National Conference on "Recent Innovations in Engineering and Technology" "MOMENTUM-19"
(Volume-2)

Paper Type :: Research Paper
Title :: High Dimensional Big data Clustering Approach in Distributed Environment
Country :: India
Authors :: Mr. Anand Mutha || Dr. Roshani Raut
Page No. :: 01-07

In semi supervised clustering is one of the main tasks and goal at grouping the data objects into significant classes (clusters) such that the similarity of protests inside groups is augmented and the likeness of articles among bunches is decreased. The dataset now and again might be in blended nature that is it might contain both numeric and distinct kind of information. Clearly these two sorts of information may vacillate in their elements. Because of the fluctuations in their qualities keeping in mind the end goal to bunch these sorts of blended information it is smarter to utilize the aggregate grouping strategy which utilizes split and consolidation way to deal with settle this issue...............

Keyword : Supervised Learning, Decision Tree, Random forest, fuzzy Classifier.

[1]. Bonissone, P. P., et al. "A fuzzy random forest: Fundamental for design and construction." Proceedings of the 12th International
Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU'08). 2008.
[2]. Cadenas, Jose M., et al. "Consensus operators for decision making in Fuzzy Random Forest ensemble." Intelligent Systems Design
and Applications (ISDA), 2011 11th International Conference on. IEEE, 2011.
[3]. Vaithiyanathan, V., et al. "Comparison of different classification techniques using different datasets." International Journal of
Advances in Engineering & Technology 6.2 (2013): 764.
[4]. Ghatasheh, Nazeeh. "Business analytics using random forest trees for credit risk prediction: A comparison study." International
Journal of Advanced Science and Technology 72.2014 (2014): 19-30.
[5]. Deepajothi, S., and S. Selvarajan. "A comparative study of classification techniques on adult data set." International Journal of
Engineering Research & Technology (IJERT) 1 (2012).


Paper Type :: Research Paper
Title :: Blockchain based E-voting system in P2P Network
Country :: India
Authors :: Miss.Vrushali Bapusaheb Bhusal || Prof.ManojWakchaure
Page No. :: 08-13

Electronic voting (also known as e-voting) refers to voting using electronic means and to take care of the votes given by the user and counting the votes accurately. An e-voting system should be secure, because it mustn't enable duplicated votes and be absolutely clear, whereas protective the privacy of the attendees. The disadvantages of traditional voting system are that there is no reliability of voting. No assurance that people gave the votes is not changed before they are counted on the system. There is no transparency between the voter and the system. So, to overcome all these issues we are proposing to use block chain technology as a medium in the voting system. The purpose of..........

Keywords: Blockchain, Electronic Voting System, e-Voting, I-Voting.

[1]. Borge, Maria, et al. "Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies." Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium on.IEEE, 2017.
[2]. Bistarelli, Stefano, et al. "An end-to-end voting-system based on bitcoin." Proceedings of the Symposium on Applied Computing.ACM, 2017.
[3]. McCorry, Patrick, Siamak F. Shahandashti, and FengHao. "A smart contract for boardroom voting with maximum voter privacy."International Conference on Financial Cryptography and Data Security.Springer, Cham, 2017.
[4]. Khoury, David, et al. "Decentralized Voting Platform Based on EthereumBlockchain." 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET).IEEE, 2018.
[5]. Lewis Tseng." Voting in the Presence of Byzantine Faults".978-1-5090-5652-1/17 $31.00 © 2017 IEEE DOI 10.1109/PRDC.2017.11.


Paper Type :: Research Paper
Title :: Frequent Item-set mining with differential privacy in Large Scale data
Country :: India
Authors :: Miss.Nikita DevramIlhe || Prof.ManojWakchaure
Page No. :: 14-19

In recent years, people have an interest in coming up with differentially non-public data processing algorithms. several researchers square measure functioning on style of information mining algorithms which supplies differential privacy. during this paper, to explore the chance of coming up with a differentially nonpublic FIM , cannot simply accomplish high info utility and a high level of protection, in addition offers time effectiveness. to the present finish, the differential non-public FIM based on the FP-growth algorithmic program, that is talk about to as PFP-growth. The Privacy based mostly algorithm consists of a pre-processing half and a mining half. among the preprocessing half, to boost the utility and privacy exchange, a very distinctive smart good ripping technique...............

