National Conference on "Recent Innovations in Engineering and Technology" "MOMENTUM-19"
(Volume-1)

Paper Type :: Research Paper
Title :: Information Filtering System By Using Co-clustering For Accurate Prediction Of Recommendation
Country :: India
Authors :: MogalKavita .B || Prof. Kurhade N.V
Page No. :: 01-05

Every day consumers make decisions on whether or not to buy a product. In some cases the decision is based solely on price but in many instances the purchasing decision is more complex, and many more factors might be considered before the final commitment is made. Recently the concept of and more querying user responses through an initial interview method has been planned as a helpful new user preference stimulus strategy. during this planned system we have a tendency to addressing the cold begin drawback victimization Ocular formula and supply economical recommendation for Business to Business (B2B) moreover as Business to Customer (B2C) users. System carried out the administered the completely different recommendation and Frequent sspublically on the market datasets..............

Keyword : co-clustering, overlapping co-clustering, cold-start, product recommendations, interpretability.

[1]. Wayne Xin Zhao, Sui Li, Yulan He, Edward Y. Chang, Ji-Rong Wen and Xiaoming Li, "Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information", 2015.
[2]. M. Zhang, J. Tang, X. Zhang, and X. Xue, "Addressing cold start in recommender systems: a semi-supervised co-training algorithm," in SIGIR, 2014.
[3]. Ma, T. C. Zhou, M. R. Lyu, and I. King, "Improving recommender systems by incorporating social contextual in-formation," ACM Trans. Inf. Syst., vol. 29, no. 2, 2011.
[4]. J. Wang, W. X. Zhao, Y. He, and X. Li, "Leveraging product adopter information from online reviews for product recommendation," in ICWSM, 2015.
[5]. J. Lin, K. Sugiyama, M. Kan, and T. Chua, "Addressing cold-start in app recommendation: latent user models constructed from twitter followers," in SIGIR, 2013.


Paper Type :: Research Paper
Title :: Text Categorization using Clustering and Classification Machine Learning Algorithms via NLP
Country :: India
Authors :: PatilKiran Sanjay || Prof.Kurhade N.V
Page No. :: 06-09

In a world that routinely delivers progressively textual information. It is basic errand to dealing with that printed information. There are numerous content investigation strategies are accessible to overseeing and imagining that information, however numerous procedures may give less precision on account of the uncertainty of natural language. To give the fine-grained investigation, in this paper present efficient machine learning algorithms for classify content information. To enhance the precision, in proposed framework I acquainted NLTK python library with perform natural language processing. The principle point of proposed framework is to sum up the model for ongoing application by utilizing efficient text classification as well as clustering algorithms and find the precision of model utilizing execution measure.

Keywords: Text analytics, TF-IDF, Text classification, Text categorization.

[1]. Deokgun Park, et al. "Concept Vector: Text Visual Analytics via Interactive Lexicon Building using Word Embedding", IEEE Transactions on Visualization and Computer Graphics, Vol. 24, NO. 1,2018
[2]. Divyansh Khanna, et al. "Comparative Study of Classification Techniques (SVM, Logistic Regression and Neural Networks) to Predict the Prevalence of Heart Disease" International Journal of Machine Learning and Computing, Vol. 5, No. 5, October 2015.
[3]. KrunoslavZubrinic,et al "Comparison of Naive Bayes and SVM Classifiers in Categorization of Concept Maps" International Journal of computers Issue 3, Volume 7, 2013
[4]. Thorsten Joachims "Text Categorization with Support Vector Machines :Learning with Many Relevant Features"
[5]. Payal R. Undhad, Dharmesh J. Bhalodiya , "Text Classification and Classifiers: A Comparative Study" 2017 IJEDR,Volume 5, Issue 2,ISSN: 2321-9939


Paper Type :: Research Paper
Title :: IOT Based Accident Detection and Image processing based Animal Detection and Traffic Sign Detection
Country :: India
Authors :: Gulave Ankita || Khade Seema || Bankar Reshma || Shelake Rekha
Page No. :: 10-14

