledge; and for that, strict proctoring is necessary. As a result, it is reasonable to conclude that the capacity to efficiently proctor an online exam is a necessary feature for future scalability in the education and assessment fields. Human proctoring is also an expensive and time-consuming option. We offer a method that does automatic online proctoring without the need for human intervention in this research.n

    n

    n

    n

    Keywords: Proprietary, open-source, examination, software, COVID-19, pandemic

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Ayush Srivastava, Preeti Singh, Alka Singh Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System ijmct July 20, 2023; 01:25-29

    n

    How to cite this URL: Ayush Srivastava, Preeti Singh, Alka Singh Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System ijmct July 20, 2023n {cited July 20, 2023};01:25-29. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=114745/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Hollister KK, Berenson ML. Proctored versus unproctored online exams: Studying the impact of exam environment on student performance. Decision Sciences Journal of Innovative Education. 2009 Jan;7(1):271–94.
    2. Casey BJ, Getz S, Galvan A. The adolescent brain. Dev Rev. 2008 Mar 1; 28(1): 62–77.
    3. Piette MA, Kinney SK, Haves P. Analysis of an information monitoring and diagnostic system to improve building operations. Energy Build. 2001 Oct 1; 33(8): 783–91.
    4. Geeks for Geeks. (2020). Difference between Open-source Software and Proprietary Software. [Online]. Available from: https://www.geeksforgeeks.org/difference-between-open-source-software-and-proprietary-software/
    5. Schryen G, Kadura R. Open source vs. closed source software: towards measuring security. In Proceedings of the 2009 ACM symposium on Applied Computing. 2009 Mar 8; 2016–2023.
    6. BBC. Cons of Proprietary Software. [Online]. https://www.bbc.co.uk/bitesize/guides/ zhx26yc/revision/11
    7. iTech India. (2019). Pros and Cons of Open Source vs Proprietary Software. [Online]. Available from: https://itechindia.co/blog/the-pros-and-cons-of-open-source-vs-proprietary-software/
    8. Alessio HM, Malay N, Maurer K, Bailer AJ, Rubin B. Examining the effect of proctoring on online test scores. Online Learning. 2017 Mar; 21(1): 146–61.
    9. Naha P. (2023). 15 Best Online Proctoring Software and Services to Look Up in 2023. [Online]. Software Suggest Blog. Available from: https://www.softwaresuggest.com/blog/best-online-proctoring-software/#
    10. Hylton K, Levy Y, Dringus LP. Utilizing webcam-based proctoring to deter misconduct in online exams. Comput Educ. 2016 Jan 1; 92–93: 53–63.
    11. Yadav K, Thareja R. Comparing the performance of naive bayes and decision tree classification using R. Int J Intell Syst Appl. 2019 Dec 1; 11(12): 11–19.
    12. George N. Mastering Django: Core. UK: Packt Publishing Ltd; 2016 Dec 23.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 27, 2023
    Accepted June 30, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nn

    nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 25-29

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Ayush Srivastava, Preeti Singh, Alka Singh
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, Assistant Professor, Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow,Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow, Department of Computer Science & Engineering, Babu Banarasi Das Engineering College, Lucknow, Assistant Professor,Uttar Pradesh, Uttar Pradesh, Uttar Pradesh,India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n This research focuses on the effects of online proctoring in facilitating the online test procedure for prospects, as well as how these tools affect engagement and learnability, as well as a retrospective investigation of other online examinations now in demand and a comparison of both. As a researcher, we learned that online proctoring is essential not only for a smooth examination process, but also for the cautious management of a student’s career. This study was conducted as a result of the trends in the field of online examinations, which necessitates mentorship for students so that they remain aware of the importance of the knowledge they require for their careers and provide an honest exam. This is also the motivation for this study; for each student to perform well in exams, they must acquire knowledge; and for that, strict proctoring is necessary. As a result, it is reasonable to conclude that the capacity to efficiently proctor an online exam is a necessary feature for future scalability in the education and assessment fields. Human proctoring is also an expensive and time-consuming option. We offer a method that does automatic online proctoring without the need for human intervention in this research.n

