Journal of Multimedia Technology & Recent Advancements
https://computers.stmjournals.com/index.php?journal=JoMTRA
<p align="center"><strong>Journal of Multimedia Technology & Recent Advancements (JoMTRA)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2349-9028</strong></p><p align="center"> </p><p align="center">Click <strong><a href="/index.php?journal=JoMTRA&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong> </strong></p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 5.362</p><p align="center"> </p><p><strong> </strong></p><p><strong>Journal of Multimedia Technology & Recent Advancements (JoMTRA)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Multimedia Technology & Recent Advancements. It's a triannual journal, started in 2014.</p><p> </p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoMTRA</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Computer Graphics</li><li>Windowing transformations</li><li>2D translation, scaling, rotation and shear</li><li>3D translation, scaling, rotation</li><li>Internet, Connections, TCP/ UDP/ IP, IP addressing</li><li>ARP, RARP, DCHP, BOOTP, ICMP</li><li>Web Servers, Web browsers, Web page makers and Editors</li><li>URL, HTML</li><li>Multimedia Communications: Technologies, Protocols, and Mechanisms</li><li>Various Services and Applications in Multimedia Communications</li><li>Optimizing and Engineering Multimedia network traffic</li><li>Issues of Personalization</li><li>Privacy and Security in Multimedia Applications</li><li>Architectures used in Multimedia Software</li><li>Database applications and Multimedia Web</li><li>Implementation of Multimedia Sensor Networks</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: </strong><strong>JoMTRA</strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p> </p><p><strong><a href="/index.php?journal=JoMTRA&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p> </p><p> </p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoMTRA&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong><br /></strong></p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong><br /></strong></p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p><p> </p>en-USJournal of Multimedia Technology & Recent Advancements2349-9028<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>Abnormal Crowd Behavior Detection System
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2698
Abnormal crowd behavior system is designed for security purpose in public sector. The system is developed using ML algorithms such as CNN and Image processing. It performs the functions to detect the abnormality in the crowd by detecting abnormal actions such as fighting, running, etc. where there is threshold value set for different places. This system can be used to reduce human work considering the accuracy and effectiveness of the system without any false attention<h2 style="margin: 0cm; margin-bottom: .0001pt; text-align: justify;"><em><span style="mso-bidi-font-size: 11.0pt; mso-bidi-font-family: 'Times New Roman'; mso-bidi-font-weight: normal;" lang="EN-US">An abnormal crowd behavior system is designed for security purposes in the public sector. The system is developed using ML algorithms such as CNN and image processing. It performs the functions to detect the abnormality in the crowd by detecting abnormal actions such as fighting, running, etc. where there is a threshold value set for different places. This system can be used to reduce human work considering the accuracy and effectiveness of the system without any false attention.</span></em></h2>Pratiksha BhosaleOmkar JadhavPratiksha MotePraveen Shinde2021-06-142021-06-148Human Body Movement Identification
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2699
<p><strong><em>Abstract</em></strong></p><p><strong><em></em>Human Body Movement Identification is the recognition technique of moving human behavior, it detects and traces the moving human body movements. A 3D human body is expressed by a multi-joint model and describe the posture by a set of joint angles. It is necessary to recognize the human body movements for computer-human interaction. It is useful in many scientific and security fields. It can be used in camera surveillance, sports as well as military applications. In this system, we propose a method to estimate human movements using Deep Learning and Machine Learning features with Pretrained Data set. Machine learning is an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. The method does not depend on clothes and orientation under noisy conditions so that the human movement can be estimated stably. </strong></p>Ritesh Jitendra KadamAnisha Anil BolikarKaran Maruti JogPragati Pejlekar2021-06-142021-06-148Gas Spillage Detection System Using IoT and Arduino
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2692
