2018- Technical Paper Presentation Competition
"2018- Technical Paper Presentation Competition"
Pages
[1]
Smart Residency- Apartment Security and Surveillance System[Full-Text ]
Ravneet Singh Kohli, Pooja Nandgaonkar, Priya Patil, Prajakta Shete In recent years, considerable progress has been made in the area of face recognition. Through the work of engineers, computers can now outperform humans in many face recognition tasks, particularly those in which large databases of faces must be searched. A system with the ability to detect and recognize faces has many potential applications including crowd and airport surveillance, private security and improved human-computer interaction. An automatic face recognition system is perfectly suited to fix security issues and offer flexibility to smart house control. Algorithm for face recognition, based on viola jones, is programmed and implemented on the Matlab platform. The system is based on the criteria of low power consumption, resources optimization, and improved operation speed. This project reviews the related work in the field of home automation systems and presents the system design, software algorithm, implementation and results. The Matlab program is developed for face detection and it met the design criteria and solves the paper problem.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WEB APPLICATION SECURITY USING VARIOUS CAPTCHA[Full-Text ]
Sunita Mali, Pranali Mahajan, Prof.A.D.PalsodkarCAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart.)CAPTCHA are used as security mechanism in web application.Text-Based CAPTCHA is mostly used. Due to the wide popularity the text-based CAPTCHAs are more vulnerable to attacks. Hence there is an immense need to improve the strength. We are providing multilevel security using various types of CAPTCHA like Text based Captcha,Math-based Captcha and Image-Based Authentication Captcha.CAPTCHA is nowdays become more important by security point of view as it prevents bots apart. We used three different types of CAPTCHA with multi level security in one plane.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Android Based Chatbot For College[Full-Text ]
Avni Prajapati, Pranali Naik, Sushmita Singh, Anil KaleChatbots are virtual users or virtual assistants for communicating via messaging or chat. They are programs which communicate with a user through messaging or chat interface. Android based Chatbot is a bot application designed for college purpose where the students would not have to visit the campus personally instead everything like notices, results, timetable, assignments would be made available at the fingertip just with the help of mobile phone and internet connection through a login. Also, the faculty would not require to make constant announcement in the class about a particular notice; rather things would get uploaded into the chatbots database by the admin.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
An Energy Efficient Fast and Furious Visible Light Communication[Full-Text ]
Richard Jacob, Balveer Singh Vasir, Gurjeet Kaur Sahota, Prathamesh TodkarAn emerging technology Li-Fi, or light fidelity is a bidirectional and fully networked wireless communications medium which uses light from light-emitting diodes (LEDs) and provides transmission of data through illumination by sending data through a LED light bulb that varies in intensity faster than the human eye can follow. It can provide connectivity within a very large area with more security and with higher data rates and high speed than data that can be transmitted through Traffic management is a major concern for cities around the world. The conventional traffic problem has been cast as a mismatch situation between supply and demand.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Image Summarization for Recognition of Image Using Image Processing[Full-Text ]
Trupti Prabhu, Siddesh Soni, Aniruddha PalsodkarWith the rapid advancement in technology it is easy to take pictures, and easier still to share them with the world at large. As a result, in a collection of images we end up having recurring and similar images which we would like to omit. Manually going through such a huge collection and picking out the required images is a highly laborious task. Traditional approach like the google photos and other image summarization techniques does not provide enough information about the image and only does the segregation of the image. Our aim is to develop a system with which will summarize the image according to different individual as well as provide personal details along with it. Through this paper we would like to develop a system in which the user will get the exact information of the particular person if image is input into the system.Using different image summarization algorithms we would segregate the image based and provide information about it.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automatic Timetable Generation using Genetic Algorithm[Full-Text ]
