International Conference on Innovation and Advance Technologies in Engineering
(Volume-2)

CMPN

Paper Type :: Research Paper
Title :: Method To Control Mouse Movement Using HAAR Classifier
Country :: India
Authors :: Pratap Kadam || Vishal Narkar || Sahil Ekhe || Prof. Neha Kunte || Prof. Shweta Sharma
Page No. :: 01-03

Computers that have been developed today have a increase in amount of power. Most of this power is used by software's for processing data. In the past twenty years we've got seen a large amendment within the quantity of information that a laptop will method and also the speed at that it will do that.. But the primary input devices haven't been a major change in the user interfaces for the past 10 years this project analyzes the biometric identification and tracking related technologies of human computer interaction Based on face detection algorithm which does not depend on specific biometric identification and tracking. This system can be used for upper limb peoples who fails to use traditional mouse and keyboard it can also be used for general computer users to do neck rehabilitation training gamesetc.

Keywords: Camera mouse, visual face tracking, Hand Free Control, Perceptual user interface

[1]. A novel robust camera mouse for disabled people P.Gyawal, Abeer Alsadoon, P.W.C prasad, A Elcouemi International Conference on Information and communication systems
[2]. Hong Chen , Te-Son Kuo, Yu-Luen Chen. "Head-controlled device with M3S-based for people with disabilities",. In 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). IEEE.
[3]. "Simultaneous Multimodal PC Access for People With Disabilities by Integrating Head Tracking, Speech Recognition, and LipsMovement" . M. NazmusShadat, Arish Alreja, MaysamGhovanloo. ,International Conference on Biomedical Circuit andSystem
[4]. Tomasz Kocejko, Jerzy Wtorek, Adam Bujnowski " Eye as a Mouse For Disabled",Conference on Human System Interactions, 25- 27 May 2017, ISBN: 978-1- 4244-1542-7


Paper Type :: Research Paper
Title :: Customer Prediction System For A Salon Management System
Country :: India
Authors :: Meet Pragnesh Shah || Varun Yogesh Sura || Deepali Maste
Page No. :: 04-08

Hard drives and cloud storage are sources of permanent storage in present days. In our era after the Industrial Revolution, the old methods of writing logs have become futile as the computers have taken their place. Long term memories (cloud, hard drive) are used to store the data safely which can be extracted whenever you like. With these, the record keeping system of all the businesses have been revolutionized and the safety of the data has also been ensured that way. This system is designed to safeguard the data of a salon by saving the entire customer onto a cloud database and provide reports to the owner so that they can check which services are more used and how much is the weekly and monthly income............

Keywords: Algorithm, Artificial Intelligence, Database, Exploratory Data Analysis, Linear Regression, Logistic Regression, Machine Learning.

[1] Jiuyuan Huo, Hong Qu, Ling Wu, Design and Implementation of Private Cloud Storage Platform Based on OpenStack, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015.
[2] Peter Harrington, Machine Learning in Action, (Manning Publications, 2012).
[3] Ms. Jadhav Vaishali , Ms. Kumthekar Aarti V., Smart Hair Salon Management System, International Advanced Research Journal in Science, Engineering and Technology, Jan, 2017


Paper Type :: Research Paper
Title :: Survey on Advanced Databases
Country :: India
Authors :: Foram Shah || Tanvi Kapdi
Page No. :: 09-12

In the period of web, when information creation has gone off-limits, associations are confronting an intense test in terms of handling, breaking down and putting away huge information. The major downside with this information is that it isn't just being made at a exceptionally quick pace however it is likewise unstructured for example does not have a fixed schema. Besides it is emerging from divergent and discrete sources, for example, the online life. NoSql or Not Only Sql databases offer an exceptionally adaptable and evenly versatile answer for store organized, semi-organized and unstructured information. These databases store information as key-esteem a set which offers better accessibility and high throughput execution as far as preparing inquiries. They are intended to be profoundly adaptable as indicated by the client's necessities, and well appropriate for the necessities of the overlying application just as the hidden information being put away. This paper gives general information of the databases to store any type of data.

Keywords: Database, Advanced Database, No SQL.

[1]. R. T. Snodgrass, "Associating Facts with Time," pp. 1–8.
[2]. S. Arora, "A comparative study on temporal database models: A survey," 2015 Int. Symp. Adv. Comput. Commun. ISACC 2015, pp. 161–167, 2016.
[3]. R. H. Güting, "An introduction to spatial database systems," VLDB J., vol. 3, no. 4, pp. 357–399, 1994.
[4]. S. Chickerur, A. Goudar, and A. Kinnerkar, "Comparison of Relational Database with Document-Oriented Database (MongoDB) for Big Data Applications," Proc. - 8th Int. Conf. Adv. Softw. Eng. Its Appl. ASEA 2015, pp. 41–47, 2016.
[5]. S. D. Sharma, "Mobile Database System : Role of Mobility on the Query Processing," J. Artic., vol. 7, no. 3, pp. 211–216, 2010.


