CONVERITA 2015- National level symposium

"CONVERITA 2015 Conference Papers "


3-Dimensional Virtual Authentication Techniquewith Chronological Scheduling[ ]


Authentication is a process of validating who are you to whom you claimed to be or a process of identifying an individual, usually based on a username and password. We have many authentication schemes but they have some drawbacks. So, 3-D password is introduced. The 3-D password is a multifactor authentication scheme. It combines all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item toanother. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Stochastic Approach towards Inclusive Rural Development Using Demographic Data[ ]


Technology has advanced immensely in India in the recent years but its advantage has not been wholly utilized by the rural parts of our country .Villages hold a diversified job environment where most jobs can be made highly profitable by establishing proper communication among various professions. Information awareness in cities is playing a major role in improving small scale businesses which is missing in villages.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Effective way of Human Body Function Monitoring Using Body Sensor Network[ ]


An integration of wireless communication and sensing technologies, the concept of a body sensor network (BSN) was initially proposed in the early decade with the aim to provide an essential technology for wearable, ambulatory, and pervasive health monitoring for elderly people and chronic patients. It has become a hot research area due to big opportunities as well as great challenges it presents.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ARDUINO LILYPAD SHOES FOR VISUALLY CHALLENGED[ ]


Arduino Lilypad shoes are intended primarily to assist blind people to reach their destination and also help them to avoid walking into things on their way. It consists of a pair of shoes in which one is fitted with vibrators, proximity sensors and a bluetooth pad. These devices are connected to an android mobile phone that calculates directions and real time location using google maps, built-in GPS and compass module. In arduino Lilypad, proximity sensors are used to detect the obstructers in the way of visually challenged people. So this arduino Lilypad device offers a non-obtrusive navigation for these people. A voice recognisable technique is used to know the desired destination of the blind people. A bluetooth device sends signal to the arduino Lilypad using the concept of internet of things. Internet of things wirelessly connects an object to the cloud and abstracts the necessary information from the internet.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AUTOMATED ATTENDANCE SYSTEM BASED ON RFID TECHNOLOGY AND MOTION SENSOR[ ]


Whole world and administrators of Educational institutions’ in our country are concerned about regularity of student attendance. Student’s overall academic performance is affected by the student’s presence in his institute. Mainly there are two conventional methods for attendance taking and they are by calling student names or by taking student sign on paper. These methods were more time consuming and inefficient. Hence, there is a requirement of computer-based student attendance management system which will assist the faculty for maintaining attendance of presence. The paper reviews various computerized attendance management system. In this paper basic problem of student attendance management is defined which is traditionally taken manually by faculty. One alternative to make student attendance system automatic is provided by Computer Vision. In this paper we review the various computerized system which is being developed by using different techniques. Based on this review a new approach for student attendance recording and management is proposed to be used for various colleges or academic institutes.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Accident Alert and Retrieval of Medical Records of Accident Victims from Cloud[ ]


In the present decade, even after technological advancements that we have come through in wireless communications, it is still difficult to improve the survival of accident victims in case of mass transportation vehicles. Cloud computing is the trend in which resources are provided to a local client on an on-demand basis, usually by means of the internet. The major and most prevalent application of cloud is storage. The idea is to use cloud to store adequate medical information of people for easier retrieval in case of accidents. This paper provides a conceptual idea, implementation perspectives and also the problems that are prone to be faced in the implementation of cloud storage to store medical records.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Education for the Blind – An Application of Computer Vision[ ]


Image recognition – renowned as computer vision – is the expertise of adopting and examining images, to produce quantitative and qualitative information. It is an approach of importing what is naturally reinforced in the human eyes and the brain into a computer’s processor. Text-to-speech is a technology that converts text into speech. In this paper, a new interactive learning tool which appends these two technologies is called forth. This tool, when reading a text using TTS software, senses an image, employs image recognition technique to materialize the image into text. This content is then converted to speech. The system undergoes various phases such as pre-processing, feature extraction, object recognition, edge detection, image segmentation and text-to-speech (TTS) conversion. An algorithm to convert graphical material to speech is incorporated along. The proposal is a modest endeavour to help in the education of the unsighted.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Embedded Based Security System[ ]


In this article, we have proposed our idea to develop the wrist watch as a safety device that can send alert signal to any police station in case of an emergency. We still have not yet reached a scenario where women could walk about with no worries in this industrial world, so without putting lives in danger , it is better to take precautions and ensure women safety by using this watch. By a simple press of a button and using the concepts of Biometrics and GPS, we have proposed this idea. The alert message consists of information regarding the current location of the victim, which enables the police officers to arrive at the scene and ensure her safety. Such an approach helps in saving womankind and thereby ensuring their safety.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Enhancing Security in Biometric System Using Blind Authentication Protocol[ ]


Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. We propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the computational cost and enhance security we have used ElGamal. It is based on asymmetric encryption in which biometric authentication and security of public key cryptography is enhanced. Authentication protocol works on public network and provides template protection, ability to retract template protection and assuage the concern on privacy. In our approach the authentication in the encrypted domain does not affect the accuracy, while the encryption key bolsters security.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Finger Vein and Hand Vein Identification System for Effective IT Security[ ]


The objective of this paper is to present a bimodal biometric verification system for physical access control based on finger vein pattern and hand vein pattern for high security access. The database of the proposed system contains 25 finger vein patterns and 25 hand vein patterns of different individuals. Feature vectors are created independently for query images and are then compared with the enrolment templates for each biometric trait to compute the matching score. The final decision is made by fusion at this matching score level architecture.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation of machine learning for medical decision making by utilising decision tree technique[ ]


