Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
CONFERENCE COMMITTEE
Conference Chair
Dr. Swati Sinha
Conference Co-Chair Program
Dr. Dhananjay Patel
Advisory Members (Internal)
Dr. Saurabh Mehta
Dr. Sangeeta Joshi
Dr. Anjali Deshpande
Organizing Secretary
Vipul Dalal
Publication Chair
Geeta Narayanan
Anuradha Bhatia
Umesh Kulkarni
Yash Shah
Finance & Logistic Chair
Shrikant Velankar
Sandeep Kamble
Publicity & Public Relations Committee
Girish Gidaye (Chair)
Sunil Kavatkar
Vivek Patker
Prita Patil
Amit Maurya
Abhishek Barve
Sandeep Kamble
Manoj Suryavanshi
Dhananjay Patel
Bhanu Tekwani
Poonam Shah
Registration Committee
Vidya Chitre (Chair)
Shradda Panbude
Anuradha Bhatia
Akshay Loke
Local arrangement & Hospitality
Manoj Suryavanshi
Snehal Andhare
Sneha A.
Web Masters
Deepali Vora
Ajay Dhruv
Shruti Agarwal
Anchoring
Manasi Pathak
Photography
Deepali Shrikhande
Bhupesh Hate
Review Heads
Deepali Vora
Geetha Narayanan
Invited Session
Chairs
Dr. Murugan
Dr. Dhananjay Patel
Food arrangements
Poonam Shah
List of Reviewers
Abhishek Anurag Dr. Saurabh Mehta
Dr. Poonam Bathla Charusheela Nehete
Dr. Kiran Bhandari Seema Nehete
Asha Bharambe Dr. Amit Oak
Prof. Anuradha Bhatia Pranita Padhye
Dr. Gresha Bhatia Prof. Dilip Motwani
Deepak Bhoir Dr Gajanan Nagare
Dr.Deepak Bhoir Prof. Geetha Narayanan
Dr.Girish Bhole Shachi Natu
Dr.Mita Bhowmick Shraddha Panbude
Dr.Sachin Bojewar Dr. Dhananjay Patel
Dr.Arun Chavan Varsha Patil
Hariram Chavan Dr. T. Prasad
Prof. Vidya Chitre Dr. Rekha Ramesh
Dr. Shalu Chopra Dr. Y.S. Rao
Dr. Neelam Choudhary Sandeep Raskar
Dr. Neelam Choudhary Dr Arpit Rawankar
Prof. Vipul Dalal Asha Rawat
Smita Dange Bindu S
Dr. Anand Darji Rashmi Salvi
Dr. Narendra Kumar Dasare Dr. Shailesh Sathe
Dr. Anjali Deshpande Anagha Shastri
Prof. Sachin Deshpande Kavita Shirsat
Prof. Girish Gidaye Dr. Swati Sinha
Dr.Murugan. Gopal Dr. Subha Subramaniam
Jayashree Hajgude Dr. Sanjay Singh Thakur
Kavita Jain Neeta Thakur
Dr Sangeeta Joshi Dr.Jitendra Toravi
Nilakshi Joshi Kushal Tuckley
Ramesh Karandikar Harshula Tulapurkar
Uday Kashid Srija Unnikrishnan
Dr.Faruk Kazi Prof. Pankaj Vanwari
3
Prachi Kshirsagar Prof. Shrikant Velankar
Umesh Kulkarni Dr. Alok Verma
Dr. Sudhakar Mande Varsha Wangikar
Dr.Sheetal Mapare Rama Rao
Deepali Vora
4
Table of Contents
Electronics Track ....................................................................................................................................... 8
Theme: Robotics, Automation and Control ................................................................................... 8
E01. Automatic Hand Braking System .......................................................................................... 9
E02. Geofencing for Disaster Management System ................................................................... 9
E03. Navigation and Depth Control in Autonomous Underwater Vehicle ............................ 10
E04. Semi-Autonomous Pneumatic Pick-Place & Autonomous Electrically Actuated
Quadruped Robots ............................................................................................................... 10
E05. Navigation Using Beacon For Building .............................................................................. 11
E06. Farmbot- A CNC Based Backyard Farming System. ......................................................... 11
E07. Automatic Power Factor Controller Using Synchronous Condenser ............................. 12
Electronics and Telecommunication Track ....................................................................................... 13
Theme: VLSI Design, SP, RF Microwave ........................................................................................ 13
ET01. 3D Pose estimation using CNN and 3D depth map probabilistic model. ..................... 14
ET02. ―Creating Interactive Mirror‖ ............................................................................................... 14
ET03. Automated Essay Generation using Tensor flow .............................................................. 15
ET04. Design of Folded Cascode Operational Amplifier ............................................................ 15
ET05. Index modulation for 5G networks ..................................................................................... 16
ET06. An Empirical Review of UV Measurement Methodologies.............................................. 16
ET07. Development of Advance Smart Electric Vehicle using Hybrid Energy Storage
System .................................................................................................................................... 17
ET08. Analysis of Various Maximum Power Point Tracking Techniques for Photovoltaic
Cell .......................................................................................................................................... 17
ET09. A Methodology for Secure Content Transmission Using Video Cryptography ............ 18
ET010. V Chef: A Hot Food Vending Machine ............................................................................... 18
ET011. Advancements In Lithography Techniques: Nanoimprint Lithography (NIL) ................ 19
ET012. Use Of Mel Frequency Cepstral Coefficients For The Implementation Of A Speaker
Recognition System .............................................................................................................. 20
Computers and IT Track ........................................................................................................................ 21
Theme: Soft Computing and Deep Learning ............................................................................... 21
C01. Survey Paper on URL Based Phishing Detection............................................................... 22
C02. Crop Prediction System using Machine Learning ............................................................. 22
5
C03. Employee Performance Appraisal System Using Hybrid algorith .................................. 23
C04. Automatic Question Paper Generator Using Semantic Approach ................................. 23
C05. Multilevel Authentication Based On Sclera Vein Recognition ........................................ 24
C06. SPARK – An Android Application for Parking Reservation System. ............................... 24
C07. Automated Music Transcription .......................................................................................... 25
C08. ―V-TRANSLATE‖- A Speech to Speech Translation System ............................................ 25
C09. Predictive Modelling of Life Insurance Data: A Comparative Study of Machine
Learning Approaches ............................................................................................................ 26
Theme: AI, Expert system, network security ................................................................................ 27
C010. Recent Life Prolonging Techniques in Wireless Sensor Network (WSN) ....................... 28
C011. Mood Therapist: Emotion Based Music Player .................................................................. 28
C012. Spam Detection using Sentiment Analysis ........................................................................ 29
C013. Active Learning in Mathematics through Think-Pair-Share ............................................ 29
C014. Ear Biometric Techniques: A Comparative Approach ....................................................... 30
C015. Sybil Defender: A Defense Against Sybil Attacks in Social Network .............................. 30
C016. Security System and Automation using Raspberry Pi ...................................................... 31
C017. Comparative study of fake news detection ....................................................................... 31
C018. Two-Tier Energy Compensation Framework Based On Smart Electric Charging
Station .................................................................................................................................... 32
C019. Agent Driven ETutoring System .......................................................................................... 33
C020. Neural Network ..................................................................................................................... 33
C021. Estimating the Stereo Information in an image with Disparity map using
Minimum Sum belief Propagation ...................................................................................... 34
Theme: Data mining, Ware house, Data analysist, GIS, & Remote Sensing......................... 35
C022. Survey on Mining Frequent Item Sets Over Uncertain Databases ................................. 36
C023. Virtual Chemistry Lab ........................................................................................................... 36
C024. Data Mining using K-means and Hierarchical Clustering Algorithms: A Case Study
Approach ................................................................................................................................ 37
C025. Analysis of the Social Media Role in Smart Learning ....................................................... 37
C026. 3D pose estimation using CNN and 3D depth map probabilistic model. ..................... 38
Theme: Cloud computing, computer networks, IoT, Computer graphics, VR, CV,
parallel & grid computing, distributed systems ......................................................................... 39
6
C027. School Automation System ................................................................................................. 40
C028. Face Recognition Home Security Using Raspberry Pi &IOT ........................................... 40
C029. IOT Based Energy Meter Android Application .................................................................. 41
C030. Hierarchy Based Secured File Sharing ................................................................................ 41
C031. Secured Re-Encryption in Un-Reliable Cloud Using File Sharing ................................... 42
C032. Dynamic Report Generation ................................................................................................ 42
C033. Dynamic Vehicle Parameters Assessment using Web Application................................. 42
C034. Personalized Smart Mirror with Voice Controlled Home Automation Using
