International Conference on Innovation and Advance Technologies in Engineering
(Volume-6)

INFT

Paper Type :: Research Paper
Title :: Atharva Search Engine
Country :: India
Authors :: Vinaykumar Devadiga || Yashasvi Bhuva || Aryak Dubey || Shreejith Nair
Page No. :: 01-02

Generally, we have observed that most of the College website doesn't include information regarding the projects undertaken by the students as well as papers published by them.We found that its one of the most important requirement for students to take new projects. Even on Atharva College web portal there are data available about the study program, but it is really hard and time wasting for a student to find the data that is needed. For easier information viewing, there is a need for a dynamic web application. ASE is implemented in some programming languages and using open source technologies. They support installation on Windows and Linux environments. XAMPP is required for the development...........

Keywords: Dynamic Web application, Search Engine, Recommendation system, Binary-search Algorithm, Query Expansion.

[1]. "Combining R-Tree and B-Tree to Enhance Spatial Queries Processing." Available:http://www.aast.edu/papers/staffpdf/44355_153_1_PID2979945.pdf Marwa A. M. Abd Elwahab Khaled M. Mahar, Hatem Abdelkader, Hatem Awad Khater
[2]. Charu Kathuria, Goutam Datta, Vanditaa Kaul ,"Context indexing in search engine using Binary Search Tree" Available:http://www.enggjournals.com/ijcse/doc/IJCSE13-05-06-105.pdf
[3]. Wen Yue ; Zhiping Chen , Xinguo Lu , Feng Lin , Juan Liu,"Using Query Expansion and Classification for Information Retrieval."Available:https://ieeexplore.ieee.org/document/4125819/
[4]. Rana Forsati , Mohammad Reza Meybodi , Afsaneh Rahbar Available:https://ieeexplore.ieee.org/document/5069385/ [5]. Nisha Pawar; K. Rajeswari ; Aniruddha Joshi "Implementation of an efficient web crawler." Available:https://ieeexplore.ieee.org/document/7860006


Paper Type :: Research Paper
Title :: Intelligent Student Progress Monitoring application (Ispma)
Country :: India
Authors :: Neha Vora
Page No. :: 03-07

In the world of digitization where every student is holding a smartphone, the scope of distraction is endless. The interest of students is fading in studies and schools and colleges are burdened with students performance. If the student's progress is monitored carefully the student gets an overall learning experience and teachers get feedback to help students with progress. The Education system faces certain human limitation as a barrier to progress monitoring. With a vigilant progress monitoring system the teachers can impart knowledge better. India is moving fast paced towards digitization. The education system also has been digitized greatly with innovative Teaching Aids, smart classes, learning content in AV form, number of Apps, and most importantly free internet. The smartphones and the internet are something that every student has access to. Separating a phone and a kid or teenager is next to impossible...........

Keywords: Education Technology, Hadoop, monitoring progress, personalized learning, machine learning

[1]. Arnold, K. E., Lynch, G., Huston, D., Wong, L., Jorn, L., & Olsen, C. W. (2014). "Building institutional capacities and competencies for systemic learning analytics initiatives‟. In Proceedings of the Fourth International Conference on Learning Analytics and Knowledge (pp. 257-260). ACM.
[2]. Behrens, J. T., & DiCerbo, K. E. (2014). Technological Implications for Assessment Ecosystems: Opportunities for Digital Technology to Advance Assessment. Teachers College Record, 116(11), 1-22.
[3]. Braun, M. L., & Ong, C. S. (2014). "Open Science in Machine Learning‟. In V. Stodde, F. Leisch & R. D. Peng (Eds.), Implementing Reproducible Research (pp. 343-365): Chapman and Hall/CRC.


Paper Type :: Research Paper
Title :: Solar Radiation Data Mining
Country :: India
Authors :: Tejas Talwadekar || Sayali Satoskar || Prof. Renuka Nagpure
Page No. :: 08-10

Solar energy is radiant light and heat from the Sun that is harnessed for solar heating, photovoltaic, solar thermal energy, solar architecture, molten salt power plants and artificial photosynthesis. It is an important source of renewable energy. It is characterized as either passive solar or active solar depending on how they capture and distribute solar energy or convert it into solar power. Solar energy being a renewable source of energy is a clean and pollution free energy source available. For the effective utilization of solar energy received on earth, various research and development is carried out. Estimation of Solar Energy received during day time and Increase in the efficiency of Solar Systems is the need of hour. Data mining being a process of exploring patterns from large data sets that can be.........