    n

    n

    n

    Keywords: Proprietary, open-source, examination, software, COVID-19, pandemic

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Ayush Srivastava, Preeti Singh, Alka Singh Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System ijmct July 20, 2023; 01:25-29

    n

    How to cite this URL: Ayush Srivastava, Preeti Singh, Alka Singh Adoption of Proprietary Online Exam Proctoring Software Using Multimedia Analytics System ijmct July 20, 2023n {cited July 20, 2023};01:25-29. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/0aea8103-25-29-adoption-of-proprietary-online-exam-proctoring-software-using-multimedia-analytic.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Hollister KK, Berenson ML. Proctored versus unproctored online exams: Studying the impact of exam environment on student performance. Decision Sciences Journal of Innovative Education. 2009 Jan;7(1):271–94.
    2. Casey BJ, Getz S, Galvan A. The adolescent brain. Dev Rev. 2008 Mar 1; 28(1): 62–77.
    3. Piette MA, Kinney SK, Haves P. Analysis of an information monitoring and diagnostic system to improve building operations. Energy Build. 2001 Oct 1; 33(8): 783–91.
    4. Geeks for Geeks. (2020). Difference between Open-source Software and Proprietary Software. [Online]. Available from: https://www.geeksforgeeks.org/difference-between-open-source-software-and-proprietary-software/
    5. Schryen G, Kadura R. Open source vs. closed source software: towards measuring security. In Proceedings of the 2009 ACM symposium on Applied Computing. 2009 Mar 8; 2016–2023.
    6. BBC. Cons of Proprietary Software. [Online]. https://www.bbc.co.uk/bitesize/guides/ zhx26yc/revision/11
    7. iTech India. (2019). Pros and Cons of Open Source vs Proprietary Software. [Online]. Available from: https://itechindia.co/blog/the-pros-and-cons-of-open-source-vs-proprietary-software/
    8. Alessio HM, Malay N, Maurer K, Bailer AJ, Rubin B. Examining the effect of proctoring on online test scores. Online Learning. 2017 Mar; 21(1): 146–61.
    9. Naha P. (2023). 15 Best Online Proctoring Software and Services to Look Up in 2023. [Online]. Software Suggest Blog. Available from: https://www.softwaresuggest.com/blog/best-online-proctoring-software/#
    10. Hylton K, Levy Y, Dringus LP. Utilizing webcam-based proctoring to deter misconduct in online exams. Comput Educ. 2016 Jan 1; 92–93: 53–63.
    11. Yadav K, Thareja R. Comparing the performance of naive bayes and decision tree classification using R. Int J Intell Syst Appl. 2019 Dec 1; 11(12): 11–19.
    12. George N. Mastering Django: Core. UK: Packt Publishing Ltd; 2016 Dec 23.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 27, 2023
    Accepted June 30, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; }n .flx {display: flex;margin: 2px;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 75%; background-color:white; padding:4px 20px 4px 20px; margin:0 10px 0 0; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.w25p {width: 25%; background-color:white; padding: 4px 10px 4px 10px; margin: 0 0 0 10px; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Malicious Application Detection in Windows Using SVM Algorithm

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 30-36

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Manish Kapoor, R.M. Samant, Suraj Sawant, Aishwarya Joshi, Neha Tawade
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, HOD, Student, Student, Student,Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune,Maharashtra, Maharashtra, Maharashtra, Maharashtra, Maharashtra,India, India, India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n In recent years, both the development of Windows application clients and the uses of smart mobile phones have increased significantly. As the number of Windows application users continues to grow, there is a rise in malicious individuals who develop harmful Windows applications with the intent of unlawfully obtaining confidential information and engaging in fraudulent activities. These applications are designed to target vulnerable areas such as mobile banking and digital wallets, aiming to deceive users and misuse their sensitive data. There are so many malicious software, tools, and programmers that are available. However, it is essential to establish a system that is capable and effective for identifying and thwarting freshly developed dangerous programmes written by hackers or programmers. This system should be able to recognise and react to sophisticated threats in an efficient manner. The purpose of this study is to identify fraudulent Windows apps using machine learning techniques.n