Raspberry Pi 3 ........................................................................................................................ 43
C035. Smart Visitor Detector .......................................................................................................... 43
C036. Child Safety Using IOT .......................................................................................................... 44
C037. Real Time Sensing with IoT and Environmental Monitoring Using Raspberry Pi ......... 45
C038. IoT Based Biometric School Bus Attendance and Tracking System ............................... 45
C039. IOT for Monitoring Oil Well Production and ensure Reliability ...................................... 46
C040. Explore Mumbai Tour Guide: Application For Android Mobile ...................................... 46
Management Track ................................................................................................................................ 47
Theme: Service, Marketing consumer behavior business process & Re-Engg. Future
Workplaces and Challenges for HR ................................................................................................ 47
M01 SPARK – An Android Application for Parking Reservation System. ............................... 48
M02 Personalized Smart Mirror with Voice Controlled Home Automation Using
Raspberry Pi 3 ........................................................................................................................ 48
M03 Analysis of the Social Media Role in Smart Learning ....................................................... 49
M04 Explore Mumbai Tour Guide: Application for Android Mobile ....................................... 49
M05 Assessment of factors causing delay in Construction Projects ....................................... 50
Theme: Education Pedagogy, social Impact, financial forecasting ........................................ 51
M06 Building An Expert System Based On Data Mining .......................................................... 52
M07 Current Features Regional Development of Organizations Of The Sphere Of
Engineering In Ukraine ......................................................................................................... 52
M08 Detecting Stress Based on Social Interactions in Social Networks ................................. 53
M09 Blockchain Technology Used In Taxation .......................................................................... 53
M10 Financial Planner and Asset Allocation Using Machine Learning ................................... 54
Bio Medical Track ................................................................................................................................... 55
7
Theme: Biomedical Instrumentation, Bio – Sensors & Healthcare, Biomedical Signal
Processing ............................................................................................................................................ 55
BM01. Walk Assist ............................................................................................................................. 56
BM02. Lung Cancer Detection and Classification Using SVM ..................................................... 56
BM03. Assisting technologies for Alzheimer‘s patients and caretakers ..................................... 57
BM04. Interactive Bus System For Visually Impaired .................................................................... 57
BM05. Proposed Model for Predictive Diagnosis of Chest Diseases ......................................... 57
BM06. Diagnosis of Alzheimer‘s Disease By Means Of Synchrony & Wavelet Features &
Machine Learning Algorithms ............................................................................................. 58
BM07. Medical Image retrieval by contour based shape signature for CT Images.................. 58
8
Electronics Track
Theme: Robotics, Automation and Control
9
E01. Automatic Hand Braking System
Sayali Lad [email protected]
Drishti Kwatra [email protected]
Sanika Hadatgune [email protected]
Mahima Srsivastava [email protected]
Abstract—The increasing cases of accidents on road due to incompetency of drivers have led
to inclusion of collision avoidance systems, automatic hand braking being one of them. This
system assists the driver to calculate the distance between itself and the obstacle and apply
brake when needed. An ultrasonic emitter is kept on the front part of the car which produces
and emits ultrasonic waves. Ultrasonic receiver which is also fixed on the front portion of the
car receives an ultrasonic signal from obstacles positioned within the predetermined distance
in front of the car. The reflected wave gives the information about the distance between the
vehicle and the obstacle. Then 8051 is used to control servo motor based on information
obtained from reflected wave and gradually slows down the speed which would ultimately
result in termination of speed using the handbrake, if the driver himself doesnt take
necessary action required at that time. Our System is a collision avoidance system but in
worst case if collision takes place then we have installed a GSM based system which will
notify the relatives on the front end about the incident.
E02. Geofencing for Disaster Management
System
Anish Deshpande
Abhishek Shingte
Ashutosh Dwivedi
Swapnil Sonawane
Abstract- We are designing an android application which is useful for saving many human
lives. Help me app is working on an android operating system. Number of people squander
their precious life in natural calamities such as accidents, floods etc. However, the
implementation of new solutions using these technologies requires concepts based on
information and resources sharing and inter-services communication. Sharing the
information between services allows acquiring more knowledge about the current events on
the Disaster area that helps participants making appropriate decisions. This paper also
discusses about what features could be added in the app in future to make it more effective
in information management in a post disaster scenario. We create Geo-fences that will help
to alert about the restricted area which is made by the user manually in the app. Database
likewise complete data of the user and the coordinates of the Geo-fences is store on server.
Later we will access those data from server to our mobile by using this application.
10
E03. Navigation and Depth Control in
Autonomous Underwater Vehicle Siddhesh Soyane, Dushyant Pal, Chetan Shelar and Shripal Jain
Abstract-In this paper, controls, and navigation systems of the latest AUV technologies have
been discussed. Different techniques have been developed so far to achieve desired vehicle
stability and tracking accuracy by processing voluminous image data picked up by expensive
sensors. Hence, brief accounts of underwater image processing and data fusion techniques,
and complex computational algorithms for navigation are also highlighted in this paper. The
main proposed method in this review paper focuses on the vehicle‘s depth and stability
control by using the discrete control approach.
E04. Semi-Autonomous Pneumatic Pick-Place &
Autonomous Electrically Actuated Quadruped Robots Sanjana Patil [email protected]
Rahul Panchal [email protected]
Atharva Pande [email protected]
Vedant Shrungarpawar [email protected]
Mrinali Parida [email protected]
Shreya Nair [email protected]
Rachita Nair [email protected]
Jenny Nadar [email protected]
Yogesh Gholap [email protected]
Abstract— This paper describes the techniques used for implementing Messenger Robot-1
(MR1) and Messenger Robot-2 (MR2) for ABU Robocon 2019. The MR1 is a semi-
autonomous bot which transfers the Gerege (a token) to the Messenger Robot-2 (MR2) and
throws the Shagai (an object of around 700 grams) into the landing zone. It is capable of
switching between automatic line following mode and manual control mode established via
a Bluetooth interface between the robot and a PS3 remote controller. Pneumatic actuating
cylinders are used by MR1 to grab and throw the Shagai. MR2 is an autonomous four-legged
robot which incorporates servo-based leg drive mechanism providing three degrees of
freedom for each leg. The obstacle detection system of MR2 comprises of laser ranging
sensors to avoid or cross the obstacle. In addition to this, a control system consisting of
three Arduino mega boards featuring Inter Integrated Circuit (I2C) control for managing the
dynamic behaviour, gait generation and transition method for MR2.
11
E05. Navigation Using Beacon For Building Bhavika Salunkhe ShrutiAdivrekar, Kalyani Donthula Sandeep kamble
Abstract — Now a days, the technology keeps improving drastically, especially on smart
phones or mobile devices. The customer‘s requirement will increase day by day. But it is time
consuming. Also from which site online shopping is done it is not feasible to customer as
distance wise. To overcome this problem we are going to develop ―Navigation ions on
mobile phone when they are pass through any building using Beacons for Building.‖ The
goal of this research is to implement mobile based indoor positioning with the beacon
solution based on the Bluetooth Low Energy (BLE) technology. For estimating the locations
based on localizations we use RSSI (Received Signal Strength Indicator). Compass is used for
calculate the current location of mobile phone. Beacons provide accuracy in proximity and
distance estimation. In our application customer saves their time because customer‘s gets
notification.
E06. Farmbot- A CNC Based Backyard Farming
System. Nayana Mahajan Pooja Karmokar, Kedar Kulkarni, Pratik Devle, Shubam Kaul
Abstract - When we are presented with the current food production system and when it
comes to mass harvesting of crops and vegetables, we have surrendered our control on how
our food is been produced and as a result affecting our health and environment. In this fast
pace life where no has time to carry out gardening and grow desired fruits, vegetables and
other plants, this farmbot is a backyard robot that is developed for a fully automated
gardening for food production on personal and small-scale level. This robot can also be used
as accessibility technology, i.e. it can help individuals with disability in growing their own
business in horticulture and also to empower individuals who might not otherwise be able to
grow their own food.