Shraddha Shinde, Saraswati Gurav, Sneha karme.The implementation of a computer program which employs Genetic Algorithm (GAs) in the quest for a optimal lecture timetable generator. GA theory is covered with emphasis is on less fully encoded systems employing non-genetic operators.The field of Automated Timetabling is also explored. A timetable is explained as essentially, a schedule with constraints placed upon it. The program written in java that has agood object oriented to do it, and it has the special libraries to deal with genetic algorithm which will be used for the implementation. In simplified university timetable problem it consistently evolves constraint violation free timetables. The effects of altered mutation rate and population size are tested. It is seen that the GA could be improved by the further incorporation of repair strategies,and is readily scalable to the complete timetabling problem.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Access to product information using QR-code[Full-Text ]
Supriya Tupgaonkar, Harshada Sawant, Yogisha Khairnar, Dr. Prof. Anil Kale This paper is developed to help blind peoples in daily life. This required normal mobile camera to scan the QR-Code which is printed and attached on stand in D-mart or any shopping mall so that blind people does not required to scan full product to find QR-Code. This is very helpful finding out description and prized of packaged product to the blind people and so helping them in deciding to buy a product especially which are packaged. This is because it becomes very hard for the blind people to tell the difference between the packaged products. In order to use this system, all the user needs to do is scan the QR-code in the mobile phone. It will retrieve the data and price about the product. This application will also suggest other products under same category. So, this application really benefits blind and visually damaged/weakened peoples and so making their work of identifying products easy. This paper can be put into use in any shopping mall, supermarket, Book stores, Medical stores etc.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
HYBRID MODEL FOR SECURING E-COMMERCE TRANSACTION[Full-Text ]
Sidraah Matte, Anoop Dubey, Nilkanth shirsat, Prof. Dr. Anil KaleIn today’s world the requirement for securing e-commerce is on a great demand. It includes the e-commerce transaction’s privacy, authenti-cation, maintenance of its integrity and non-repudiation. These are very critical issues in today’s time for trade which is taken over the internet through the means called e-commerce. This paper contains of various methods called as the Cipher method that improves the Diffie-Hellman key exchange by using truncated polynomial in discrete logarithm problem (DLP) that increases the security of the e-commerce transaction that takes over the internet. It also contains algorithms such as the MD5, and AES. MD5 is the asymmetric key algorithm and AES is symmetric key algorithm.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Student’s Employability Prediction Using Data Mining[Full-Text ]
Madhavi Girase, Suchita Lad, Prerna PachpandeStudent’s employability is a major concern for the institutions offering higher education and a method for early prediction of employability of the students is always desirable to take timely action. The paper uses Decision Trees as classification techniques of data mining to predict the employability of Undergraduate Engineering students and find the algorithm which is best suited for this problem. For this purpose, a data set is developed with the traditional parameters like socioeconomic conditions, academic performance and some additional emotional skill parameters. Predicting student employability can help identify the students who are at risk of unemployment and thus management can intervene timely and take essential steps to train the students to improve their performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SQL Injection Detection and prevention[Full-Text ]
DIKSHA PATIL, SHEETAL SONKAMBLE, PROF. V. M. KHARCHEComplete Web Vulnerabilities Scanner is developed for creating scanning whole webpage of websites. This web application is to be con-ceived in its current form as a dynamic site- requiring constant updates both from the clients as well as the developer. On the whole the objective of the project is to remove the vulnerabilities which is founded by this application. A great number of web application vulnerabilities are leveraged through client-side submission of unexpected inputs. While it is clear these vulnerabilities are complex and widespread, what is not clear is why after over a decade of effort they remain so prevalent.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Recognizing Devanagari Numeral Using Deep Neural Networks[Full-Text ]