Paper Type :: Research Paper
Title :: Background Verification and Data Analysis
Country :: India
Authors :: Utsav Shah || Dhaval Vasant || Shubham Shinde || Nikita Patil
Page No. :: 13-15

Xverifyis a web-application that will verify background of individuals as well as companies. It will find the credit score/ credit health of individuals. This product will help customers with the credit and financial health check of spouses, their family, their employers, recruiters, etc. so that they will be assured of a bright financial future together. After all, getting into marriage or business is one of the biggest decision of one's life. It will also provide trust and transparency to the entire process. Xverify brings the offline verification system online, powering the individuals with quick and hassle free access to information and results.

[1]. Andler, E. C., & Herbst, D. (2003). "The complete reference checking handbook: the proven (and legal) wayto prevent hiring mistakes (2nd ed.)". New York, NY: American Management Association.
[2]. Burke, M. E. (2005). "2004 Reference and background checking."
[3]. Alexandria, VA:" Society for HumanResource Management"
[4]. Camacho, R. A. (1993). How to avoid negligent hiring litigation. Whittier Law Review, 14, 787–807.
[5]. Crebs, P. T., & Rush, C. M. (1996). Employer's liability for employee's criminal or other wrongful act: thetort of negligent hiring Federation of Insurance and Corporate Counsel Quarterly, 47,11–40Davis, G. M. (2006). Criminal background checks for employment purposes. Alexandria, VA: Society forHuman Resource Management.DeCenzo


Paper Type :: Research Paper
Title :: QR code based Railway e-Ticket
Country :: India
Authors :: Ms.Apeksha Waghmare || Ms.Suvarna Pansambal || Ms.Aruna Pavate || Ms.Divya Kumawat
Page No. :: 16-23

We propose to build a unique and easy to use local train ticketing system. The system allows users to enroll and as soon as they register themselves with unique id is created in the system. User may book tickets for western central and harbor lines of Indian railway and fare is calculated according to distance between stations. This fare balance is later deducted from user account. User may later recharge his account through an admin. Here we use the server on a station. Android devices coming in Wi-Fi range of the server may book tickets. Our system allows users to thus book tickets through their android device. This system not only allows booking train tickets for western, central or harbor lines individually but also can get train or bus pass for BEST, NMMT, KDMT, MBMT, via this system...............

[1] N.M. Girinivas et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March- 2015, pg. 201-207.
[2] Karthick SI, Velmurugan, ―Android suburban railway ticketing with GPS as ticket checker‖, IEEE; 2013. p. 1–4.
[3] International Journal of Computer Applications (0975 – 8887) National Conference on Advancements in Computer & Information Technology (NCACIT-2016).
[4] Wallace Jackson's (2011) "Android Apps for Absolute Beginners" Apress Publication.
[5] International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 3 317 – 320


Paper Type :: Research Paper
Title :: Analogous Investigation of Most Commonly Used Machine Learning Tools
Country :: India
Authors :: Aruna Pavate || Divya Kumawat || Suvarna Pansambal || Apeksha Waghmare || Anita Chaudhari
Page No. :: 24-29

Machine learning is the field most commonly used in many Industries including academics, gaming, designing expert system, and government institutions, Image Recognition, Medical Diagnosis, Financial Services, Marketing & Sales, Transportation Services, Other Biometrics, Safety and Security etc. There are plenty of tools supports to design and experiment soIt is necessary to know the details of the tools available and how we can utilize these tools. This paper provides a general idea of the most commonly used machine learning tools from a practitioner's perspective. Essential services available with these tools are described as well as a comparative examination of these tools represented.

[1]. S. Marsland, Machine learning: an algorithmic perspective. CRC press, 2015
[2]. Peter Harrington "Machine Learning In Action", DreamTech Press
[3]. https://machinelearningmastery.com/machine-learning-performance-improvement-cheat-sheet/
[4]. Tom M. Mitchell "Machine Learning" McGraw Hill
[5]. Sebastian Schelter, Felix Biessmann, Tim Januschowski, David Salinas, Stephan Seufert, Gyuri


Paper Type :: Research Paper
Title :: Cued Click Point Based Authentication
Country :: India
Authors :: Suvarna Pansambal || Apeksha Waghmare || Aruna Pavate || Divya Kumawat || Swati Shirke
Page No. :: 30-34

Usable security has interesting usable difficulties in light of the fact that the requirement for security regularly implies that standard human-computer communication approaches can't be effectively legitimately connected. A vital convenience objective for validation frameworks is to help clients in choosing better passwords. Clients frequently make paramount passwords that are simple for aggressors to figure, yet solid framework doled out passwords are troublesome for clients to recollect. So analysts of current days have gone for elective strategies wherein graphical picture are utilized as passwords. Graphical passwords basically use pictures or portrayal of pictures as passwords............

