International Conference on Innovation & Research in Engineering, Science & Technology (ICIREST-19)
(Volume-15)

Paper Type :: Research Paper
Title :: ProGuard: A Multilevel Health Checkup Paltform
Country :: India
Authors :: Ankita Y. Meshram || Nayan P. Khedikar || Rupali M. Matey || Kalyani H. Wanjari || Supriya A. Kite
Page No. :: 01-05

In the recent times the healthcare sector in India has been changing. The journey of someone sick and looking for treatment starts with finding a doctor in our nearby places or nearby home, and then may also involve finding labs to get tests done, a second option, finding a hospital to get a certain procedure done, and recover while taking good treatments and medications. For trying to solve the healthcare problem and claims to be the only one offering an end-to-end solution. The end-to-end problem with health care is not an end-to-end solution. Not even the government. PROGUARD aims to connect the marketplace with a strong community of healthcare providers. By using PROGUARD millions of patients can connect to over healthcare platform. Using this site the patients/customers easily find out the hospitals.........

Keywords –PHP, MySql, Wordpress, XAMPP.

[1]. Luciana Tricai Cavalini Department of Health Information Technology Rio de Janeiro State University Rio de Janeiro, Brazil lutricav@lampada.uerj.br Timothy Wayne Cool National Institute of Science and Technology –Medicine Assisted by Scientific Computer Petrópolis, Brazil timothywayne.cook@gmail.com
[2]. Mario F. Li System Admin, OPTM Software Ottawa, Canada 13mfl1@queensu.ca (Currently student at Queen's University) Jun Feng Technical Advisor OPTM Software Ottawa, Canada 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
[3]. Giorgio Vittadini Department of Statistics, University of Milano-Bicocca, 20126 Milano, Italy And Simona C. Minotti Department of Economics and Social Sciences, Catholic University of Piacenza, 29100 Piacenza, Italy.
[4]. Zhenxing Zhang School of Information & Electric Engineering Ludong University YanTai, China ludongzx@gmail.com Joon
[5]. S. Lim IT College Gachon University Seongnam, South Korea jslim@gachon.ac.kr


Paper Type :: Research Paper
Title :: Real Time GSM based Electronic Display Screen
Country :: India
Authors :: Prof. Anup Gade || Swapnil P. Chaple || Thaneshwar T. Katre || Rahul M. Yede || Shubham V. Kinekar || Pranav S. Dhage
Page No. :: 06-09

The main aim of this project is to implement wireless electronic communication on semiconductor diode name plate victimization GSM. It presents Associate in Nursing SMS based mostly name plate incorporating the wide used GSM to facilitate the communication of displaying message on name plate via user's mobile. The semiconductor diode show System is aimed toward the colleges and universities for displaying day to-day info unceasingly or at regular intervals throughout theoperating hours. These displays area unit employed in bar chart displays, Industrial controllers, Panel meters, semiconductor diode matrix displays. Being GSM- based mostly system, it offers flexibility to show flash news or announcements quicker than the programmable system.......

Keywords: GSM Based, Real time messaging, LED plate.

[1]. [1]Wireless Electronics Display Board Using GSM Technology - N. Jagan Mohan Reddy and G.Venkeshwaralu.
[2]. [2] Display Message on Notice Board using GSM-Foram Kamdar, Anubbhav Malhotra and Pritish Mahadik.
[3]. [3] Cipher SMS-A Protocol for End to End Secure Transmission of SMS Polasa Abhinethri, Tula Vandana.
[4]. [4] Vijay Kumar Garg, Joseph EWilkes, Principle and Application of GSM, Upper Saddle River, NJ [u.a.] Prentice Hall PTR, pp. 177-192, 1999.
[5]. [5] Pawan Kumar, Vikas Bhardwaj, Narayan Sing Rathor, Amit Mishra, GSM Based e-Notice Board:Wireless Communication. ISSN: 2231-2307, Volume-2, Issue-3, July 2012


Paper Type :: Research Paper
Title :: Reusable CAPTCHA Security Engine
Country :: India
Authors :: Manisha Dharmik || Vaishnavi Sawarkar || Nikita More || Alfisha Ansari || Prof. Bhagyashali Kokode
Page No. :: 10-11

A CAPTCHA is a type of challenge-response test used in computing to determine whether the user is human. "CAPTCHA" is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart", trademarked by Carnegie Mellon University. A CAPTCHA involves one computer (a server) which asks a user to complete a test. While the computer is able to generate and grade the test, it is not able to solve the test on its own. Because computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. A CAPTCHA is sometimes described as a reverse Turing test, because it is administered by a machine and targeted to a human, in contrast to the standard...........