12
E07. Automatic Power Factor Controller Using
Synchronous Condenser
Sayad Fahiz, [email protected]
Shah Rahul, [email protected]
Salmani Ramzan, [email protected]
Yakub Khan, [email protected]
Shaikh Afsar Ali, [email protected]
Syed Kaleem, [email protected]
Ankur Uadhyay [email protected]
Abstract— The power factor correction of electrical loads is a problem common to all
industrial companies. Earlier the power factor correction was done by adjusting the
capacitive bank manually .The automated power factor corrector (APFC) using capacitive
load bank is helpful in providing the power factor correction. Proposed automated project
involves measuring the power factor value from the load using microcontroller. The design
of this auto-adjustable power factor correction is to ensure the entire power system always
preserving unity power factor. For the low maintenance cost and long life, synchronous
condenser is used for correction method instead of capacitor bank. Harmonics are put down
by synchronous condenser which can‘t be possible by using capacitor bank. For controlling
the DC excitation of synchronous condenser as well as to improve the power factor, the
power factor and generation of required control signal from microcontroller are needed to
measure and monitor continuously which is also involved in this method.
13
Electronics and
Telecommunication
Track
Theme: VLSI Design, SP, RF Microwave
14
ET01. 3D Pose estimation using CNN and 3D
depth map probabilistic model.
Prof. Nayana Mahajan, Mayur Bharankar, Rishikesh Mudaliyar, Sourabh Kothari, RoshanKumar Poojari
Abstract - We have integrated the techniques of 3D pose estimation and action recognition
from 2D images. By using Convolutional Neural network and training the network by
providing a set of images from the pretrained data for detection of pose from the images.
This estimation of the pose will further be used for the human computer interface for other
projects. With this method we intend to reduce the challenges between 2D joint detection
and 3D pose/model reconstruction.
ET02. ―Creating Interactive Mirror‖
A smart mirror in the education sector
Srujan Jadhav [email protected] Anuja Jadhav [email protected]
Sonali Khaire [email protected] Swapnil Sonwane [email protected]
Abstract- We have been using mirrors since a very long time. When you see a mirror in front
of you, you see it in its capability of a mere decorative item or a basic requirement. In today‘s
world, smart mirrors are used in the automobile industry, at malls for aesthetic as well as
navigational purposes, medical and healthcare purpose. These applications are done world-
wide in almost every major city of the world. However, our application of the smart mirror
involves using the smart mirror in an educational backdrop using Internet of Things as well.
We aim at designing and implementing a solution to the problem of manual work of the
students and to avoid any mistake in keeping track of events, notices, deadlines which they
may miss. It also solves the problem of asking for directions in a big campus and simplifying
this by providing directions to the targeted location provided by the user via voice
command.
15
ET03. Automated Essay Generation using Tensor
flow
Nikhil Jawale [email protected]
Bijali Mulgir [email protected]
Vaishnavi Pednekar [email protected]
Umesh Kulkarni. [email protected]
Abstract-Essay Generation is the process of creating a condensed form of a text document
which maintains significant information and general meaning of source text. It is the process
of creating a shorter version of one text document. Automatic essay generation becomes an
important way of finding relevant information precisely in large text in a short time with little
efforts. In this, the extracted information is achieved as a summarized report and conferred
as a concise (shortly) summary to the user. [16][22]
ET04. Design of Folded Cascode Operational
Amplifier
Tejal Pawar [email protected],
Karishma Nimje [email protected]
Kajal Vidhate [email protected]
Abstract: This paper proposes to design the Folded Cascode CMOS Operational Amplifier
with Moderate Gain and Low Power Dissipation. The circuit is designed using 180nm
Technology and its performance parameters are measured using LTspice Simulation Tool.
The proposed Folded Cascode Op-Amp provides an Open Loop Gain of 54dB and a Slew
Rate of 87V/µs using 5V DC supply voltage
16
ET05. Index modulation for 5G networks
Sohan Juvale, [email protected]
Mansi Nikam, [email protected]
Sagar Virkar, [email protected]
Aditya Singh, [email protected]
Namita Agarwal [email protected]
Abstract- Multicarrier transmission has been proved quite beneficial for Wireless and
Wideband Communication community. 4G wireless systems has availed several features in
today‘s fast world in the field of wireless communications. But the researches still need to
seek solutions for increasing demand for higher data rates, better quality of service, fully
mobile systems and lower latency. Along with these services, problems relating to data
integrity and security are needed to be fulfilled. Recent developments on 5G and beyond
wireless networks can support can help in availing these services. The researchers are seeking
various solutions for increasing demand for higher data rates, better quality of service, fully
mobile systems and lower latency. A new emerging Modulation technique called Index
Modulation is proving to be quite futile for paving way toward 5G wireless networks. [1] IM
has three significant forms: Spatial Modulation, Channel Modulation and Orthogonal
Frequency Division Multiplexing with Index Modulation (OFDM-IM), which are seem to be
helpful for providing application scenarios as needed in future wireless networks. [3]
Orthogonal Frequency Division Multiplexing (OFDM). OFDM divides the wide band
frequency selective fading channel into narrow flat sub band channels. It mainly combats the
effect of multipath reception. Incorporating Index Modulation with OFDM leads to an Index
Modulation technique OFDM-IM which can be used in 5G and beyond networks. Orthogonal
Frequency Division Multiplexing with Index Modulation (OFDM-IM) allows on-off mechanism
of subcarriers based on the use. In this paper it is revealed that OFDM-IM with interleaved
grouping out performs classical OFDM for small modulation index and certain ranges of
signal-to-noise ratio. Finally the effects of modulation types on the performance of OFDM-
IM are studied.
ET06. An Empirical Review of UV Measurement
Methodologies Dr. Jitendra Toravi [1] Prutha Deshpande [2] Aishwarya Kura [3] Saurabh Joshi [4]
Abstract-Ozone layer depletion has led to an increase in UV exposure. UV radiation can be
divided into three spectral bands namely UVA, UVB & UVC. Literature [1] mentions the effect
of UVA and UVB resulting in skin tanning and burning respectively. Prolonged exposure to
UV Radiation can lead to different skin diseases and skin cancers [2]. This review aims to
study various UV measurement methods for precautionary purpose. [3] UV sensitivity varies
for different skin types. It is necessary to study and develop a method which evaluates how
individual‘s skin reacts to UV radiation.
17
ET07. Development of Advance Smart Electric
Vehicle using Hybrid Energy Storage System
Mr. Shobhit K Khandare, Mr. Wilson Alen, Mr. Akshay Bhopani, Mr. Kalpesh Kolhe, Ms. Sakshi Potdar
Abstract: Hybrid Electric Vehicles (HEVs) utilize electric sources power as well as mechanical
engine for propulsion. The performance of HEVs is directly proportional to the characteristics
of the Energy Storage System (ESS). The requirement that an ESS for HEVs should have are
high power performance, long life cycle, reliability and cost effective. So the Hybrid Energy
Storage System (HESS), which combines different kinds of storage devices has been
considered to fulfill both performance and cost requirements. In this paper a hybrid power
system is designed with solar energy, wind energy and plug-in charge whose energies are
stored in a rechargeable battery.
ET08. Analysis of Various Maximum Power Point
Tracking Techniques for Photovoltaic Cell
Ansari Rabi [email protected]
Shaikh Shafiqurrahman
Yadav Avdheshkumar [email protected]
Khan Saif [email protected]
Yakub Khan [email protected]
Syed Kaleem [email protected]
Abstract: This paper acknowledges about the maximum power point tracking for
photovoltaic system. Many papers have been registered and published up to the date, but
it‟s been mere to select a particular tracking technique for PVC. However, crisis arises
because each tracking has its own merits and demerits. It‟s very vital to give a proper and
detailed review of the technique. In previous decades power generation was done with the
help of conventional sources like coal, water and wind. This paper emphasizes on the various
maximum power point tracking techniques, controlling strategies, features and types of
different circuits used in PV system. The intention of this paper is to serve as a guideline for
the future MPPT users.