In the past few years, IoT has extended it's roots to virtually every possible device around us. It is reforming our lives. Safety is the primary concern of any project, and it has not been left untouched by IoT either. LPG spillage in household and manufacturing can prove to be hazardous and lethal. We propose a system that can detect, alert and act upon a leakage scenario. The proposed system comprises of a gas sensor, an Arduino controller equipped with an IoT module, a beacon contrivance and a shut-off servo. IoT platform is utilized for accumulating, storing and analysing data. The system can be monitored and controlled from the same. Human presence in the vicinity can be detected with the designed system. Spillage alert is given through an alarm and a notification to a user's phone. The design is capable of turning off the gas supply pipeline automatically.Swapnil JitekarPranav PatilArchana Arudkar2021-06-102021-06-108Impact of COVID-19 on Education System: New Educational Scenario
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2743
<p><em>COVID-19 is a very fast pandemic worldwide. India’s education sector has also come in the grip of the world. Due to this pandemic, steps like lockdown were taken here. In all, about 32 crore learners from schools and colleges were affectedbecause the educational activities of all the students had stopped. This situation has taught us well that change is inevitable. This period has served as a catalyst forthose institutions which have already developed platforms with technologies. In this epidemic, special efforts were made to save the education sectorand with the help of digitization, they also succeeded in stopping the threat of epidemic to a large extent. This paper highlights some of the measures taken by the government along with changes in the education system. Both the negative and positive effects of COVID-19 on India’s education to supply uninterrupted education within the country are discussed and some useful suggestions for conducting teaching/learning activities during this period are also given.</em></p>Purushottam Lal BhariGeeta Tiwari2021-06-052021-06-058Role of Mass Media during Pandemic
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2693
<p><em>Media has the ability to make however we tend to expertise the things during this world. We tend to simply shut our minds and open our eyes. During this crisis, media view awfully vital role in creating individual privy to things, calm and encourage them to try and do positive action. Roles of mass media throughout the pandemic lockdown in Asian countriesis to know the impact of COVID-19 and pandemic lockdown in India. The various quiet media like digital media and medium with their impacts are given during this paper. There square measure several challenges at ground level in spreading data to the individuals across the state.</em></p>Sama JainAvani PrajapatiChanchal Sharma2021-06-052021-06-058Image Reconstruction of Noisy Distorted Images Using Deep Learning Methods: A Review
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2621
<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>The field of digital image processing deals not only with the extraction of features and analysis of images but also restoration of images. Image restoration is one of the basic steps of processing that deals with making certain improvements in a digital image based on some predefined criteria. A deep learning architecture for image restoration that attains statistically significant improvements over traditional algorithms is Poisson image de-noising, especially when the noise is strong. Poisson noise commonly occurs in low-light and photon-limited settings, where the noise can be most accurately modeled by the Poisson distribution.</em></p>Anamika TiwariProf. Silky Pareyani2021-02-122021-02-128Fake News Detection Using Multimodal Framework
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2620
<p><strong><em>Abstract</em></strong><em></em></p><p><em>The explosive growth in fake news and its erosion to democracy, justice, and public trust has increased the demand for fake news analysis, detection and intervention. The explosive growth of fake news and its erosion to democracy, justice, and public trust increased the demand for fake news detection. As an interdisciplinary topic, the study of fake news encourages a concerted effort of experts in computer and information science, political science, journalism, social science, psychology, and economics. A comprehensive framework to systematically understand and detect fake news is necessary to attract and unite researchers in related areas to conduct research on fake news. One can easily say in today’s world, information aka news to few, is more precious than money itself. The news needs to be in authentic form which is usually found in adulterated version. News, being a form of information can be subjective to the proofs and source for its authenticity. As a human, one can easily identify real news from fake news with the help of one’s innate capability to deduce logic and outlandish source of the information piece. Just that one needs few trusted sources to check for the facts and myths. But on a real time basis, there is a dire need for some software which can nip such ‘false news’ in its bud. Leading it to be one of the most researched areas nowadays, these research focus on Multi-Modal-Framework (MMF) for fake news detection, which is based on “Text-Feature” as-well-as “Image-Features” to predict whether the News-article is “Fake” or “Real”.</em></p>Savani ShrivastavaDr. Preeti Rai2021-02-122021-02-128Age Invariant Face Recognition Techniques: A Review