Keywords: Wearable sensors, healthcare, bigdata, cloud computing, authentication, security.

[1]. Pan, Zhaopeng, Peiyu Liu, and Jing Yi. "An Improved FP-Tree Algorithm for Mining Maximal Frequent Patterns."2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA).IEEE, 2018.
[2]. Fahrudin, TresnaMaulana, IwanSyarif, and Ali RidhoBarakbah. "Discovering patterns of NED-breast cancer based on association rules using apriori and FP-growth." Knowledge Creation and Intelligent Computing (IES-KCIC), 2017 International Electronics Symposium on.IEEE, 2017.
[3]. Djenouri, Youcef, et al. "Frequent Itemset Mining in Big Data With Effective Single Scan Algorithms." IEEE Access 6 (2018): 68013-68026.
[4]. Xun, Yaling, Jifu Zhang, and Xiao Qin. "Fidoop: Parallel mining of frequent itemsets using mapreduce." IEEE transactions on Systems, Man, and Cybernetics: systems 46.3 (2016): 313-325.


Paper Type :: Research Paper
Title :: Voice Based Email System for Blind People
Country :: India
Authors :: Shilpa Sasikumar || Lakshmi Rahim || Sindooja Gajam || Prapti Lasunte || Prof. Sunil Khatal
Page No. :: 20-22

In the modernizedworld, communication has become so easy due to the integration of communication technologies with the internet.Emails are important as it is the most used form of communication, also it is very difficult for the blind to access emails and relate information via laptops or other devices. However, it becomes very difficult for the visually challenged to utilize this technology because of the fact that using this requires visual perception. Even though many new upgrades have been implemented to help them use the computers efficiently no naive user who is visually challenged can use this technology as efficiently as a normal user. Voice-based email system helps the visually impaired to interact with the computer system at a maximum probability and easy to communicate. The aim of this project is to make differently abled use the system efficiently and pave a way for differently abled to easily access their emails.

[1]. 2018 International Conference on Computer and Applications(ICCA) Mobile Assistive Technologies For Visual Impaired Users: A Survey AbdelGhani Karkar, Somaya Al-Maadeed Department of Computer Science and Engineering Qatar University Doha, Qatar a.karkar@qu.edu.qa, s alali@qu.edu.qaprogram (NCEP) expert panel on detection, evaluation, and treatment of high blood cholesterol in adults (adult treatment panel III) final report. Circulation. 2002;106(25, article 3143).
[2]. Prevalenceofmetabolic syndrome according to adult treatment panel III and international diabetes federation criteria: a populationbased study. Metabolic Syndrome
[3]. Designing Haptic Assistive Technology for Individuals Who Are Blind or Visually Impaired Dianne T.V. Pawluk, Member, IEEE, Richard J. Adams, Senior Member, IEEE, and Ryo KitadBener A, Dafeeah E, Ghuloum S, Al-HamaqAOAA.Association between psychological distress and gastrointestinal symptoms in type 2 diabetes mellitus. World Journal of Diabetes. 2012;3(6):123–129
[4]. 2017 2nd International Conference for Convergence in Technology (I2CT) Digital Assistant For The Blind Prince Bose剷, Apurva Malpthak†, Utkarsh Bansal‡, Ashish Harsola§ 剷Fr. Conceicao Rodrigues Institute of Technology 400703 Vashi Email: boseprince201195@gmail.com †Fr. Conceicao Rodrigues Institute of Technology 400703 Vashi Email: apoorvamalpathak22@gmail.com ‡Fr. Conceicao Rodrigues Institute of Technology 400703 Vashi Email: ubansal25@gmail.com §Fr. Conceicao Rodrigues Institute of Technology 400703 Vashi Email: ashishharsola@gmail.comfoundation.Diabetes Care. 2008;31(4):811–822


Paper Type :: Research Paper
Title :: A novel approch Automatically Categorizing Software Technologies
Country :: India
Authors :: Mr.Dinesh Bhere || Prof.Kunal Kore
Page No. :: 23-26

Software development is increasingly based on reusable components in the form of frames and libraries, as well as programming languages and tools to use them. Informal language and the absence of a standard taxonomy for software technologies make it difficult to reliably analyze technological trends in
discussion forums and other online sites. The system proposes an automatic approach called Witt for the categorizationof software technology. Witt takes as input a sentence that describes a technology or a software concept and returns a general category that describes it (for example, an integrated development environment), along with attributes that qualify it even more. By extension, the approach allows the dynamic creation of lists of all technologies of a given type.