18
ET09. A Methodology for Secure Content
Transmission Using Video Cryptography
Dattakumar Malkhede
Shraddha Pandey [email protected]
Saurabhi Shingade [email protected]
Shivanjali Sangale [email protected]
Prof. Somnath R.Wateganokar [email protected]
Abstract—Picture and video are the two most essential types of transmitting data. With the
assistance of Image and video encryption techniques, a specific arrangement of pictures or
recordings can be transmitted without stressing over security. In the proposed paper an
extremely straightforward and constant calculation, utilizing pixel mapping, is utilized for the
encryption of the pictures which are the fundamental building squares of any video record.
In the proposed research paper the video is conveyed into the photograph outlines utilizing
a Matlab code and every one of the edges are consecutively put away. Each such edge
contains a mix of red, blue and green layers. On the off chance that we consider a pixel as an
8 bit an incentive than every pixel has the incentive in the scope of 0 to 255. In the proposed
work for each casing, two pixels arranged at the upper left and the base right corner are
changed in order to embed a message in each picture. After the fulfillment of the pixel
esteem changing every one of the pictures is set in a successive way and afterward, every
one of the edges is fell for an age of the first video document with encryption. This new
video is relatively like the first video record without any progressions unmistakable to the
stripped eye.
ET010. V Chef: A Hot Food Vending Machine Rashmitha Nair, Shreyas Gawali, Sanket Makwana, Rincy Joy, Prof. Shrikant Velankar, 6Prof. Poonam Shah
Abstract: Employees of any institute may not be able to avail canteen services due to limited
working hours of the canteen staff. In such situations, they have to resort to the packed food
dispensed by vending machines which may not be healthy. VChef is a vending machine
which makes and serves hygienic, healthy and hot dosas as and when required.
19
ET011. Advancements In Lithography Techniques:
Nanoimprint Lithography (NIL)
Akshada Tukaram Thube
Akshata Sunil Kawale
Dr. Sangeeta Joshi
Pranali Sampat Shelar
Pranjali Shivshankar Jadhav
Dr. Venu Gopal Achanta
Abstract The fabrication of an integrated circuit (IC) requires a variety of physical and
chemical processes performed on semiconductor (e.g., silicon) substrate. In general, the
various processes used to make an IC fall into three categories: Film deposition, Lithography
and semiconductor doping. According to the Moore's Law made by Intel co-founder Gordon
Moore in 1965, the number of transistors on a chip doubles every two years while the costs
are halved. In order to satisfy moore‘s law, the number of transistors in an integrated circuit
should be doubled every two years while the chip size needs to be the same. This is made
possible by the advancements in lithography process. The word lithography comes from
Greek word lithos, meaning stones, and graphia, meaning to write. In case of semiconductor
lithography our stones are silicon wafer and our patterns are written with light sensitive
polymer called a photoresist. Lithography is the process of transferring geometrical patterns
from a mask to the silicon wafer. The Importance of lithography can be stated in two ways.
First, due to the large number of lithography steps needed in IC fabrication, lithography
typically accounts for about 40 percent of the cost of manufacturing. Secondly, lithography
tends to be the technical limiter for further advancements in feature size reduction, transistor
speed and silicon area. The currently used lithography techniques are E-Beam Lithography
(EBL), Dip-Pen Lithography, Nano-shaving Electron Projection Lithography (EPL), Nano-
grafting, Lithographically Induced Self-Assembly (LISA), Atom Lithography, Micro and Nano-
Contact Printing, Ion Beam Lithography (IBL) and Nano-Imprint Lithography. In any
lithographic process the two main figure of merits are resolution and throughput and we
reviewed each of the existing technology with respect to these factor. This paper discusses
the advancement in lithography process: nanoimprint lithography.
20
ET012. Use Of Mel Frequency Cepstral
Coefficients For The Implementation Of A Speaker
Recognition System Rachel T. Pol, Dhanashri S. Sawant, Priyanka S. Sharma, Bhoomika V. Purohit, Pratibha R. Dumane
Abstract: The paper proposes a Speaker Recognition system which does the task of
validating a user‘s claimed identity using characteristics extracted from their voices. It is one
of the most useful and popular biometric recognition techniques in the world especially
related to areas in which security is a major concern. A direct analysis and synthesizing of the
complex voice signal is due to too much information contained in the signal. Therefore, the
digital signal processes, Feature Extraction and Feature Matching were introduced to
represent the voice signal. Mel- Frequency Cepstral Coefficients (MFCC) were extracted from
the speech signal which were used to represent each speaker and recognition was carried
out using weighted Euclidean distance. MATLABR2017b platform was used to implement
feature extraction process.
21
Computers and IT Track
Theme: Soft Computing and Deep Learning
22
C01. Survey Paper on URL Based Phishing
Detection
Abstract—Looking at the current situation faced by farmers, we have observed that there is
an increase in suicide rate over the years. The reasons behind this situation are weather
conditions, debt, family issues. Sometimes farmers are not aware about the crop which suits
their soil quality, soil nutrients and soil composition and rain fall value. The work proposes to
help farmers check the soil quality depending on the analysis done based on data mining
approach. Thus the system focuses on checking the soil quality and rainfall value to predict
the suitable crop for cultivation and that can maximize the crop yield by using machine
learning algorithm like decision tree algorithm and SMA.
C02. Crop Prediction System using Machine
Learning Manali P. Lokhande, Saili S. Chavan, Pragya R. Pandey, Prof. Sanjeev Dwivedi
Abstract: It is a Desktop Application for Teachers and Students for the Computer Department
which helps us again Phishing attackers that can damage, haram or destroy any computer
with just a single click.In this paper Exisiting we propose a heuristic-ased phishing detection
technique that uses uniform resource locator (URL) features. We identified features that
phishing site URL contain. The proposed method employs those features for phishing
detection. The Technique was evaluated with a dataset of 3,000 phising site URLs and 3,000
legitimate site URLs. The result demonstrates that the proposed technique can detect more
than 98.23% of phsing sites.
23
C03. Employee Performance Appraisal System
Using Hybrid algorithApurva Ashtekar [email protected]
Omkar Mayekar [email protected]
Sandeep J.Kamble [email protected]
Hasnain A Shaikh [email protected]
Abstract—Employee performance appraisal system it is effective technique that contributes
to the important aspects of the organization in its business domain. The traditional methods
of evaluation are rating scale method and qualitative appraisal criteria using quantifiable
attributes however it‘s in capable of providing accurate result. This can lead to biasness with
evaluation and the employees may get dissatisfied outcomes in which they feel not
justifiable enough. Therefore, an advanced system for employee evaluation system is
proposed which evaluates performance of the employee and provide accurate result using
the hybrid algorithm (Naïve Bayes, ID3 and Linear Regression). The aim of this paper is to
compare accuracy of ID3 and hybrid algorithm for given dataset.
C04. Automatic Question Paper Generator Using
Semantic Approach Aliasgar Samiwala [email protected] Shubham Ahinave [email protected]
Atish Tule [email protected] Sandeep Kamble [email protected]
Abstract— In Today‘s age, Education is the most important way of achieving success.
Examination prepares students in their quest for knowledge. So, having a proper Examination
Paper is quite necessary. The project is Automatic Question Paper Generator Using Semantic
Approach will enable college authorities to automatically generate question paper out of
existing question set in the database. This system will use the database to harness the
question paper where the database could consist number of questions. It will produce a
random question paper set using Semantic algorithm such that the question does not repeat
in the same paper. Once the question is entered into system then you can easily generate
question paper in one click. In this way this system will help to generate question paper
uniquely and in less time.
24
C05. Multilevel Authentication Based On Sclera
Vein Recognition Nikita Pai, [email protected]
Mansi Salunkhe
Tejas Bait, [email protected]
Prof. Geetha Narayanan [email protected]
Tushar Pardhi, pardh [email protected]
Abstract—This paper focuses on implementing sclera vein recognition as a measure of
biometric security followed by application of Global System for Mobile Technology. GSM
technology is used to send One time password (OTP) to the authorized person‘s mobile
phone via SMS. This system is being implemented using Raspberry Pi B + Model 3, hence
making it convenient and portable for real time application. Sclera being a unique
identification trait for every individual forms a compatible match with respect to biometric
implementation. Further, to improve the matching speed in real time application, we have
introduced Orb detector and Brute force matching method. The experimental result shows
that the productivity of our proposed two stage matching method is not only efficient but
also pragmatic.