Thousands lose their valuable life in vehicle accidents everyday due to the traffic, road condition and speed. By using GPS antenna and latest technological concept of IoT , accident can be immediately reported, reduced and human life can be saved; by connecting different kinds of sensors to different parts or position of vehicle .We proposed system tilt sensor is used to detect the accident caused due to tilting, vibration sensor to detects the accident if there is a hard vibration of vehicle due to road condition and IR sensor is used for notifying if vehicle is too close to some other vehicle or obstacles. The collision of an animal with the vehicle on the highway is one such big issue which leads to such road accidents. In this system, a simple and a low-cost approach for automatic animal detection on highways for preventing animal-vehicle collision using computer vision techniques are proposed. This presents an overview of the road and traffic sign detection and recognition. It describes the characteristics of the road signs, the requirements and difficulties behind road signs detection and recognition.

Keywords: Accident detection, Image Processing, Arduino, Vehicle, Traffic Sign.

[1]. Kavya K1, Dr. Geetha C R2 "Accident Detection and Ambulance Rescue using Raspberry Pi", International Journal of Engineering and Techniques - Volume 2 Issue 3, May – June 2016
[2]. MuratOzbayoglu, Gokhan, Erdogan," A Real-Time Autonomous Highway Accident Detection Model Based on Big Data Processing and Computational Intelligence", 978-1-4673-9005-7/16/$31.00 ©2016 IEEE
[3]. Asad Ali and MohamadEid," An Automated System forAccident Detection", 978-1-4799-6144-6/15/$31.00 ©2015IEEE
[4]. "Enform." Lexus, Toyota. N.p., n.d. Web. 15 June 2014.
[5]. Johnston, Casey. "The Pursuit of Connection: The $120KLexus App and Car Combo." ArsTechnica.N.p., n.d. Web.15 June 2014.


Paper Type :: Research Paper
Title :: Virtual Classroom on LAN
Country :: India
Authors :: Rohit Kumar || Anmol SinghMatharu || Prabjyot Singh Solar
Page No. :: 15-19

In today's world video conferencing plays a key role in communication areas. The communication may be point to point or may be multipoint communication. This sought out the geographical gap to minimum level. This is widely used in many sectors let it be for corporate world ie., for business conference or for education purpose ie., for distance learning, remote education, teleshopping, group design & remote operation, which are necessary for various group activities. This paper proposes a video conferencing system that works on lan along with the internet facility if needed.

Keywords: lan, video conferencing system, virtual classroom

[1]. Free and opensource multiplatform voice (VoIP) application "https://jitsi.org/".
[2]. Software used for presenting, online training, web conferencing and whiteboard "https://openmeetings.apache.org/".
[3]. Open source web conferencing system based on GNU/Linux operating system and runs on Ubuntu 16.04 "https://bigbluebutton.org/" .
[4]. Mconf is an open source web conference system built on top of BigBlueButton "http://mconf.org/".
[5]. Kiss, G. (2012). Comparison of traditional and web-based education - case study "BigBlueButton" 2012 International Symposium on Information Technologies in Medicine and Education. doi:10.1109/itime.2012.6291286.


Paper Type :: Research Paper
Title :: Privacy Preserving Ranked Multi And Fuzzy Keyword Searching On Cloud
Country :: India
Authors :: Ms.Shraddha Sayaji Karande || Mr.N.V Kurhade
Page No. :: 20-23

with the arrival of cloud computing, it's clad to be increasingly rife for knowledge homeowners to source their info to open cloud severs whereas allowing info shoppers to recover this information. For protection considerations, secure ventures over encrypted cloud info have impelledmany analysis works below the one owner model. In any case, most cloud servers in apply do not merely serve one owner rather, they support numerous home owner share the benefits brought by distributed computing. Hence these knowledge home owners will transfer their files over the cloud so the different knowledge users might realize various files and use them.

[1]. W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, "Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing", IEEE Transactions on computers, vol. 65, no. 5, May 2016.
[2]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
[3]. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Int. Symp. Security Privacy, Nagoya, Japan, Jan. 2000, pp. 44–55.
[4]. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distrib. Comput. Syst., Genoa, Italy, Jun. 2010, pp. 253–262.
[5]. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1–5.