Decision making is becoming more complex and stressful for individuals and groups especially for medical professionals as a result of huge quantity of data. This paper is on the use of decision tree for treatment options in medical decision support systems. Decision tree was developed and an algorithm to identify optimal choice among complicated options in Surgery (Medical Operation) and Medical management (Drug Prescription) by calculating probabilities of events and incorporating patient evaluations of possible outcomes based on Average Life Year (ALY). This can help the medical professionals in taking decision among the available choices.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ITEM BASED COLLABORATIVE FILTERING USING CLOUD COMPUTING (HADOOP)[ ]


Recommender systems generate meaningful recommendations to a collection of users for items or products that might interest them. In short, It is a Information filtering technology commonly used on e-commerce websites that uses collaborative filtering approach. Recommender systems differ in the way they analyze data sources. One such major technique used in analyzing data sources is Collaborative filtering.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Money Generation By Utilizing Idle Time Of Computers Through Innovative Cloud Storage Outsourcing[ ]


Have you ever imagined that a computer at home or office can generate huge passive income despite being idle all the time? Computing powers are growing today enormously but its resources are not utilised to the fullest capability. We introduce a way that in which each and every computer in this world is used to its fullest capability but at the same time none of your day-to-day activities on the computer gets affected and also it generates huge income doing absolutely nothing extra. We propose the concept of cloud outsourcing for this i.e. we introduce a normal home/office user’s system into Infrastructure-as-a-Service(IaaS) layer of the cloud architecture and so the idle time of the computers can be now used to save the world through this innovative idea. This idea would lead the cloud storage capacity of the world by many folds and that too at a very affordable price.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Non-invasive Acetone Based Glucometer with insulin calculator and updation in cloudserver[ ]


The ultimate focus of this concept is to evaluate the blood glucose level of the patient in a non- invasive manner and to calculate the amount of insulin required and upload the same in the cloud server. Nowadays glucose level is calculated by pricking the blood from the patient’s finger which is quite invasive to some patients. In our method, the patient’s glucose level is calculated by the acetone sensor which is activated by the infrared sensor. The patient is asked to blow his breath towards the mouth piece/blower(focussing the sensor). From the acetone level the amount of blood glucose present is evaluated by the algorithm designed. This value in-turn is used for the calculation of the amount of insulin required. All these data that are interpreted are transmitted to the end device paired and the value is uploaded in the cloud server.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Using Twitter to predict Stock Market Returns (August 2015)[ ]


Twitter is an online social networking service that enables users to send and read short 140-character messages called "tweets". Twitter generates 8TB data per day! This huge dataset can be analyzed using data mining techniques to find interesting trends, combat crime, etc. It also proves to be an interesting source for predicting stock market trends using the emotions expressed by twitter users. Sentiment Analysis is a data mining technique which aims to determine the attitude of a speaker or a writer with respect to some topic. We know that people are easily attracted towards emotional contents, gossips, trends, fashion, etc. When it comes to social networking sites, people express their perspective and their opinions about the things they experience. Normally, if we are planning to go for a movie we see the reviews of that movie to check it will be worth to spend time watching the movie. Using the same principle, we can predict the future of an industry to predict gain or loss in stock market.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Predictive Analysis With Cricket Tweets Using Big Data[ ]


We are now living in a world of Big Data, massive repositories of structured, semi-structured or unstructured data. Each organization holds “electronic data or huge data” in large volume. Some organization see it as a burden and some organization are exploring different ways to analyze, exploit and monetize the information contained within it but also have to tackle with the cost and risk of storing that data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Interactive Headgear[ ]


In India the usage of two wheelers is more when compared to four wheelers, it requires more attention as far as safety is concerned and a important problem is bikers suffer from inadequate roads and bad driving conditions. Other important problem is that most of the time they don’t wear helmet which could be fatal when accidents happen. If rider runs into a blind spot at an intersection or path hole in the road, he can activate the microphone by pressing a button and then record bad road condition or big dangerous hole.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SMART MOBILITY STICK[ ]


The white cane, due to its primitive design, is unable to offer the blind and visually impaired a level of independence that is achievable with modern technology. The Smart walking stick looks to upgrade the white cane by increasing security and usability of the cane while ensuring an affordable price for an older and lower income demographic. This was done by including an GSM -GPS module to pin point the location of the blind person and to establish a two way communication path in a wireless fashion .Moreover, it provides the direction information as well as information to avoid obstacles based on ultrasonic sensor. A beeper, an accelerometer sensor and vibrator are also added to the system. The whole system is designed to be small, light and comfortable . Observations and basic testing confirm the effectiveness of the vibrations in the handle and the accuracy of the ultrasonic sensor up to 1.5 meters past the tip of the cane.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
THE TICKETLESS TRAVEL USING BIGDATA[ ]


In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes and Big data is a buzzword, or catch-phrase, used to describe a massive volume of both structured and unstructured data that is so large it is difficult to process using traditional database and software techniques [1]. Thus with the help of these to revolutionary concepts in IT field we are trying our best to give our country a very useful solution for the problems that we Indian commoners face in their day to day life. Yes, in everyday bus travel we need to search for change in order to buy our tickets without any quarrel with the conductor.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Sensor Networks in Green Cloud Computing[ ]


Cloud computing is currently a very blooming archetype in the information technology sector. This leads to a great increase in the number of cloud based data centers. This in turn is causing high energy consumption and emission of CO2 which greatly affects the environment. Green Computing is a method to reduce these adverse effects on the environment. In this paper, a system has been proposed to implement green computing by combining a wireless sensor network to cloud computing.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------