Keywords:Solar, Radiation, Data Mining, Energy, Efficiency.

[1]. "A novel data mining method for high accuracy solar radiation forecasting" by M. Ghofrani, N. Niromand; R. Azmi; M. Ghayekhloo. (2017)
[2]. "Estimating the availability of sunshine using data mining techniques" by M. Mayilvahanan; M. Sabitha. (Jan 04-06-2013)
[3]. "A Novel hybrid approach based on self-organizing maps, support vector regression to forecast solar irradiance." by Z. Dong; D. Yang; T. Reindll and W.M. Walsh (Energy vol.82, pp570-577,2015)
[4]. "A hybrid approach for solar radiation and photovoltaic power short term forecast." Loredana Cristaldi, Giacomo Leone, Roberto Ottoboni (Milano, Italy.)978-1-5090-3598-0/17/$31.00, 2017 IEEE.)
[5]. "What are the current status and future prospects in solar irradiance and solar power forecasting?" Mehmet Yesilbudak, Medine Colak, Ramazan Bayindir. (Faculty of Engineering and Architecture, Department of Electrical & Electronics Engineering.Accepted- 28-02-2018)


Paper Type :: Research Paper
Title :: Enhanced Data Storage Security In Cloud Environment Using Encryption, Compression And Splitting Technique
Country :: India
Authors :: Mr. Mohit Patil || Mr. Pratik Chavan || Mr. Pratish Chavan || Ms. Nileema Pathak
Page No. :: 11-15

Now days cloud computing has become one of the main topics of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media............

Keywords: cloud computing, encryption, decryption, steganography, compression

[1]. G. Anthes, "Security in the cloud", in communication of the ACM, vol. 53, no.11, pp. 16-18, 2010.
[2]. E. M. Mohamed, H. S. Abd-el-Kader and S. El-Etriby "Enhanced Data Security Model for Cloud Computing", the 8th International Conference on Inforrmatics and Systems (INFOS2012 Cloud and Mobile Computing Track, pp. cc-12, 2012
[3]. R. Gupta, Tanisha, Priyanka "Enhanced Security for Cloud Storage using Hybrid Encryption" International Journal of Advanced Research in Computer And Communication Engineering vol. 2, no.7, July 2013.
[4]. Chintada. S. Rao, C. C. Sekhar"Dynamic Massive Data Storage Security Challenges in Cloud Computing Environments "International journal of innovative research in computer and communication engineering vol.2, no.3, March 2014.
[5]. N. D. Dabble, N.Mishra, "Enhanced File Security using Encryption and Splitting technique over Multi-cloud Environment" International Journal on Advanced Computer Theory and Engineering (IJACTE) ISSN: 2319-2526, vol.3, no.4, 2014


Paper Type :: Research Paper
Title :: Weather Prediction App
Country :: India
Authors :: Deep Gosaliya || Bhavika Joshi || Vishakha Sutar || Renuka Nagpure
Page No. :: 16-18

Weather forecasting is a vital application in meteorology and has been one of the most scientifically and technologically challenging problems around the world in the last century[1]. In this project ,we investigate the use of data mining techniques in forecasting maximum temperature ,rainfall ,evaporation and wind speed, Humidity,Visibility, Sea level press. This was carried out using Decision Tree algorithms and meteorological data collected between 2013 and 2017. A data model for the meteorological data developed and this was used to train the classifier algorithm. The result of these algorithm were compared and the algorithm which gave the best results used to generate classification rules for the mean weather variables.This Weather forecasting App is more efficient than existing methods. The results show that given enough case data, Data mining techniques can be used for weather forecasting and climate change studies

Keywords—Weather prediction, Random Forest &SLIQ,

[1]. R. Samya, R. Rathipriya, "Application Predictive Analysis for Weather Prediction using Data Mining with ANN: A Study" ,International Journal of Computational Intelligence and Informatics, Vol. 6: No. 2, September 2016.
[2]. Folorunsha Olaiya, Adesesan Barnabas Adeyemo, "Application Of Data Mining Techniques In Weather Prediction And Climate Changes Studies" , I.J Information Engineering and Electronic Business 1,51- 59,2012.
[3]. Supriya Bachal,Shubhada Mone,Aparna Ghodke & Ujwala Ahirrao, "Weather Forecasting Using Predictive Analysis For Determination Of Solar Output Of PV Cells" , Imperial Journal Of Interdisciplinary Research, Vol-2, Issue 4, 2016.
[4]. Abhishek Saxena, Neeta Verma, Dr. k. C. Tripathi, "A Review Study Of Weather Forecasting Using Artificial Neural Network Approach" , International Journal Of Engineering Research & Technology, Vol-2, Issue 11, 2013.
[5]. M. A. k Nafeela, k.Madhavan, "International Journal Of Latest Trends In Engineering And Technology" , Vol 6, Issue 2, 2015