Paper Type :: Research Paper
Title :: Wireless Information and Power Transfer through Wireless Sensor Networks for trees
Country :: India
Authors :: Asmita Gorde || Kunal Kore
Page No. :: 24-26

Nowadays smuggling of trees is a big problem. Our project is deals saving the important and precious trees like sandal, sagwan etc from being harvested or smuggled. As name suggests here we are saving trees by using accelerometer sensor, GPS and GSM module. These trees are very costly as well as less available in the world. These are used in the medical sciences as well as cosmetics. Because of huge amount money involved in selling of such trees woods lots of Karnataka and Tamil nadu notorious smuggler "Virrappan" did the smuggling of such trees for so many years. To restrict such smuggling and to save the forest around the globe some preventive measures need to be deployed. We are developing such a system which can be used to restrict this smuggling...............

Keywords-GPS, GSM Module, Accelerometer Microcontroller Sensor.

[1]. PrasadR.Khandar,K.Deivanai,"Preventivesystemforforests",InternationalJournalofComputerScienceTrendsandTechnology(IJCST) Volume 4 Issue 1, Jan - Feb 2016.
[2]. S. Guo, C. Wang and Y. Yang, Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks,, IEEE Trans. Mobile Computing, vol. 13, no. 12, pp. 2836-2852, Dec.2014.
[3]. C.Wang,J.Li,F.YeandY.Yang,NETWRAP:AnNDNBasedReal-TimeWirelessRechargingFrameworkforWirelessSensorNetworks,
[4]. , IEEE Trans. Mobile Computing, vol. 13, no. 6, pp. 1283-1297, June 2014.
[5]. C.Wang,J.Li,F.YeandY.Yang,RechargingSchedulesforWirelessSensorNetworkswithVehicleMovementCostsandCapacity Constraints, IEEE SECON 2004, pp. 468-476,2014.


Paper Type :: Research Paper
Title :: Security of Public Health Record In Cloud via Data sharing
Country :: India
Authors :: Miss Pansare Kalyani Baban || Prof. Kurhade N.V
Page No. :: 27-29

The widespread acceptance of cloud computing based services in healthcare sector has resulted in cost effective and convenient exchange of Personal Health Records (PHRs) among several participating entities of the e-Health systems. Nevertheless, storing confidential health information to cloud servers is susceptible to revelation or theft and calls for the development of methodologies that ensure the privacy of the PHRs. . The PHR scheme ensures patient-centric control on the PHRs and preserves the confidentiality of the PHRs. The patients store the encrypted PHRs on the un-trusted cloud servers and selectively grant access to different types of users on different portions of the PHRs. A semi-trusted proxy called Setup and Re-encryption Server (SRS) is introduced to set up the public/private key pairs and to produce the re-encryption keys. Moreover, the methodology is secure against insider threats and also enforces a forward and backward access control. Furthermore, Performance evaluation with regard to time consumption indicates that this methodology has potential to be employed for securely sharing the PHRs in the cloud.

Keywords: Cloud Computing,PHR.

[1]. HUAQUN WANG1, 2 1Jiangsu Key Laboratory, \Anonymous Data Sharing Scheme in Public Cloud and Its Application in Ehealth Record," IEEE Transactions on Parallel Data Security Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
[2]. C. Chu, S. Chow, W. Tzeng, J. Zhou, R. Deng, \Key-aggregate cryptosystem for scalable data sharing in cloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp.468-477, Feb. 2014
[3]. Y. Tong, J. Sun, S. Chow, P. Li, Cloud-assisted mobile-access of health data with privacy and audit ability", IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, Mar. 2014.
[4]. C. Fan, V. Huang, H. Rung, Arbitrary-state attribute-based encryption with dynamic membership", IEEE Transactions on Computers, vol. 63, no. 8, pp. 1951-1961, Apr. 2013.
[5]. D. Boneh, G. Crescenzo, R. Ostrovskyy, G. Persianoz, \Public key encryption with keyword search", in Euro crypt 2004, Interlaken, Switzerland, May 2-6, 2004, pp.506-522.
[6]. N. Cao, C. Wang, M. Li, K. Ren, W. Lou, \Privacy-preserving multi keyword ranked search over encrypted cloud data", IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, Nov. 2013


Paper Type :: Research Paper
Title :: Automated Toll Payment using Android Phone
Country :: India
Authors :: Parita Danole || Prachiti Parab
Page No. :: 30-33

