Paper Type | :: | Research Paper |
Title | :: | Atharva Search Engine |
Country | :: | India |
Authors | :: | Vinaykumar Devadiga || Yashasvi Bhuva || Aryak Dubey || Shreejith Nair |
Page No. | :: | 01-02 |
Generally, we have observed that most of the College website doesn't include information regarding the projects undertaken by the students as well as papers published by them.We found that its one of the most important requirement for students to take new projects. Even on Atharva College web portal there are data available about the study program, but it is really hard and time wasting for a student to find the data that is needed. For easier information viewing, there is a need for a dynamic web application. ASE is implemented in some programming languages and using open source technologies. They support installation on Windows and Linux environments. XAMPP is required for the development...........
Keywords: Dynamic Web application, Search Engine, Recommendation system, Binary-search Algorithm, Query Expansion.
[1]. "Combining R-Tree and B-Tree to Enhance Spatial Queries Processing." Available:http://www.aast.edu/papers/staffpdf/44355_153_1_PID2979945.pdf Marwa A. M. Abd Elwahab Khaled M. Mahar,
Hatem Abdelkader, Hatem Awad Khater
[2]. Charu Kathuria, Goutam Datta, Vanditaa Kaul ,"Context indexing in search engine using Binary Search Tree" Available:http://www.enggjournals.com/ijcse/doc/IJCSE13-05-06-105.pdf
[3]. Wen Yue ; Zhiping Chen , Xinguo Lu , Feng Lin , Juan Liu,"Using Query Expansion and Classification for Information
Retrieval."Available:https://ieeexplore.ieee.org/document/4125819/
[4]. Rana Forsati , Mohammad Reza Meybodi , Afsaneh Rahbar Available:https://ieeexplore.ieee.org/document/5069385/
[5]. Nisha Pawar; K. Rajeswari ; Aniruddha Joshi "Implementation of an efficient web crawler." Available:https://ieeexplore.ieee.org/document/7860006
Paper Type | :: | Research Paper |
Title | :: | Intelligent Student Progress Monitoring application (Ispma) |
Country | :: | India |
Authors | :: | Neha Vora |
Page No. | :: | 03-07 |
In the world of digitization where every student is holding a smartphone, the scope of distraction is endless. The interest of students is fading in studies and schools and colleges are burdened with students performance. If the student's progress is monitored carefully the student gets an overall learning experience and teachers get feedback to help students with progress. The Education system faces certain human limitation as a barrier to progress monitoring. With a vigilant progress monitoring system the teachers can impart knowledge better. India is moving fast paced towards digitization. The education system also has been digitized greatly with innovative Teaching Aids, smart classes, learning content in AV form, number of Apps, and most importantly free internet. The smartphones and the internet are something that every student has access to. Separating a phone and a kid or teenager is next to impossible...........
Keywords: Education Technology, Hadoop, monitoring progress, personalized learning, machine learning
[1]. Arnold, K. E., Lynch, G., Huston, D., Wong, L., Jorn, L., & Olsen, C. W. (2014). "Building institutional capacities and
competencies for systemic learning analytics initiatives‟. In Proceedings of the Fourth International Conference on Learning
Analytics and Knowledge (pp. 257-260). ACM.
[2]. Behrens, J. T., & DiCerbo, K. E. (2014). Technological Implications for Assessment Ecosystems: Opportunities for Digital
Technology to Advance Assessment. Teachers College Record, 116(11), 1-22.
[3]. Braun, M. L., & Ong, C. S. (2014). "Open Science in Machine Learning‟. In V. Stodde, F. Leisch & R. D. Peng (Eds.),
Implementing Reproducible Research (pp. 343-365): Chapman and Hall/CRC.
Paper Type | :: | Research Paper |
Title | :: | Solar Radiation Data Mining |
Country | :: | India |
Authors | :: | Tejas Talwadekar || Sayali Satoskar || Prof. Renuka Nagpure |
Page No. | :: | 08-10 |
Solar energy is radiant light and heat from the Sun that is harnessed for solar heating, photovoltaic, solar thermal energy, solar architecture, molten salt power plants and artificial photosynthesis. It is an important source of renewable energy. It is characterized as either passive solar or active solar depending on how they capture and distribute solar energy or convert it into solar power. Solar energy being a renewable source of energy is a clean and pollution free energy source available. For the effective utilization of solar energy received on earth, various research and development is carried out. Estimation of Solar Energy received during day time and Increase in the efficiency of Solar Systems is the need of hour. Data mining being a process of exploring patterns from large data sets that can be.........
Keywords:Solar, Radiation, Data Mining, Energy, Efficiency.
