National Seminar cum workshop on "Data Science and Information Security 2019"
(Volume-2)

Paper Type :: Research Paper
Title :: Academic Assesment & Performance Prediction Using Data Mining
Country :: India
Authors :: Shivam Tiwari || Barkha Bhardwaj || Namrata Dhanda || Bramah Hazela
Page No. :: 01-04
These days, the most critical test for every association like an instructive foundation, a worldwide enterprise, and so forth is to support their notoriety by giving quality administrations. Numerous associations are directing persuasive, social occasions to improve their representatives or understudies execution. The essential test to deal with is to limit the disappointment proportion of a recipient and give quality support of every single recipient. With the goal that establishment needs an expectation framework which is utilized to foresee recipient potential execution based on their own execution. By which organization can decide the fitting arrangements for each recipient execution expectation. Based on the forecast, foundation sorts their recipient and makes suitable arrangements for every single order...............

Keyword :Quality Administration, linear regression, information mining, prediction system, Support vector machine, naïve Bayes

[1]. The Third Information Systems International Conference, A Review on Predicting Student's Performance using Data Mining Techniques, Amirah Mohamed Shahiri ,Wahidah Husain, Nur'aini Abdul Rashid, a school of Computer Science University Sains Malaysia 11800 USM,Penang, Malaysia.
[2]. Data Mining: A prediction for Student's Performance Using Classification Method, Abeer Badr El Din Ahmed, Ibrahim Sayed Elaraby.
[3]. Ahmed, A. B. E, Ibrahim S. E. "Data Mining: A prediction for Student's Performance Using Classification Method." World Journal of Computer Application and Technology Volume 2(2) (2014).
[4]. 2nd International Conference on Electrical & Electronic Engineering (ICEEE), 27-28 December 2017,RUET, Rajshahi, Bangladesh, "Predict Student's Academic Performance and Evaluate the Impact of Different Attributes on the Performance Using Data Mining Techniques", Md. Hasibur Rahman, Md. Rabiul Islam.
[5]. Predicting Students Performance in Final Examination using Linear Regression and Multilayer Perceptron, Febrianti Widyahastuti and Viany Utami Tjhin ,978-1-5090-4688-1/17/$31.00 copyright 2017 IEEE.

Paper Type :: Research Paper
Title :: Extension of Data Science Techniques in Education Prognosis
Country :: India
Authors :: Barkha Bhardwaj || Shivam Tiwari || Bramah Hazela || Namrata Dhanda
Page No. :: 05-08

In today's world, the most critical problem being faced by the students while looking for the courses like which course is better among the available course for them and how can they say that this particular course is beneficial for them? Due to this dilemma, students usually go for a course in which either they regret later or drop the course in between. As a result, they face problem during their courses. Most of the time, student go according to the suggestions given by the peer, teacher, friends, family that ultimately creates confusion in the process of selecting the course and they make a random decision that affects their motivation to complete the course. So, there is a need for such a system that would provide them a better prediction about a course that would actually be beneficial for them and should also maintain their motivation to complete it. So, in this paper we're discussing data science and data mining techniques like Regression, Decision Tree, Classification, Clustering, etc. for the better prediction in higher education

Keywords: Random decision, prediction, data mining, regression, classification, clustering.

[1]. M. Nasiri and B. Minaei, "Predicting GPA and Educational Data Mining, " IEEE Third International Conference on E-Learning and E-Teaching (ICELET), pp. 53-58, 2012
[2]. R. Knauf, Y. Sakurai, K. Takada and S. Tsuruta, "Prediction Of Higher Education by Data Mining," IEEE International Conference on Advanced Learning Technologies (ICALT), pp. 488-492, 2010.
[3]. E. Tovar and O. Soto, " Predict the Performance of Students," IEEE Frontiers in Education Conference (FIE), pp. F3J-1, 2010.
[4]. G. Ningning, "prediction of higher education," International Forum on Information Technology and Applications, vol. 1, pp. 436- 439, 2010.
[5]. F. Wu, "Apply Data Mining to Students," IEEE Education Technology and Computer Science (ETCS), vol. 1, pp. 606-609, 2010.