[1]. Core JavaTM 2 Volume I – Fundamentals 7th Edition.
[2]. Pearson Education – Sun Microsystems.
[3]. Core JavaTM 2 Volume II – Advanced .
[4]. Pearson Education – Sun Microsystems.
[5]. Head First Servlets & JSP.


Paper Type :: Research Paper
Title :: Secure Mobile Communication
Country :: India
Authors :: Ms. Aditi S. Pandey || Ms. Kamini S. Gajkeshwar || Ms. Juhi R.Singh || Ms. Pratiksha D. Kamble || Ms. Pooja landage
Page No. :: 12-15

The tremendous advancement in the field of Communication and Information Technology over the last decade have influenced our lives greatly. Wireless communication has witnessed a growth number of users in the recent years. One of the main advantages of wireless technology is mobility, which allows mobile users to move from one network to another while maintaining their permanent IP address. This keeps transportation and high level connection while moving IP routing on the IP address, which uniquely identities a node's point of attachment to the internet.

[1]. Xavier Perez-Costa, a Marc Torrent-Morenoab Hannes Hartensteina, "A Performance Comparison of Mobile IPv6, Hierarchical Mobile IPv6, Fast Handovers for Mobile IPv6 and their Combination", Mobile Computing and Communications Review, Volume 7, Number 4.
[2]. Zongpu Jia, Gaolei Wang1 and Ran Zhao, "A Literature Survey on Handoff for Mobile IPv6", JOURNAL OF NETWORKS, VOL. 6, NO. 8, AUGUST 2011.
[3]. Sonal V. Toshniwal, "Study of Mobile IPv6 ", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016.
[4]. Weimin Gao, Xiaoyong Fang, Lizhen Xiao, "STUDY THE HANDOFF MANAGEMENT OF MOBILE IPV6 NETWORK BASED ON MPLS", International Journal of Advanced Computer Technology (IJACT), VOLUME 2, NUMBER 6.
[5]. Johnny Lai1, Y. Ahmet Sekercioglu1, Norbert Jordan1, Andreas Pitsillides2, "Performance Evaluation of Mobile IPv6 Handover Extensions in an IEEE 802.11b Wireless Network Environment ".


Paper Type :: Research Paper
Title :: Securing Cloud Data Using DES Algorithm
Country :: India
Authors :: Aparna Akare || Anagha Choukade || Prajwali Gandhare || Ishwari Mahajan
Page No. :: 16-20

Cloud computing is the delivery of computing service server, storage, databases, networking, software, analytics, intelligence and more over the internet the cloud to offer raster innovation, flexible resources and economics of scale. Software as a Service (SaaS) service is the top most layer of the cloud computing stack directly consumed by end user i.e. SaaS. However, the new technology has also created new challenges such as data security, data ownership and transcode data storage. Security is an important factor in cloud computing insuring clients data is placed on the secure mode in the cloud. This paper describes about the design and implementation of simplified algorithm based on data encryption standard (DES) algorithm. The data to be encrypted is manipulated with the private key that is created.

Keywords: Algorithms: DES, Cloud Computing, SaaS Services.

[1]. Ghassan O. karame, Claudio Soriente, "Securing Cloud Data Under Key Exposure", is affiliated with NEC Labotatories Europe, Heidelberg, 69115 Germany, IEEE 2017.
[2]. Arjun Kumar 1 ,Byung Gook Lee2, HoonJaeLee"Secure Storage and Access of Data in Cloud Computing"Department of Ubiquitous-IT 2Department of Computer and Information Engineering Dongseo University, Busan, 617-716, Korea,IEEE2012.
[3]. Pearson,S., Benameue,A., "Privacy,Security and TZrust Issues arlses from cloud computing cloud computing technology and science (cloudCom)", IEEE second international conference,2010,On page(s):693-702.
[4]. Subhashinipallikonda,yashwanthreddy, "securing cloud data using encryption algorithm", MVSR engineering college, hydrabad 2017,
[5]. Zhifeng Xiao and Yang Xiao" Security and privacy in cloud computing" Department of Computer Science, The University of Alabama,Tuscaloosa, AL 35487-0290 USA,IEEE,2012.
[6]. Arjun Kumar and HoonjaeLee" Secure storage and access of data cloud computing" Department of Ubiquitous-IT, Dongseo University, Busan, 617-716, Korea,2012.