[1]. J.-R. Falleri, M. Huchard, M. Lafourcade, and M. Dao, Automatic extraction of a WordNet-like identifier network from software, in 18thIEEE International Conference on Program Comprehension (ICPC), 2010, pp. 413.
[2]. SEWordSim: Software-specific word similarity database, in Companion Proceedings of the 36th International Conference on Software Engineering, 2014
[3]. C. Treude and M.-A. Storey,Work item tagging: Communicating concerns in collaborative software development, IEEE Transactions on Software Engineering, vol. 38, no. 1, 2012.
[4]. M. F. Porter, An algorithm for suffix stripping, Program, vol. 14, no. 3, 1980.
[5]. G. A. Miller, R. Beckwith, D. Gross, and K. J. Miller, Introduction to Wordnet: An on-line lexical database, International Journal of Lexicography, vol. 3, no. 4, 1990.


Paper Type :: Research Paper
Title :: Verbal Coding
Country :: India
Authors :: Komal Vairagade || Sushma Paimode || Tejas Date || Ass. Prof. Monika Rokade
Page No. :: 27-29

Software development using programming requires keyboard for input and all programming languages are mostly text oriented. This text oriented nature of programming languages becomes barrier to persons suffering from arm disability and it is difficult to remember the proper syntax. A person having brilliant mind and potential for programming skills, but as suffering from arm injuries or being disabled cannot be a programmer. To be a good developer, a human must memorize the syntax and keywords of programming language. In this paper, we proposed a methodology for Java programming language where programmer will speak and code of Java will be written accordingly.

[1]. M. S. Hasan, and H. Yu, "Innovative developments in HCI and future trends", in ICAC 20015, Glasgow, UK, Sep. 11-12, 2015.
[2]. G. Dede, and M. H. Sazli, "Speech recognition with artificial neural networks," Digital Signal Processing, vol. 20, no. 3, pp. 763- 768, May 2010.
[3]. G. W. Furnas, T. K. Landauer, L. M. Gomez, and S. T. Dumais, "The vocabulary problem in human-system communication," Communications of the ACM, vol. 30, no. 11, pp. 964-971, Nov. 1987.
[4]. T. K. Landauer, K. M. Galotti, and S. Hartwell, "Natural command names and initial learning: a study of text-editing terms,"
[5]. Communications of the ACM, vol. 26, no. 7, pp. 495-503, Jul. 1983.


Paper Type :: Research Paper
Title :: Voice Calling Using TCP/IP Protocol Over Local Area Network
Country :: India
Authors :: Mahesh Shripat Pokharkar || Nilesh Vasant Kurhade
Page No. :: 30-32

Calling is a very essential thing nowadays for us. But sometimes some problems occur because ofnetwork connection that affects everything related to our work and many things. This problem can be solve using the concept of Voice Calling Using IP Address Over Wireless Local Area Network (WLAN). This can be a solution for the problem mentioned above. This will be use-full in a an office or in communication lab. TCP/IP will use existing network of office for communication which will be cost effective, secure and can work without any internet service.

[1]. "One to Many PC Communications using TCP/IP protocol in Text and Voice format" published at technophilia 2018 http://www.ijaerd.com/papers/special_papers/TCO019.pdf
[2]. https://en.wikipedia.org/wiki/Berkeley_sockets
[3]. Socket Programming by LimiLimi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 4802-4807 www.ijcsit.com 4802 and its risk factorsin a population-based study of Qatar. Diabetes Research and Clinical Practice. 2009;84(1):99–106.
[4]. https://web.eecs.umich.edu/~pmchen/eecs482/socketProgramming.pdf
[5]. TCP/IP sockets in Java: practical guide for programmers" by K. Calvert and M. Donahoo


Paper Type :: Research Paper
Title :: Best IoT Based Smart Waste Management System
Country :: India
Authors :: Navale Pallavi || Gosavi Kirti || Bankar Nikita || Prof. K.D.Dere
Page No. :: 33-36

Nowadays, the trend is clear that the use of computing technology has taken place to improve waste management by providing electronic system by utilizing integration of different sensing and communication technologies for identification at bin level. In this system, we proposing a smart garbage bin based on universal hardware kit which would be mounted over the lid of the garbage bin's lid. The rest segment consists of bins with sensory node installed in it ,second segment contains the router and the third segment is android application and the base station. The sensor nodes can measure and transmit the waste conditions such as waste level, weight inside the bin in every access of the bin. The gateways can receive and forward the bin data to the base station. The base station stores............

