Authors - Parth Thakkar, Mohammed Kaif Shaikh, Harsh Sanghavi, Dhruv Shah, Vinodray Thumar, Jaimin Shroff Abstract - The persistent concern of road safety is to be addressed by introducing a cost-effective and robust model for detection of drowsiness and yawning while driving on road. Utilizing theArduCam camera modules, the system constantly records facial benchmarks to analyze the Eye Aspect Ratio (EAR). In the event of calculated EAR values falling below or exceeding the defined threshold range, indicating driver drowsiness or wakefulness, the system issues timely alerts through a speaker. The scope of this work extends to capturing driver’s images in challenging conditions, optimizing emergency response by sending messages to authorities, and implementing a personalized alert system. The ultimate goal is to significantly reduce road accidents and contribute to enhance road safety.
Authors - Ravi Chaudhary, Ashish Kumar, Monika Saini, Kapil Kumar Abstract - The prominent objective of present study is to conduct the behavioral analysis of single unit systems in classical and Bayesian setups. For this purpose, a stochastic model of single unit system is developed with the concepts of preventive maintenance, degradation, waiting time for repairman, single server, perfect switch devices, and Weibull densities. The degraded unit after failure replaced by new one. A simulation study in classical and Bayesian setup is carried out for behavior analysis of the system. Various measures of system effectiveness are derived in both frameworks using semi-Markovian approach and regenerative point technique. The numerical values of various measures of system derived to high light the importance of the study. The results may be beneficial for system designers and maintenance personnel.
Authors - Prachi Gaurang Desai, Kanubhai K. Patel, Sagar Kavaiya, Krishna Kant, Nilay Vaidya Abstract - The world is expecting another dramatic breakthrough in wireless communication with the impending arrival of 6G technology. Providing a comprehensive analysis of 6G technology, this study seeks to clarify its basic ideas, its uses, obstacles, and possibilities. In this article, a roadmap for the development of 6G technology is presented, along with an analysis of its revolutionary influence on multiple sectors, based on an extensive assessment of the literature and expert observations. It also looks into the technological developments that are going to reshape wireless communication, like terahertz frequencies, artificial intelligence (AI)-powered networks, and ubiquitous broadband. This research study provides important insights into the next frontier of telecommunications by assessing the potential and challenges related to 6G implementation.
Authors - Parth Shah, Priteshkumar Prajapati, Ravi Patel, Dhaval Patel Abstract - RSA, Diffie-Hellman (DH), and Elliptic Curve Cryptography (ECC) like public key cryptography algorithms have proved their significance before the era of quantum cryptography. The security of RSA is based on the factorization problem while the security of DH and ECC is based on the problem of secret logarithm problem. These problems are considered hard to solve with the current computation facilities. However, these problems would be easy to solve with the quantum computer. This leads to the search for another cryptographic algorithm that can be sustained in the era of quantum computers. The algorithm must be computationally secure and efficient such that it should not be solved by even a quantum computer. Few of the candidate algorithms are based on lattice. Many researchers have provided literature to explain the workings of lattice-based cryptography. In this paper, a very simple but concrete explanation is given. Also, the possible attacks and countermeasures are discussed.
Authors - Pranav Mathur, Deepa Gupta Abstract - This study examines the profound influence of Low Code/No Code (LC/NC) development platforms on conventional software development processes. LC/NC systems, characterised by their intuitive interfaces and interchangeable components, democratise the process of app creation. They empower anyone without extensive technical knowledge to quickly design and deploy applications. This move not only speeds up digital innovation within organisations but also represents a wider transition towards more inclusive, agile, and cost-efficient software development methods. Although LC/NC platforms do not replace conventional approaches, they do complement them. However, their increasing popularity requires a considerable change in skills and workforce, emphasising the need for a combination of technical, analytical, and problem-solving talents in the digital era.
Authors - Jaitej Singh, Dharmendrasinh Rathod, Parth Shah, Priteshkumar Prajapati Abstract - This research addresses a critical knowledge gap in intelligent traffic management, here, E-Challan systems, by pioneering the exploration of real-time tow truck detection using comparative analysis of YOLOv8 and YOLOv9 models. Tow truck detection, an underexplored aspect, holds significant importance in scenarios such as accidents, breakdowns, and emergencies. Leveraging the advanced features of YOLOv8 and YOLOv9, including anchor-free detection and task-aligned assignment, our study presents a comprehensive framework for accurate and adaptable tow truck detection. Through benchmarking YOLOv8n, YOLOv8s, YOLOv8l, and YOLOv9c models, we perform a comparative analysis of their contributions and trade-offs, revealing the strengths of each version. Visualization graphs and evaluation metrics, including mAP-50 and mAP50-95, provide detailed insights into the performance comparison between YOLOv8 and YOLOv9, showcasing the superiority and improvement of the latest YOLOv9 model. This research fills a crucial gap in E-Challan systems and introduces an innovative approach to enhance traffic management and rule enforcement standards.
Authors - Nirav Bhatt, Priyanka Patel, Uttam Bhavani, Hiren Kakadiya Abstract - Cloud computing has become a popular choice for businesses and organizations looking to improve the performance of their applications, including the ability to scale resources on demand, the use of distributed computing architectures, and the ability to leverage the latest hardware and software technologies. This research paper explores various ways in which cloud computing can be used to enhance application performance, including the use of virtualization, containerization, and serverless computing. The paper also discusses the benefits and limitations of each approach, as well as the importance of proper planning and management to achieve optimal results. Overall, the findings of this research imply that cloud computing can be a useful tool for enhancing application performance, but businesses must carefully analyses their individual needs and select the solution that best meets their objectives.