Impact of Blockchain to Secure E-Banking Transaction
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.1-6, May-2019
Abstract
Although E-banking provides its customers a wide range of services at anytime and from anywhere, most of the research studies have indicated that security is the major concern to adopt it without any doubt. As digital world is full of known and unknown cyber threats, there is a real need to protect sensitive records from misuse. Blockchain is a new technology that just steps in to solve the issues. It is basically a linked list of blocks (public ledgers) that records data in hash functions with timestamps to store it anonymously with other participants within the chain. It eliminates third party dependency required for the traditional banking, which in turn reduces the probability of central point vulnerability. Data manipulation is impractical due to use of one-way hash function. There is no requirement of designing distributed trust model as all transactional data are verified with every relevant stakeholder. It has been studied here how Blockchain technology can be used for E-banking scenarios using hash algorithm along with nonce and what is its impact on the society to transfer financial data. However, there are still a few issues associated with Blockchain that need to be addressed before implementing it in real-life.
Key-Words / Index Term
Blockchain, Hashing, Nonce, Distributed Ledger, E-Banking
References
[1] J. Cleens, V. Dem, J. Vandewalle, “On the security of today’s online electronic banking systems”, Journal of Computers & Security 21 (3), 257–269, 2002.
[2 ] J. Boersma, Blockchain technology use cases in financial services. Retrieved October 5, 2018, from https://www2.deloitte.com: https://www2.deloitte.com/nl/nl/pages/financial-services/articles/5-blockchain-use-cases-in-financial-services.html
[3] Y. J. Yang, “The Security of Electronic Banking, Technical Report”, MD20783, University of Maryland, USA, 1998.
[4] B.Schneier, Applied Cryptography Second Edition: Protocols, Algorithms and Source Code in C, Wiley Computer Publishing, John Wiley & Sons, Inc.,pp. 266-271,470-475,2007.
[5] M.D. Nath, S.Karforma, “Object-Oriented Modelling Of Kerberos Based Authentication Process In E-Banking Transaction”, International Journal of Computer Sciences and Engineering,Vol.-6, Issue-9, 2018.
[6] B. Schneier, “Two-Factor Authentication: Too Little, Too Late,” Comm. ACM, vol. 48, no. 4, 2005.
[7] S. M. Darwish, A.M. Hassan , “A model to authenticate requests for online banking transactions”, Alexandria Engineering Journal 51, 185–191, 2012.
[8] N. Jin, F. Cheng,“Network Security Risks in Online Banking”, International Conference of Wireless Communication & Mobile Computing, Canada, pp. 1183–1188, 2005.
[9] Y. Yuan, F. Wang, “Blockchain:the state of the art and future trends,”Acta Automatica Sinica,Vol.42,no.4,pp.481-494,2016.
[10] H. Vranken, “Sustainability Of Bitcoin and Blockchains”, Curr.Opin.Environ, 28, 1-9, 2017.
[11] G.Zyskind,O. Nathan, A.S.Pentland,” Decentralizing privacy: using blockchain to protect personal data”,in Proceedings of the IEEE Security and Privacy Workshops,SPW 2015,pp. 180- 184,IEEE, 2015.
[12] T. Bhattasali, “Blockchain: Remoulding the Future of Banking Sector”, YOUTHINK, vol. XIII, pp. 129-132, 2018.
[13] Cryptography Hash Function Explained:A Beginner’s Guide, Available online at: https://komodoplatform.com/cryptographic- hash-function.
[14] BankChain community:Blockchain for banks, Available online at: www.bankchaintech.com
Citation
Mausumi Das Nath, Tapalina Bhattasali, "Impact of Blockchain to Secure E-Banking Transaction", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.1-6, 2019.