    n

    n

    n

    Keywords: Malicious Application Detection in Windows Using SVM Algorithm

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Manish Kapoor, R.M. Samant, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023; 01:30-36

    n

    How to cite this URL: Manish Kapoor, R.M. Samant, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023n {cited July 20, 2023};01:30-36. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=114732/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Investig. 2018 Mar 1; 24: S48–59.
    2. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 IEEE 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    3. Canfora G, Medvet E, Mercaldo F, Visaggio CA. Detecting android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile. 2015 Aug 31; 13–20.
    4. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. Taintdroid: an information-flow tracking system for real time privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS). 2014 Jun 1; 32(2): 1–29.
    5. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    6. Ni Z, Yang M, Ling Z, Wu JN, Luo J. Real-time detection of malicious behavior in android apps. In 2016 IEEE International Conference on Advanced Cloud and Big Data (CBD). 2016 Aug 13; 221–227.
    7. Feldman S, Stadther D, Wang B. Manilyzer: automated android malware detection through manifest analysis. In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems. 2014 Oct 28; 767–772.
    8. Tian P, Huang X. A malicious application detection model to remove the influence of interference API sequence. In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017 Nov 24; 501–505.
    9. Chen F, Fu Y. Dynamic detection of unknown malicious executables base on API interception. In 2009 IEEE 1st International Workshop on Database Technology and Applications. 2009 Apr 25; 329–332.
    10. Li Y, Fang J, Liu C, Liu M, Wu S. Study on the application of Dalvik injection technique for the detection of malicious programs in Android. In 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication. 2015 May 14; 309–312.
    11. Huda S, Abawajy J, Alazab M, Abdollalihian M, Islam R, Yearwood J. Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener Comput Syst. 2016 Feb 1; 55: 376–90.
    12. Bailin X, Shunzheng Y, Tao W. Application layer anomaly detection based on hsmm. In 2010 International Forum on Information Technology and Applications. 2010 Jul 16; 2: 411–414.
    13. Gao Y, Ma Y, Li D. Anomaly detection of malicious users’ behaviors for web applications based on web logs. In 2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017 Oct 27; 1352–1355.
    14. Matsuda W, Fujimoto M, Mitsunaga T. Real-time detection system against malicious tools by monitoring DLL on client computers. In 2019 IEEE Conference on Application, Information and Network Security (AINS). 2019 Nov 19; 36–41.
    15. Bhat P, Dutta K, Singh S. Mapldroid: Malicious android application detection based on naive bayes using multiple. In 2019 IEEE 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). 2019 Sep 28; 49–54.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 7, 2023
    Accepted July 3, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nn

    nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Malicious Application Detection in Windows Using SVM Algorithm

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 30-36

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Student, R.M. Samant, Student, Student, Student,Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Head of Department, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune, Department of Information Technology, NBN Sinhgad School of Engineering, Pune,Maharashtra, Maharashtra, Maharashtra, Maharashtra, Maharashtra,India, India, India, India, India
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n In recent years, both the development of Windows application clients and the uses of smart mobile phones have increased significantly. As the number of Windows application users continues to grow, there is a rise in malicious individuals who develop harmful Windows applications with the intent of unlawfully obtaining confidential information and engaging in fraudulent activities. These applications are designed to target vulnerable areas such as mobile banking and digital wallets, aiming to deceive users and misuse their sensitive data. There are so many malicious software, tools, and programmers that are available. However, it is essential to establish a system that is capable and effective for identifying and thwarting freshly developed dangerous programmes written by hackers or programmers. This system should be able to recognise and react to sophisticated threats in an efficient manner. The purpose of this study is to identify fraudulent Windows apps using machine learning techniques.n

