International Conference on Management Practices, Innovations & Research 2019
(Volume-4)

Paper Type :: Research Paper
Title :: Big Data Security and Privacy Issues in the Cloud
Country :: India
Authors :: Vinod Kundlik Gajbhiy || Rajesh Babu
Page No. :: 01-12
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-of- the-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the recent developments for enhancing the Apache Hadoop security as one of the most deployed big data infrastructures. We also outline the frontier research on privacy-preserving data-intensive applications in cloud computing such as privacy threat modeling and privacy enhancing solutions.

Keyword :Cloud Security, Privacy, Trust, Big Data, Virtualization, Data Protection

[1]. A. Szalay and J. Gray, "2020 Computing: Science in an exponential world," Nature, vol. 440, pp. 413–414, Mar.2006.

[2]. E. U. Directive, "95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data," Official Journal of the EC, vol. 23,1995.
[3]. U. States., "Health insurance portability and accountability act of 1996 [micro form]: conference report (to accompany h.r. 3103)." http://nla.gov.au/nla.catvn4117366,1996.
[4]. "Hypervisors, virtualization, and the cloud: Learn about hypervisors, system virtualization, and how it works in a cloud environment." Retrieved June 2015.
[5]. M. Portnoy, Virtualization Essentials. 1st ed., 2012.Alameda, CA, USA: SYBEXInc


Paper Type :: Research Paper
Title :: Cloud Computing: Study of Security Issues and Research Challenges
Country :: India
Authors :: Prof. Anand D.G. Donald || Ashwini K. Lode || Anusha A. Adur || Vaishnavi R. Ghubde || Tejaswini B. Waghmare
Page No. :: 13-18

- Cloud computing is the practice of using a network of remote servers hosted on internet to store, manage and process data on demand and pay as per use. It provides access to a pool of shared resources instead of local servers or personal computers. As it do not acquire the things physically, it saves managing cost and time for organizations. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Microsoft etc. Cloud computing is an emerging domain and is acclaimed throughout the world. There are some security issues creeping in while
using services over the cloud. This research paper presents a review on the cloud computing concepts as well as security issues inherent within the context...........

[1]. Abbadi, I.M. and Martin, A., "Trust in the Cloud", Information Security Technical Report, 16, 108-114, 2011.
[2]. Casola, V., Cuomo, A., Rak, M. and Villano, U., "The Cloud Grid approach: Security analysis and performance evaluation", Future
Generation Computer Systems, 29, 387-401, 2013.
[3]. Zissis, D and Lekkas, D., "Addressing cloud computing security issues", Future Generation Computer Systems, 28, 583-592, 2012.
[4]. Teneyuca, D, "Internet cloud security: The illusion of inclusion", Information Security Technical Report, 16, 102-107, 2011.
[5]. R. L Grossman, "The Case for Cloud Computing", IT Professional, Vol. 11(2), 23-27, 2009.

Paper Type :: Research Paper
Title :: Convolutional Neural Network for Facial Expression Recognition
Country :: India
Authors :: Vaishali Ingale || Rajesh Kumar || Neeraj Singh
Page No. :: 19-20

In this project, we developed Convolutional Neural Networks (CNN) for a facial expression recognition task. Our goal is to classify each facial image into one of the seven facial emotion categories. Different depth structures of CNN models are trained using grayscale images from the Kaggle facial expression challenge [1]. To reduce overfitting, we utilized different techniques including dropout and L2 regularization (loss function).

[1]. https://www.kaggle.com/c/challenges-inrepresentation-learning-facial-expressionrecognition-challenge/data
[2]. Dalal, Navneet, and Bill Triggs (2005). Histograms of oriented gradients for human detection. Computer Vision and Pattern Recognition (CVPR), IEEE Computer Society Conference on.
[3]. Bettadapura, Vinay (2012). Face expression recognition and analysis: the state of the art. arXiv preprint arXiv:1203.6722
[4]. Y. Tian, T. Kanade, and J. Cohn. Recognizing action units for facial expression analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(2), 2001.
[5]. Anbang Yao, Junchao Shao, Ningning Ma, and Yurong Chen. Capturing au-aware facial features and their latent relations for emotion recognition in the wild. In Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, pages 451–458. ACM, 2015.