A Study on Research-gap in present E-waste Management and an Intuitive App-based Solution
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.7-12, May-2019
Abstract
Electronic waste (e-waste) refers to the disposal of broken or obsolete e-components. E-wastes may be valuable and recyclable. Most e-wastes requires special handling in their disposal. Due to the rapid advancement of technology, electronic products become trash after a very short span of use. Most electronic devices those are improperly thrown away to a landfill or sold to local rag pickers never get safely disposed of let alone being recycled. These e-wastes contain many harmful materials like lead, copper, zinc, and brass. Due to reprehensible disposal of e-waste, the recycling facility of metals or plastics gets lost and the hazardous element gets leaked in the environment. Hence E-waste is becoming a serious issue as it affects global resource repository, green environment, and sustainability index. This paper paves a path that how does e-waste recycling mechanism can be considered as a service system. The major reason for waste issues, going by our research, comes from the attitude of urban dwellers towards treating their electronic wastes. According to 2016 dictum, the producer has to bear the responsibility of taking back their products. The paper depicts this process starting from a collection of wasted components by recyclers and then recycling it or disposing of it in an eco-friendly manner. Our primary goal is to make this process easier and faster for the end users using an online mobile app. This is an implementation of Extended Producer Responsibility (EPR) where the producer has to be concerned about the product after it gets expired.
Key-Words / Index Term
Electronic waste, Harmful, Management Rule, Recycling, EPR, Online App
References
[1] No. 551 Order of the State Council of the People’s Republic ofChina, Regulations for the administration of the recovery and disposal of waste electronic and electronic products. 2009. 3.www.chinaenvironmentallaw.com/.../regulations-on-waste-electricand-electronic-products-chn-eng.pdf
[2] Research on Innovative Information-Flow Management of E-Waste RecyclingNetwork Based on Cloud ComputingKejing Zhang1, Ping Cang1, Jutta Geldermann2, Fugen Song1
[3] E-Parisaraa Private Limited - http://ewasteindia.com
[4] Ecoreco - Eco Recycling Limited - http://ecoreco.com/
[5] J S Pigments Private Limited - http://www.jspigments.com/
[6] ATTERO - Electronics Asset Management Company - http://www.attero.in/
Citation
Jacky Kumar Shaw, Anuja Mukherjee, Dibas Das, Ipsita Saha, "A Study on Research-gap in present E-waste Management and an Intuitive App-based Solution", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.7-12, 2019.
Matrix Method for Distinction between Text and Non-Text Images
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.13-16, May-2019
Abstract
Recognition of text and non-text images is a major challenge in the field of computer vision so as to efficiently extract the text from that image. The algorithm used for the extraction of the text from the images would have a higher efficiency if it is known beforehand that the image is a text image or a non-text image. However, there are many images such as old manuscripts where the extraction of the text becomes very difficult. In that case, the algorithm for the distinction between the text and non-text becomes very easy for text detection and have high accuracy and fast in detecting the text from the image. This method can also be applied to detect and extract the text from the signboards also. In our approach, we had built a system that takes any sort of image as an input. After the input of the image, it is then processed and converted into a binary image. Distance transform method is then applied and the measure of the distance between the various points in the image are then calculated. From the calculated points, duplicate points are merged into one point and are sorted in ascending order. The total area of the binary image is then calculated and also the image corresponding to each of the distance transform points are then calculated. The total area of the binary image is then divided by each of the area value of the corresponding distance transform points are the value extracted is known as the feature values. After getting all the feature values the whole value is then divided into small intervals and is then processed through the classifier. The accuracy of the classifier is then calculated and evaluated for the distinction between text and non-text images. This method is a very simple and accurate method for the distinction between the text and the non-text images and also helps in the extraction of the text from the image. Experiment have been done with simple text and non-text image dataset and the efficiency of the proposed method is then demonstrated.
Key-Words / Index Term
text recognition, distance transform, classifier
References
[1]. Najwa Maria Chidiac, Pascal Damein and Charles Yacoub, “A robust algorithm for text extraction from images”, 39th International conference on Telecommunication and Signal Processing, 2016.
[2]. Radhika Patel and Suman K Mitra, “Extracting text from degraded documents”, 5th National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, 2015.