Paper Type :: Research Paper
Title :: Automated Detection Of Dermatological Disorder Through Image Processing And Machine Learning
Country :: India
Authors :: Sameer Jadhav || Hiren Kashodriya || Neel Parmar || Ameya Kamble || Prof. Jyothi Arun
Page No. :: 19-20

Dermatological disorder is one of the biggest skin related disease due to its highly complex and expensive diagnosis. In case of fatal diseases like Melanoma, Eczema, Psoriasis, etc. the application of automated methods will help in early detection of dermatological diseases through lesion images, a machine intervention. Our model will be designed into three phases, data collection, designing model and finally prediction. We will be using AI algorithm like Convolutional Neural Network (CNN) and will combine it with image processing tools such as grey scaling, blurring, sharpening, reducing the noise and smoothing to form a better structure and accuracy. Disease is predicted as an output.

Keywords: Dermatological disorder, skin disease, early detection, lesion images, Image processing, Machine learning, CNN, better accuracy.

[1]. Soumya Sourav, Nikhil Garg, Yasha Hasija "Automated Detection of Dermatological Disorders through Image-Processing and Machine Learning‟, Proceedings of the International Conference on Intelligent Sustainable Systems (ICISS 2017) IEEE Xplore Compliant - Part Number:CFP17M19-ART, ISBN:978-1-5386-1959-9.
[2]. Pravin S. Ambad, A.S. Shirsat "A Image analysis System to detect Skin Disease", IOSR Journal of VLSI and Signal Processing- 2016
[3]. VinayshekharBannihatti Kumar, Sujay S Kumar, Varun Saboo "Dermatological Disease Detection Using Image Processing and Machinew Learning, IEEE-2016.
[4]. RahatYasir, Md. Ashiqur Rahman, Nova Ahmed "Dermatological Disease Detection using Image Processing and Artificial Neural Network", 8th International Conference on Electrical and Computer Engineering-2014


Paper Type :: Research Paper
Title :: Hand Gesture Recognition To Speech Conversion
Country :: India
Authors :: Dhruv Vaghela || Ankit Vaity || Rajvi Makwana || Afreen Shaikh || Chanda Chouhan
Page No. :: 21-25

Inability to speak is considered to be true disability. In our system we intend to overcome this disability by capturing hand gestures performed by the disabled and giving text and speech as output. This will not only help the mute people but also deaf and blind ones to communicate with anyone around. Our system will contain a manual of our own gestures which will be categorized depending on the situation they are most likely to be used in hence making it easier for the user to convey his message.

[1]. Hand-Gesture Recognition for Automated Speech Generation. IJSRD|Vol. 4,Issue 02, 2016.
[2]. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, L. Fei-Fei, "ImageNet: A large-scale hierarchical image database", CVPR, 2009.
[3]. A. Howard, "Some improvements on deep convolutional neural network based image classification", ICLR, 2014.
[4]. J. Redmon, A. Angelova, "Real-time grasp detection using convolutional neural networks", IEEE International Conference on Robotics and Automation, pp. 1316-1322, 2015.


Paper Type :: Research Paper
Title :: Website Protection And Analysis Using Dedicated Security Tool
Country :: India
Authors :: Priyank Patil || Deepesh Warghade || Nileema Pathak
Page No. :: 26-29

The number of users using the World Wide Web has crossed 3.8 billion and the number is increasing day by day. Today Internet touches all aspects of our life, education and economy. There has been a significant increase in hacking of websites on daily basis due to the vulnerabilities present in the websites. According to White Hat security's "2018 Website Security Statistics Report" more than 60 percent of websites had at least one serious and exploitable vulnerability open throughout the year – meaning the doors to easy exploits were wide open. It has become highly essential that each website should have a security measure in place. The main research goal of this paper is to overcome this challenge by presenting an tool which can present an analysis of websites and protection of websites from hackers.