[1]. "A novel data mining method for high accuracy solar radiation forecasting" by M. Ghofrani, N. Niromand; R. Azmi; M.
Ghayekhloo. (2017)
[2]. "Estimating the availability of sunshine using data mining techniques" by M. Mayilvahanan; M. Sabitha. (Jan 04-06-2013)
[3]. "A Novel hybrid approach based on self-organizing maps, support vector regression to forecast solar irradiance." by Z. Dong; D.
Yang; T. Reindll and W.M. Walsh (Energy vol.82, pp570-577,2015)
[4]. "A hybrid approach for solar radiation and photovoltaic power short term forecast." Loredana Cristaldi, Giacomo Leone, Roberto
Ottoboni (Milano, Italy.)978-1-5090-3598-0/17/$31.00, 2017 IEEE.)
[5]. "What are the current status and future prospects in solar irradiance and solar power forecasting?" Mehmet Yesilbudak, Medine
Colak, Ramazan Bayindir. (Faculty of Engineering and Architecture, Department of Electrical & Electronics Engineering.Accepted-
28-02-2018)
Paper Type | :: | Research Paper |
Title | :: | Enhanced Data Storage Security In Cloud Environment Using Encryption, Compression And Splitting Technique |
Country | :: | India |
Authors | :: | Mr. Mohit Patil || Mr. Pratik Chavan || Mr. Pratish Chavan || Ms. Nileema Pathak |
Page No. | :: | 11-15 |
Now days cloud computing has become one of the main topics of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media............
Keywords: cloud computing, encryption, decryption, steganography, compression
[1]. G. Anthes, "Security in the cloud", in communication of the ACM, vol. 53, no.11, pp. 16-18, 2010.
[2]. E. M. Mohamed, H. S. Abd-el-Kader and S. El-Etriby "Enhanced Data Security Model for Cloud Computing", the 8th
International Conference on Inforrmatics and Systems (INFOS2012 Cloud and Mobile Computing Track, pp. cc-12, 2012
[3]. R. Gupta, Tanisha, Priyanka "Enhanced Security for Cloud Storage using Hybrid Encryption" International Journal of Advanced
Research in Computer And Communication Engineering vol. 2, no.7, July 2013.
[4]. Chintada. S. Rao, C. C. Sekhar"Dynamic Massive Data Storage Security Challenges in Cloud Computing Environments "International journal of innovative research in computer and communication engineering vol.2, no.3, March 2014.
[5]. N. D. Dabble, N.Mishra, "Enhanced File Security using Encryption and Splitting technique over Multi-cloud Environment" International Journal on Advanced Computer Theory and Engineering (IJACTE) ISSN: 2319-2526, vol.3, no.4, 2014
Paper Type | :: | Research Paper |
Title | :: | Weather Prediction App |
Country | :: | India |
Authors | :: | Deep Gosaliya || Bhavika Joshi || Vishakha Sutar || Renuka Nagpure |
Page No. | :: | 16-18 |
Weather forecasting is a vital application in meteorology and has been one of the most scientifically and technologically challenging problems around the world in the last century[1]. In this project ,we investigate the use of data mining techniques in forecasting maximum temperature ,rainfall ,evaporation and wind speed, Humidity,Visibility, Sea level press. This was carried out using Decision Tree algorithms and meteorological data collected between 2013 and 2017. A data model for the meteorological data developed and this was used to train the classifier algorithm. The result of these algorithm were compared and the algorithm which gave the best results used to generate classification rules for the mean weather variables.This Weather forecasting App is more efficient than existing methods. The results show that given enough case data, Data mining techniques can be used for weather forecasting and climate change studies
Keywords—Weather prediction, Random Forest &SLIQ,
[1]. R. Samya, R. Rathipriya, "Application Predictive Analysis for Weather Prediction using Data Mining with ANN: A Study" ,International Journal of Computational Intelligence and Informatics, Vol. 6: No. 2, September 2016.
[2]. Folorunsha Olaiya, Adesesan Barnabas Adeyemo, "Application Of Data Mining Techniques In Weather Prediction And Climate
Changes Studies" , I.J Information Engineering and Electronic Business 1,51- 59,2012.
[3]. Supriya Bachal,Shubhada Mone,Aparna Ghodke & Ujwala Ahirrao, "Weather Forecasting Using Predictive Analysis For
Determination Of Solar Output Of PV Cells" , Imperial Journal Of Interdisciplinary Research, Vol-2, Issue 4, 2016.
[4]. Abhishek Saxena, Neeta Verma, Dr. k. C. Tripathi, "A Review Study Of Weather Forecasting Using Artificial Neural Network
Approach" , International Journal Of Engineering Research & Technology, Vol-2, Issue 11, 2013.