Paper Type :: Research Paper
Title :: Smart Electricity Board Android Application
Country :: India
Authors :: Mrs. Snehal Golait || Samiksha Ghugare || Vikesh Juware || Aditi Radke || Manish Raut || Prachi Ramteke
Page No. :: 21-26

Smart Electricity Board Android Application suggests a mobile based system to collect, process and notify consumers about consumption. This system will be reliable, efficient and accurate to suit the requirements of the providers. Meter reading, even though looks simple, is far from simple and involves processes which are not expedient. Calculation errors and delays in system updating are the major problems involved. Here we aim to eliminate the manual processes involved in the electricity meter reading system and eliminates the need of a user. It measures and monitors the electricity consumed by consumers in a locality and forwards the consumed power to the board which in turn notifies the power consumption with the help of GSM, GPS and Android. Our system reduces the cost of labor involved, increases the accuracy of meter reading and saves a large amount of
time.

[1]. Prototype Extraction and Adaptive OCR Yihong Xu,, Member, IEEE, and George Nagy, Senior Member, IEEE,December 1999.
[2]. L. Neumann and J. Matas. A method for text localization and recognition in real-world images. In ACCV, 2010.
[3]. Y. Netzer, T. Wang, A. Coates, A. Bissacco, B. Wu, and A. Ng. Reading digits in natural images with unsupervised feature learning. In NIPS Workshop on Deep Learning and Unsupervised Feature Learning, 2011.
[4]. K. Wang, B. Babenko, and S. Belongie. End-to- end scene text recognition. In ICCV, 2011.
[5]. T. Wang, D. Wu, A. Coates, and A. Ng. End-to- end text recognition with convolutional neural networks. In ICPR, 2012.
[6]. www.labbookpages.co.uk
[7]. Link:tess4j.sourceforge.net


Paper Type :: Research Paper
Title :: Smart Healthcare Prediction System
Country :: India
Authors :: Sudeeksha Khare || Meethu Das || Prof.Dipali Pethe || Anjali Tembhurne || Akanksha Pothbhare
Page No. :: 27-29

In medical and health care areas, due to regulations and due to the availability of computers, a large amount of data is becoming available. Such a large amount of data cannot be processed by humans in a short time to make diagnosis, and treatment schedules. Health Care System is a web based application can be accessed throughout the specified department to handle the various processes involved in Smart health Prediction System where Patient can see various Doctor For their health issue, the system shows various essence. Software also lists various expert Doctors available where user can search Doctor for their medical issue. The ambition of developing this project is to provide medical guidance for a patient who wants to know about the Disease Symptoms. Healthcare is a sector where decisions usually have very high-risk and high-cost associated with them. The decisions related to health are crucial as it may cost a person his/her life. While diagnosing the disease doctor analyses the symptoms of the patient. Regarding the symptoms the final disease is predicted.

Keywords: Health; Application; Patient; Doctor; Disease; diagnosing; Healthcare

[1]. Prashant Tiwari1, Aman Jaiswal2, Narendra Vishwakarma3, Pushpanjali Patel4" SMART HEALTH CARE" Volume: 04 Issue: 04 | Apr -2017.
[2]. Aakash Khatavkar1 Piyush Potpose2 Pankajkumar Pandey3" Smart Health Prediction System" Vol. 5, Issue 02, 2017.
[3]. Vikramaditya R. Jakkula1, Diane J. Cook2, Gaurav Jain3 Prediction Models for a Smart Home based Health Care System WA 99164.
[4]. Aditya Tomar, " An Approach to Devise an Interactive Software Solution for Smart Health Prediction using Data Mining," Vol. 5, Issue 7, July 2016 .