Heavy traffic congestion occurs on almost all toll plazas leading to a waste of resources of fuel, energy and time. This waste can be easily avoided by paying toll in advance using an android application for toll payment. People can select the route in advance even before starting their journey and the toll plazas on the route will be automatically detected. A confirmation message will be sent via short message service (SMS) to the mobile number linked with the vehicle number. The cameras at the toll booth will capture images of license plates and a license plate reader system will recode photographs and the license plate numbers of all vehicles. Thus, the vehicles won't have to stop at all for toll payment which would greatly save time and effort.

[1]. Mhatre Devika, Kamble Rohan, Pimple Sayali, Sankhe Amruta, "Electronic Toll Collection Using Barcode Reader", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
[2]. Dhurat Anish, Magal Parag, Chheda Manish, Ingle Darshan," Gateless Electronic Toll Collection using RFID," in IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 2, (Mar-Apr. 2014), PP 73-80.
[3]. Kamble Yogesh, Abhyankar Ajinkya, Pradhan Tanmay, Thorat Aditya, "Check post and Toll Tax Collection using RFID," in IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 2, April 2014.
[4]. S. Nandhini 1, P. Premkumar, "Automatic Toll Gate System Using Advanced RFID and GSM Technology", at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering


Paper Type :: Research Paper
Title :: Crop Prediction and Disease Detection Using IOT Technique
Country :: India
Authors :: Priti Pawar || Mrunal Thorat || Namdev Shegar
Page No. :: 34-36

Today energy resources have become scarcer and thus more valuable. In conjunction with the increase over last century, the necessity for locating new, more efficient, and sustainable strategies of agricultural cultivation and food production has become a lot of crucial. To facilitate this process, we tend to
are designing, building, and evaluating a system for preciseness agriculture that provides farmers with helpful knowledge concerning the disease prevention, the water supply, and also the general information of the diseases in a user friendly, simply accessible manner. Our system aims to create cultivation and irrigation more efficient as the farmer is ready to form higher enlightened choices and therefore save time and resources. the range of location and climatic effects upon agricultural cultivation............

Keywords- Agricultural vegetation, anisotropic propagation effects, multibaseline (MB) synthetic aperture radar(SAR), phenology, SAR tomography, vegetation water content (VWC).

[1]. Adams, R., Fleming, R., Chang, C., McCarl, B., and Rosenzweig, 1993 ―A Reassessment of the Economic Effects of Global
Climate Change on U.S. Agriculture, Unpublished: September.
[2]. Adams, R.,Glyer, D., and McCarl, B. 1989. "The Economic Effects of Climate Change on U. S. Agriculture: A Preliminary
Assessment." In Smith, J., and Tirpak, D.,eds., The Potential Effects of Global Climate Change onthe United States. Washington,
D.C.: USEPA.
[3]. Adams, R.,Rosenzweig, C., Peart, R., Ritchie, J., McCarl,B., Glyer, D., Curry, B., Jones, J., Boote, K., and Allen, H.1990."Global
Climate Change and U. S. Agriculture."Nature.345 (6272, May): 219-224.
[4]. [4]Adaptation to Climate Change Issues of Longrun Sustainability." An Economic Research
[5]. Barron, E. J. 1995."Advances in Predicting Global Warming‖.The Bridge (National Academy of Engineering). 25 (2, Summer): 10-
15.Barua, D. N. 2008. Science and Practice in Tea Culture,second ed. Tea Research Association, Calcutta-Jorhat,India.


Paper Type :: Research Paper
Title :: Secured and Fast transfer and minimization of Big Data using Adaptive Encoding
Country :: India
Authors :: DabhadeJyoti Goraksh || Prof. KoreKunal Sidramappa
Page No. :: 37-42

High dimensional data processing is the most essential task in bigdata environment there are many systems in existing offences which is already define to process the large data. The proposed work carried out to process high dimensional genomic data set in the distributed environment. Initially system works with DNA sequential data which having various attributes. In this work, designed a data minimization algorithm to transfer big genomic datasets in an expedient, secure way to allow scientists to share their data and analyses. The HTTP is used as a baseline protocol to compare and assess implementation results of transferring big genomic datasets. System algorithm provides improvements in response and transfer time of genomic datasets, as well as prevents unauthorized individuals............