Paper Type :: Research Paper
Title :: Data Mining Techniques for Social Media Analysis: A Review
Country :: India
Authors :: Charanjeet Dadiyala || Neha Mogre || Priyanka Mogre || S. Kiran Kumar
Page No. :: 21-26

Social Media has now become one of the most important applications that almost everyone uses and manages on a daily basis, results in generation of tremendous amount of personal data. There are many popular websites like Twitter, Facebook, Instagram, Quora, etc., daily stores and records our personal data in terms of millions of chats, likes, comments, answers etc. This tremendous amount of personal data can also be referred as Big Data, contains almost everything from making a purchase, booking a movie ticket, viewing online products or planning an international trip. This phenomenon gave birth to the idea of Social Media Online Data Tracking. This tracking can help companies to learn and know better about their consumers about their choices............

Keywords:Big Data, Social Media, Data Mining, Big Data Analysis, Social Media Analysis

[1]. Kumar, Vikas & Nanda, Pooja. (2019). Social Media to Social Media Analytics: Ethical Challenges. International Journal of Technoethics. 10. 57-70. 10.4018/IJT.2019070104.
[2]. Sebei, Hiba & Hadj Taieb, Mohamed Ali & Ben Aouicha, Mohamed. (2018). Review of social media analytics process and Big Data pipeline. Social Network Analysis and Mining. 8. 10.1007/s13278-018-0507-0.
[3]. Stieglitz, Stefan & Mirbabaie, Milad & Ross, Björn & Neuberger, Christoph. (2018). Social media analytics – Challenges in topic discovery, data collection, and data preparation. International Journal of Information Management. 39. 156-168. 10.1016/j.ijinfomgt.2017.12.002.
[4]. Peng, Sancheng & Yu, Shui & Mueller, Peter. (2018). Social networking big data: Opportunities, solutions, and challenges. Future Generation Computer Systems. 86. 1456-1458. 10.1016/j.future.2018.05.040.
[5]. Aydin, Nursen. (2018). Social Network Analysis: Literature Review. 34. 10.5824/1309-1581.2018.4.005.x.


Paper Type :: Research Paper
Title :: A Review on Various Techniques for Duplication Detection in News Articles
Country :: India
Authors :: Komal Badge || Jayant Adhikari
Page No. :: 27-30

Identifying near duplicate documents is a challenge often faced in the field of information discovery. Unfortunately many algorithms that find near duplicate pairs of plain text documents perform poorly when used on web pages, where metadata and other extraneous information make that process much more difficult. If the content of the page (e.g., the body of a news article) can be extracted from the page, then the accuracy of the duplicate detection algorithms is greatly increased. Using machine learning techniques to identify the content portion of web pages, we achieve accuracy that is nearly identical to plain text and significantly better than simple heuristic approaches to content extraction. We performed these experiments on a small, but fully annotated corpus. Existing studies on news articles duplication detection mainly focus on newspaper articles, and we further explore the duplication detection in news articles from the newest online We Media data.

Keywords: Duplication Detection; News Article; PlagiarismDetection, Big Data

[1]. Lu Lu, Pengcheng, Wang Duplication Detection in News Articles Based on Big Data, 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analytics
[2]. S. Niwattanakul, J. Singthongchai, E. Naenudorn, and S. Wanapu, "Using of Jaccard coefficient for keywords similarity," Proc. IMECS, 2017, pp. 380–384
[3]. J. Agarwal et al., "Intelligent plagiarism detection mechanism using semantic technology: A different approach," 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore, 2013, pp. 779-783.
[4]. doi: 10.1109/ICACCI.2013.6637273.
[5]. H. Zhang and T. W. S. Chow, "A coarse-to-fine framework to efficiently thwart plagiarism," Pattern Recog., vol. 44, pp. 471–487, 2015.


Paper Type :: Research Paper
Title :: Geographic and Opportunistic Routing for Underwater Wireless Sensor Network
Country :: India
Authors :: Sampada Kumbhalkar || Roshani Talmale
Page No. :: 31-38

Underwater Wireless Sensor Network (UWSN) as it is emerging to be a promising mechanism for discovering the underwater environment efficiently. Geographic routing is considered the promising routing protocol for UWSNs. Geographic routing relies on geographic position information, hence the data packets are sent using its geographic location of the destination instead of the destination network address. Geographic routing protocol suffers from a drawback called communication void region. The basic idea of DBR is to forward data packets greedily towards the water surface. To maintain explicit paths to route data along communication void regions. These approaches cause an overload in the underwater acoustic channel leading to excessive packets collisions. GEDAR uses the greedy......