Keywords:- Smart City, Sensors, Wi-Fi module, Universal module.

[1]. Overflowing sewage in residential areas giving health scare - times of india "Overflowing sewage in residential areas giving health scare - Times of India", The Times of India, 2016. [Online]. Available: http://timesofindia.indiatimes.com/city/nagpur/Overflowingsewage- in-residential-areas-giving-health-scare/articleshow/53162237.cms. [Accessed: 11- Oct- 2016].
[2]. Vincenzo Catania, Daniela Ventura, "An Approach for Monitoring and Smart Planning of Urban Solid Waste Management Using Smart-M3 Platform", 15TH CONFERENCE OF FRUCT ASSOCIATION, 2014, ISSN 2305-7254
[3]. Belal Chowdhury, "RFID-based Real-timeSmart Waste Management System", Australasian Telecommunication Networks and Applications Conference, December 2nd – 5th 2007, Christchurch, New Zealand
[4]. Fachmin Folianto, Yong Sheng Low, Wai Leong Yeow, "Smartbin: Smart Waste Management System",IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 7-9 April 2015
[5]. Chan H. See, Kirill V. Horoshenkov, Raed A. Abd-Alhameed, Yim Fun Hu, Simon J. Tait, A Low Power Wireless Sensor Network for Gully Pot Monitoring in Urban Catchments, IEEE SENSORS JOURNAL, VOL. 12, NO. 5, MAY 2012


Paper Type :: Research Paper
Title :: Classification and Notification of Road Incidents Using Ensemble Approach
Country :: India
Authors :: Manisha R. Arsule || Manjusha R. Gahiwade || Varsha S. Hedav || Nivedita P. Patil || Karuna S. Patil
Page No. :: 37-41

Normally many vehicle travels on road and number of traffic incidents occur which influences people journeying on that direction. The task of manual classification of these incidents takes more time which may be minimized the use of the system which classifies these incidents using machine learning algorithms. When the incident takes place administrator fills the information of it for dataset generation. This dataset is used for prediction of incident severity. The incidents are categorized for finding out severity using Naïve Bayes and k- Nearest Neighbour classifiers in an effort to discover and visualize frequent patterns in ancient incidents. The classification model accuracy will be progressed using k-fold cross validation. The ensemble approach of machine learning allows to apply different model which yields better results and reduce problem of overfitting by the combination of model............

[1]. Hoang Nguyen, Chen Cai, Fang Chen Data61 – CSIRO, "Automatic classification of traffic incident's severity using machine learning approaches", 13 Garden Street, Eveleigh NSW 2015, Australia.
[2]. So Young Sohn, Sung Ho Lee, "Data fusion, ensemble and clustering to improve the classification accuracy for the severity of road traffic accidents in Korea", Department of Computer Science and Industrial Systems Engineering, Yonsei University,134 Shinchondong, Sudaemon-ku, Seoul, South Korea.
[3]. Anuja H. Vanjari, Madhura C. Aher, Shrikant R. Baviskar.: Road safetyaudit of service roads adjacent to national highway- 3 passing through nashik.
[4]. V.S. Aher1, K.H. Ahirrao2, M.R. Gaikar3, S.S. Surve4, R.R. Kshatriya5 .:Road Accident Prediction for Nashik City.


Paper Type :: Research Paper
Title :: Encrypted graph based Keyword searching Technique
Country :: India
Authors :: Snehal Aher || Meghangi Amrutkar || Pallavi Garud || Pranali Pawar
Page No. :: 42-45

In this era cloud computing is widely used by many users, so the computing and storage services are moving from cloud to edges. In edge computing, data is processed by the device itself or by a local computer or server, rather than being transmitted to a data centre. To deal with this problem the proposed system provides solutions of data encryption at data owner side before outsourcing. If data owner is valid then cloud service provider will send the tokens to data owner and data owner will be able to outsource the data. Also, user can find appropriate file by using keyword search rather than searching by file name. The proposed system provides a searching technique called K-Nearest Keyword searching algorithm............