Keywords: Machine Learning, Deep Learning, RNN, Mapreduce, HDFS, Hadoop.

[1]. Li W. Optimize Genomics Data Compression with Hardware Accelerator. InData Compression Conference (DCC), 2017 Apr 4 (pp. 446-446). IEEE.
[2]. Haaswijk W, Collins E, Seguin B, Soeken M, Kaplan F, Süsstrunk S, De Micheli G. Deep Learning for Logic Optimization Algorithms. InCircuits and Systems (ISCAS), 2018 IEEE International Symposium on 2018 May 27 (pp. 1-4). IEEE.
[3]. Petrillo UF, Sorella M, Cattaneo G, Giancarlo R, Rombo S. Analyzing Big Datasets of Genomic Sequences: Fast and Scalable Collection of k-mer Statistics. arXiv preprint arXiv:1807.01566. 2018 Jul 4.
[4]. Sun H, Chen X, Shi Q, Hong M, Fu X, Sidiropoulos ND. Learning to optimize: Training deep neural networks for wireless resource management. InSignal Processing Advances in Wireless Communications (SPAWC), 2017 IEEE 18th International Workshop on 2017 Jul 3 (pp. 1-6). IEEE.
[5]. Bhardwaj R, Sethi A, Nambiar R. Big data in genomics: An overview. InBig Data (Big Data), 2014 IEEE International Conference on 2014 Oct 27 (pp. 45-49). IEEE.


Paper Type :: Research Paper
Title :: A Survey on Irrelevant Image Flagging in Online Social Network
Country :: India
Authors :: Ritesh Suvarna || Akhil Karvanje || Saad Shaikh
Page No. :: 43-47

Social media are interactive computer-mediated technologies that provides facility for users around the world to share information, ideas or any forms of expressions via virtual communities and networks. Sometimes users may post irrelevant (unwanted) content in social networking platforms meant for a specific cause. Flagging irrelevant images is of much importance in keeping social media platforms safe and of relevance to other users. Researchers have worked on various machine learning techniques to classify the images with accuracy. Neural networks is widely used in image classification. In this paper we have listed and performed a comparative analysis on some approaches used in Image Classification.

Keyword: Deep learning, Neural Networks, Image flagging, image classification

[1]. G. Mercier and F. Girard-Ardhuin, ―Partially Supervised Oil-Slick Detection by SAR Imagery Using Kernel Expansion,‖ IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, vol. 44, Issue. 10, 2006.
[2]. A. Greiwe,―An unsupervised image endmember definition approach‖, 1st EARSeL Workshop of the SIG Urban Remote Sensing, 2006.
[3]. RICOTTA, C., 2004, Evaluating the classification accuracy of fuzzy thematic maps with a simple parametric measure. International Journal of Remote Sensing, 25, pp. 2169–2176.
[4]. HUANG, Z. and LEES, B.G., 2004, Combining non-parametric models for multisource predictive forest mapping. Photogrammetric Engineering and Remote Sensing, 70, pp. 415–425


Paper Type :: Research Paper
Title :: Security for Multi-user and Dynamic Multi-keyword Ranked Search over Cloud data
Country :: India
Authors :: Pandit Ashok || Naykodi Apeksha || , Pokharkar Shubhangi || Dumbare Rajendra || Prof.Gholap P.S.
Page No. :: 48-53

Cloud computing is popular due to its feature like multiuser, multitenacy and performance. Peoples are motivated to outsource their data on cloud servers that can easily manage the data, to store data in secure form various encryption technology is used to sharing the data secularly Ciphertext-policy attribute-based encryption (CP-ABE) technology has been preferred to use. In the various fields the departments like military and healthcare having data files with multilevel hierarchy. CP-ABE hierarchy structure of shared file has not been search. In this paper, attribute-based encryption scheme an efficient file hierarchy is proposed in cloud computing. Integration of layered access structure into a singal access structure then integrated access structure is encrypted with hierarchical files.........