[5]. M. A. k Nafeela, k.Madhavan, "International Journal Of Latest Trends In Engineering And Technology" , Vol 6, Issue 2, 2015
Paper Type | :: | Research Paper |
Title | :: | Automated Detection Of Dermatological Disorder Through Image Processing And Machine Learning |
Country | :: | India |
Authors | :: | Sameer Jadhav || Hiren Kashodriya || Neel Parmar || Ameya Kamble || Prof. Jyothi Arun |
Page No. | :: | 19-20 |
Dermatological disorder is one of the biggest skin related disease due to its highly complex and expensive diagnosis. In case of fatal diseases like Melanoma, Eczema, Psoriasis, etc. the application of automated methods will help in early detection of dermatological diseases through lesion images, a machine intervention. Our model will be designed into three phases, data collection, designing model and finally prediction. We will be using AI algorithm like Convolutional Neural Network (CNN) and will combine it with image processing tools such as grey scaling, blurring, sharpening, reducing the noise and smoothing to form a better structure and accuracy. Disease is predicted as an output.
Keywords: Dermatological disorder, skin disease, early detection, lesion images, Image processing, Machine learning, CNN, better accuracy.
[1]. Soumya Sourav, Nikhil Garg, Yasha Hasija "Automated Detection of Dermatological Disorders through Image-Processing and
Machine Learning‟, Proceedings of the International Conference on Intelligent Sustainable Systems (ICISS 2017) IEEE Xplore
Compliant - Part Number:CFP17M19-ART, ISBN:978-1-5386-1959-9.
[2]. Pravin S. Ambad, A.S. Shirsat "A Image analysis System to detect Skin Disease", IOSR Journal of VLSI and Signal Processing-
2016
[3]. VinayshekharBannihatti Kumar, Sujay S Kumar, Varun Saboo "Dermatological Disease Detection Using Image Processing and
Machinew Learning, IEEE-2016.
[4]. RahatYasir, Md. Ashiqur Rahman, Nova Ahmed "Dermatological Disease Detection using Image Processing and Artificial Neural
Network", 8th International Conference on Electrical and Computer Engineering-2014
Paper Type | :: | Research Paper |
Title | :: | Hand Gesture Recognition To Speech Conversion |
Country | :: | India |
Authors | :: | Dhruv Vaghela || Ankit Vaity || Rajvi Makwana || Afreen Shaikh || Chanda Chouhan |
Page No. | :: | 21-25 |
Inability to speak is considered to be true disability. In our system we intend to overcome this disability by capturing hand gestures performed by the disabled and giving text and speech as output. This will not only help the mute people but also deaf and blind ones to communicate with anyone around. Our system will contain a manual of our own gestures which will be categorized depending on the situation they are most likely to be used in hence making it easier for the user to convey his message.
[1]. Hand-Gesture Recognition for Automated Speech Generation. IJSRD|Vol. 4,Issue 02, 2016.
[2]. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, L. Fei-Fei, "ImageNet: A large-scale hierarchical image database", CVPR, 2009.
[3]. A. Howard, "Some improvements on deep convolutional neural network based image classification", ICLR, 2014.
[4]. J. Redmon, A. Angelova, "Real-time grasp detection using convolutional neural networks", IEEE International Conference on
Robotics and Automation, pp. 1316-1322, 2015.
Paper Type | :: | Research Paper |
Title | :: | Website Protection And Analysis Using Dedicated Security Tool |
Country | :: | India |
Authors | :: | Priyank Patil || Deepesh Warghade || Nileema Pathak |
Page No. | :: | 26-29 |
The number of users using the World Wide Web has crossed 3.8 billion and the number is increasing day by day. Today Internet touches all aspects of our life, education and economy. There has been a significant increase in hacking of websites on daily basis due to the vulnerabilities present in the websites. According to White Hat security's "2018 Website Security Statistics Report" more than 60 percent of websites had at least one serious and exploitable vulnerability open throughout the year – meaning the doors to easy exploits were wide open. It has become highly essential that each website should have a security measure in place. The main research goal of this paper is to overcome this challenge by presenting an tool which can present an analysis of websites and protection of websites from hackers.