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2619
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Face acknowledgment is utilized in numerous applications, for example, in ATM, social insurance framework, driving permit framework, railroad reservation, observation activity, finding missing kids, recognizing hoodlums, and visa validation and so on. This is likewise utilized for opening gadgets, for example, cell phones, workstations, entryways and numerous others. It is one of primary biometric identifier utilized in biometric frameworks. Anyway the presence of one individual may fundamentally change with age which forces a test in face acknowledgment calculations. To conquer this test age invariant face acknowledgment (AIFR) might be utilized to expand the exactness of face acknowledgment calculations. Right now, a general face acknowledgment framework utilizing steps, for example, face recognition, face standardization, highlight extraction and highlight coordinating is examined. A complete audit old enough invariant face recognition strategies is introduced and these methods are ordered as generative, discriminative and profound learning based on face portrayal and learning procedure used. The significant issues in the AIFR are broad changes of appearance official skin (wrinkles, stunning), facial shape, and skin tone in blend with the variety of posture and enlightenment. These difficulties force impediments on the current AIFR frameworks and confound the acknowledgment task for character check particularly for worldly variety. Right now, present a 3D sexual orientation explicit maturing model that is hearty to maturing and posture varieties and gives a superior acknowledgment execution than the regular AIFR frameworks. In generative plan AIFR methods, fake face picture is orchestrated utilizing at least one fixed age classifications and afterward face acknowledgment is performed with incorporated fake face picture. By and large the generative strategies split the acknowledgment procedure in two phases. In first stage, counterfeit face image is combined and in second stage face acknowledgment is performed. The objective of the discriminative strategies is to make an advanced oppressive model to take care of the AIFR issue. In profound learning, AIFR strategies face acknowledgment includes highlight extraction promotion grouping strategies. This paper delineates some significant facial maturing databases regarding the quantity of subjects and pictures per subject alongside their age ranges. At last stretching out the extent of AIFR to other new applications, for example, human exercises and conduct acknowledgment is talked about as future bearings of AIFR. </em></p>Deepak Mittan2021-02-122021-02-128Review on Offline Signature and Online Signature Recognition and Verification
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2618
<p align="center"><strong><em>Abstract</em></strong></p><p><em>Biometrics is regularly utilized nowadays with the end goal of distinguishing proof and confirmation of the people and their marks on the planet. Transcribed mark of an individual is a novel recognizable proof work of human which are utilized and acknowledged particularly in the banking and other monetary and lawful exchanges. Now a day, signature verification is required for different frauds. In this paper, an online mark check framework idea and parts are examined for ID and confirmation of the marks. This paper presents a survey of exploration work and philosophies in the field of manually written mark confirmation. Transcribed mark is one of the biometrics utilized even before the approach of PCs. There are two sorts of manually written marks: 1.Off-line signature and 2. On-line signature. This paper talks about different strategies and issues. Further the survey of different classifiers and coordinating procedures utilized records in signature check.</em></p>Chandan Kumar2021-02-122021-02-128Discrete Cryptography
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2554