Keywords: Attribute-Based Encryption, Fine-Grained, CP-ABE

[1]. C.-K. Chu, W.-T.Zhu, J. Han, J.-K. Liu, J. Xu, and J. Zhou, "Security concerns in popular cloud storage services," IEEE Pervasive Comput., vol. 12, no. 4, pp. 50–57, Oct./Dec. 2013.
[2]. T. Jiang, X. Chen, J. Li, D. S. Wong, J. Ma, and J. Liu, "TIMER: Secure and reliable cloud storage against data re-outsourcing," in Proc. 10th Int.Conf. Inf. Secur. Pract.Exper., vol. 8434. May 2014, pp. 346–358.
[3]. [3] K. Liang, J. K. Liu, D. S. Wong, and W. Susilo, "An efficient cloudbased revocable identity-based proxy re-encryption scheme for public clouds data sharing," in Proc. 19th Eur. Symp. Res. Comput. Secur.,vol. 8712. Sep. 2014,pp.257–272.
[4]. T. H. Yuen, Y. Zhang, S. M. Yiu, and J. K. Liu, "Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks," in Proc. 19th Eur. Symp. Res. Comput. Secur.,vol. 8712. Sep. 2014, pp. 130–147.
[5]. K. Liang et al., "A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing," IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, pp. 1667–1680,Oct.2014.


Paper Type :: Research Paper
Title :: Survey on: Based on Ultrasonic Vehicle Sensor Pathole Detection System
Country :: India
Authors :: Miss. Kharde Ashwini.Rajendra || Miss. Kolhe Akshada Rajaram || Miss. Muthal Ashwini Balasaheb || Prof. Shelake R.M
Page No. :: 54-57

Pothole Detection system is a unique concept and it is very useful to whom which face the problem of pothole in their route. The technology is purely new and idea is generated a profile for pothole in your vehicle journey. It is an application which is Accessing to timely and accurate road condition information, especially about dangerous potholes is of great importance to the public and the government. We implement an effective road surface monitoring system for automated path hole detection. It is a unique concept where it a low cost solution for the road safety purpose. This will help to avoid accidents and can use to identify problem areas early. The authorities can be alerted to take preventive actions; preventive actions can save money. Poorly maintained roads are a fact of life in most developing countries including our India. A well maintained road network is a must for the well being and the development of any country. So that we are going to create an effective road surface monitoring system. Automated path hole detection is our focus in the system.

Keywords- Ultrasonic Sensor, Android, GPS, MVC.

[1]. Multi-lane Pothole Detection from Crowdsourced Undersampled Vehicle Sensor Data Andrew Fox, Member, IEEE, B.V.K. Vijaya Kumar, Fellow, IEEE, Jinzhu Chen, Member, IEEE, and Fan Bai, Fellow, IEEE
[2]. Asphalt Pavement Pothole Detection and Segmentation Based on Wavelet Energy Field PenghuiWang, Yongbiao Hu, Yong Dai, and Mingrui Tian National Engineering Laboratory for Highway Maintenance Equipment, Chang'an University.
[3]. Implementing Intelligent Traffic Control System for Congestion Control, Ambulance Clearance, and Stolen Vehicle Detection Rajeshwari Sundar, Santhoshs Hebbar, and Varaprasad Golla
[4]. Automatic Detection of Potholes and Humpson Roads to Aid DriverProf.R.M.SahuProfessor, Electronic Engineering, PDEACOEM,Maharashtra, India
[5]. Pothole Detection System Based on Android Device and Ultrasonic Sensor (IJIRCCE)


Paper Type :: Research Paper
Title :: Controlling Home Appliances on Google Assistant and Monitoring Data
Country :: India
Authors :: Mhanta Prasad || Mayuri Ghodke || Swati Gaikwad || Prof. N. V. Kurhade
Page No. :: 58-62

Now a day's this paper presents a proposal for home automation using voice via Google Assistant Home automation or domestics a term for home automation. Flawless controllingof home, monitoring and programming by the end user have yet to enter the mainstream. This can be possible to develop an independent and self-managing system and extensible home system that can support toady's smart devices and technologies of differing feature and protocols. This paper describes how to control and monitor home appliances using android application over internet. There are number of commercial home automation systems available in market. But they have certain limitations to it. So thatway we come up with idea to develop a pocket friendly system. However, these are designed for limited use.............