Vikas C.Mishra, Yash D.Jain, Omkar P.ThakurHandwritten Devanagari numeral using neural network is presented in this paper. Handwritten character recognition is one of the most fascinating and challenging research areas in the field of image processing. It is the ability of the computer to receive and interpret handwritten input from various sources and convert it into editable text format. Feature extraction plays an important role in handwritten character recognition because of its effect on the capability of classifiers. Recognition and classification of numerals are then done by the use of Neural Networks. The recognition rate of the proposed system has been found to be quite high. In this project, we consider the problem of recognizing handwritten numerals using Machine Learning techniques. The first step is building the database using various image processing techniques etc. We found a dataset of 20,000 Devanagari numerals which is used to train and test our classifiers. Following neural network algorithms were used - back-propagation algorithm, perceptron algorithm. For each of the classier, after training the networks, their accuracy of classification was calculated and compared on the test set.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption[Full-Text ]
Swapnil Deshmukh, Sourabh Dhivare, Prof.Mr. Harshad DagadeWith the growth of cloud computing, a new way for data sharing is being formed benefiting every other individual or organisation associated with it. But the data shared may not reach the cloud computing sources securely. This is when cryptography comes into picture to secure user's valuable data and information that needs to be kept thoroughly confidential. The authorization to secured data needs to be dynamic as soon as the authorization gets expired and needs to be revocable. This is where we propose (RS-IBE) where authorization are updated systematically and simultaneously. The performance of the proposed (RS-IBE) has advantages in terms of functionality and efficiency. Finally, we provide the implementation of the the proposed scheme as well as its practicability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Centralized Database Management System for Medicals[Full-Text ]
Kalpesh Shinde, Sandeep Kadu, Rohit Avhad, Prof. Mr. Jitendra PatilThe issue of current medical system is that each medical shops have separate and scattered database system. So we intend to implement a centralized database management system for medical stores. This system will be available for the medical store owners as well as customers. We will provide a platform for all medical store owners to manage their database. The store owner can add, delete, and modify records in the file. It will provide a user friendly interface to perform all the basic operations required for a medical store thus helps in maintaining the records with ease. It will also provide access to customers who can search particular medicine which he needs and the system will provide the details of medical store in their locality which currently have the medicine in stock.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Digital Helthcare System Using iBox[Full-Text ]
Kunal Rajdev, Ajay Vavhal, Komal Bonde, Prof. Poonam Lad This paper is developed to help patient as well as doctors. This system required Special Hardware circuit called as “iBox” to monitor the patient various parameters such as heart rate, Temp, movement. Futher this information will send to server-side PC. Pc will store information in excel and if some abnormal codition or variation happens than information will send to doctor on his mobile through IoT. Then doctor will send priscription to server-side Pc through his application. This is very helpful in hospital beause It is difficult for doctor to monitor paitent continuously. With the help of this system doctor can not only keep the record of patient but also get updates various parameter. This will also helpful in rural area where doctor can not reach easily.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Anti Phishing Framework Based On Visual Cryptography[Full-Text ]
Bhagyesh Mali, Akshay Kadam, Akshay Hande, Prof. P.B.Lad Computer and network security is one of the most Crucial areas today. With so many attacks happening on all kinds of computer systems and networks, it is imperative that the subject be understood by students who are going to be the IT professionals of the future. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. "A Novel Anti-phishing framework based on visual cryptography" to solve the problem of phishing. The use of visual cryptography is showed to protect the privacy of image captcha by dividing the original image captcha into two parts (shares). That image shares are stored in separate database servers such that the original image captcha can be exposed only when both are simultaneously available. Once the image captcha parts are match then user can use whole image as password.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Securing Against Collaborative Blackhole Attack in Wireless Ad-Hoc Network[Full-Text ]