Keywords: Keyword searching, edge computing, K-Map

[1]. I. Abraham, D. Delling, A. V. Goldberg, and R. F. Werneck. Hierarchical hub labelings for shortest paths. In Algorithms–ESA, pages 24–35. Springer, 2012.
[2]. R. Agarwal, P. Godfrey, and S. Har-Peled. Approximate distance queries and compact routing in sparse graphs. In IEEE INFOCOM, pages 1754–1762, 2011.
[3]. T. Akiba, Y. Iwata, and Y. Yoshida. Fast exact shortest-path distance queries on large networks by pruned landmark labeling. In ACM SIGMOD, pages 349–360, 2013.
[4]. B. Bahmani and A. Goel.Partitioned multi-indexing: bringing order to social search. In WWW, pages 399–408, 2012.
[5]. J. Blocki, A. Blum, A. Datta, and O. Sheffet.Differentially private data analysis of social networks via restricted sensitivity. In ACM ITCS, pages 87–96, 2013.


Paper Type :: Research Paper
Title :: To Detect and Protect TheInternal Intrusion Using Data Mining And Novel Algorithm
Country :: India
Authors :: Mali Rohini S. || UndeShital N. || ShedgePrajvaleeta T || Prof.Gholap.P.S.
Page No. :: 46-50

IDPS uses a local computational grid to detect malicious behaviors in an internal system.Most of the computer system uses user-id and password as login to the system. If any user/admin shares their login id and password to their employee or friends then it will be the weakest point of security. Intrusion detection and protectionin the field of computer science is an important area of research from the last few years. Many approaches of classification have been proposed and they are compared with the existing approaches. In this system we used the techniques like data mining, novel algorithm and forensic technic. These algorithms are shows best results in terms of accuracy detection rate..........

[1]. S. Gage, A. Sadeghi, C. Stable, and M. Wigand, ―Compartmented security for browsers—Or how to thwart a phisher with trusted computing,‖ in Proc. IEEE Int. Conf. Avail., Rel. Security, Vienna, Austria, Apr. 2007, pp. 120–127.
[2]. C. Yue and H. Wang, ―BogusBiter: A transparent protection against phishing attacks,‖ ACM Trans. Int. Technol., vol. 10, no. 2, pp. 1–31, May 2010.
[3]. Q. Chen, S. Abdelwahed, and A. Erradi, ―A model-based approach to self-protection in computing system,‖ in Proc. ACM Cloud Autonomic Comput. Conf., Miami, FL, USA, 2013, pp. 1–10.
[4]. F. Y. Leu, M. C. Li, J. C. Lin, and C. T. Yang, ―Detection workload in a dynamic grid-based intrusion detection environment,‖ J. Parallel Distrib. Comput., vol. 68, no. 4, pp. 427–442, Apr. 2008.
[5]. H. Lu, B. Zhao, X. Wang, and J. Su, ―DiffSig: Resource differentiation based malware behavioral concise signature generation,‖ Inf. Commun. Technol., vol. 7804, pp. 271–284, 2013.


Paper Type :: Research Paper
Title :: Smart Employee Manager System Using Geo Fencing Algorithm
Country :: India
Authors :: Deshmukh Gauri V. || Dange Jyoti D. || Patil Akshay D. || Bhatewara Resham D. || Prof.Gholap.P.S.
Page No. :: 51-54

This paper discusses the various Geofencing concepts. Constructs are concepts, models, or schematic ideas: In our case they are the theoretical constructs of the Geofence used as a Security Strategy Model. In our concept considers Location Based Services and RFID as central to the security of wireless network security. In this Location Based Service and RFID Technology emerge as key constructs. Geofencing application used in framework an organization can turn from less secure when it uses a wireless network to highly secure. This Geofencing application framework was developed with the projection that applying the concepts of statistical process control to wireless network security .This wireless network encourage secure method of communication by organizations prone to war driving and hacking. Paper is divided into two parts. In first part is experimental work, in which field measurement............