Paper Type :: Research Paper
Title :: "Smart Home Automation By Using Google Assistant
Country :: India
Authors :: Lilesh R. Dharmik || Tushar T. Khobragade || Sushil T. Ghugul || Dhanraj B. Rathod || Mamta L. Renge
Page No. :: 30-35

This paper presents a proposal for home automation using voice via Google Assistant. We saw many home automation technologies introduced over these years from Zigbee automation to Amazon Echo, Google Home and Home from Apple. It has become a craze these days. Google Home price is around Rs.10,000 with an additional cost of the devices to be connected to, the total cost of the system reaches over Rs.17,500. Apple Home Kit too is pretty more expensive, over Rs.7,000 more than the Google Home just for a basic setup. Philips Hue, a smart light which is controlled by the Google Assistant, Amazon Echo and Siri, voice assistant by Apple is priced around Rs.10,000. Similarly, Belikin'sWemo light is priced around Rs. 3,000 per unit and this can be controlled both by Siri and Google Assistant. So, overall we............

[1]. https://components101.com/ics/uln2803a-darlington-transistor-arrays
[2]. https://www.instructables.com/id/NodeMCU-ESP8266-Details-and-Pinout/
[3]. https://www.instructables.com/id/Interface-Relay-Module-With-NodeMCU/
[4]. https://virang-a.blogspot.com/2017/06/ifttt-button-with-nodemcu.html?m=1
[5]. https://roboindia.com/tutorials/blynk-introduction-nodeMCU


Paper Type :: Research Paper
Title :: Smart Sensing Shopping Cart
Country :: India
Authors :: Nitish Kurhadkar || Uddhav Raut || Vijay Tembhare || Prof.Nayan Shambharkar || Monika Kharpuriya || Manasi Bahad
Page No. :: 36-37

Now days purchasing and shopping at big malls is becoming a daily activity in metro cities. We can see huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discount. People purchase different items and put them in trolley. After total purchase one needs to go to billing counter for payments. At the billing counter the cashier prepare the bill using bar code reader which is a time consuming process and results in long queues at billing counters. Our aim is to develop a system that can be used in shopping malls to solve the above mentioned challenge..............

Keywords- RFID, Graphical Lcd,Crystal-12MHz

[1]. Programming in ANSI C: E BALAGURUSAMY
[2]. The and embedded systems: MUHAMMAD ALI MAZIDI & JANICE GILLISPIE MAZIDI
[3]. The AVR microcontroller: KENNETH J. AYALA


Paper Type :: Research Paper
Title :: Software Licence Generator for Industrial Application
Country :: India
Authors :: Ms. Sneha Bhange || Ms Durga Kashyap
Page No. :: 38-46

A license generator can be developed to generate particular license key for the legal users as a way of protecting their application from being used illegally (i.e. pirated). A license generator generates unique number or encryption key that identify the legal user of software application. The generated basic license key is used for the particular program and advance key is used for the subprogram and option which is selected by the user. It also help to generate license key for a particular time period. License generator using mac address and time code key will provide more security for the application and avoid piracy.

Key Words: MAC address, Time Code, Encryption, Decryption, Basic Key and Advance Key.

[1]. "License File Generator Using MAC Address" Anirudha A. Kolpyakwar1 , Piyush M. Dhande2 , Pallavi A. Chaudhari3
[2]. https://security.stackexchange.com/questions/24 33/license-key-serial-number-generator-and-checker
[3]. https://en.wikipedia.org/wiki/Product_key
[4]. http://www.webopedia.com/TERM/L/license_generator.html
[5]. https://en.wikipedia.org/wiki/License_manager


Paper Type :: Research Paper
Title :: Web-Based Data Mining Tools: Performing Feedback Analysis And Association Rule Mining
Country :: India
Authors :: Shital Gadekar || Prerna Naiskar || Prof. Vijaya Kamble || Monika Dhoble || Nancy Wahane
Page No. :: 47-51

This paper aims to explain the web-enabled tools for educational data mining. The proposed webbased tool developed using Asp.Net framework and php can be helpful for universities or institutions providing the students with elective courses as well improving academic activities based on feedback collected from students. In Asp.Net tool, association rule mining using Apriori algorithm is used whereas in php based Feedback Analytical Tool, feedback related to faculty and institutional infrastructure is collected from students and based on that Feedback it shows performance of faculty and institution. Using that data, it helps management to improve in-house training skills and gains knowledge about educational trends which is to be followed by faculty to improve the effectiveness of the course and teaching skills.