C06. SPARK – An Android Application for Parking
Reservation System. Ramchandra E.Gawade [email protected]
Sunny Dhotre [email protected]
Akash A. Vaidya [email protected]
Amit K. Nerurkar [email protected]
Abstract— The parking problem in big cities, especially the metro-cities, has become one of
the key reasons of causing traffic in the city. Finding a parking spot is a very hectic and time-
consuming job. Even after finding a parking lot there is no guarantee that drivers will get an
empty parking space to park. To solve this issue, we have proposed a system that will allow
users to reserve a parking spot beforehand. This paper offers an android based reservation
system through Firebase where users will be able to view the various parking lots in user‘s
proximity or in proximity of the destination, the user is travelling to and see whether any
parking space is available or not, along with the pricing model for the parking slot.
25
C07. Automated Music Transcription Tejas Sodhi [email protected]
Sayed Abdur Rehman [email protected]
Prof. Devendra Pandit [email protected]
Yash Rajput [email protected]
Abstract— In this paper, we are proposing the idea of making an automated software that
will transcribe each note while the musician plays the instrument. The software will take the
sound of the instrument as an input and will process the frequency of each note and the way
it is played and transcribe the note visually. In this project, we will consider recordings
consisting of only monophonic notes i.e. only a single note will be played at a time. This
paper focuses on extracting audio, detecting pitch and displaying symbols. The project
makes extent use of audio signal processing and python libraries (pyAudio)..
C08. ―V-TRANSLATE‖- A Speech to Speech
Translation System Shashank Mahale [email protected]
Ronit Motiwale [email protected]
Sami Rumani [email protected]
Sachin Deshpande [email protected]
Abstract- V-Translate, A Speech to Speech Translation Platform, is a system which will take a
voice input of a certain uniform language, say English, and will translate that particular
language into another language, say Hindi, and provide a voice output of the same. The
input will be stored in the database in the form of audio files. It can be used in future by a
user by selecting a particular language out of the provided options. Moreover, our
application will recognise the input language on its own given it is consistent. This
application has 4 modules. First, to take the Voice input and identify the language. Second,
to convert this Audio input to Text format. Third, to translate the Text format of the input to
the Text format of the desired language. And Fourth, to convert the translated Text to an
Audio format and hence provide the output.
26
C09. Predictive Modelling of Life Insurance Data: A
Comparative Study of Machine Learning
Approaches Ramnath Sharma, Dr. Nilam Choudhary, Geetika Gautam, Rohan Singhal
Abstract: Predictive modelling is being utilized by companies and people everywhere
throughout the world to extract information from historical datasets [8]. These are the
mathematical calculations, which are utilized to "take in" the examples covered up on
specific datasets. The term supervised learning or classification is additionally utilized which
implies that you have past cases tagged or classified (yes or no). So this learning will be
utilized on the proposed dataset. In this study, there is going to be extraction of influential
features for classification. Some features are in numerical form and some in categorical. It‘s
easy to extract numerical data filled features but not for categorical value features. By the use
of a ―Chi Square Test‖ we will determine what categorical variables are impacting the result
[6]. Then 4 classification algorithms along with one regression algorithm will bere viewed to
find out which model predicts accurate results.
27
Theme: AI, Expert system, network security
28
C010. Recent Life Prolonging Techniques in
Wireless Sensor Network (WSN) Pramodkumar H. Kulkarni , Samruddhi Palande , Devika Dhoke , Akshay Netkar4
Abstract: Wireless sensor network is ever growing field in today‘s society. Smart homes with
wirelessly connected and controllable devices, continuous monitoring in environmental,
health care and industrial settings, and automated, self-adjusting systems in homes and
factories are all growing technologies that are built using wireless sensor networks (WSNs).
Based on network structure, routing protocols in WSNs can be divided into two categories
flat routing and clustering routing. As there are variety of advantages, clustering is becoming
an active branch of routing technology in WSNs. Also wireless sensor network is an emerging
technology that promises a wide range of potential applications in both civilian and military
areas. In many of these systems, energy consumption can be a major concern. Most devices
in the network rely on small batteries as their energy source. Because ofthis, any energy
usage optimization can lead to greatly increased lifetime.
C011. Mood Therapist: Emotion Based Music
Player Sathvika Selvandurai
Isha Shyam Repal
Prof. Prita K. Patil
Abstract— In this fast paced and stressful world, music plays a very important role in a lot of
people's lives. It could be for entertainment purposes and sometimes even for therapeutic
reasons. To satisfy basic user‘s requirements there are a lot of music players available with
basic features and a large library.One‘s tastes in music vary mostly according to their current
mood and have to manually select the songs to soothe them. Hence to be even more
personal and efficient understanding human emotions is desirable for better human-
machine interaction. Humans express emotions in different ways like facial expression,
gestures, speech and even by written text. In this paper we propose a system which uses
facial features and speech as inputs to detect the mood and give the corresponding playlist.
It also takes the user‘s feedback into consideration while doing so.
29
C012. Spam Detection using Sentiment Analysis Aishwarya Ashok Aagte [email protected]
Vrushali Wagh [email protected]
Prof. Sandeep Kamble [email protected]
Prince Vishwa karma [email protected]
Abstract— the rapid growth of internet has made us dependent on it for most of our
activities. One such growing area is e – commerce. Today, there are hundreds of e –
commerce sites and millions of products available on them. These sites allow its users to
write a review about the product or the service provided. These reviews can act as a great
source of information for the service provider for analyzing sales or decision making. It can
also be useful for potential users to decide whether to buy a product or not. However, these
reviews can be useful only if they are true. Rapid growth of e – commerce has also led to
great competition among companies/brands. Hence, some parties try to add fake reviews on
the competitor‘s site in order to raise the popularity or to criticize a product/brand. This
paper talks about the various techniques for detecting spam.
C013. Active Learning in Mathematics through
Think-Pair-Share Deepti Saxena,
Rachana Desai,
Abstract - The aim of this paper is to investigate the influence of think-pair-share (TPS) on
improving undergraduate engineering students‟ learning in the subject of applied
mathematics. From the data, paper shows that the students were active than the traditional
teaching techniques and showed more enthusiasm and participation during math lectures.
Also they find that TPS played a big role in developing interest in topic and also useful to
learn basic concepts of mathematics.
30
C014. Ear Biometric Techniques: A Comparative
Approach Siddharth Nandargi
TejalNanaware
Kavya Parag
ChandanSingh Rawat
Neha Pote
Abstract—Biometric technology has always been about innovation and new technology. It
was the world of passwords and identity proofs that ruled the world of security before
biometrics happened. Ear biometric is invariant from childhood to early old age as compared
to other biometrics. Ear biometric is a non-invasive type of recognition. This paper presents a
delineated comparison between two techniques which are used for recognition based on
various characteristics of the ears. Use of SURF features along with K NearestNeighbours
classification technique has been incorporated along with the training of Convolution Neural
Network model where the features extracted in the first few layers are classified in the last
layer. The experimental results show the relationship between computational time taken and
varying number of features for different scenarios with the aid of KNN classifier, also the
proposed approach of recognition by training CNN model gives an accuracy of 86% on AWE
database.
C015. Sybil Defender: A Defense Against Sybil
Attacks in Social Network Bharati Bargot [email protected] Prof.Umesh Kulkarni [email protected]
Abstract—Social media have gained increased usage quickly as online social network (OSN)
has connected to people‘s everyday lives as virtual gathering places that facilitates
communication. OSNs such as Facebook, Whatsapp, Twitter, Google+ and LinkedIn have
hundreds of millions of daily active users. Distributed systems are vulnerable to sybil attacks
in which opponent creates many fake identities called ‗Sybil Identities‘ and deals with
running of the system or violates the system with fake information. Because of fake
identities, it is vulnerable to sybil attack. The proposed system is a mechanism that influences
the network structures to defend against Sybil attacks in social network. The mechanism
works based on limited number of random walks on the social graph. The system will be
having algorithms such as sybil identification algorithm and sybil community detection
algorithm and also the combination of both algorithms.