[3]. R. Malik and SeongAh chin, “Extraction of text in images”, Proceedings of International Conference on Information Intelligence and Systems, 1999.
[4]. Sezer Karaoglu, Ran Tao, Theo Gevers and Arnold W. M. Smeulders, “Words matter: Scene Text for Image Clssification and Retrieval”, IEEE transactions on multimedia, vol. 19, no. 5, may 2017.
[5]. Chengquan Zhang, Cong Yao, Baoguang Shi and Xiang Bai, “Automatic discrimination of text and non-text natural images”, 13th International Conference on Document Analysis and Recognition, 2015.
Citation
P. Karmakar, C. Md. Mizan, S. Jana, S. Dasgupta, S. Paul, R. Das, S. Das, "Matrix Method for Distinction between Text and Non-Text Images", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.13-16, 2019.
Quantum Key Distribution Protocol for Knapsack Cryptosystem
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.17-21, May-2019
Abstract
The major threat in data communication in present day is security. To reduce the threat caused in the communication channel quantum cryptography is emerging as a replacement to its classical counterpart. This paper focuses on a quantum key distribution protocol for the knapsack cryptosystem using a one-way trapdoor function by qubit rotation. The protocol exploits a qubit in superposition state for a single bit message communication. The security of the protocol is owing to the fact that any random quantum state cannot be replicated.
Key-Words / Index Term
Quantum Cryptography, Knapsack Sequence, Quantum Key Distribution Protocol
References
[1] C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing”, Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, December 1984, pp. 175-179.
[2] C.H. Bennett, “Quantum cryptography using any two non-orthogonal states” Physical Review Letters, 68, 1992, pp 3121–3124.
[3] Ching-Nung Yang and Chen-Chin Kuo, “Enhanced Quantum Key Distribution Protocols Using BB84 and B92”, 2002.
[4] M. Houshmand and Khayat. S. Hosseini., “An Entanglement- base Quantum Key Distribution Protocol”, Information Security and cryptology (ISCISC), 8th International ISC Conference, IEEE, 2011, pp. 45-48.
[5] A. Odeh, K. Elleithy, et. al., “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, London, United Kingdom: third International Conference on Innovative Computing Technology (INTECH), IEEE, August 2013.
[6] A. Aldhaheri, K. Elleithy, et. al., “A Novel Secure Quantum Key Distribution Algorithm”, University of Bridgeport, 2014.
[7] A. Gueddana and V. Lakshminarayanan, “Physical Feasibility of QKD based on Probabilistic Quantum Circuits”, IET Information Security, Volume 12, Issue 6, November 2018, pp. 521 – 526.
[8] Bruce Schneir (1996), “Applied Cryptography”, John Willey and Sons Inc., New York, USA
[9] W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 1982, pp. 802-803.
[10] M. A. Nielsen and I. L. Chuang, “Quantum Computation and Quantum Information”, Cambridge University Press, Cambridge, London, 2000.
Citation
Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay, "Quantum Key Distribution Protocol for Knapsack Cryptosystem", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.17-21, 2019.
Internet of Things-Enhanced Healthcare Services
Review Paper | Journal Paper
Vol.07 , Issue.18 , pp.22-28, May-2019
Abstract
Internet of Things (IoT) technology has attracted much attention in recent years for its potential to alleviate the strain on healthcare systems caused by an aging population and a rise in chronic illness. In IoT based healthcare, various distributed devices aggregate, analyze and communicate real time medical information to the cloud, thus making it possible to collect, store and analyze the large amount of data in several new forms and activate context based warnings. IoT has helped both practitioners and researchers to design innovative solutions in healthcare. The IoT-enabled healthcare research is significant due to its valuable inference, including higher quality and lower cost of services and reliable preventive care.[1]
Key-Words / Index Term
IoT services, CGM, Pulse Sensor, Arduino
References
[1] “Internet of Things for Smart Healthcare:Technologies, Challenges, and Opportunities”, Stephanie Baker, Wei Xiang, Senior Member, IEEE, and Ian Atkinson .