Keyword: Academic, Apriori, Asp.Net, Feedback, Knowledge, Mining, Php

[1]. Luan Jing (2001). Data Mining Applications in Higher Education. A chapter in the upcoming New Directions for Institutional Research. Josse-Bass. San Francisco.
[2]. Sachin R.B, Vijay M.S (2012). A Survey and Future Vision of Data Mining in Educational Field. pp.96 – 100.ISBN:978-1-4673- 0471-9
[3]. Goyal Monika, Vohra Rajan (2012). Applications of Data Mining in Higher Education. IJCSI. Vol. 9, Issue 2, No 1. ISSN (Online): 1694-0814
[4]. Bhardwaj Brijesh Kumar, Pal Saurabh (2011) Mining Educational Data to Analyze Students Performance. International Journal of Advanced Computer Science and Applications. Vol. 2, No. 6.
[5]. Heinrichs H. John, Lim Su-Jeen (2003). Integrating web-based data mining tools with business models for knowledge management. Decision Support Systems 35,103– 112..


Paper Type :: Research Paper
Title :: Women Safety Application
Country :: India
Authors :: Prof. Vaishali Jadhao Assistant Professor || Gahina Ukey Student || Chetan Rabbewar Student || Vrushabh Bhong Student || Sitanshu Mustafi Student
Page No. :: 52-58

In today's world it is very unsafe to travel alone, especially for women. Since lots of unexpected, and shameful incidents are happening around the globe. Problems may come from anywhere and anytime, as women are also growing equally like men so for that purpose they have to travel alone at night where ever they go, they have to travel alone in public transport as well, and for that reason we need to understand and solve this problem of women so they also should not feel any fear regarding their safety. This report represents an android application which will serve the purpose to rescue the women from unsafe conditions. As we all Know that nowadays every individual carry their own smartphones and the uses of android applications have been increased rapidly so it is better to have such an android application which will provide a safe environment in public transport.

Keywords: Android, Database Management, PHP.

[1]. Introduction to Android: h ttp://developer.android.coguide/index.html.
[2]. Android API: h ttp://developer.android.com/r e ference/packages.html
[3]. Java 6


Paper Type :: Research Paper
Title :: "Women Safety Band"
Country :: India
Authors :: Ms. Sakshi Shirbhate || Ms. Harsha Hardas || Ms. Divya Shirbhate || Prachiti Mopidwar || Ms. M. S. Alur
Page No. :: 59-62

India which sees itself as a promising super power and an economic hub, is still trapped in the clutches of various patriarchal evils like molestations, dowry, crime against women, worst among all is rape. In today's world, women safety has become a major issue as they can't step out of their house at any given time due to fear of physical/sexual abuse and violence.So, in an attempt to curb this menace, the atrocities against the women can be now brought to an end with the help of a Women Safety Device. This safety device consists of a microcontroller, a temperature sensor, a heartbeat sensor and an emergency pushbutton switch. On sensing the emergency situation, this device fetches the current location of woman and sends it to emergency contacts via Global System for Mobile (GSM) module. The safety device also includes a shock giver circuit which is intended to hurt the attacking or abusing person, due to which there is a chance for the women to escape.

[1]. Suraksha. A device to help women in distress: An initiative by a student of ITM University Gurgaon.efytimes.com. 2013. Available from: http://efytimes.com/e1/118387/SURAKSHA-A-Device-To-Help-Women-In-Distress-An-Initiative-By-A-Student-Of-ITMUniversity- Gurgaon.pdf
[2]. Pantelopoulos A, Bourbakis NG. A survey on wearable sensor-based systems for health monitoring and prognosis. IEEE Transactions on Systems, Man and Cybernetics – part C: Applications and Reviews. 2010 Jan; 40(1):1–12.
[3]. Toney G, Jaban F, Puneeth S. et al. Design and implementation of safety arm band for women and children using ARM7. 2015 International Conference on Power and Advanced Control Engineering (ICPACE); Bangalore. 2015 Aug 12-14. p. 300–3.
[4]. Vigneshwari S, Aramudhan M. Social information retrieval based on semantic annotation and hashing upon the multiple ontologies. Indian Journal of Science and Technology.2015 Jan; 8(2):103–7.