31
C016. Security System and Automation using
Raspberry Pi Joseph Patole,
Chinmay More
Gaurav Kolapate
Professor Jayen Modi
Dr. Deepak Bhoir
Abstract: As an essential part of many organization security and safety precedence, video
surveillance has established its importance and benefits many times by providing immediate
supervising of possessions, people, environment and property.Our paper ‗Security System
and Automation using Raspberry pi‘ deals with embedded technologies using image
processing and speech processing for raspberry pi, microphone and camera module.In this
paper we present a security system and home automation technique. The camera module,
microphone and buzzer will be interface with Raspberry pi. The camera will be able to
identify the authorized person and will trigger the raspberry pi to open the door link. The
microphone is used for automation process like controlling the electronic and electrical
appliances in the room. The mic also works as an chat-box. This paper will serve as an
example of how with the help of image processing and speech processing we can have fast
and more secured system and make our life easier.
C017. Comparative study of fake news detection
Amol Belgaonkar [email protected]
Hiral Mahadik [email protected]
Darshan Tandel [email protected]
Mohini Chaudhari
Abstract— Internet and social media made the access to the news much easier and
convenient. Mass media has a huge influence on society, and as it often happens, there is
someone who wants to take advantage of this fact. It is cheap to provide news online and
much faster and easier to disseminate through social media, large volume of fake news.
Sometimes to achieve some goals mass media may manipulate the information in different
ways. This lead producing of the news articles that are not completely true or even false. This
paper shows simple approach for fake news detection using multiple algorithms of
classification. Using a dataset obtain from BuzzFeed and Kaggle, we apply TF-IDF (Term
frequency inverse document frequency) and N-gram detection to 20,000 above articles. We
test our dataset on multiple classification algorithms Support Vector Machine, Decision Tree,
Logistic Regression, Naive Bayes and Perceptron. We achieved 98.02 % accuracy on Kaggle
dataset using Logistic Regression.
32
C018. Two-Tier Energy Compensation Framework
Based On Smart Electric Charging Station Sandesh D. Patil
Akshay B. Phalphale
Sushant M. Nagare
Abstract: Traditional cars produce a lot of carbon dioxide (CO2) emissions that are ejected
into the atmosphere, causes pollution and greenhouse gases today, electric vehicles (EVs)
have received much attention as an alternative to traditional vehicles. The traditional vehicles
are powered by internal combustion engines. The electric vehicle is developed because of
the advancement in battery technology and motor efficiency. The secondary batteries are the
main energy sources of the EV. Thus, energy management is the key factor in EV or Hybrid
Electric Vehicles (HEV) design. Moreover, the charge capacity of the battery will influence the
endurance of electric vehicles. The main challenge in the HEV is the charging time required
for the batteries and insufficiency of charging stations (CS) and therefore charging within
existing distribution system infrastructure is problematic. Up to now the HEV s CS ‟ is in the
range of 100 km per charge due to the on-board energy which is needed to be optimized.
The second challenge for the EV‟s is their battery capacity which ranges from 8.6KWh to
15.2KWh. The consequent disadvantage is that the charging time for above mentioned size,
in a level 1 household charger (120V, 50Hz, 15-20A) is more than 15 hours. Due to these
constraints, the vendor (EV charging station supplier) needs a convenient distribution system
to cater to customer demand as well as maximize benefits. A special attention must be given
to the charging station. In future, the number of electric vehicles will be increasing to a
greater extent, these electric vehicles have to re-charge their battery in a place (i.e.) charging
station, so there will be a growing need of public accessing charging stations. This will have a
significant impact on the power systems like transformers, protection devices etc. With
respect to the varying load, it will have an impact on the consumers and vendors due to the
traffic at these station, waiting time for charging the vehicles will increase etc. Therefore both
the consumer and vendor will get assistance from a communication system which shares
useful data regarding the charging station, whether the charging slots are free, rate at which
charging is done, cost per unit etc.
33
C019. Agent Driven ETutoring System Jugal Yadav Kedar Sambhus Amit Dey Satvinder Singh
Abstract —ETutoring system is a process of teaching and learning for students of differing
abilities in the same class in a more personalised manner. The intent of ETutoring is to
maximize each student's growth and individual success by meeting each student where he or
she is, and assisting in the learning process. Many specialists in the domain of teaching have
recently identified ETutoring as a method of helping more students in diverse classroom
settings experience success. The entire curriculum is designed to increase flexibility in
teaching and decrease the barriers that frequently limit student access to materials and
learning in classrooms based on student's intellectual knowledge. The system gives students
multiple options for taking in information and making sense of ideas thus in turn helping to
develop student's mind map in order to help the tutors to be much more flexible in their
approach to teaching and adjust the curriculum and presentation of information to learners
rather than expecting students to modify themselves for the curriculum. The work flow of the
system includes the student taking up a particular course and understanding the concepts
with the help of the course materials provided by the system which he or she can view
multiple times and then finally taking up a test. Based on the responses given by the learner
his or her performance and accuracy will be evaluated.
C020. Neural Network Nikki Singh, Sachin Bojewar
Abstract - A conversation between humans and computers is regarded as one of the most
hard-core problems in computer science, which involves interdisciplinary techniques in
information retrieval, Machine Learning, natural language processing, and artificial
intelligence. It is an Interactive Entity which automatically generates conversations to
exchange information smoothly between people with little knowledge of the computer. The
challenges lie in how to respond so as to maintain a relevant and continuous conversation
with humans. This research applies a generative model-based method for conversation
generation. This research is for the development of conversational agent, which generates
conversations using recurrent neural network and its coupled memory unit.
34
C021. Estimating the Stereo Information in an
image with Disparity map using Minimum
Sum belief Propagation Chitra Suresh [email protected]
Kushal R. Tuckley [email protected]
Abstract—Stereoscopic images or stereo pair image consists of two images of the same
object/ terrain taken slightly horizontally separated points, known as left view and the right
view. Generally an image contains multiple objects and the objects situated at different
depth show different displacement in these two images. This ‘stereo information‘ is
presented using the concept of disparity. The disparity for stereoscopic images is the
horizontal distance between two matching pixel and the disparity-map is an image showing
disparity of each pixel. Disparity map is indicative of the stereo information, or the relative
depth at which different objects are located. In this paper we have presented an iterative
technique for computation of the disparity map using minimum sum message update
scheme of belief .The paper also presents the results of this technique and assesses the
efficacy of this technique.
35
Theme: Data mining, Ware house, Data
analysist, GIS, & Remote Sensing
36
C022. Survey on Mining Frequent Item Sets Over
Uncertain Databases Sudhir Lawand [email protected] Umesh Kulkarni [email protected]
Abstract— Uncertain data mining frequent itemsets over uncertain databases have attracted
much attention due to its wide applications. In uncertain databases, instead of counting fixed
occurrence of item sets, we use the support of an item set as random variable. The data
modified from sensor tracking system and data integration rigorousness is highly
ambiguous. One of the major issues is extracting frequent itemset from a large uncertain
database, interpreted under the Possible World Semantics. The mining process can be
modeled as a Poisson binomial distribution by observing that an uncertain database contains
an exponential number of possible worlds. Mining such manifold itemset from generous
ambiguous database illustrated under possible world semantics is a crucial dispute.
Approximated algorithm is established to ascertain manifold itemset from generous
ambiguous database exceedingly. A data trimming framework is used to improve mining
efficiency. The data trimming technique can achieve significant savings in both CPU cost and
I/O cost. We focus on the problem of mining frequent itemsets (MFI) over uncertain
databases. In order to solve the MFI problem over uncertain databases, we use an efficient
mining algorithm, named U-Apriori. Extensive experiments on both real and synthetic
datasets verify that this algorithm is effective and efficient.
C023. Virtual Chemistry Lab Mrudula Sadaye [email protected]
Shrutika Nikalje [email protected]
Aishwarya Deokar [email protected]
Prof.Snehal Andhare [email protected]
Abstract: Nowadays, computers and Internet has changed the way in which the information
is delivered. Technologies nowadays provide a valuable opportunity to practise new learning
techniques. In recent times Virtual Reality has proven to have a larger fundamental impact in
most of the domains. Teaches should also use Virtual Reality environment inorder to
facilitate learning. The aim of this paper is to develop an application that allows school
students to perform chemistry laboratory experiment in Virtual Reality. The students can
perform the experiments in Virtual Reality using a VR headset and a VR controller that allows
interaction in VR. On completion of the experiment the student will be provided with the
chemical equation associated with the chemical reaction. The students can also experiment
with different combination of the proportion of the reactants to know the result obtained.