Keywords- Website Security, SQLi Injection Attack , Mass Request Attack
[1]. Anomaly Behaviour Analysis of Website Vulnerabilty and Security.Author: Pratik Satam ,Douglas Kelly , and Salim
Haririhttps://ieeexplore.ieee.org/document/7945697
[2]. White Hat security's "2018 Website Security Statistics Report"https://www.whitehatsec.com/blog/2018-whitehat-app-sec-statisticsreport/
Paper Type | :: | Research Paper |
Title | :: | An Android Application For Protecting Personal Information Using Fingerprint Encryption |
Country | :: | India |
Authors | :: | Rinisha Burriwar || Sayli Dhotre |
Page No. | :: | 30-32 |
In developing countries like India there is strong focus on data security. New encryption algorithms and softwares are built every year. The maintenance of these encryption systems is many times overlooked. Whenever private information gets leaked, many people and organizations face huge loss. Hence, we are developing a note taking software that will secure the personal information of user efficiently by using finger print encryption for individual note. Here, we are going to use the highly efficient algorithm, i.e., the AES algorithm, to encrypt the information and fingerprint hash values and provide security to the user's sensitive information.
Keywords- data security, fingerprint encryption, android notes
[1]. 2014 IEEE International Conference on Systems, Man, and Cybernetics October 5-8, 2014, San Diego, CA, USA.Education and
Learning Support System Using Proposed Note-Taking Application. M.Numazawa, K.Ai , M.Noto.
[2]. International Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March- 2015.Android Application Development & Its Security.S.Mukerjee, Prof. J.Prakash , D. Kumar.
Paper Type | :: | Research Paper |
Title | :: | Project Feature Extractor |
Country | :: | India |
Authors | :: | Krina Rathod || Rohan Parab || Yash Chaukekar || Prachi More || Yogita Shelar |
Page No. | :: | 33-35 |
Feature Extraction is a facet of Text Mining that is gaining exponential popularity due to the information explosion on the Internet. It is imperative at this point to explore this domain so as to develop systems that make it easier to understand the vast data by summarizing it. Text Summarization can be performed by abstraction and extraction. Our proposed system makes use of the extraction approach. Summarization by extraction is the process of identifying important features of the document as well as extracting the sentences on the basis of their score or weight. In our proposed system, we consider research papers as input, perform different preprocessing techniques, then use six features to calculate the weight of each sentence to get a short summary as output.
Keywords: Artificial Intelligence, Data Mining, Feature Extraction, Text Summarization, Text Mining
[1]. Kaustubh Patil and Pavel Brazdil, "SUMGRAPH: Text Summarization Using Centrality In The Pathfinder Network",International
Journal on Computer Science and Information Systems, vol.2, no.1, 2007, PP. 18-32.
[2]. Khushboo Thakkar and Urmila Shrawankar, "Test Model for Text Categorization and Text Summarization," Web Intelligence and
Intelligent Agent Technology, International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 4, Apr 2011.
[3]. Leonhard Hennig, Winfried Umbrath and Robert Wetzker, "An Ontology-based Approach to Text Summarization," Web
Intelligence and Intelligent Agent Technology, Vol.3, 2008, PP. 291- 294.
[4]. Rajesh Shardanand Prasad and Uday Kulkarni, "Implementation and valuation of Evolutionary Connectionist Approaches to
Automated Text Summarization", Journal of Computer Science, vol. 6, no. 11, 2010, PP.1366-1376.
[5]. W.M. Darling, and F. Song, "Probabilistic document modeling for syntax removal in text summarization". Proceedings of the 49th
Annual Meeting of the Association for Computational Linguistics, (CL‟ 11), ACM Press, Stroudsburg, PA.2011, PP. 642-647
Paper Type | :: | Research Paper |
Title | :: | Sentiment Analysis Of Tweets Using Semantic Analysis |
Country | :: | India |
Authors | :: | Snehal Kale || Pankaj Kadam |
Page No. | :: | 36-38 |
In today's world, there is endless stream of data present online and the automated analysis of such data holds a great promise in business analytics for providing a strong support in decision making. This paper looks at the very heart of the concept of sentiment analysis by classifying the tweets with the help of algorithms like Naïve Bayes, Maximum Entropy, and Negation. In this paper, we first preprocess the tweets to remove unnecessary content in tweet; we then extract the adjectives which forms the feature vector, which are also used to find synonyms used in further semantic calculations in aforementioned algorithms. Finally, we calculate Accuracy, Precision, and Recall to compare these algorithms.
[1]. G. Gautam and D. Yadav, "Sentiment analysis of twitter data using machine learning approaches and semantic analysis," 2014
Seventh International Conference on Contemporary Computing (IC3), Noida, 2014, pp. 437-442. doi: 10.1109/IC3.2014.6897213
[2]. Alessia D'Andrea, Fernando Ferri, PatriziaGrifoni and TizianaGuzzo. Article: Approaches, Tools and Applications for Sentiment
Analysis Implementation. International Journal of Computer Applications 125(3):26-33, September 2015. Published by Foundation
of Computer Science (FCS), NY, USA.