Paper Type :: Research Paper
Title :: Foreground Segmentation and Change Detection Using Singular Value Decomposition
Country :: India
Authors :: Priyanshi Sachan || Pooja Khanna
Page No. :: 09-14

Separating background from a video image is an important step for change detection. Most of the change detection methods depend on intensity and texture variations. These algorithms may not give very satisfactory results because of the illumination variation and presence of noise. In this paper we have attempted to segregate moving foreground from video data set and change detection in time series data sets using singular value decomposition (SVD) which is a generalization of the Eigen decomposition which can be used to analyze rectangular matrices. 'CDnet 2012', an open source dataset is used as input image dataset. We have taken SVD for all input images and singular values of all these images were used for detecting any change present in images. A comparison was made for obtained results with the results of 'CDnet 2012'. It is found that the obtained results are very effective and clearly segregate foreground.

Keywords : Background Subtraction, Singular Value Decomposition, Eigen Values, CDnet 2012.

[1]. Singular Value Decomposition (SVD) Tutorial. BE.400 / 7.548 http://web.mit.edu/be.400/www/SVD/Singular_Value_Decomposition.html
[2]. C. Hsu and C. Chen, SVD-Based Projection for Face recognition http:// ieeexplore. ieee.org/xpl/ articleDetails.jsp? arnumber=4374514
[3]. SingularValuedecomposition,Wolfram MathWorldhttp://mathworld.wolfram.com/SingularValueDecomposition.html
[4]. Singular Value Decomposition (SVD) – Chapter 4 https://www.cs.cmu.edu/~venkatg/teaching/CStheory-infoage/book-chapter-4.pdf
[5]. Banerjee, Sudipto; Roy, Anindya (2014), Linear Algebra and Matrix Analysis for Statistics, Texts in Statistical Science (1st ed.)


Paper Type :: Research Paper
Title :: Artificial Intelligence: A Tool in Machine Translation
Country :: India
Authors :: Trupti Mishra
Page No. :: 15-19

The thought process of humans is formulated according to the language one is familiar with. The process of reasoning process is complex. It is highly dependent on the language in which humans think and express their ideas. The human brain immediately starts the process of translating a text from one language to another. Translation is not just literal, word to word conversion of text from one language to the other, but the context and culture where the said languages are prevalent also play a vital role. Today, translation is based on literal conversions using methods like pattern recognition. The available corpora of knowledge is also limited. This paper attempts to explore how artificial intelligence can be used as a tool in machine translation and how far can it be used as a replacement of human translation.

Keywords: Translation, Artificial Intelligence, Machine Translation, knowledge

[1]. ALEKSY, M., Korthaus, A., and Schader, M., CARLA – A CORBA-based Architecture for Lightweight Agents, in: Proceedings of the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[2]. AU, R., Yao, M., and Looi, M., Privilege Negotiation Agents for Distributed Authorisation on World Wide Web, in: Proceedings of the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[3]. Chavez, A., Maes P., Kasbah: An Agent Marketplace for Buying and Selling Goods, in: Proceedings of the 1st International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, London 1996.
[4]. COSSENTINO, M., Sabatucci L., and Chella A., A Possible Approach to the Development of Robotic MultiAgent Systems, in: Proceedings of the IEEE/WIC International Conference on Intelligent Agent Technology (IAT'03), Halifax, Canada 2003.
[5]. COST, S., Chen, Y., Finin, T., Labrou, Y., and Peng, Y., Using Colored Petri Nets for Conversation Modeling, Issues in Agent Communication, Lecture Notes in AI, Springer-Verlag, Berlin 2000.


Paper Type :: Research Paper
Title :: Model for Smart Web services using Intelligent Assistance
Country :: India
Authors :: Urvi Mitra || Roopanshi Dixit || PoojaKhanna || Puneet Sharma
Page No. :: 20-25

In current era of digitization most of the services are now offered as E-services; E- shopping, E Governance, E-Healthcare. For a non E-educated person it is the biggest challenge to survive in E-world. There is a huge gap between demand and supply of E-services. The world of internet is full of latest and advance web services but they are not being used by even 50% of total internet users. One of the reason for such a huge gap in; services offered and their utilization by common men, is lack of knowledge and fear. With studies it is found that corrective measures are required to deal with the problem. The work here is a sincere effort in the direction of providing smart web services for users.............