[1]. Vasos Hadjioannou, Constandinos X. Mavromoustakis, George Mastorakis, Evangelos K. Markakis, Dimitra Valavani, Evangelos Pallis, "Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living"Bener A, Zirie M, Janahi IM, Al-Hamaq AOAA, Musallam M, Wareham NJ.Prevalence of diagnosed and undiagnosed diabetes mellitus and its risk factorsin a population-based study of Qatar. Diabetes Research and Clinical Practice. 2009;84(1):99–106.
[2]. Aditi Gupta and Vibhor Harit, "Child Safety & Tracking Management System". North India Institute of Technology, Najiyabad. 2016.and Related Disorders. 2009;7(3):221–230
[3]. Ulrich Bareth, Deutsche Telekom Laboratories, TU Berlin, "Privacy-aware and Energy-efficient Geofencing through Reverse Cellular Positioning", 2012. Brunzell JD, Davidson M, Furberg CD, et al. Lipoprotein management inpatients with cardiometabolic risk:consensus statement from the American diabetes association and the american college of cardiology
[4]. Natalia Wawrzyniak, Tomasz Hyla, "Application of Geofencing Technology for the Purpose of Spatial Analyses in Inland Mobile Navigation", Maritime University of Szczecin, Poland, 2016. [Colhoun HM, Betteridge DJ, Durrington PN, et al. Primary prevention of cardiovascular disease with atorvastatin in type 2 diabetes in the collaborative atorvastatin diabetes study (CARDS): multi centrer trial. The Lancet. 2004; 364(9435) :685–696.


Paper Type :: Research Paper
Title :: Using Social Interaction:To Analysis sentiments on Twitter
Country :: India
Authors :: Pansare Nirmala N || Prof.Kurhade N.V
Page No. :: 55-58

Sentiment analysis on Twitter Tweets has attracted much attention recently. One of the most populerfeatures of Twitter, is the immediately communication with other users or people in an very easy and user-friendly and most fast way. Consequently, people express their feelings freely, which makes Twitter an
ideal source for accumulating a vast amount of opinions towards a wide diversity of topics. This amount of information offers most potential and can be harnessed to receive the sentiment trend towards these topics. However, since none can invest an infinite amount of time to read through these tweets, an automated decision making way is required. Nevertheless, most..........

Keywords: Big Data, Sentiment Analysis, Text Mining,Twitter ,CNN, POMS(Profile of Mood States)

[1]. A. Radford, R. Jozefowicz, and I. Sutskever, "Learning to Generate Reviews and Discovering Sentiment", 2017.
[2]. B. Nejat, G. Carenini, and R. Ng, "Exploring Joint Neural Model for Sentence Level Discourse Parsing and Sentiment Analysis", Proc. of the SIGDIAL 2017.
[3]. N. Nodarakis, S. Sioutas, A. Tsakalidis, and G. Tzimas, "Using Hadoop for Large Scale Analysis on Twitter: A Technical Report", arXiv preprint arXiv:1602.01248, 2016.
[4]. Y. Zhang and B. C. Wallace, "A Sensitivity Analysis of (and Practitioners' Guide to) Convolutional Neural Networks for Sentence Classification", ArXiv preprint arXiv:1510.03820v4, 2016.
[5]. J. Guo, W. Che, H. Wang, and T. Liu, "A Universal Framework for Inductive Transfer Parsing across Multi-typed Treebanks", Proc. of the 26th Int. Conf. on Computational Linguistics (COLING-16), pp. 1222, 2016.
[6]. A. Agarwal, B.Xie, I. Vovsha, O. Rambow, and R. Passonneau. Sentiment analysis of twitter data. InProceedings of the Workshop on Languages in SocialMedia, , 2011.


Paper Type :: Research Paper
Title :: Using Social Interactions in Social Networks Detecting Users in Stress
Country :: India
Authors :: Ms. Sujata Sahebrao Dusunge
Page No. :: 59-63

Mental stress is turning into a threat to people's health currently days. With the fast pace of life, a lot of and a lot of folks are feeling stressed. It is very difficult to detect users stress in an early time to protect user. With the fame of web-based social networking, individuals are used to sharing their day
by day activities and interacting with friends via web-based networking media stages, making it possible to use on-line social network knowledge for stress detection. In new structure, we found that those clients push state is firmly identified with that of his/her companions in online networking, and I utilize a huge scale dataset from certifiable social stages to deliberately think about the relationship of clients' pressure states and social communications.............