[3]. Jurek, A., Mulvenna, M. D., & Bi, Y. (2015). Improved lexicon-based sentiment analysis for social media analytics. Security
Informatics, 4(9). DOI: 10.1186/s13388-015-0024-x
[4]. P.D. Turney," Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews," Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, pp. 417-424, July
2002
Paper Type | :: | Research Paper |
Title | :: | Bridge Safety Monitoring System Using Internet Of Things |
Country | :: | India |
Authors | :: | Divesh Chonkar || Manas Naik || Aditya Kolte || Sumita Chandak |
Page No. | :: | 39-41 |
In developing countries like India there is strong focus on national infrastructure. New bridges are built every year. The maintenance of these bridges is many times overlooked. Whenever bridge collapses so many people lose their family member. This happens because there is no application which will send the alert message to the user when the movement of the bridge is detected or when the bridge is collapsed. And because of this the amount of accidents happened because of the collapsing of the bridge never decreased. As the bridge is so much important, because of the bridge the people can reach to their home, cross the rivers etc. So the safety of that bridge and the people who are using that bridge is also important.........
Keywords : Internet Of Things,Arduino,Sensors.
[1]. Jin-Lian Lee, Yaw-Yauan Tyan, Ming-Hui Wen, Yun-Wu Wu "Development of an IoT-based Conference on Applied System
Innovation IEEE-ICASI 2017.
[2]. Y. Sun, "Research Bridge Safety Monitoring System" Proceedings of the 2017 IEEE International
on the Railroad Bridge Monitoring Platform Based on the Internet of Things," International Journal of Control and Automation, vol.
7, no. 1, pp. 401–408,2014.
[3]. A.Praba Asst. Prof., Civil Engineering Department, VCET, Madurai, India "IoT of Civil
[4]. Infrastructures, International Journal of Research in Advanced Technology-IJORAT Vol.1, Issue 6, JUNE 2016 .
Paper Type | :: | Research Paper |
Title | :: | Brainq An E-Learning Applications |
Country | :: | India |
Authors | :: | Gajanan Desai || Prachi Palvi || Anup Maurya |
Page No. | :: | 42-46 |
Most universities in India face many educational problems and obstacles that technology can help to overcome. In an IT and software industry, new and improved technologies are always on the rise. And when talking about education there has always been a speculation of how can we use the format of applications to benefit the educational field. Also using these for commercial purpose has always been upfront. We have to keep ourselves updated with the ongoing demand, in order to develop an effective product for commercial use. We have a more crucial role to play to ensure an application's efficient working, as almost all of the books and exam, today, is online. This paper shows that the use of interactive features of e-learning increases the motivation of the undergraduate students for the learning process.
[1]. A. Edmundson, Globalized e-learning cultural challenges. (USA: Idea Group Inc), 2007.
[2]. B. O‟Connell, "A Poor Grade for ELearning. (Classroom Students Did Better)", Workforce, 81(7), 15
[3]. B.R. Worthen , J.R. Sanders, Educational evaluation: Alternative approaches and practical guidelines. White Plains, NY: Longman,
1987.
[4]. D. Holley, "Which room is the virtual seminar in please?", Education and Training, 44(3), 112-121. http://dx.doi.org/10.1108/
00400910210424283
[5]. D. Picar, "E-Learning and Motivation", White Paper, ITEC at SFSU, 2004. Retrieved from http://itec.sfsu.edu/wp/860wp/f04_
860_picar_elearning_motivation.pdf
Paper Type | :: | Research Paper |
Title | :: | IOT Messaging Protocols |
Country | :: | India |
Authors | :: | Nileema Pathak || Chanda Chouhan || Jyothi Arun || Vaishali Salvi || Sumita Chandak |
Page No. | :: | 47-49 |
In this connected world today, technology is playing a major role in connecting intelligent things and developing smart applications. Making the connected devices to communicate with each other is very cumbersome. Connecting battery operated devices and constrained network are common challenges in IoT solutions. So, the communication protocol used should be lightweight, should consume less energy and must be suitable for such constrained environments. Various messaging protocols are defined and published to these type of applications. In this paper we will discuss about the popular IoT messaging protocols such as MQTT, MQTT-SN
[1]. Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT)— MQTT-SN protocols by Future
Generation Computer Systems ―Elsevier‖
[2]. https://blog.imaginea.com/internet-of-things-messaging-protocols-part-2/
[3]. ―MQTT-S – A Publish/Subscribe Protocol For Wireless Sensor Networks‖ IBM laboratory
© 2019 All Rights Reserved | Design by iosrjen