    n

    n

    n

    Keywords: Malicious Application Detection in Windows Using SVM Algorithm

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023; 01:30-36

    n

    How to cite this URL: Manish Kapoor, Manish Kapoor, Suraj Sawant, Aishwarya Joshi, Neha Tawade Malicious Application Detection in Windows Using SVM Algorithm ijmct July 20, 2023n {cited July 20, 2023};01:30-36. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/99688419-30-36-malicious-application-detection-in-windows-using-svm-algorithm-1.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Karbab EB, Debbabi M, Derhab A, Mouheb D. MalDozer: Automatic framework for android malware detection using deep learning. Digit Investig. 2018 Mar 1; 24: S48–59.
    2. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 IEEE 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    3. Canfora G, Medvet E, Mercaldo F, Visaggio CA. Detecting android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile. 2015 Aug 31; 13–20.
    4. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN. Taintdroid: an information-flow tracking system for real time privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS). 2014 Jun 1; 32(2): 1–29.
    5. Ferrante A, Medvet E, Mercaldo F, Milosevic J, Visaggio CA. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 11th International Conference on Availability, Reliability and Security (ARES). 2016 Aug 31; 372–381.
    6. Ni Z, Yang M, Ling Z, Wu JN, Luo J. Real-time detection of malicious behavior in android apps. In 2016 IEEE International Conference on Advanced Cloud and Big Data (CBD). 2016 Aug 13; 221–227.
    7. Feldman S, Stadther D, Wang B. Manilyzer: automated android malware detection through manifest analysis. In 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems. 2014 Oct 28; 767–772.
    8. Tian P, Huang X. A malicious application detection model to remove the influence of interference API sequence. In 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017 Nov 24; 501–505.
    9. Chen F, Fu Y. Dynamic detection of unknown malicious executables base on API interception. In 2009 IEEE 1st International Workshop on Database Technology and Applications. 2009 Apr 25; 329–332.
    10. Li Y, Fang J, Liu C, Liu M, Wu S. Study on the application of Dalvik injection technique for the detection of malicious programs in Android. In 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication. 2015 May 14; 309–312.
    11. Huda S, Abawajy J, Alazab M, Abdollalihian M, Islam R, Yearwood J. Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener Comput Syst. 2016 Feb 1; 55: 376–90.
    12. Bailin X, Shunzheng Y, Tao W. Application layer anomaly detection based on hsmm. In 2010 International Forum on Information Technology and Applications. 2010 Jul 16; 2: 411–414.
    13. Gao Y, Ma Y, Li D. Anomaly detection of malicious users’ behaviors for web applications based on web logs. In 2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017 Oct 27; 1352–1355.
    14. Matsuda W, Fujimoto M, Mitsunaga T. Real-time detection system against malicious tools by monitoring DLL on client computers. In 2019 IEEE Conference on Application, Information and Network Security (AINS). 2019 Nov 19; 36–41.
    15. Bhat P, Dutta K, Singh S. Mapldroid: Malicious android application detection based on naive bayes using multiple. In 2019 IEEE 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). 2019 Sep 28; 49–54.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 7, 2023
    Accepted July 3, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; }n .flx {display: flex;margin: 2px;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 75%; background-color:white; padding:4px 20px 4px 20px; margin:0 10px 0 0; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.w25p {width: 25%; background-color:white; padding: 4px 10px 4px 10px; margin: 0 0 0 10px; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19);}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Baggage Detection and Recognition Using Local Tri-Directional Pattern