Keywords: Chatbot, deep learning, customer service, intelligent system, conversational agent

[1]. Alan Ritter, Colin Cherry, and William B Dolan. Data Driven Response Generation in Social Media.In Proc. of EMNLP, 2011, 583-593.
[2]. AnjuliKannan, Karol Kurach, Sujith Ravi, Tobias Kaufmann, Andrew Tomkins, BalintMiklos, Greg Corrado, Laszlo Lukacs, Marina Ganea, Peter Young, and VivekRamavajjala. Smart Reply: Automated Response Suggestion for Email. In Proc. of KDD, 2016, 955-964
[3]. IlyaSutskever, OriolVinyals, and Quoc V Le.Sequence to Sequence Learning with Neural Networks. In Proc. of NIPS, 2014, 3104- 3112
[4]. Tomas Mikolov, IlyaSutskever, Kai Chen, Greg S Corrado, and Jeff Dean.Distributed Representations of Words and Phrases and Their Compositionality.In Proc. of NIPS, 2013, 3111-3119.
[5]. Q. Vera Liao1, Muhammed Mas-ud Hussain2,4 *, Praveen Chandar2,6 †, Matthew Davis2, Yasaman,Khazaen2, Marco Crasso3, Dakuo Wang1, Michael Muller2, N. Sadat Shami5, Werner Geyer2,IBM Research, 1Yorktown Heights, NY, USA; 2Cambridge, MA, USA; 3Capital Federal, Argentina4Northwestern University, Evanston, IL, USA,IBM, Armonk, NY, USA, 6Spotify Research, New York, NY, USA. All Work and no Play? Conversations with a Question-and-Answer Chatbot in the Wild


Paper Type :: Research Paper
Title :: Multilayer fibonacci Structures Containing Single-Negative Metamaterials Conditioned in Photonic Transmission Spectra
Country :: India
Authors :: Vishal Kumar Singh || Vishal Singh Chandel
Page No. :: 26-31

In this work we studied transmission properties of the Fibonacci semi periodic layered structure comprising of a couple of two fold/double positive (DPS), epsilon-negative (ENG) and mu-negative (MNG) materials. Frequently electrically thinMNG and ENG meta-materialslayers considered in microwave reduplication location. It is observed that there exist the polarization-subordinate with invariant transmission gap with a difference in layer scale and angle of incident (approximate negligent angle). The successful medium hypothesis has been utilized to clarify the properties of transmission spectra of DPS-MNG, DPSENG and ENG-MNG multilayerFibonacci structures.

Keywords- Meta material,Photonic crystal, transmittance, band gap and Fibonacci.

[1]. Fredkin, D. R. and A. Ron, "Effectively left-handed(negative index) composite material," Appl. Phys. Lett., Vol. 81, 1753, 2002.
[2]. Li, J., L. Zhou, C. T. Chan, and P. Sheng, "Photonic band gap from a stack of positive and negative index materials," Phys. Rev. Lett., Vol. 90, 083901, 2003.
[3]. Srivastava, S. K. and S. P. Ojha, "Enhancement of omnidirectional reflaction bands in one-dimentionalphotonic crystals with left-handed materials," Progress In Electromagnetics Research, PIER 68, 91 –111, 2007.
[4]. Srivastava, R., S. Pati, and S. P. Ojha, "Enhacement of omnidirectional reflection in photonic crystal hetro structures," Progress In Electromagnetics Research B, Vol. 1, 197–208, 2008.


Paper Type :: Research Paper
Title :: Revisiting Secured Software Development: Information Security Perspective
Country :: India
Authors :: Syed Wajahat Abbas Rizvi || Pawan Singh
Page No. :: 32-36

Current scenario of Information Technology has been witnessing the development of variety of software applications. These applications are being developed by various developers in order to cater the customer requirements those are exponential growing day by day. No doubt, it has facilitated the end user but on the other side also raised the possibilities of weaknesses, defects and the vulnerability of the system that further reduces the desirable security of the information handled through these software. Subsequently, make the application more unsecure and highly complex, and at the same time losing the trust as well as the good will of the end user. As Information Security in software applications is a critical issue.........

Keywords: Information Security, Secured Software Development, Software Metrics, Security Measurement, Software Requirements, Early Stage Measures.