[1]. S. Chiasson, A. Forget, O. Biddle, P.C. van Oorschot "Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism," published in IEEE transactions on dependable and secure computing, vol. 9, no. 2, pp.222-235, Apr. 2012.
[2]. Vaibhav Moraskar, Sagar Jaikalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke, "Cued Click Point techniques for graphical password authentication," International Journal Of Computer Science And Mobile Computing, Vol.3 Issue.1,
[3]. Ian Jermyn, Alain Mayer, Fabin Monrose, Michael K. Reither, Aviel D. Rubin "The design and analysis of graphical passwords", Proceeding of The 8th UNISEX Security Symposium, 1999.
[4]. Suo, Ying Zhu, G. Scott,Owen Xiaoyuan, "Graphical passwords: a survey", (Department of Computer Science Georgia State University).
[5]. S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International Journal of Human-Computer Studies, 2007.


Paper Type :: Research Paper
Title :: Crop Yield Prediction Using Supervised Machine Learning Algorithm
Country :: India
Authors :: Hardik Joshi || Monika Gawade || Manasvi Ganu || Prof.Priya Porwal
Page No. :: 35-42

Agriculture is considered as the main and the foremost culture practiced in India. Nowadays, some farmers don't have awareness about the crop which will give them good production. They usually plan the cultivation process based on their experiences. But due to the lack of precise knowledge about cultivation, they may end up cultivating undesirable crops which will not give them an expected production rate. Hence, some of the farmers choose the suicide over it for paying off the loan which is not the right solution for it. There is an invention of new technologies like ML, IOT, AR but it's not getting used properly in the agricultural field...........

Keywords: Agriculture production, Machine learning Prediction, Supervised learning, Unsupervised learning

[1] Prediction of Crop Yield using Machine Learning by Rushika Ghadge, Juilee Kulkarni, Pooja More, Sachee Nene, Priya R L. IRJET Volume: 05 Issue: 02 ,Feb-2018.
[2] Agricultural Production Output Prediction Using Supervised Machine Learning Techniques by Md. Tahmid Shakoor, Karishma Rahman, Sumaiya Nasrin Rayta, Amitabha Chakrabarty, 978-1-5386-3831-6/17/$31.00©2017 IEEE.
[3] Crop Selection Method to Maximize Crop Yield Rate using Machine Learning Technique by Rakesh Kumar, M.P. Singh, Prabhat Kumar and J.P. Singh, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).


Paper Type :: Research Paper
Title :: Vehicle Pooling and Ride Sharing System for College
Country :: India
Authors :: Darshan Maheshwari || Varun Nair || Sanman Munj || Tanvi Kapdi
Page No. :: 43-46

Vehicle pooling which is also known as ride-sharing, is a way of sharing vehicle journeys so that more than one person can travel in a vehicle, and also frees them from the need of driving to a location themselves. By having more people using one vehicle, vehicle pooling reduces each person's travel costs such as: fuel costs, tolls, and the stress of driving. Vehicle Pooling reduces air pollution, carbon-emission, traffic congestion on the roads, and the need for parking spaces thus becoming an environmentally friendly and sustainable way to travel and sharing journeys. Ride sharing is a good way to use up the full seating capacity of the car, thus increasing the number of High Occupancy Vehicle (HOV) which could have otherwise resulted in
unused seats if it were just the driver using the car.

Keywords- Android application, Ride sharing, Carpooling.

[1]. Anuja Shete, Vedashree Bhandare, Leena Londhe, P.B. Mali, "Intelligent Carpooling System" International Journal of Computer Applications (0975 – 8887) Volume 118 – No. 4, May 2015
[2]. S. Carrese, T. Giacchetti, S.M. Patella, M. Petrelli, "Real time ridesharing: understanding user behavior and policies impact", 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MTITS), Pg No:721-726
[3]. Aarthi R, "A Smart Real Time Ridesharing And Travel Assistance", International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 2 February 2015, Page No. 10264-10269
[4]. Dejan Dimitrijević, Nemanja Nedić, Vladimir Dimitrieski, "Real-Time Carpooling and Ride-Sharing: Position Paper on Design Concepts, Distribution and Cloud Computing Strategies", Federated Conference on Computer Science and Information Systems 2013 pp. 801–806


Paper Type :: Research Paper
Title :: Study of Data Mining Techniques for Credit Risk Analysis and Risk Analysis by Using Decision Tree Algorithm
Country :: India
Authors :: Divya Kumawat || Aruna Pavate || Apeksha Waghmare || Suvarna Pansambal
Page No. :: 47-51

Banks fundamental business model depends on financial intermediation by raising finance and lending (mortgage, real estate, consumer and companies loans). Consumers and companies loan is one the major source of income for banks. Some risks are always involved in lending loan to Customers. This paperlists different data mining algorithms with its uses.It also present a model to predict Credit defaulters as well as loan pay ability of person requesting loan by using data mining techniques. The system uses ID3 algorithm to identify credit defaulters. It also undergoes training to generate the rule set .