[1]. Yuan Zhang, Jie Tang, Jimeng Sun, Yiran Chen, and JinghaiRao.Moodcast: Emotion prediction via dynamic continuous factor graph model 2016 IEEE International Conference on Data Mining
[2]. Bridging the vocabulary gap between health seekers and healthcare knowledgeLiqiang Nie, Yi-Liang Zhao, Mohammad Akbari, JialieShen, and Tat-Seng Chua. 2013
[3]. Factor Graphs and the Sum-Product Algorithm Frank R. Kschischang, Senior Member, IEEE, Brendan J. Frey,IEEE TRANSACTIONS 2015
[4]. Xiao jun Chang, Yi Yang1, Alexander G. Hauptmann, Eric P. Xing and Yao-Liang Yu Semantic Concept Discovery for Large- Scale Zero-Shot Event Detection Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI 2015)


Paper Type :: Research Paper
Title :: Air Polluted Path MonitoringSystem
Country :: India
Authors :: Prof. Ganesh S. Kothawale || Prof. Rekha M. Shelake
Page No. :: 64-67

Air pollution awareness is very important to the citizens, especially for those people who suffer from illnesses because of the air pollution. There are different types of pollution one of them is the air pollution, this pollution causes so many health issues. Air pollution is increasing know a days because of huge vehicular traffic. This huge vehicular traffic generating horrible gases in air. Which includes gases like Sulphur Dioxide, Nitrogen Dioxide, and Carbon Monoxide etc. There are different systems that reminded best early route to the user, but no any route which is better for the human health. So it's very important to travel healthy. This project develops a model that remanded route to the user, which have less air pollution and healthy for the user. Dijkstra algorithm is used into this model to find the less air polluted path. This project is definitely initiative for the healthy lifestyle of every person.

[1]. Sergey A. Belyaev1, Alexander S. Kuleshov2, Ivan I. Kholod3, "Solution of the Answer Formation Problem in the Question- Answering System in Russian", 2017 IEEE
[2]. FatemehEskandari, Hamid Shayestehmanesh, SattarHashemi, "Predicting Best Answer Using Sentiment Analysis in Community Question Answering Systems", SPIS2015, 16-17 Dec. 2015
[3]. http://www.arthapedia.in/index.php?title=Ambient_Air_Quality_Standards_in_India
[4]. http://cpcb.nic.in/air-quality-standard/
[5]. Jurafsky D., Martin J. H. Speech and Language Processing, Ch. 28:Question Answering, New Jersey, Alan Apt Publ., 1999, 975 p.
[6]. Lapshin V. A. Informatsionnyeprotsessyisistemy. Voprosno-otvetnyesistemy: razvitieiperspektivy, Nauchnotekhnicheskayainformatsiya, [Information processes and systems. Question-answer systems:development and perspectives, Scientific and technical information], Moscow, 2012, vol. 2, no. 6, pp. 1-9, (in Russian).


Paper Type :: Research Paper
Title :: Centralized User Data Management (CUM)
Country :: India
Authors :: Vidushi Desai || Vishal Jadhav || Kanchan Waghchaure || Tushar Dangat
Page No. :: 68-71

This is a Centralized User Data Management System. This application is cloud data management system. The basic idea of this project is creating an opens source User Data Management System that allows use to access data from anywhere in the home directory in the LAN without the use of Internet Connection. Cloud computing is a cost-effective model. Self-service capabilities eliminate the traditional processes associated with IT resource provisioning. Users can access a public or private cloud, review current cloud computing instances or create new ones, monitor utilization and costs, and adjust resource allocations. With reporting, users can track cloud budgets and reduce or delete unused instances to cut operating expenses.

1. http://www.ijircce.com/upload/2014/november/67_An%20Innovative.pdf
2. https://searchstorage.techtarget.com/definition/Cloud-Data-Management-Interface
3. https://www.komprise.com/glossary_terms/cloud-data-management/
4. https://www.networkworld.com/article/2329984/access-control/rdbms-vs--ldap.html