[1]. Chowdhury, I., &Zulkernine, M. (2011). Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities, Journal of Systems Architecture, 57(3), 294-313
[2]. Easterbrook, S., & Paul, A.S. (1998). An Experience Report on Requirements Reliability Engineering Using Formal Methods. IEEE Transactions on Software Engineering, 24(1), 4-14.
[3]. Gilliam, D. P., Wolfe, T. L., Sherif, J. S., & Bishop, M. (2003). Software Security Checklist for the Software Life Cycle, Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, ACM Digital Library
[4]. Graham, D., Finzi, S., & Glib, T. (1993). Software Inspection. New York: Addison-Wesley, ISBN-10: 0201631814
[5]. Gupta, P. N., Singh, P., Singh, P. K., & Kumar, A. (2012b). A Comparative Analysis of Page Ranking Algorithms, International Journal of Computer Science and Telecommunications, 3(10), October 2012,33-39


Paper Type :: Research Paper
Title :: Key Emerging Technologies of 5G Mobile Communication Network
Country :: India
Authors :: Suhani Sengar || Satish Kumar
Page No. :: 37-40

In the upcoming years, the 5G mobile communication network will be established across the globe aiming to remove all the obstacles in the communication network and provide a wireless world. In the near future i.e. [beyond 4G some of the prime objectives or demands that needs to be addressed are fast network, high capacity, Intelligent handover, service in remote areas, reliable service in crowded areas, pseudo outdoor communication, spectrum allocation, energy efficiency etc. that solves the existing problems in mobile communication network. This paper presents the results of detailed survey on 5G mobile communication and a study on key emerging technologies, challenges, and future aspects.

Keywords : Intelligent Handover, Pseudo outdoor communication.

[1]. "Study on scenarios and requirements for next generation access technologies", 3GPP, Sophia Antipolis, France, Tech. Rep. 38.913, Jun. 2017.
[2]. Pekka Pirinen, A brief overview of 5G research activity, ICST, 2014, PP.17-22
[3]. Martion Dannenberg, Rohit Datta, Andreas Festag, Gerhard Fetteis, Experimental testbed for 5G cognitive radio access in 4g LTE cellular systems, IEEE Sensor Array and Multi Channel Signal Processing Workshop, 2014, pp.321-324
[4]. ICT-317669 METIS Project, Scenarios, Requirement and KPIs for 5G Mobile and Wireless Communication System
[5]. S. Patil, V. P. Bhat, A review on 5G technology, Int, J. Eng. Innovative Technology ( IJEIT) (1) (2012) 26-30


Paper Type :: Research Paper
Title :: A Comprehensive Review on Various Applications and Challenges for Flying Ad hoc Networks
Country :: India
Authors :: Sumit Kumar Gupta || Sachin Kumar || Sudhanshu Tyagi || Sudeep Tanwar
Page No. :: 41-45

Exponential growth of wireless ad hoc networks and its un-reliable nature on pre-existing infrastructure is attracting various industries for different applications. Flying Ad hoc networks (FANETs) is a latest technology of ad-hoc network which has captured the attention of investors due to its unique flying nature. FANET consist of different nodes that can fly at high altitude like balloons, unmanned aerial vehicles (UAVs), and have the ability to fly without the pilot. Common applications of FANET are surveillance, agriculture, photography, etc., and the challenges which can open the opportunity for researchers are multipath propagation, severe shadowing, traffic load balancing, mobility............

Keywords- MANET, FANET, UAV

[1]. Alshbatat, A.I., Dong, L.: Cross-layer design for mobile ad-hoc unmanned aerial vehicle communication networks. In: 2010 International Conference on Networking, Sensing and Control (ICNSC). IEEE (2010).
[2]. Dey, N., Mukherjee, A.: Embedded Systems and Robotics with Open Source Tools. CRC Press (2016)
[3]. Ateef Altaf Munshi, Shikha Sharma and Dr. Sandeep Singh Kang: A Review on Routing Protocols for Flying Ad-hoc Networks, Proceedings of the International Conference on Inventive Research in Computing Applications (ICIRCA 2018) IEEE Xplore Compliant Part Number: CFP18N67-ART; ISBN:978-1-5386-2456-2
[4]. Ozgur Koray Sahingoz: Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges, J Intell Robot Syst (2014) 74:513–527 DOI 10.1007/s10846-013-9959-7
[5]. Anuradha Chauhan, and Ms. Renu Singla. "A Detail Review on Unmanned Aeronautical Ad-Hoc Networks." International Journal of Science, Engineering and Technology Research (IJSETR), May 2016.


Paper Type :: Research Paper
Title :: A Heuristic Approach for Fake Currency Identification
Country :: India
Authors :: Kamlesh Kumar Singh || Sachin Kumar || Pragya
Page No. :: 46-51

Every economy runs on profit and losses, losses incurred can damage economy and wellbeing of the Nation. Economy in broad sense refers to prosperity of a nation in terms of production, distribution and trade, however there are certain negative events which hamper the growth of the economy, one such area is unauthorized printing and circulation of fake currency. Though every government is employing experts and utilizing the best solutions possible to curb the issue, yet estimated average damage in 2018 was about Rs 400 crore in India itself. Thus it is required to plan a framework that is useful in identification fake paper money notes with quick speed and in less time.........