[2] “The Application of the Internet of Things in Healthcare”, Fayez Hussain Alqahtani King Saud University P. O. BOX 2454, Riyadh 11451 Kingdom of Saudi Arabia.
[2]“Internet of things in healthcare: applications, benefits, and challenges”, Peerbits.
[3]“Internet of things in healthcare: applications, benefits, and challenges”, Peerbits.
[4]Red Hat Opensource
[5]Github
[6] Heartbeats in Your Project, Lickety-Split.
[7] PreciousFeedz.
Citation
Bidisha Das Adhikary, "Internet of Things-Enhanced Healthcare Services", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.22-28, 2019.
A Rule based Approach for Anaphora Resolution in Bengali Sentences
Survey Paper | Journal Paper
Vol.07 , Issue.18 , pp.29-34, May-2019
Abstract
Anaphora Resolution (AR) is one of the complex tasks in computational linguistics. It is the process of finding the referents in a given discourse. In this paper, anaphora resolution between a noun and its representative pronoun is presented using a rule-based model. First of all, a set of test sentences are retrieved from the Bengali text corpus. Each of the test sentences contains noun/s and its representative pronoun/s in it. Next, these sentences are processed using a set of rules to establish the relation between noun/s and its representative pronoun/s. The experiment is carried out on a set of 200 structured sentences and the overall accuracy is achieved 65.14%. The sentences are collected from the Bengali text corpus, developed in the TDIL (Technology Development for Indian Languages) project of the Government of India. The challenges and pitfalls of this work are described in this paper at last.
Key-Words / Index Term
Bengali Anaphora Resolution, Rule based Approach, Bengali Orthographic Rule
References
[1] Hobbs, Jerry, "Resolving pronoun references", In the Proceedings of the Lingua 44:311-338, 1979.
[2] S. Lappin and H.J. Leass, “An algorithm for pronominal anaphora resolution”, In the Proceedings of the Computational Linguistics, 20(4), 535-561, 1994.
[3] Constantin Orasan and Richard Evans,“NP Animacy Identification for Anaphora Resolution”, Journal of Artificial Intelligence Research 29, 79-103, 2007.
[4] A. Dhar and U. Garain, “A method for pronominal anaphora resolution in Bengali”, In the Proceedings of the 6th Int. Conf. on Natural Language Processing (ICON), Student Competition section, Pune, December.
[5] T Tazakka, Md. Asifuzzaman and Sabir Ismail, “Anaphora Resolution in Bangla Language”, International Journal of Computer Applications (0975 – 8887), November 2016.
[6] Anwesa Bagchi, "POSTPOSITIONS IN BANGLA With special reference to Prepositions in English", LANGUAGE IN INDIA, Volume 7 : 11 November, ISSN 1930-2940, 2007.
[7] U.K. Sikdar, A. Ekbal, S. Saha, Olga Uryupina and M. Poesio, “Adapting a state-of-the-art Anaphora Resolution System for Resource-poor Language”, In the Proceedings of the International Joint Conference on Natural Language Processing, pages 815–821, Nagoya, Japan, October 2013.
Citation
Angan Das, Abhishek Banerjee, Samiya Maity, Alok Ranjan Pal, "A Rule based Approach for Anaphora Resolution in Bengali Sentences", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.29-34, 2019.
DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.35-38, May-2019
Abstract
Increasing number of vehicles in utilize has conducted in the service to supply human and resource security. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network, where the nodes are mobile vehicles moving in constrained road topology. VANET networks are visualized to be utilized in practical ITS systems around the world. A network standard has been grown as Wireless Access In Vehicular Environment (IEEE 802.11p) to be utilized in VANET which is an alteration to IEEE 802.11 standard. With each innovative technical applications particularly computers and network appliances, come novel safety challenges. Each network in present time is vulnerable to safety attacks and VANET is not the exception. The most notorious attack among all is the Distributed Denial of Service Attack which is obvious as unlike other safety attacks the data packets utilized in it are genuine and authorized packets. In this paper, a novel offensive measure for detection and prevention has been proposed.