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 08-18

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Muhammad Nadeem
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Lecturer,Department of Computer Science, Alhamd Islamic University,Islamabad,Pakistan
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n Nowadays, pattern-based image retrieval algorithms are gaining popularity just because of their uniqueness. There are several issues in the previously proposed systems. The proposed system resolves issues highlighted in the literature. Our proposed system is tested on two image datasets ILIDS and PETS 2006. LTDP provides good results as compared to LBP in baggage detection on two classes that either bag is present or not in an image because LTDP works on finding the difference between adjacent neighbors and magnitude pattern which is either 0 or 1 which means either bag is present or not. In addition to LTDP patterns, HOG transformation has also been used for better feature extraction results. The results obtained through ANN are 90% whereas SVM depicts 50% accuracy and through classification learner, 75% accuracy is obtained.n

    n

    n

    n

    Keywords: LTDP, LBP, baggage detection, pattern-based image retrieval algorithms, baggage detection

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Muhammad Nadeem Baggage Detection and Recognition Using Local Tri-Directional Pattern ijmct July 20, 2023; 01:08-18

    n

    How to cite this URL: Muhammad Nadeem Baggage Detection and Recognition Using Local Tri-Directional Pattern ijmct July 20, 2023n {cited July 20, 2023};01:08-18. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] n [else]n n var fieldValue = “[user_role]”;n if (fieldValue == ‘indexingbodies’&’administrator’) {n document.write(‘

    Full Text: 1

    ‘);n document.write(‘

    1

    ‘);n }n }else if (fieldValue == ‘ijmct’) {n document.write(‘

    3

    ‘);n }else {n document.write(‘ ‘);n }n [/if 992]n


    nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 1, 2023
    Accepted June 2, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; padding:4px 8px;}n .flx {display: flex;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 74%; padding:4px 4px 4px 8px;}n.w25p {width: 24%; border-left: 1px solid gainsboro;}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More
    IJMCT

    Baggage Detection and Recognition Using Local Tri-Directional Pattern

    [{“box”:0,”content”:”

    n

    Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 08-17

    n

    n

    n

    n

    n

    n

    By

    n

    [foreach 286]

    Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer,Department of Computer Science, University of Engineering and Technology, Department of Computer Science and Software Engineering, International Islamic University, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, Abasyn University, Department of Computer Science, National University of Technology, Department of Computer Science, National University of Technology, Department of Computer Science, Iqra University,Taxila, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad,Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n Nowadays, pattern-based image retrieval algorithms are gaining popularity just because of their uniqueness. There are several issues in the previously proposed systems. The proposed system resolves issues highlighted in the literature. Our proposed system is tested on two image datasets ILIDS and PETS 2006. LTDP provides good results as compared to LBP in baggage detection on two classes that either bag is present or not in an image because LTDP works on finding the difference between adjacent neighbors and magnitude pattern which is either 0 or 1 which means either bag is present or not. In addition to LTDP patterns, HOG transformation has also been used for better feature extraction results. The results obtained through ANN are 90% whereas SVM depicts 50% accuracy; and through classification learner, 75% accuracy is obtained.n

    n

    n

    n

    Keywords: LTDP, LBP, baggage detection, pattern-based image retrieval algorithms, baggage detection

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid Baggage Detection and Recognition Using Local Tri-Directional Pattern ijmct July 20, 2023; 01:08-17