[1]. Ji Qian, Dongping Qian, MengjieZhang,″A Digit Recognition System for Paper Currency Identification Based on Virtual Instruments"1-4244-0555-6/06 (© 2006IEEE.
[2]. Y.Y.Tang,H.D.Cheng,&C.Y.Suen,"Transformation-Ring-Projection(TRP) Algorithm and Its VLSI Implementation", Character & Handwriting Recognition: Expanding Frontiers, 1991, World Scientific PublishingCo. Pte. Ltd.,Singapore
[3]. http://rbi.org.in/currency/Sec_fea_Rs500.html
[4]. Foresti G.L, Regazzoni C,″A hierarchical approach to feature extraction and grouping" IEEE Trans ImageProcessing,2000;9(6):1056-74.
[5]. EuisunChoi,JongseokLeeandJoonhyunYoon,″FeatureExtractionforBankNote Classification Using Wavelet Transform" 2006 @ISBN ISSN:1051- 4651 , 0-7695-2521-0 ,IEEE


Paper Type :: Research Paper
Title :: Smart Fix Home Automation Using Internet of Things
Country :: India
Authors :: Sanjeev Gangwar || Ashok Kumar Yadav || Santosh Kumar Yadav
Page No. :: 52-55

We are in the age of rapid technology change, where working on new technology is booming to create new things to easier the living style of human beings. This idea re present to design and implement a minimum cost and a highly secure home automation system which are controlled by smart phones. The whole system is based on Arduino Uno board connected with relay to access and control the home automated appliances with the help of android Smart phone. The communication medium between hardware and software is done using the low cost Bluetooth module i.e. wireless system implementation is going to be done. This system is design to provide low cost and easy to implement home automation system to control different electrical appliances. Each system is secure with the unique security feature of Bluetooth pairing technique i.e. based on MAC address to provide security feature during the connectivity.

Keyword: Arduino Uno, Smart phone, Android IDE, Bluetooth, Arduino BT.

[1]. Gaurav Tripathi, Dhananjay Singh, and Antonio J. Jara, "A survey of Internet-of-Things: Future Vision, Architecture, Challenges and Service", IEEE World Forum on Internet of Things (WF-IoT), 2014, pp. 287-292
[2]. Neng- Shiang Liang; Li-Chen Fu; Chao-Lin Wu. "An integrated, flexible, and Internet-based control architecture for home automation system in the internet era". Proceedings ICRA `02. IEEE International Conference on Robotics and Automation, Vol. 2, pp.1101-1106, 2002.
[3]. E. Yavuz, B. Hasan, I. Serkan and K. Duygu. "Safe and Secure PIC Based Remote Control Application for Intelligent Home". International Journal of Computer Science and Network Security, Vol. 7, No. 5, May 2007.
[4]. B. Koyuncu. "PC remote control of appliances by using telephone lines". IEEE Transaction on Consumer Electronics, Vol. 41, Issue 1, pp.201-209, 1995.
[5]. Chao-Lin Wu, Yi-Show Tseng, and Li-Chen Fu, "Spatio-Temporal Feature Enhanced Semi-supervised Adaptation for Activity Recognition in IoT-based Context-aware Smart Homes", IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013, pp. 460-467.


Paper Type :: Research Paper
Title :: Routing Optimization for Wireless Sensor Network Using Genetic Algorithm
Country :: India
Authors :: Kushagra Seth || Sumita Mishra || Pallavi Asthana
Page No. :: 56-63

This paper discusses about various routing optimization methods employed in wireless sensor network with main focus on genetic algorithm based optimization.Wireless Sensor Network (WSN) is composed of various types of networks which are randomly distributed to process or transfer the data to another step or path. It is used commonly nowadays in industrial applications like street light, health care monitoring, water impurities measuring devices, weather prediction, soil condition etc. One of the important uses of WSN is in the area of machine monitoring like rotating machine where it is difficult for engineers to take measurement from hard wired sensors and more relevant to wired sensors, wireless sensors are much cheaper than them.

Keyword: Wireless Sensor Network, optimization techniques, genetic algorithm, Sensor Nodes.