Key-Words / Index Term
VANET, Ad-hoc, ITS, Mobile and DoS
References
[1] Kuppusamy, K., and S. Malathi. "An effective prevention of attacks using GI Time frequency algorithm under DDOS." International Journal of Network Security & Its Applications 3, no. 6 (2011): 249.
[2] Barford, Paul, Jeffery Kline, David Plonka, and Amos Ron. "A signal analysis of network traffic anomalies." In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 71-82, ACM, 2002.
[3] Brutlag, Jake D. "Aberrant Behavior Detection in Time Series for Network Monitoring." In LISA, vol. 14, no. 2000, pp. 139-146. 2000.
[4] Naoumov, Naoum, and Keith Ross. "Exploiting p2p systems for ddos attacks." In Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM, 2006.
[5] Ahmad, Shaikh Sharique, and HiralalSolunke. "Survey on VANET Based Self Adaptive Prioritized Traffic Signal Control." (2018).
[6] Sharma, Richa, and Jyoteesh Malhotra. "A Survey on Mobility Management Techniques in Vehicular Ad-hoc Network." In International Conference on Computing, Communication & Systems, 38, vol. 41. 2014.
[7] Agarwal, Pallavi. "Technical review on different applications, challenges and security in VANET." Journal of Multimedia Technology & Recent Advancements 4, no. 3 (2018): 21-30.
[8] Zhang, Jie. "A survey on trust management for vanets." In 2011 IEEE International Conference on Advanced Information Networking and Applications, pp. 105-112. IEEE, 2011.
[9] Gaikwad, Dhananjay Sudhakar, and Mukesh Zaveri. "VANET routing protocols and mobility models: A survey." In Trends in Network and Communications, pp. 334-342. Springer, Berlin, Heidelberg, 2011.
[10] Hamedani, Parisa Saraj, and Arshin Rezazadeh. "A New Two Level Cluster-Based Routing Protocol for Vehicular Ad Hoc NETwork (VANET)." In 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim), pp. 121-126. IEEE, 2018.
Citation
Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh, "DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.35-38, 2019.
Artificial Neural Networks in Compute: A Review
Review Paper | Journal Paper
Vol.07 , Issue.18 , pp.39-43, May-2019
Abstract
Classification is one of the data mining problems receiving enormous attention in the database community. Although artificial neural networks (ANNs) have been successfully applied in a wide range of machine learning applications, they are however often regarded as black boxes, i.e., their predictions cannot be explained. ANN methods have not been effectively utilized for data mining tasks because how the classifications were made is not explicitly stated as symbolic rules that are suitable for verification or interpretation by human experts. With the proposed approach, concise symbolic rules with high accuracy, that are easily explainable, can be extracted from the trained ANNs. Extracted rules are comparable with other methods in terms of number of rules, average number of conditions for a rule, and the accuracy.
Key-Words / Index Term
Processing,Networks,neurons(keywords)
References
[1]. DAWSON, CHRISTIAN W (1998). "An artificial neural network approach to rainfall-runoff modeling". Hydrological Sciences Journal.
Citation
Soumya Dhol, Itu Chakraborty, "Artificial Neural Networks in Compute: A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.39-43, 2019.
A New Heuris tic for Multiplication of two matrices of order 2*2
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.44-47, May-2019
Abstract
From the very beginning of computer era, the scientists are trying their best for searching the method which can reduce the complexity of multiplication of matrices. In case of ordinary matrix multiplication of two given 2*2 matrixes, we use three for loops to determine the product of these two matrixes and produce a resultant two-dimensional matrix. Then the complexity of the algorithm is n3. Although this problem has been studying extensively, we intend to implement and modify the pre-existing procedure. So, we decide to tackle the multiplication of those two two-dimentional matrixes by using a one-dimensional array. The algorithm that we develop will store all the elements of two 2x2 matrixes in a single one-dimensional array. Then we generalized a formula that will provide the co-relationship between the index number of the one-dimensional array to find the product of those two 2*2 matrixes. So, in our case we determine the result by using two for loops only that basically reduce the complexity.