<p>The theory of Public Key Cryptography (PKC) was introduced by Diffie and Hellman [2]. There was the key agreement protocol based on the Discrete Logarithm Problem (DLP) in 1976. In 1985, ElGamal [1] applied the concept of [1] and presented the first real and practical PKC. The security of this PKC interacts with the hardness of DLP. The discrete cryptography is presented in this paper. Cryptography interacts with the hard mathematical problem. This is the study based on Discrete Logarithm Problem. The structure of the DLP is analyzed over the finite field. In this paper, a PKC is proposed based on the variant of DLP.</p><p>2010 AMS Mathematics Subject Classification Number: 94A60.</p><p>Keywords: DLP, Finite Field, PKC, Cryptography, Protocol.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Discrete Cryptography. Journal of Multimedia Technology & Recent Advancements. 2020; 7(2): 1–3p.</p>Amitabh BanerjeeSunil Kumar Kashyap Kumar KashyapBirendra Kumar Sharma2020-08-212020-08-218Digital Transactions System
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2553
<p>In this paper, a cryptographic application is presented as Digital Transaction System (DTS). DTS requires the high level security protocol. There are various attacks considered successfully on DTS. The claim of the security of DTS holds the short time. Thus, it requires updating frequently. The single hardness of the problem is not enough but the compact problem is recommended to design such DTS. This work is based on the study and the analysis of the properties and the structures of the finite field. The algorithms have been given for generating the digital money cum digital signature. The mathematical theory has also been given for designing the digital money cum digital signature. Basically this research concerns with the characteristics of both the types of mathematics, i.e. the traditional (pure and applied) and the discrete, but as the new compact version.</p><p>Keywords: Digital Money, Digital Signature, Finite Field, Cryptography, Protocol. Mathematics Subject Classification Number: 94A60.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Digital Transactions System.<em> Journal of Multimedia Technology & Recent Advancements. </em>2020; 7(2): 18–24p.</p><p> </p>Birendra Kumar SharmaSunil Kumar KashyapAmitabh Banerjee2020-08-212020-08-218Extended Cryptosystem
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2552
<p>In this paper, we propose Discrete Logarithm Problems (DLPs) over finite extension Fields. Consequently we propose Public Key Cryptosystems (PKCs), corresponding to these DLP As we know all the DLPs so designed are based on Galois Field of order p. More emphasis is given on algebraic aspect of the respective Galois Fields for DLPs defined therein.</p><p>2000 Mathematics Subject Classification Number: 94A60.</p><p>Keywords and Phrases: DLP, Finite Extension Field, PKCs, Galois Field, technology.</p><p>Cite this Article: Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. Extended Cryptosystem. Journal of Multimedia Technology & Recent Advancements. 2020; 7(2): 9–12p.</p>Sunil Kumar KashyapBirendra Kumar SharmaAmitabh Banerjee2020-08-212020-08-218Blockchain-The Consensus
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2550
<p>This article examines the impact of blockchain technology in existing ongoing projects and initiatives, and discusses overall implications, challenges and potential, with a critical view over the maturity of these projects. Our findings indicate that blockchain is a promising technology towards a transparent chain, with many ongoing initiatives.</p><p>Keywords: Bitcoin, Immutability, Consensus, Ledger, Technology</p><p>Cite this Article: Shefali Kadam, Komal Patra, Apoorva Rasal, Shraddha Subhedar. Blockchain-The Consensus. Journal of Multimedia Technology & Recent Advancements. 2020; 7(2): 4–8p.</p>Shefali KadamKomal PatraApoorva RasalShraddha Subhedar2020-08-062020-08-068Computer based Automated Detection of Diabetic Retinopathy Stages using Neural Network
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2551
<p>Diabetic Retinopathy (DR) is a condition where a person suffering from diabetes for more than 10 years and has problem in vision. Due to DR, blood vessels in retina gets damaged. Patient also suffers from a blurred vision, finds difficulty in seeing colors in some cases or even total loss of vision. Retinal surgeries can relieve the symptoms, but efficient way to tackle DR is controlling diabetes and managing early symptoms of DR, which can be done by having eyes checked at least once annually. DR is a leading cause of blindness. The manual process for studying the fundus images is a time consuming approach and needs expertise to do it. Thus to minimize the time and to detect it more accurately, the proposed system uses deep learning algorithms. Convolutional Neural Networks (CNN) is used to train the model using images of fundus. These fundus images include data of five stages of DR. Satisfactory results were obtained using CNN.</p><p>Keywords: Deep learning, Convolutional Neural Networks (CNN), Diabetic Retinopathy (DR), technology, digital image processing.</p><p>Cite this Article: Malay Hitendra Patel, Sayali Sharad Manjrekar, Ashish Dnyaneshwar Parulekar, Rina Bora. Computer based Automated Detection of Diabetic Retinopathy Stages using Neural Network. Journal of Multimedia Technology & Recent Advancements. 2020; 7(2): 13–17p.</p>Malay Hitendra PatelSayali Sharad ManjrekarAshish Dnyaneshwar Parulekar Dnyaneshwar ParulekarRina Bora2020-08-062020-08-068Multi Layer Defense Architecture