Mr. Deepesh Dilip Jagdale, Mr. Siddhesh KhanvilkarThe Networks which are not connected cables of any kind are term as Wireless Networks. The introduction of cables is expensive. Therefore, Enterprises incorporate Wireless Networks into buildings or as a connection tool between entirely different equipment locations. The vulnerability of these networks to several attacks is an issue to be a tackle. A prerequisite in the design of mobile ad hoc networks (MANETs) is the establishment of communication among nodes i.e. the nodes must collaborate with one another. Within the prevalence of malicious nodes, this demand might result in serious security concerns; for instance, such nodes might disrupt the routing method. Considering this one of the biggest challenges is prevention and detection of malicious nodes which launching gray hole or collaborative black hole attacks may be a challenge. This project tries to resolve this issue by planning an Ad Hoc on-demand distance vector routing (AODV) based routing mechanism; i.e. referred as the cooperative bait detection scheme (CBDS), that integrates the benefits of reactive defense architectures. CBDS technique implements a reverse tracing method to assist in achieving the projected goal. Thus, with the blend of CBDS with different well-known message security scheme named hash coding, securing routing framework is attain.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CLOUD BASED SMART WATER METER[Full-Text ]
Rugvedi Deshmukh, Vrushali Bankar, Vaishnavi Bandagale, Amruta doiphode.This is a research paper on WATER METER which has become a notable topic in today’s technological discussion. In this fast paced life water suppliers and consumers needs to introduce a new water system which is more efficient and comparatively quicker. Digital Water Meters are used to measure the volume of water used by residential and commercial buildings that are supplied with water by a public water supply system. Thus by using this we can keep monitoring on the usage of water by different consumers. The main objective is to make water supply more accountable and transparent which reduces the manual assistance, deliver secure and time efficient solution for the complex water system. Apart from grown countries, the water supplies in others present with a sensor which is operated electronically. In this project a GSM based billing system is provided. This is a system which leads to a continual hassle free water supply and billing giving maximum convenience to consumers and enhancement in water usage audit.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Campus Navigation Using Augmented Reality[Full-Text ]
Mayuri Tamhane, Prathamesh Sarjekar, Chirag Gupta, Prof. V M. KharcheNavigation is a technique which basically focuses on process of monitoring and controlling the movement of person or vehicle or craft from one place to another e.g.: Aeronautic Navigation, Land navigation, Marine Navigation, etc. The campus navigator is the android mobile application which is basically used for navigating routes inside any campus premises e.g.: College, Hospital, Mall, etc. Mobile phones are nowadays far more than merely devices to communicate with. Especially, Smartphones are products that help to make our work and everyday life easier. Along with the advanced technology and popularity of these devices, the use of mobile applications has increased enormously in the last few years. Based on new techniques like GPS, sensors, compass and accelerometer that can be used to determine the orientation of the device, location-based applications coupled with augmented reality views are also possible. There are several commercial navigation applications - such as Google Maps, Yahoo Maps and Mapquest that provide users with directions from one place to another. However, these applications must search along existing roads; they are not able to provide routes that are as precise as an on-campus path would require.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Crime Reporter and Missing Person Finder[Full-Text ]
Pranay Thali, Dhiraj Mujmule, Ankit Bhingarde, Prof. Yogesh SalveIn this paper we propose an Android application for crime reporter and finding missing person.This is an android application for Free Dedicated to Missing Peoples. This android application will be used by Jeevan Vikas Charitable Trust for the purpose of finding missing person. This application contains functionality to add complaint as well as view all complaints. By using these complaints, Trust members will try to find lost person in various areas. This application will upload complaint on web server which can be accessed by any of the trust member having this application
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Expressing The QoS by Call Admission Control Technique for Next Generation MANET[Full-Text ]
Prof. Jagdish M. HatwarRapidly increasing access of multimedia in the worldwide telecommunication networks needs to improve service quality for mobile networks and personal communications systems. It is now important to study and understand the different CAC policies to solve current issues for providing the improved Quality of Services. For reduction in the network congestion as well as in call dropping, CAC offer fantastic strategies by limiting the number of call connections into the networks. In this paper it is try to put a technique to enhance the QoS in customer’s point of view. As they always demanding for more and more as well as time to time access for the network with as fastest as without interruption of services i.e. without any blocking and dropping of call request.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages
[1]