[1]. H. Yu, N. Yao, and J. Liu, "An adaptive routing protocol in underwater sparse acoustic sensor networks," Ad Hoc Networks, vol. 34, pp. 121– 143, 2015.
[2]. Rodolfo W. L. Coutinho , AzzedineBoukerche ,Luiz F. M. Vieira , Antonio A. F. Lour(2015), "Geographic and Opportunistic Routing for Underwater Sensor Network", IEEE Transactions on Computers, Volume: 65 Issue: 2pp 548 - 561.
[3]. Youngtae Noh, Uichin Lee, Paul Wang, Brian Sung Chul Choi, and Mario Gerla(2016), "VAPR: Void-Aware Pressure Routing for Underwater Sensor Networks", IEEE Transactions on Mobile Computing Volume: 12 , Issue: 5 , May 2016
[4]. I. F. Akyildiz, D. Pompili, and T. Melodia, "State-of-the-art in protocol research for underwater acoustic sensor networks," in Proceedings of the 1st ACM international workshop on Underwater networks, Los Angeles, USA, pp. 7–16, ACM, 2016.
[5]. PengXie, Zhong Zhou, ZhengPeng, Jun-Hong Cui, and Zhijie Shi(2017), "Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks", WASA 2017: Wireless Algorithms, Systems, and Applications pp 305-314.


Paper Type :: Research Paper
Title :: Implementation of Video Crypto-Stegno Real Time (CSRT) System using Wang's Scheme
Country :: India
Authors :: Ashwini rane || Rajesh Babu
Page No. :: 39-42

Information is any sort of put away computerized data. Security is about the assurance of advantages. Information security alludes to defensive computerized protection quantifies that are applied to counteract unapproved access to PCs, individual databases and sites. Cryptography is evergreen and improvements. Cryptography ensures clients by giving usefulness to the encryption of information and verification of different clients. Pressure is the way toward diminishing the quantity of bits or bytes expected to speak to a given arrangement of information. It permits sparing more information. Cryptography is a well known methods for sending imperative data in a mystery way. There are numerous cryptographic procedures accessible and among them AES is one of the most dominant systems. The situation of present day of data security framework incorporates secrecy, legitimacy, honesty, non-renouncement. The security of correspondence is an essential issue on World Wide Web. It is about privacy, honesty, verification during access or altering of classified inside records.

Keywords- Data Encryption and decryption, Compression, Cryptography Concept, Security, Integrity

[1]. Swarnalata Bollavarapu and Ruchita Sharma-― Data Security using Compression and Cryptography Techniques‖
[2]. Manoj Patil, Prof. Vinay Sahu—― A Survey of Compression and Encryption Techniques for SMS‖
[3]. Bobby Jasuja and Abhishek Pandya –― Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography
and Entropy Encoding‖
[4]. https://msdn.microsoft.com/en-us/library/windows/desktop/aa381939(v=vs.85).aspx
[5]. https://www.techopedia.com/definition/1773/decryption [6]www.computerhope.com/jargon/d/decrypti.htm


Paper Type :: Research Paper
Title :: Internet of Things (IOT): Research Challenges and Future Applications
Country :: India
Authors :: Prof. Anuradha A.Dakhane || Prof. Madhavi L.Tota
Page No. :: 43-48

The world is moving forward at a fast speed, and the credit goes to ever growing technology. As of now, we are in an age where every object is a smart object that has embedded electronics and connected to the internet. In other words, specifically, we are in the era of Internet-of-Things (IoT). Automation in IoT (Internet of things) is no longer a virtual reality. Ranging from smart cities, to health care, smart agriculture, logistics and retail, to even smart living and smart environments IoT is expected to insinuarate into virtually all aspects of daily life. Internet of things connects a lot of non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT are classified........

Keywords—Internet of Things, IoT application, IoT challenges, future technologies, smart cities, smart environment, smart agriculture, smart living, Security, Sensors.

[1]. M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, "A Review on Internet of Things (IoT), Internet of Everything (IoE) and In ternet of Nano Things (IoNT)", in 2015 Internet Technologies and Applications (ITA), pp. 219– 224, Sep. 2015, DOI: 10.1109/ITechA.2015.7317398.
[2]. P. J. Ryan and R. B. Watson, "Research Challenges for the Internet of Things: What Role Can OR Play?," Systems, vol. 5, no. 1 , pp. 1–34, 2017.
[3]. M. Miraz, M. Ali, P. Excell, and R. Picking, "Internet of Nano-Things, Things and Everything: Future Growth Trends", Future Internet, vol. 10, no. 8, p. 68, 2018, DOI: 10.3390/fi10080068.
[4]. E. Borgia, D. G. Gomes, B. Lagesse, R. Lea, and D. Puccinelli, "Special issue on" Internet of Things: Research challenges and Solutions".," Computer Communications, vol. 89, no. 90, pp. 1–4, 2016.
[5]. K. K. Patel, S. M. Patel, et al., "Internet of things IOT: definition, characteristics, architecture, enabling technologies, application future challenges," International journal of engineering science and computing, vol. 6, no. 5, pp. 6122–6131, 2016.