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2445
<p>Gaining access to the exclusive information is easy nowadays and this information is always been at the peak of confidentiality. As in day to day life, authentication, confidentiality and data integrity are the three biggest aspects of security. So, keeping this in priority, we are proposing an idea to develop a multi-layer defense architecture for securing network and cloud. This could achieve security up to an extent but also higher level of authentication and confidentiality. In order to achieve authentication, confidentiality, and data integrity, we are providing a concept which uses a multi-layer defense system for satisfying legitimate users to keep their data within their concern.</p><p>Keywords: Authentication, confidentiality, multi-layer defense architecture</p><p>Cite this Article: Shivani Choudhary, Shubham Chouhan. Multi-layer Defense Architecture. Journal of Multimedia Technology & Recent Advancements. 2020; 7(1): 28–32p.</p>Shivani ChoudharyShubham Chouhan2020-06-022020-06-028Design and development of an IP core for speech detection in varying noise environments
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2444
<p>Speech detection is a process of separating speech and silence regions from noisy speech. It is an important part in speech processing. One of the important and difficult tasks in speech detection is the detection of speech in a very low signal to noise ratio. The application of speech detector includes speech coding, where the accurate speech coding can reduce bit number low down the bit rates, and in speech enhancement systems where speech pause detector helps to get good estimate of the noise. The basic idea is to extract certain kind of feature to differentiate the dividing points between speech and pause, according to which different processing algorithms are carried out. This paper aims to design and develop an IP core for speech detection in a highly varying noise environment.</p><p>Keywords: Speech enhancement, pause</p><p>Cite this Article: Anishma M.K., Shamna A.R., Asmin M.K., Amina M.K. Design and Development of an IP Core for Speech Detection in Varying Noise Environments. Journal of Multimedia Technology & Recent Advancements. 2020; 7(1): 19–27p.</p>Anishma M.K.Shamna A.R.Asmin M.K.Amina M.K.2020-06-022020-06-028Text Summarization with KNN Algorithm by Table Similarity
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2441
<p>This paper proposes Text Summarization using K Nearest Neighbor Classification algorithm on the basis of table similarity. This is being proposed for blog summarization, so that the text summarization can be used for summarization of blogs. Today, summarized data is needed everywhere, so that people can get more information in less amount of time, and that can be given with the help of summarized blogs. This method is being used for changing encoding writings into numerical vectors for utilizing the customary variants for content mining assignments causing the three primary issues: the enormous dimensionality, the inadequate appropriation, and the poor content quality. The possibility of this exploration is to decipher the content rundown task into the content grouping task and apply the proposed adaptation of KNN to the undertaking where writings are encoded into tables. The adjusted rendition which is proposed right now expected to outline messages all the more dependably than the conventional form by taking care of the three issues. Thus, the objective of this exploration is to execute the content rundown framework, utilizing the proposed approach.</p><p>Keywords: Blog summarization, encoding, KNN, table similarity, text summarization</p><p>Cite this Article: Shakshi Neha, Arun Kumar Yadav. Text Summarization with KNN Algorithm by Table Similarity. Journal of Multimedia Technology & Recent Advancements. 2020; 7(1): 14–18p.</p>Shakshi NehaArun Kumar Yadav2020-06-022020-06-028Analysis of Disease and Risk Prediction using ML
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2442