This application is developed using Unity 3D that provides support for development of
Virtual Reality.
37
C024. Data Mining using K-means and Hierarchical
Clustering Algorithms: A Case Study
Approach Akshata Prabhu [email protected]
Abstract— Data mining is the processing of analyzing large datasets and database so has to
derive patterns and establish relation between them. There are various disciplines available
under Data mining and clustering is one of them. Clustering is the process of dividing data
into groups that have similar objects. Each similar group is a cluster. The distance between
the objects in the same group is minimum. It is possible to implement clustering algorithms
via number of methods. This paper shows study & comparison between different clustering
algorithms – Partition methods and hierarchical methods.
C025. Analysis of the Social Media Role in Smart
Learning Dhanamma Jagli, Prajwal Jumde, Suysah Kholapure, Roma Motwani [email protected],
[email protected], [email protected]
Abstract: The paper describes and evaluates the role of social media in Smart Learning.
―Smart learning is a broad term for education in today's digital age. It reflects how advanced
technologies are enabling learners to digest knowledge and skills more effectively‖ [9]. The
data in this module were collected from students in the survey is mainly held in student‘s
perspective, what they prefer to study now this day, is it really useful as study material for
effective and latest knowledge, all these basic questions are asked for the student and collect
the facts of social media or other commercial online platform of learning sites. Data was
saved in a database and algorithm was applied to it. The algorithm we used in this model
was the decision tree algorithm. The algorithm was applied to a database based on the data
decision tree was constructed and showed the results considering various possibilities.
38
C026. 3D pose estimation using CNN and 3D
depth map probabilistic model. Prof. Nayana Mahajan, Mayur Bharankar, Rishikesh Mudaliyar, Sourabh Kothari, RoshanKumar Poojari
Abstract: We have integrated the techniques of 3D pose estimation and action recognition
from 2D images. By using Convolutional Neural network and training the network by
providing a set of images from the pretrained data for detection of pose from the images.
This estimation of the pose will further be used for the human computer interface for other
projects. With this method we intend to reduce the challenges between 2D joint detection
and 3D pose/model reconstruction.
39
Theme: Cloud computing, computer networks,
IoT, Computer graphics, VR, CV, parallel & grid
computing, distributed systems
40
C027. School Automation System Ankita Patil ,[email protected]
Najuka Jadhav [email protected]
Supriya Sargar [email protected]
Sujay Jayachandran,[email protected]
Abstract— The main objective behind ‗School Automation system‘ is creating a central
system while traditional approach is to do a manual work in paper. So, for that it‘s very
difficult to manage all the record and also difficult to analyze all the record in any
departments. A manual work is to lengthy and its very time consuming for the entire
department. So, for that needs of central system are arising which gives the effective and
efficient result within less time. All departments can access the data with the system and also,
they can perform a desired task. With that all the data can be easily manipulated and can be
easily retrieved whenever anybody wants. With system in place, people in different
departments can view the same information about Student Information, making sure that
every single interaction with student is based on accurate information. It also means that
manual processes can be automated to free up people‘s time and make internal processes
more efficient. It‘s all about how to manage the student record in a master file as well as how
admin and faculty can manage the profile and keep information about the student. All the
information regarding student can be seen and edited if necessary, apart from that faculty
can keep record of student and they can manage information like student profile, exam and
other information.
C028. Face Recognition Home Security Using
Raspberry Pi &IOT Sahil Bhaldar [email protected]
Soheb Sayyad [email protected]
Kiran Chavan [email protected]
Gaurav Tawde [email protected]
Nikhil Jadhav [email protected]
Abstract— Home security is a growing field. To provide security to home, face recognition
system can be implemented using image processing methods. A standard USB camera
captures the image to identify the person. It is a system that identifies the visitor. If the door
recognizes the visitor, it will greet them by name, and door will be unlocked and opened. If
they are not identified the door will remain locked. The system will perform the detection
and recognition rapidly in real time. This project adds mainly four features: security, safety,
control and monitoring to home automation. Firstly the system needs a face authentication
for the user to be able to enter the home (locked/unlocked). When an unauthenticated
person tries to log in, the face will be captured and would be sent to owner via Gmail as an
attachment. The system also supports remote home control.
41
C029. IOT Based Energy Meter Android
Application Komal Shirke [email protected] Tanuja Adhikari [email protected]
Meghna Brid [email protected] Dr.Swati Sinha [email protected]
Abstract— This paper presents an android application for smart energy meter. This android
application will be useful for online monitoring of domestic electricity consumption or usage by
consumer. This system provides a special feature, where a user can monitor each device in the
power consumption. An IOT based energy meter reading system based on raspberry pi and data
collaborated with an android facility is proposed in this paper. This application is useful to obtain
meter readings whenever required, so that meter readers do not need to visit each customer for
the consumed energy data utilized and to distribute the bill slips to each customer at their
places. Also this function can be installed in handheld devices such as Mobile Phones and
provides ease of access. Microcontroller can be used to monitor and record the meter readings.
Utility can cut off and reconnect the customer connection by Android Application. Though, the
customer can check the status of electricity consumption as the usage pattern from anywhere
using his /her smartphone. In this system readings of an energy meter are being transferred by
making use of dynamic readings.
C030. Hierarchy Based Secured File Sharing Akshaya Ganesan Iyer [email protected]
Harshali Poojary [email protected]
Sneha Annappanavar [email protected]
Nupur Sonve [email protected]
Abstract—As technology is advancing exponentially, anyone is able to access confidential
data if it is not secured properly. To protect the data which the administrator does not want
to share or needs the data to be confidential we use AES encryption method where the user
requires a public key to decrypt the encrypted data. Hence enhancing the security of
Hierarchical based access control model. The admin would be able to upload/delete files
from the application, declare the visibility of the file and also change the password if needed.
There are two hierarchy in case of the visibility. One is partially visible, which the admin is
willing to share with multiple users. Each of such user will be given a partial access (i.e. only
selected files would be visible) provided they have the password for it. The admin will have a
separate password which will provide him with full access to files and enable him to perform
the functions mentioned above.
42
C031. Secured Re-Encryption in Un-Reliable Cloud
Using File Sharing Kalpesh Brid, [email protected]
Gopal Bhoi, [email protected]
Viraj Pawar , [email protected]
Prof Sanjeev Dwivedi [email protected]
Abstract – A key approach for secure cloud computing is for data owner to store encrypted
data in the cloud, and issue decryption key to authorized users. Then when a user is revoked,
the data will automatically be re-encrypted on the cloud to prevent the data from any
outside attack. In this the data is encrypted and decrypted in a flow. We have also done the
data file sharing and group sharing in this project so data can be shared to valid users at the
same time.
C032. Dynamic Report Generation Mr. Dipesh Hedamba [email protected]
Mr.Manoj Shelar [email protected]
Ms.Shruti Khatpe [email protected]
Ms.Bhanu Tekwani [email protected]
Abstract: This paper presents the approach of generating reports, resumes, certificate and
departmental forms. The generation of such reports will be based on the data which will be
provided by the user in the form of input. This reports will be auto formatted and justified.
This data will be stored in the database and retrieved at the time of report generation. The
generated report will be properly formatted i.e. the data will be properly justified, there will
be proper margins, images will be properly scaled and the report will be having a common
college header and footer. This tool can be used by various colleges such that they can also
use their own college logo.
C033. Dynamic Vehicle Parameters Assessment
using Web Application Rajeshwari R. Rajput [email protected]
Onkar K. Tarar [email protected]
Dr. Shreenivas Jog [email protected]
Abhishek Shrivastav [email protected]
Abstract—The objective of this paper is to describe a dynamic vehicle parameters
assessment system that remotely tracks the vehicle‘s location, speed, temperatures, humidity,
door lock status, seat belt status, fuel level of the vehicle and displays all of them on a web
application in real time with the help of an uninterrupted internet connection. It employs
sensors to find various parameters of the vehicle, GPS module to find the location of a
vehicle and a GPRS module that sends data to the data server of the web application. This
system integrates all the existing technologies that are used separately to monitor individual
parameters. The web application is specifically designed to view the vehicle‘s location on
open source map and other parameters on the dashboard. The web application handles the
user authentication by itself. This paper also discusses an additional proposition of offering a
range of control over vehicle parameters, which can be implemented by using relay based
control concept implemented in the same fashion.