Paper Type :: Research Paper
Title :: Labour's Betterment System & Mobile Application
Country :: India
Authors :: Akash Kawale || Ankul Gaikwad || Snehlata Mukhade || Kajal Bhonde || Mrunali Meshram || Prof. Priyanka Bhende
Page No. :: 49-50

The adjustment of company labour and company official is a big challenge. Challenges such as requirement of labour, supply of labour, availability of labour on time are very tough to handle. Companies or Industry also faces lot of problems in adjusting labour in terms of need and also giving them daily wages based on the time and the day they have worked upon. So, making a Unified Platform for all kind of labours for manufacturing and production industry is our aim.

Keywords: Labour, interface, Database System, DBMS, Sql, Platform, Open source

[1]. Vikramdas Vaishav, Vaibhav Ghatge, Mandar Bhosale, Diptesh Raut, Akash Shinde, Vrushali Sonar: "Employee Tracking and Management", International Journal of Advanced Research I n Computer and Communication Engineering, Vol. 6, Issue 2, February 2017, ISSN (Print) 2319 5940.
[2]. Mr.Pratik Udayshankar Singh, Mr. Hemant Singh Fartyal, Mr. Khan Abdul Ahad Zubair, Prof. Akshata Laddha: "Employee Management System", INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET), VOLUME: 06 ISSUE: 05 | MAY 2019, P-ISSN: 2395-0072.
[3]. Madya Ansari, Maviya Shaikh, Ansari Abdul Basit, Jigna Waghela : "Employee Management System", International Journal of Scientific & Engineering Research Volume 9, Issue 2, February-2018 ISSN 2229-5518.

[4]. Kancho Kanchev, "Employee Management System", ISSN, ISRN, VXU/MSI, Dec-06.
[5]. Reena Chaudhari, Ketan Gurav, Rajesh Jalal, Akshay Kshirsagar, Vishwakarma R Ganesh, "Employee Management System" International Journal Advanced research in Computer Engineering and Technology,vol.5,4 April 2016, Issn 2278-1323


Paper Type :: Research Paper
Title :: Mobile Application System for Online Job seeker
Country :: India
Authors :: KanchanTambe || AnkitaNagrale || DnyaneshwariMotamwar || RunaliGajbhiye || Prof. Vishakha Nagrale
Page No. :: 51-53

This paper is to provide a online job portal for employees and fresher's about opportunities in different companies. This system can manage job vacancies, job details , bio data ,interview, call letter etcand advance service we are providing SMS integration. This system is very useful for users because they need to submit resume through there account and all uploaded resume through are visible to other users and visitors who provide job opportunities. This paper provides a lot features to manage all the data in very well manner. This application contains a lot advance modules which makes the back end system very powerful.

Keywords:Employee,SMS integration ,visitors ,job opportunities, back end.

[1]. http://docs.spring.io/spring/docs/current/spring-framework-references/html/index.html[sep.10,2016]
[2]. https://docs.jboss.org/hibernate/orm/5.0/quickstart /html/
[3]. https://www.wikipedia.org/wiki/Android_Runtime[oct 12, 2016]
[4]. https://www.phppoint.com
[5]. https://1000projects.org


Paper Type :: Research Paper
Title :: A Survey on Node Level Trust Management Schemes for Wireless Sensor Networks
Country :: India
Authors :: Lekhchand Sharnagat || Rajesh Babu || Roshani Talmale
Page No. :: 54-57

A sensor system will review our health, our home, the streets we follow, the workplace or the industry we work in or even theaircrafts we use, trying to improve our safety. Notwithstanding, the wireless sensor networks themselves are inclined to security attacks. The listof security attacks, in spite of the fact that officially exceptionally long, keeps on enlarging obstructing the development of these networks. Thetrust management schemes comprise of a powerful tool for the detection of unexpected node behaviors either malicious or faulty. In wirelesssensor networks, sensor nodes in the region of interest must report the cognitive process to the sink by sensing, and this report will satisfies thereport frequency necessary by the sink. Inside the domain of system security, we decipher the idea of trust..........