    n

    How to cite this URL: Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Muhammad Nadeem, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid Baggage Detection and Recognition Using Local Tri-Directional Pattern ijmct July 20, 2023n {cited July 20, 2023};01:08-17. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=112949/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] nhttps://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/8b1d72d6-8-17-baggage-detection-and-recognition-using-local-tri-directional-pattern-2.pdf [else]nnvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/8b1d72d6-8-17-baggage-detection-and-recognition-using-local-tri-directional-pattern-2.pdf’);n }nelse if (fieldValue == ‘administrator’) { document.write(‘https://storage.googleapis.com/journals-stmjournals-com-wp-media-to-gcp-offload/2023/08/8b1d72d6-8-17-baggage-detection-and-recognition-using-local-tri-directional-pattern-2.pdf’); }n else { document.write(‘ ‘); }nn[/if 992]nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. Khanam T, Deb K. Baggage Recognition in Occluded Environment using Boosting Technique. KSII Trans Internet Inf Syst (TIIS). 2017; 11(11): 5436–5458.
    2. Khanam T, Deb K. Human and carried baggage detection & classification based on RSD-HOG in video frame. In 2016 9th International Conference on Electrical and Computer Engineering (ICECE). 2016; 415–418.
    3. Leone K, Liu RR. The key design parameters of checked baggage security screening systems in airports. J Air Transp Manag. 2005; 11(2): 69–78.
    4. Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syedawajiha, Rashid Muhammad, Band Shahab S, Mosavi Amir. Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN. Comput Mater Contin. 2022; 74(2): 2641–2659. 10.32604/cmc.2023.028796.
    5. Smith K, Quelhas P, Gatica-Perez D. Detecting abandoned luggage items in a public space. In IEEE Performance Evaluation of Tracking and Surveillance Workshop (PETS). 2006; 75–82.
    6. Chang J-Y, Liao H-H, Chen L-G. Localized detection of abandoned luggage. EURASIP J Adv Signal Process. 2010; 2010: 675784.
    7. Tzanidou G, Zafar I, Edirisinghe EA. Carried object detection in videos using color information. IEEE Trans Inf Forensics Secur. 2013; 8(10): 1620–1631.
    8. Beleznai C, Gemeiner P, Zinner C. Reliable left luggage detection using stereo depth and intensity cues. In Proceedings of the IEEE International Conference on Computer Vision Workshops. 2013; 59–66.
    9. Lin K, Chen S-C, Chen C-S, Lin D-T, Hung Y-P. Left-luggage detection from finite-state-machine analysis in static-camera videos. In 2014 22nd International Conference on Pattern Recognition. 2014; 4600–4605.
    10. Zahra SW, Arshad A, Nadeem M, Riaz S, Dutta AK, Alzaid Z, Alabdan R, Almutairi B, Almotairi S. Development of Security Rules and Mechanisms to Protect Data from Assaults. Appl Sci. 2022; 12(24): 12578. [online] doi:10.3390/app122412578.
    11. Wahyono, Jo KH. Detecting and recognizing LED dot matrix text in natural scene images. InEmerging Intelligent Computing Technology and Applications: 9th International Conference, ICIC 2013, Nanning, China, July 28-31, 2013. Proceedings 9 2013 (pp. 153–158). Springer Berlin Heidelberg.
    12. Johnstone M, Creighton D, Nahavandi S. Simulation-based baggage handling system merge analysis. Simul Model Pract Theory. 2015; 53: 45–59.
    13. Nadeem Muhammad, Arshad Ali, Riaz Saman, Zahra Syeda, Dutta Ashit, Alaybani Sultan. Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Appl Sci. 2022; 12(15): 7701(19p). 10.3390/app12157701.
    14. Jo K-H. Carried baggage detection and classification using part-based model. In International Conference on Intelligent Computing. 2015; 289–296.
    15. Szwoch G. Extraction of stable foreground image regions for unattended luggage detection. Multimed Tools Appl. 2016; 75(2): 761–786.
    16. Hättenschwiler N, Sterchi Y, Mendes M, Schwaninger A. Automation in airport security X-ray screening of cabin baggage: Examining benefits and possible implementations of automated explosives detection. Appl Ergon. 2018; 72: 58–68.
    17. Wang C, Liu J, Chen Y, Liu H, Wang Y. Towards In-baggage Suspicious Object Detection Using Commodity Wi-Fi. In 2018 IEEE Conference on Communications and Network Security (CNS). 2018; 1–9.
    18. Smeureanu S, Ionescu RT. Real-time deep learning method for abandoned luggage detection in video. In 2018 26th European Signal Processing Conference (EUSIPCO). 2018; 1775–1779.
    19. Nadeem Muhammad, Arshad Ali, Riaz Saman, Shahab Band S, Mosavi Amir. Intercept the Cloud Network from Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. 2021; 9: 152300–152309. 10.1109/ACCESS.2021.3126535.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 1, 2023
    Accepted June 2, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nn

    nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]

    Read More