[1]. IFTTT: https://ifttt.com/discover https://www.pocketlint.com /SmartHome/SmarHomenew
[2]. adafruit: https://en.wikipedia.org/wiki/AdafruitIndustries
[3]. NodeMCU: https://nodemcu.readthedocs.io/en/master https:/ /iotbytes.wordpress.com/nodemcupinout/
[4]. Google Assistant: https://assistant.google.com/intl/enin/https : //www.pocketlint.com/Apps/Appsnews/Googleappnews
[5]. IoT based Smart Home Automation System using Sensor NodeHimanshu Singh, Vishal Pallagani, VedantKhandelwal and Venkanna U.2018


Paper Type :: Research Paper
Title :: Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic
Country :: India
Authors :: Dr.Yogesh Kumar Sharma || Rokade Monika D
Page No. :: 63-67

Basically anomaly detection is the part of intrusion detection system which is categorized in network intrusion detection system as well as host based intrusion detection system. Various existing systems has been developed on synthetic as well as some real time data. It system illustrates some challenges like false positive ratio of system, elevate, low accuracy these are the major challenges of anomaly based intrusion detection system. This work we proposed a deep learning based anomaly intrusion detection system which can eliminate label as well as a label attacks IDS focus on identifying possible incidents or threats, logging information, attempting to stop intrusion or malicious activities, and report it to the management station. In addition, it record information related to observed actions..........

Keywords- Deep Neural Network (DNN), Random Forest, Anomaly detection, Imbalanced network traffic, Variation Auto-Encoder.

[1]. Kim CH, Kabanga EK, Kang SJ. Classifying malware using convolutional gated neural network. In2018 20th International Conference on Advanced Communication Technology (ICACT) 2018 Feb 11 (pp. 40-44). IEEE.
[2]. Jithesh V, Sagayaraj MJ, Srinivasa KG. LSTM recurrent neural networks for high resolution range profile based radar target classification. In Computational Intelligence & Communication Technology (CICT), 2017 3rd International Conference on 2017 Feb 9 (pp. 1-6). IEEE.
[3]. Hong D, Zhang Z, Xu X. Automatic modulation classification using recurrent neural networks. In Computer and Communications (ICCC), 2017 3rd IEEE International Conference on 2017 Dec 13 (pp. 695-700). IEEE.
[4]. Alom MZ, Alam M, Taha TM, Iftekharuddin KM. Object recognition using cellular simultaneous recurrent networks and convolutional neural network. In2017 International Joint Conference on Neural Networks (IJCNN) 2017 May 14 (pp. 2873-2880). IEEE.


Paper Type :: Research Paper
Title :: Health Care Patient Monitoring using IoT and Machine Learning
Country :: India
Authors :: Dr.Yogesh Kumar Sharma || Khatal Sunil S
Page No. :: 68-73

Security and privacy is the most essential thing in Big Data environment, there are many algorithms have been proposed in existing approaches for data privacy as well as security. In many applications like Healthcare are banking applications having available data where third party attacker can easily access the privacy of victims. In Internet of Things (IoT) environment there is the major issue of data security. In this paper we proposed high dimensional Healthcare big data security as well as disease prediction using machine learning approach. Basically the system has categorized into two sections first we implement IoT based environment which generates the data of patient body. This section be used some wearable devices like ECG sensor, BP sensor temperature sensor heart........

Keywords - Wearable sensors, healthcare, bigdata, cloud computing, authentication, security.

[1]. de Carvalho Junior, Helton Hugo,. "A heart disease recognition embedded system with fuzzy cluster algorithm." Computer methods and programs in biomedicine 110.3 (2013): 447-454.
[2]. Mirmozaffari, Mirpouya, AlirezaAlinezhad, and AzadehGilanpour. "Data Mining Apriori Algorithm for Heart Disease Prediction."Int'l Journal of Computing, Communications & Instrumentation Engg (IJCCIE) 4.1 (2017).
[3]. Khaing, HninWint. "Data mining based fragmentation and prediction of medical data." Computer Research and Development (ICCRD), 2011 3rd International Conference on.Vol. 2.IEEE, 2011.