<p>This paper comprises of efficient machine learning algorithms used in predicting diseases through symptoms. As, the health industry has a huge amount of data for various fields, so we want to make a system where we can use various other applications of machine learning on health industry. This all had been done to make better medical decisions and also for rise in the accuracy. As an accurate analysis and early prediction of disease helps in the patient care and the society services. These all challenges can be easier with the help of various tools, algorithms, and framework provided by the machine learning. In addition to all these predictions, we are making a chatbot for all that where patients can add the symptoms that are helpful to predict the disease and also check the risk of heart disease status through the various information provided to system by the patients and the database is obtained from UCI Repository.</p><p>Keywords: Decision tree classification, logistic regression, Naive Bayes, NLTK, risk prediction</p><p>Cite this Article: Megha Gupta, Ruchika Gupta. Analysis of Disease and Risk Prediction using ML. Journal of Multimedia Technology & Recent Advancements. 2020; 7(1): 7–13p.</p>Megha GuptaRuchika Gupta2020-06-022020-06-028Term Frequency Inverse Document Frequency
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2443
<p>Recent advances in computers and technology have resulted in an ever increasing set of documents that will be difficult and time-consuming for the user to retrieve useful information from them. The need is to find a set of data of high relevance from the given document. In this paper, we will apply Term Frequency Inverse Document Frequency (TF-IDF) to determine what set of words in a collection of written text is of high relevance. As the term indicates, TF-IDF will calculate a value for each word in a document. Word with high TF-IDF numbers will imply a strong relationship with the document they appear in, suggesting that, if that is included in the document, the document can be of great interest to the user and vice-versa.</p><p>Keywords: Artificial intelligence, k-mean clustering, machine learning, relevance of words to documents, TF-IDF</p><p>Cite this Article: Utkarsh Sharma, Anay Jain, Anshita. Term Frequency Inverse Document Frequency. Journal of Multimedia Technology & Recent Advancements. 2020; 7(1): 1–6p.</p>Utkarsh SharmaAnay JainAnshita .2020-06-022020-06-028Two-Level HM with Dual Constellation Mapping Level 2 for DVB-H
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=115
<p>Hierarchical modulation (HM) technique explained in DVB-H technology serves user with different quality of video data for TV on cellular phone. This newer modulation technique has shown good spectrum utilization with availability of HDTV and SDTV video-quality reception. SDTV quality is by default quality to receive in any channel condition while HDTV quality is restricted to healthy reception condition which is indirectly wasting spectrum up to certain extent. The proposed three-layer hierarchical modulation technique is solution to the limitation of previous HM technique with the compromise of video quality as SDTV only. The analysis of three layer HM is carried out on three gray scale video using MATLAB simulation for all possible channel scenarios defined by DVB-H and upcoming standard DVB-NGH. The improvement possibility is shown by addition of simple post-processing</p><p><strong>Keywords</strong>: Digital video broadcasting for handhelds, two levels HM with dual constellation mapping level 2, post processing</p><p> </p>shweta shahUpena Dalal2020-02-202020-02-208Automated Sorting of Municipal Solid Waste Using Robotic Arm
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2359
<p>Abstract: The main idea behind the paper is the segregation of municipal solid waste (MSW) by developing a manipulation system for automated sorting of useful recyclables which includes aluminum cans, plastic bottles, and tetra packs. The system is equipped with a thermal imaging camera, proximity sensor and a 5-DOF (degree of freedom) robotic arm. The sorting is based on automated identification of thermographic images. The supervised machine-learning algorithm is used for material classification and reinforced learning of grasping plan. The proposed system will be placed at top of garbage sorting unit (GSU) which will sort the recyclable units using object identification and sensing process.</p><p>Keywords: MSW, DOF, GSU, SURF, SVM, robotic arm</p><p>Cite this Article: Rishabh Sharma, Prince Gupta. Automated Sorting of Municipal Solid Waste Using Robotic Arm. Journal of Multimedia Technology & Recent Advancements. 2019; 6(3): 5–8p.</p>Rishabh SharmaPrince Gupta2020-01-102020-01-108A Study on Current Scenario of Ethical Hacking
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2337