[1]. S.Ramakrishnan and Ibrahiem "M., Wireless Sensor Network from theory to Application" 1st ed. , United States : CRC Press 2013, pp. 10-50.
[2]. Ruiz-Garcia L, Lunadei L, Barreiro P, et al. "A review of wireless sensor technologies and applications in agriculture and food industry: state of the art and current trends". Sensors, 2009, 9(6): 4728-4750.
[3]. N. Jamal "Routing Techniques in wireless networks a survey" IEEE Wireless Communication, Vol 11(6), 2012.
[4]. S. Rajahekaran, G.A.Vijayalksmi- "Neural Network, Fuzzy Logic and Genetic Algorithm: Synthesis and Application" Published 2008.
[5]. Ferentinos K P, Tsiligiridis T A. "Adaptive design optimization of Wireless Sensor Network using Genetic Algorithm." Computer networks, 2007, 51(4): 1031-1051


Paper Type :: Research Paper
Title :: Utilization of Data Science to Investigate the Role of Nano Materials in Road Transportation Engineering
Country :: India
Authors :: Ajay Kumar Singh || Asita Kulshreshtha
Page No. :: 64-66

Nanotechnology is the technology in which nanoscale material properties are utilized in construction or formulation of new composite materials. When the conventional materials interacts with nanoparticles their physical parameters change dramatically. The reason being that nanoparticles provide highly reactive sites on their surface[1] bringing in unusual physical, chemical, and biological properties at the nano scale, differing in important ways from properties of bulk materials. Some nanostructured materials are stronger or have different magnetic properties compared to other forms or sizes of the same material. Working at the nanoscale enables us to utilize the unique physical properties of the nanomaterials. Presently we have made a comparative study of various parameters obtained by previous workers to find out the economicviability of the nanomaterials.

Keyword: Nanosilica (NS), Nanoclay (NC), Compressive Strength, Flexure Strength

[1]. Thamwattana N.& Hill, J.M.(2005)" Mathematical Modelling in Nanotechnology", Proceedings of the International Conference in Mathematics and ApplicationsICMA-MU2005(pp1-17). Bangkok: Department of Mathematics, Faculty of Science, Mahidol University.
[2]. A.M. Said, M.S.Zeidan, M.T. Bassuoni, Y.Tian, " Properties of Concrete Incorporating Nanosilica." Constr. Build Mater.,36(2012) pp.838-844.
[3]. M.S.Morsy, "Effect of Nanoclay on Mechanical Properties and Microstructure of Ordinary Portland Cement Mortar" Int.J. Recent Trends Eng.,(4)(2009)
[4]. Anwar,M.Mohamed,"Influence of Nanomaterials on Flexural Behavior and Compressive Strength of Concrete". HBRC Journal Volume 12, Issue2, August 2016 Pages 212-225.


Paper Type :: Research Paper
Title :: Overview of Breast Cancer Detection using Machine Learning
Country :: India
Authors :: DikshaRajpal || Anil Kumar || Sumita Mishra
Page No. :: 67-71

Cancer is the second cause of death in the world. Breast Cancer is one of the leading causes of death in women. Breast Cancer is caused due to abnormal growth of cells in the breast tissue. Both women and men can suffer from breast cancer. There are several ways by which breast cancer can be detected the chief being mammograms. However, mammograms have a disadvantage that false results can be detected which can risk a patient's health. It becomes imperative to discover different techniques which are simpler to formulate and are able to operate with various datasets, are cheaper to design and are able to estimate results which have higher accuracy. This paper discusses a basic breast cancer classifier model which uses different machine learning and deep learning algorithms to predict results via images to determine whether the cancer is benign or malignant and future plans for designing better classifier models.

Keyword: Breast Cancer, Deep Learning

[1]. X. Liu, J. Shi, S. Zhou, and M. Lu, "An iterated Laplacian based semi-supervised dimensionality reduction for classification of breast cancer on ultrasound images," in Proceedings of the 201436th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC '14), pp. 4679–4682, USA,August 2014.[2]. Y. Qiu, Y. Wang, S. Yan et al., "An initial investigation on developing a new method to predict short-term breast cancer risk based on deep learning technology," in Proceedings of theMedical Imaging 2016: Computer-Aided Diagnosis, SPIE. Digital Library, San Diego, California, USA, March 2016.
[3]. M. Taheri, G. Hamer, S. H. Son, and S. Y. Shin, "Enhanced breast cancer classification with automatic thresholding using SVM and Harris corner detection," in Proceedings of the InternationalConference on Research in Adaptive and Convergent Systems (RACS '16), pp. 56–60, ACM, Odense, Denmark, October 2016.
[4]. N. C. Mhala and S. H. Bhandari, "Improved approach towards classification of histopathology images using bag-of-features," in Proceedings of the 2016 International Conference on Signal andInformation Processing (IConSIP '16), IEEE, Vishnupuri, India,October 2016.