Keywords: Trust Management, Security, Wireless Sensor Networks, Lightweight WSN

[1]. Fenye Bao, Ray Chen, MoonJeong Chang, and Jin-Hee Cho. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE transactions on network and service management, 9(2):169–183, 2012.
[2]. Garth V Crosby, Niki Pissinou, and James Gadze. A framework for trust-based cluster head election in wireless sensor networks. In Second IEEE Workshop onDependability and Security in Sensor Networks and Systems, pages 10–pp. IEEE, 2006.
[3]. Saurabh Ganeriwal, Laura K Balzano, and Mani B Srivastava. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks(TOSN), 4(3):15, 2008.
[4]. Ablolfazl Afsharzadeh Kazerooni, Hamed Jelodar, and Javad Aramideh. Leach and heed clustering algorithms in wireless sensor networks: a qualitative study. Advances in Science and Technology Research Journal, 9(25), 2015.
[5]. Xiaoyong Li, Feng Zhou, and Junping Du. Ldts: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE transactions on information forensics and security, 8(6):924– 935, 2013.


Paper Type :: Research Paper
Title :: Plant Disease Detection Using Image Processing Techniques
Country :: India
Authors :: Khushbu R. Wase || Rajesh Babu
Page No. :: 58-60

Diseases in plants cause major production and economic losses as well as reduction in both quality and quantity of agricultural products. Now a day's plant diseases detection has received increasing attention in monitoring large field of crops. Farmers experience great difficulties in switching from one disease control policy to another. The naked eye observation of experts is the traditional approach adopted in practice for detection and identification of plant diseases. On the other hand, mobile phone usage has increased exponentially among the population of India. People from all walks of life are using mobile phones and different associated applications for gaining economic and social benefits..............

Keywords: Image processing, leaf disease detection,binary image comparison, binary images

[1]. SnigdhaSen, and Madhu B, "Smart Agriculture: A Bliss to Farmers", 6(4): April, 2017.
[2]. ChetanDwarkani M, Ganesh Ram R, Jagannathan S, R. Priyatharshini, "Smart Farming System Using Sensors for Agricultural Task Automation", 2015 IEEE International Conference on Technological Innovations in ICT for Agriculture and Rural Development (TIAR 2015).
[3]. NikeshGondchawar, R. S. Kawitkar, "IoT based Smart Agriculture", International Journal of Advanced Research in Computer and communication Engineering Vol. 5, Issue 6, June 2016.
[4]. N. Suma, Sandra Rhea Samson, S. Saranya, G. Shanmugapriya, and R. Subhashri, "IOT Based Smart Agriculture Monitoring System", International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5 no. 2, 2017.
[5]. Tuli, N. Hasteer, M. Sharma and A. Bansal, "Framework to leverage cloud for the modernization of the Indian agriculture system," IEEE International Conference on Electro/Information Technology, Milwaukee, WI, 2014, pp. 109-115.


Paper Type :: Research Paper
Title :: Real Time Filtering Using Convolutional Neural Network
Country :: India
Authors :: Shriya Sharma || Mona Bhandekar || Kanchan Ingole || Pratiksha Khedkar || Ayushi Umredkar
Page No. :: 61-65

In this project, we aim to Implement a real-time expression recognition and tracking the head poses position from high definition video using Haar Classifier. SimpleCv and OpenCv libraries are used for face recognition and tracking the head poses position. Face detection and recognition from an image or a video is a popular topic in biometrics research. Face recognition technology has broadly attracted interest due to its massive application value and market potential, such as real-time video surveillance system. It is broadly acknowledge that the face recognition has played an important role in surveillance system as it doesn't need the object's co-operation. We propose a real-time face detection system based on IP camera and image set algorithm by way of OpenCV and Python programming development........

Keywords: Python, Android studio, Anaconda python, MATLAB, JAVA, Javascript

[1]. "A Facial Expression Recognition System Using Convolutional Networks" by Lopes, Andre Teixeira, Edilson de Aguiar and ThiagoOliveiraSantos in 28th SIBGRAPI Conference on Graphics, Patterns and Images, IEEE(2015)
[2]. "J Learning and Transferring mid-level image representation using convolutional neural networks" by Oquab, M.Bottou, Laptev and I.Sivic in CVPR(2014)
[3]. Manske, M., 2007. Figure Visually Demonstrating the Evaluation of a Rectangle Feature with the Integral Image, s.l.: s.n.
[4]. "Facial Expression Recognition Based on TensorflowPlatform", ITM Web Conferences, 2017,
[5]. Mount, J., 2014. Approximation by orthogonal transform. [Accessed 18 April 2017].