<p>Abstract: In today’s time all the work is based on internet either related to academics and business. Nowadays every person use internet to purchase things. The state of security on internet is bad and getting worse. Proper security system can be provided to solve this problem. The person who performs this task is called “hacker”. Ethical hackers find weakness in the system for testing purpose and then fix it. The main objective of this paper is to provide a review on what ethical hacking is, what it can do, an ethical hacking methodology as well as some tools which can be used for ethical hacking and what is the current scenario of “Ethical Hacking” around the globe?</p><p>Keywords: Hacker, scenario, security, network system, ethical hacking</p><p>Cite this Article: Anurika Mehta, Mayank Agrawal and Harsh Agarwal. A Study on Current Scenario of Ethical Hacking. Journal of Multimedia Technology & Recent Advancements. 2019; 6(3): 1–4p.</p>Anurika MehtaMayank AgrawalHarsh Agarwal2019-11-302019-11-308Perusal on the Internet of Things
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2338
<p>Abstract: The new span of computing technology arrives, i.e., Internet of Things (IoT). IoT is something by which we can communicate with technology in a more intelligent manner. The notion of IoT is to intensify more features and benefits of the internet which makes human life more simplified and effortless. It is an intelligent interactive connected device, where smart machines can interact and liaise with another machine, objects using sensors, frequency and other smart networks. In this paper, we are reviewing the Internet of Things technology based on performance, ease, and future scope of this technology for the better interaction of machines.</p><p>Keywords: embedded internet, smart system, machine interaction, networks, IoT.</p><p>Cite this Article: Aachal Kala, Mohit Bajpai. Perusal on the Internet of Things. Journal of Multimedia Technology & Recent Advancements. 2019; 6(3): 20–22p.</p>Aachal KalaMohit Bajpai2019-11-302019-11-308Energy Generation: Renewable Energy Resources
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2355
<p>Abstract: The power prerequisites of the world including India are expanding at a high rate and the power demand has been running in front of supply. It is likewise now broadly perceived that the non-renewable energy sources (i.e., coal, oil, and flammable gas) and other ordinary assets, presently being utilized for the age of electrical vitality, may not be either adequate or appropriate to keep pace with consistently expanding the interest of the electrical vitality of the world. Also, generation of electrical power by cold based steam power plant or nuclear power plants causes pollution, which is likely to be more acute in future due to large generating capacity on one side and greater awareness of the people in this respect. The recent severe energy crisis has forced the world to develop new and alternative methods of power generation, which could not be adopted so far due to various reasons. The magneto-hydro-dynamic (MHD) power generation is one of the instances of another novel strategy for power generation. The other non-ordinary techniques for power generation might be, for example, solar cells, fuel devices, thermo-electric generator, thermionic converter, solar power generation, wind power generation, geothermal energy generation, tidal power age and so on. This paper explains about Different Energy sources, why we are going for non-regular vitality sources, Different non-conventional energy sources and comparison between them, about fuel devices and their applications.</p><p>Keywords: Renewable energy, DC (direct current), DEMC (direct-methanol fuel cells), MHD (magneto-hydro dynamic), PEMFC (proton-exchange membrane fuel cell)</p><p>Cite this Article: Kshitiz Sharma, Rakesh Gurjar. Energy Generation: Renewable Energy Resources. Journal of Multimedia Technology & Recent Advancements. 2019; 6(3): 9–13p.</p>Kshitiz SharmaRakesh Gurjar2019-11-302019-11-308Home Appliances Automation System
https://computers.stmjournals.com/index.php?journal=JoMTRA&page=article&op=view&path%5B%5D=2339
<p>Abstract: The past decade has been very interesting if we talk about power system. The increasing demand of electricity has led to a rapid increase in electricity production. India is a country with a vast population and to meet the demand of such a vast population requires a power planning, load forecasting, sustainably developed resources, energy saving plans, and with all such planning, smart solutions to save resources. Hence, in this section of paper, we will be discussing the major role of smart home appliances in power saving power as well using capability.</p><p>Keywords: Logical Link Control and Adaptation Protocol (L2CAP), Service Discovery Protocol (SDP), RFCOMM (serial cable emulation protocol) protocol</p><p>Cite this Article: Divyansh Vyas, Vaibhav Tiwari, Preeti Vashishtha. Home Appliances Automation System. Journal of Multimedia Technology & Recent Advancements. 2019; 6(3): 14–19p.</p>Divyansh VyasVaibhav TiwariPreeti Vashishtha2019-11-302019-11-308