[1]. Https://Www.Analyticsvidhya.Com/Blog/2016/04/Complete-Tutorial-Tree-Based- Modeling-Scratch- In-Python/
[2]. Dr. K. Chitra , B. Subashini "Data Minig And Its Applications In Banking Sector", International Journal of Emerging Technology and Advanced Engineering , Volume 3, Issue 8, August 2013.
[3]. Sudhamathy G., Jothi Venkateswaran C. "Analytics Using R For Predicting Credit Defaulters"2016 IEEE International Conference on Advances In Computer Applications (ICACA).
[4]. The CRISP-DM Model:The New Blueprint For Data Mining Colin Shearer, JOURNAL Of Data Warehousing, Volume 5, Number 4,Pag.13-22, 2000.
[5]. Jingping Chen, Haiwei Pan, Qilong Han, Linghu Chen, Jun Ni, "Credit Risk Assessment Model Based On Domain Knowledge Constraint", 2008 International Multi-symposiums on Computer and Computational Sciences.


Paper Type :: Research Paper
Title :: An Android Application for Plant Disease Detection
Country :: India
Authors :: Shruti Sankhe || Sayali Parkar || Mrunali Sawant || Assist. Prof. Divya Kumawat
Page No. :: 52-55

Agriculture is one of the foundations of the Indian economy. It not only contributes to GDP but also serves as a source of income for a larger chunk of the population. The farmers detect diseases based on their past experiences, which is very time consuming and require lots of expertise. Sometimes, the disease cannot be diagnosed with naked eyes. This paper uses the image processing technique for detecting the disease in plants. For feature extraction, OpenCV libraries along with SURF algorithm are used. The proposed system will identify the bacterial and fungal diseases in a plant at an early stage in a short span of time.

Keyword: OpenCV, SURF, Image Segmentation.

[1]. Jaskaran Singh , Harpreet Kaur, "A Review on: Various Techniques of Plant Leaf Disease Detection", 2018 2nd International Conference on Inventive Systems and Control (ICISC).
[2]. Chan-ho Lee and Hoon Heo "FPGA based Implementation of FAST and BRIEF algorithm for object Recognition", 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013)
[3]. Mei-Ping Song, Yue-Jing Cao, Chun-Yan Yu, Ju- Bai An and Chein-I Chang "SOLAR IMAGE MATCHING BASED ON IMPROVED FREAK ALGORITHM", 2018 International Conference on Machine Learning and Cybernetics (ICMLC)
[4]. Zhang Huiqing, Zhang Jingli, Dai Ruyong "A Fast Image Matching Research Based On MIC-SURF Algorithm", The 27th Chinese Control and Decision Conference (2015 CCDC).
[5]. Monzurul Islam, Anh Dinh, Khan Wahid, Pankaj Bhowmik "Detection of Potato Diseases Using Image Segmentation and Multiclas Support Vector Machine", 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).


Paper Type :: Research Paper
Title :: Salient Schemes for Data Analysis
Country :: India
Authors :: Chandana Nighut || Samira Nigrel || Sushma Amudalapally || Nida Parkar
Page No. :: 56-59

In the digitalisation era, the data is no longer scanty, its robust. Hence to enable an Organisation or a firm to access the data skillfully and easily, the data needs to besifted and sorted. Data analysis is the process of evaluating data usinglogical & analytical reasoning to examine each component of the data provided. This paper presents various schemes/ methods to analyze the widespread range of data.

Keywords: Data analysis, logical & analytical reasoning.

[1]. Pierre Perron The great crash, the oil price shock, and the unit root hypothesis Econometrica, 57 (6) (1989), pp. 1361-1401
[2]. G.S. Maddala, I.M. Kim Unit Roots, Co integration, and Structural Change Cambridge University Press, Cambridge (2003)
[3]. R. Lumsidaine, D.H. Papel Multiple trend breaks and the unit root hypothesis Rev Econ Stat, 79 (1997), pp. 212-218
[4]. S. Johansen, K. Juselius Maximum likelihood estimation and inference on co integration- with applications to the demand for money Oxf Bull Econ Stat, 52 (1990), pp. 169-210
[5]. Irving Fisher The Purchasing Power of Money-its Determination and Relation to Credit, Interest, and Crises The Macmillan Co, New York (1922)