Keywords- Website Security, SQLi Injection Attack , Mass Request Attack

[1]. Anomaly Behaviour Analysis of Website Vulnerabilty and Security.Author: Pratik Satam ,Douglas Kelly , and Salim Haririhttps://ieeexplore.ieee.org/document/7945697
[2]. White Hat security's "2018 Website Security Statistics Report"https://www.whitehatsec.com/blog/2018-whitehat-app-sec-statisticsreport/


Paper Type :: Research Paper
Title :: An Android Application For Protecting Personal Information Using Fingerprint Encryption
Country :: India
Authors :: Rinisha Burriwar || Sayli Dhotre
Page No. :: 30-32

In developing countries like India there is strong focus on data security. New encryption algorithms and softwares are built every year. The maintenance of these encryption systems is many times overlooked. Whenever private information gets leaked, many people and organizations face huge loss. Hence, we are developing a note taking software that will secure the personal information of user efficiently by using finger print encryption for individual note. Here, we are going to use the highly efficient algorithm, i.e., the AES algorithm, to encrypt the information and fingerprint hash values and provide security to the user's sensitive information.

Keywords- data security, fingerprint encryption, android notes

[1]. 2014 IEEE International Conference on Systems, Man, and Cybernetics October 5-8, 2014, San Diego, CA, USA.Education and Learning Support System Using Proposed Note-Taking Application. M.Numazawa, K.Ai , M.Noto.
[2]. International Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March- 2015.Android Application Development & Its Security.S.Mukerjee, Prof. J.Prakash , D. Kumar.


Paper Type :: Research Paper
Title :: Project Feature Extractor
Country :: India
Authors :: Krina Rathod || Rohan Parab || Yash Chaukekar || Prachi More || Yogita Shelar
Page No. :: 33-35

Feature Extraction is a facet of Text Mining that is gaining exponential popularity due to the information explosion on the Internet. It is imperative at this point to explore this domain so as to develop systems that make it easier to understand the vast data by summarizing it. Text Summarization can be performed by abstraction and extraction. Our proposed system makes use of the extraction approach. Summarization by extraction is the process of identifying important features of the document as well as extracting the sentences on the basis of their score or weight. In our proposed system, we consider research papers as input, perform different preprocessing techniques, then use six features to calculate the weight of each sentence to get a short summary as output.

Keywords: Artificial Intelligence, Data Mining, Feature Extraction, Text Summarization, Text Mining

[1]. Kaustubh Patil and Pavel Brazdil, "SUMGRAPH: Text Summarization Using Centrality In The Pathfinder Network",International Journal on Computer Science and Information Systems, vol.2, no.1, 2007, PP. 18-32.
[2]. Khushboo Thakkar and Urmila Shrawankar, "Test Model for Text Categorization and Text Summarization," Web Intelligence and Intelligent Agent Technology, International Journal on Computer Science and Engineering (IJCSE), Vol. 3, No. 4, Apr 2011.
[3]. Leonhard Hennig, Winfried Umbrath and Robert Wetzker, "An Ontology-based Approach to Text Summarization," Web Intelligence and Intelligent Agent Technology, Vol.3, 2008, PP. 291- 294.
[4]. Rajesh Shardanand Prasad and Uday Kulkarni, "Implementation and valuation of Evolutionary Connectionist Approaches to Automated Text Summarization", Journal of Computer Science, vol. 6, no. 11, 2010, PP.1366-1376.
[5]. W.M. Darling, and F. Song, "Probabilistic document modeling for syntax removal in text summarization". Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics, (CL‟ 11), ACM Press, Stroudsburg, PA.2011, PP. 642-647


Paper Type :: Research Paper
Title :: Sentiment Analysis Of Tweets Using Semantic Analysis
Country :: India
Authors :: Snehal Kale || Pankaj Kadam
Page No. :: 36-38

In today's world, there is endless stream of data present online and the automated analysis of such data holds a great promise in business analytics for providing a strong support in decision making. This paper looks at the very heart of the concept of sentiment analysis by classifying the tweets with the help of algorithms like Naïve Bayes, Maximum Entropy, and Negation. In this paper, we first preprocess the tweets to remove unnecessary content in tweet; we then extract the adjectives which forms the feature vector, which are also used to find synonyms used in further semantic calculations in aforementioned algorithms. Finally, we calculate Accuracy, Precision, and Recall to compare these algorithms.