Key-Words / Index Term
matrix,multiplication,complexity, array
References
[1] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to Algorithms”, the MIT Press.
[2] Aho, A.V., Hopcroft, J.E., and Ullman, J.D,”The Design and Analysis of Computer Algorithms”. Addison-Wesley, Reading,,MA, 1974.
[3] Khaled Thabet, Sumaia AL-Ghuribi , “Matrix Multiplication Algorithms”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012.
[4] IVO HEDTKE,” STRASSEN’S MATRIX MULTIPLICATION ALGORITHM FOR MATRICES OF ARBITRARY ORDER”, Bulletin of Mathematical Analysis and Applications ISSN: 1821-1291, URL: http://www.bmathaa.org Volume 3 Issue 2(2011), Pages 269-277.
Citation
Shankar Debnath, Ira Nath, Dharmpal Singh, "A New Heuris tic for Multiplication of two matrices of order 2*2", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.44-47, 2019.
GPS Operated Smart Walking Stick for Visually Impaired People
Research Paper | Journal Paper
Vol.07 , Issue.18 , pp.48-52, May-2019
Abstract
This paper represents the architecture and implementation of a smart self obstacle detection stick that will help to navigate the visually impaired people. This system uses GPS and voice recognition along with obstacle avoidance with the help of developed Android application. The visually impaired person issues the command and receives the direction response using audio signal, which encourage blind people to walk on the road without any help of other people. With the advancement of voice recognition system, it is now become easier to issue commands regarding directions to the visually impaired people. The blind person will provide the destination’s name as the input to the developed APP, which will plot a path to it. The app navigates the user`s progress along the route and issues voice instructions for each turn.
Key-Words / Index Term
Bluetooth module,GPS,Smart walking stick, Ultrasonic Sensor, Voice navigation
References
[1] R.Jothi, M.Kayalvizhi, K.Sagadevan, “Smart Walking Stick for Visually Challenged People”, Asian Journal of Applied Science and Technology, Vol. 1, Issue. 2, pp. 274-276, 2017.
[2] A.Sangami, M.Kavithra, K.Rubina, S.Sivaprakasam, “Obstacle Detection and Location Finding For Blind People”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 2, pp. 119-123, 2015.
[3] S. Chaitrali, A. D. Yogita, K. K. Snehal, D. Swati, V. D. Aarti, “An Intelligent Walking Stick for the Blind”, International Journal of Engineering Research and General Science, Vol. 3, Issue. 1, pp. 1057-1062, 2015.
[4] K.C. Nalavade, F. Bharmal, T. Deore, A. Patil, ”Use of ultrasonic sensors, GPS and GSM technology to implement alert and tracking system for Blind Man”, In the Proceeding of 2014 International Conference of Advance Research and Innovation, pp. 138-142, 2014.
[5] H. Girish, V. V. Lonkar, V. Marathe, M. Modak. "Electronic path guidance for visually impaired people", The International Journal of Engineering and Science (IJES), Vol. 9, Issue. 14, pp. 248-254, 2013.
[6] H. Gawari, M. Bakuli, “Voice and GPS Based Navigation System For Visually Impaired”,International Journal of Engineering Research and Applications, Vol. 4, Issue. 4, pp.48-51, 2014.
[7] J. Ramadhan, “Wearable Smart System for Visually Impaired People”, Sensors 2018, Vol. 18, pp. 843-856, 2018.
Citation
D.Mukherjee, S. Bhattacharyya, S. Samanta, "GPS Operated Smart Walking Stick for Visually Impaired People", International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.48-52, 2019.