Paper Type :: Research Paper
Title :: Cost efficient security system Using Internet of Things
Country :: India
Authors :: Ashok Kumar Yadav || Santosh Kumar Yadav || Sanjeev Gangwar
Page No. :: 72-75

Home Security System is an Arduino based security system that not only protects our homes but also all those place where security is required. For domestic purpose, need of security alarm systems is required. As the number of crimes is increasing every day, there should be something that will keep us safe. We are aware of high end security systems present in all markets, but they are not easily available for everyone. Therefore we want to provide a solution by building a cost-effective electronic system that has the ability to feel the intruder's speed and stop the alarm with the user sending an SMS alert. The basic idea behind this letter is that all bodies produce some heat energy in the form of infrared which is invisible to human eyes. However, it can be detected by electronic motion sensors................

Keyword: Arduino, motion sensor, buzzer, LCD display, SIM800

[1]. Takeshi Yashiro, Shinsuke Kobayashi, Noboru Koshizuka, and Ken Sakamura, An Internet of Things (IoT) Architecture for Embedded Appliances, IEEE R10-HTC2013.
[2]. Padmini Gaur, Mohit P. Tahiliani, Operating Systems for IoT Devices: A Critical Survey, 2015 IEEE Region 10 Symposium
[3]. Husni Ruslai3, Kamaruzzaman Jahidin4, Mohammad Syafwan Arshad4, Smart Mirror for Smart Life ,2017 IEEE
[4]. Jinhong Yang, Hyojin Park, Yongrok Kim, Jun Kyun Choi, IoT Gadget Control on Wireless AP at Home, The 11th Annual IEEE Consumer Communications and Networking Conference
[5]. Neng- Shiang Liang; Li-Chen Fu; Chao-Lin Wu. "An integrated, flexible, and Internet-based control architecture for home automation system in the internet era". Proceedings ICRA `02. IEEE International Conference on Robotics and Automation, Vol. 2, pp.1101-1106, 2002


Paper Type :: Research Paper
Title :: Analysis of E-Healthcare centers in Lucknow
Country :: India
Authors :: Vartika Singh || Deepak Arora || Pooja Khanna || Puneet Sharma
Page No. :: 76-80

E-HealthCare center are muchfocused to ameliorate the healthstatus of the country. In thispaper, we are presenting an analysis of variousGovernmentHospitals and privateHospitals in Lucknow. There are basically 10 Governmenthospitals, out of whichonly 7 hospitals have website. Wehadbasicallyfocused on someposh areas of Lucknow i.e. GomtiNagar, Indira Nagar, Hajratganj, Mahanagar, Aliganj, Jankipuram, Alambagh, LDA Colony and Aashiana. The total number of PrivateHospitals and Trauma centers in these areas isapproximately 200. Out of whichonly 60 hospitals have theirwebsites running. The in-depthanalysis of thesewebsitesisdone by using Alexa Tool. In thispaper, wehadalsodiscussed about the Bounce Rate, Daily Page views and the average time the user spends on the site.

Keyword: E-HealthCare, Bounce Rate, Daily Page Views

[1]. R Jaya Subalakshmi, Arjit Das, N.Ch. S.N. Iyengar : A small E-Healthcare information systems with Agent Technology, 2011 International Conference on Computational Intelligence and Communication Systems, IEEE
[2]. Laura O' Grady: Depicting credibility in health care websites. Towards a more usable means, ACM SIGCAPH Newsletter, Page No 75, January 2003
[3]. Anthony Maeder, e-Research meets eHealth, Proc. 2nd Australian Workshop on Health Data and Knowledge Management, CRPIT Volume 80, Health Data and Knowledge Management, 2008.
[4]. Craig E Kuziemskey, James B Williams, Jens H. Weber-Jahnke: Towards Electronic Health Record support for Collaborative Processes, ACM.
[5]. Alexa, http://www.alexa.com/