[1]. G. Gautam and D. Yadav, "Sentiment analysis of twitter data using machine learning approaches and semantic analysis," 2014 Seventh International Conference on Contemporary Computing (IC3), Noida, 2014, pp. 437-442. doi: 10.1109/IC3.2014.6897213
[2]. Alessia D'Andrea, Fernando Ferri, PatriziaGrifoni and TizianaGuzzo. Article: Approaches, Tools and Applications for Sentiment Analysis Implementation. International Journal of Computer Applications 125(3):26-33, September 2015. Published by Foundation of Computer Science (FCS), NY, USA.
[3]. Jurek, A., Mulvenna, M. D., & Bi, Y. (2015). Improved lexicon-based sentiment analysis for social media analytics. Security Informatics, 4(9). DOI: 10.1186/s13388-015-0024-x
[4]. P.D. Turney," Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews," Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, pp. 417-424, July 2002


Paper Type :: Research Paper
Title :: Bridge Safety Monitoring System Using Internet Of Things
Country :: India
Authors :: Divesh Chonkar || Manas Naik || Aditya Kolte || Sumita Chandak
Page No. :: 39-41

In developing countries like India there is strong focus on national infrastructure. New bridges are built every year. The maintenance of these bridges is many times overlooked. Whenever bridge collapses so many people lose their family member. This happens because there is no application which will send the alert message to the user when the movement of the bridge is detected or when the bridge is collapsed. And because of this the amount of accidents happened because of the collapsing of the bridge never decreased. As the bridge is so much important, because of the bridge the people can reach to their home, cross the rivers etc. So the safety of that bridge and the people who are using that bridge is also important.........

Keywords : Internet Of Things,Arduino,Sensors.

[1]. Jin-Lian Lee, Yaw-Yauan Tyan, Ming-Hui Wen, Yun-Wu Wu "Development of an IoT-based Conference on Applied System Innovation IEEE-ICASI 2017.
[2]. Y. Sun, "Research Bridge Safety Monitoring System" Proceedings of the 2017 IEEE International on the Railroad Bridge Monitoring Platform Based on the Internet of Things," International Journal of Control and Automation, vol. 7, no. 1, pp. 401–408,2014.
[3]. A.Praba Asst. Prof., Civil Engineering Department, VCET, Madurai, India "IoT of Civil
[4]. Infrastructures, International Journal of Research in Advanced Technology-IJORAT Vol.1, Issue 6, JUNE 2016 .


Paper Type :: Research Paper
Title :: Brainq An E-Learning Applications
Country :: India
Authors :: Gajanan Desai || Prachi Palvi || Anup Maurya
Page No. :: 42-46

Most universities in India face many educational problems and obstacles that technology can help to overcome. In an IT and software industry, new and improved technologies are always on the rise. And when talking about education there has always been a speculation of how can we use the format of applications to benefit the educational field. Also using these for commercial purpose has always been upfront. We have to keep ourselves updated with the ongoing demand, in order to develop an effective product for commercial use. We have a more crucial role to play to ensure an application's efficient working, as almost all of the books and exam, today, is online. This paper shows that the use of interactive features of e-learning increases the motivation of the undergraduate students for the learning process.

[1]. A. Edmundson, Globalized e-learning cultural challenges. (USA: Idea Group Inc), 2007.
[2]. B. O‟Connell, "A Poor Grade for ELearning. (Classroom Students Did Better)", Workforce, 81(7), 15
[3]. B.R. Worthen , J.R. Sanders, Educational evaluation: Alternative approaches and practical guidelines. White Plains, NY: Longman, 1987.
[4]. D. Holley, "Which room is the virtual seminar in please?", Education and Training, 44(3), 112-121. http://dx.doi.org/10.1108/ 00400910210424283
[5]. D. Picar, "E-Learning and Motivation", White Paper, ITEC at SFSU, 2004. Retrieved from http://itec.sfsu.edu/wp/860wp/f04_ 860_picar_elearning_motivation.pdf


Paper Type :: Research Paper
Title :: IOT Messaging Protocols
Country :: India
Authors :: Nileema Pathak || Chanda Chouhan || Jyothi Arun || Vaishali Salvi || Sumita Chandak
Page No. :: 47-49

In this connected world today, technology is playing a major role in connecting intelligent things and developing smart applications. Making the connected devices to communicate with each other is very cumbersome. Connecting battery operated devices and constrained network are common challenges in IoT solutions. So, the communication protocol used should be lightweight, should consume less energy and must be suitable for such constrained environments. Various messaging protocols are defined and published to these type of applications. In this paper we will discuss about the popular IoT messaging protocols such as MQTT, MQTT-SN

[1]. Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT)— MQTT-SN protocols by Future Generation Computer Systems ―Elsevier‖
[2]. https://blog.imaginea.com/internet-of-things-messaging-protocols-part-2/
[3]. ―MQTT-S – A Publish/Subscribe Protocol For Wireless Sensor Networks‖ IBM laboratory