43
C034. Personalized Smart Mirror with Voice
Controlled Home Automation Using Raspberry Pi 3 Anushree Dash, Shobna Bangera, Supriya Jadhav, Umesh Channapnor, Suchitra A Patil
Abstract: This paper presents a design of interactive voice controlled Smart Mirror.The mirror
is converted into personalized digital device equipped with peripherals such as Raspberry PI-
3, Google Assistant, and LED Monitor that is covered with two way mirror that provides the
most basic common amenities such as weather, latest news and local time. With the help of
speech processing techniques we can also control the equipments or devices of the home
such as light, fan, blub. The Smart Mirror interacts with help of verbal commands to people.
It responds to user‘s questions.
C035. Smart Visitor Detector Amogh Rane [email protected]
Shubhangi Gupta [email protected]
Karan Chotlani [email protected]
Kajal Raut [email protected]
Rasika Naik [email protected]
Abstract— Due to the fast-paced life nowadays, people are often unaware when a person
visits their home/workplace. There are very few systems which allow the users to know about
who visits in their absence and also lets them communicate with the visitor, which allows the
user to know when someone visits their home/workplace, and also provides them with
options like raising an alarm, communicating with the visitor and taking no action. In this
paper, a new low-cost system is described. The ultrasonic sensor is used to check for the
presence of a visitor. When it detects someone, the camera is instructed by the Raspberry Pi
to click a picture. Once it has been ascertained that the image contains an unknown person,
it is uploaded to Github, Firebase, or a local server. A specially designed app for this system
will collect this image along with date and time information from the server and the
notification will be sent to the user. After viewing the received image, the user can now select
whether to communicate with the visitor, raise an alarm and notify the police, or no action.
44
C036. Child Safety Using IOT Khushalsing Rajput [email protected]
Ankur Chavan [email protected]
Omkar Tanawade [email protected]
Swapnil Sonawane [email protected]
Abstract—This paper discusses the concept of child safety device with the help of IOT
(Internet of Things) technology. Recently, all over the world, crime against children is
increasing at higher rates and it is high time to offer safety support system for the children
going to schools. This paper focuses on implementing children tracking system for every
child attending school. Today, technology is growing rapidly and providing all essential and
effective solution for every requirement. The major advantage of this wearable over another
wearable is that it can be used in any cell phone and doesn‘t necessarily require an expensive
smartphone and not a very tech savvy individual to operate. The purpose of this device is to
help parents locate their children with ease. Now there are many wearables in the market
which help track the daily activity of children and also help find the child using Wi-Fi and
Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable
medium of communication between the parent and child. Therefore, the focus of this paper
is to have an SMS text enabled communication medium between the child‘s wearable and
the parent as the environment for GSM mobile communication is almost present everywhere.
The parent has to send a text with specific keywords such as ―START‖ and ―STOP‖. After
sending ―START‖ message the device will be activated, and it sends the information about
the child repeatedly after certain time of interval. Child information includes location of that
child, surrounding temperature, UV radiation index, etc. Also, after sending ―BUZZ‖ message
the alarm buzzer is activated and sounds an alarm which a bystander can easily spot. After
sending ―STOP‖ message the device will be deactivated. Finally, implementation results for
the proposed system are provided in this paper.
45
C037. Real Time Sensing with IoT and
Environmental Monitoring Using Raspberry Pi Nikita Tanaji Salunke [email protected] Prof. Varsha Bhosale [email protected]
Abstract - Nowadays, development in embedded system has proved to a reliable solution in
monitoring and controlling the environment monitoring system. The recent climatic changes
have increased the importance of environmental monitoring making it a topical and highly
active research area. The main objective of proposed system is to provide environmental
parameters at remote location using IoT. This paper introduces an approach to build a cost
effective standardized environment monitoring device using the Raspberry-Pi single board
computer. Raspberry pi is a small computer with most popular features like low-priced,
flexible, fully customizable and programmable tiny PC embedded Linux board and abilities of
its usage as a wireless sensor node. The system was designed using Python Programming
Language and can be controlled and accessed remotely through an IoT (Internet of Things)
platform. It takes data about the surrounding environment through sensors and send the
sensors status through R-Pi controller to the android application using inbuilt Wi-Fi and also
send to the server where it can be accessed anywhere and anytime through internet. We will
be using Raspberry-Pi as our main board and sensors will collect all the real time data from
environment and this data will be given to the controller and display it. User can access this
data anywhere through Internet.
C038. IoT Based Biometric School Bus Attendance
and Tracking System Karuna Kishor More [email protected] Varsha Bhosale [email protected]
Abstract- In the current period due to increase in number of road accident and kidnapping
cases, parents always worry about their children. This paper recommends a android based
solution which helps parents to track their children location in real time. To track the location
GPS of android application is used and to identity the child a biometric identification is used
which is in built in the system. Whenever a child boards a bus, the biometric identification
done in the bus and the system will identify the child and update log on server will send to
the parents consisting the current location and time. Parents can see the location of bus,
they will be notified when the children is getting into bus or getting down from bus.
46
C039. IOT for Monitoring Oil Well Production
and ensure Reliability Karan Sonawane, Sachin Bojewar
Abstract - Unconventional resources challenge the oil industry. Exploration and development
of oil and gas reservoirs require new sensors, analytics, and processes. Systems require better
connectivity, monitoring and control, and process automation. Previously deployed
technology limits the ability to quickly and reliably integrate and robustly operate field-to-
cloud systems, especially across large field installations. The Industrial Internet of Things
represents the biggest opportunity in recent decades for the advancement of industrial
technology. This study presents an application of a multivariate regression model to estimate
the future production performance of oil wells based on monthly-production time series
data. Several engineering techniques that require expertise and data that are difficult to
obtain are used currently to predict well performance. In this report, focus is on how
innovative networking standards and protocols are enabling revolutionary system-building
approaches that greatly ease field operations, how to predict, forecast the value of oil
production over time under different condition.
C040. Explore Mumbai Tour Guide: Application For
Android Mobile Akshada Shelke [email protected]
Namrata Mukane [email protected]
Gayatri Padwal [email protected]
Prakash Parmar [email protected]
Abstract— Tourist needs brief idea about destination and how to reach destination. They
have to pay a part of amount of travelling budget to local guides and agents to get
information. A tourist wants to visit maximum places of a city with his budget and limited
time. A ―Explore Mumbai Tour Guide App‖ that combines information resources and
location-based service category. Many projects have been undertaken on the use of context
aware mobile technologies for tourism that rely on the use of mobile phone devices. The
concept of mobile tourism, wherein user access tourist content through mobile application
has recently emerged. In accordance with mobile travel guides have to provide context
dependent, multimedia, rich touring services for tourist. Traditional travel guide application
contains basic modules such as, offline map and tourist journal, hotel bookings. In this
project we are implementing new features with traditional modules to make travelling
convenient in today‘s modern and fast world. Some features of this applications are available
offline so user will always have access to their information.
47
Management Track
Theme: Service, Marketing consumer behavior
business process & Re-Engg. Future Workplaces
and Challenges for HR
48
M01 SPARK – An Android Application for Parking
Reservation System.
Ramchandra Gawade [email protected]
Sunny Dhotre [email protected]
Akash Vaidya [email protected]
Amit Nerurkar [email protected]
Abstract— The parking problem in big cities, especially the metro-cities, has become one of
the key reasons of causing traffic in the city. Finding a parking spot is a very hectic and time-
consuming job. Even after finding a parking lot there is no guarantee that drivers will get an
empty parking space to park. To solve this issue, we have proposed a system that will allow
users to reserve a parking spot beforehand. This paper offers an android based reservation
system through Firebase where users will be able to view the various parking lots in user‘s
proximity or in proximity of the destination, the user is travelling to and see whether any
parking space is available or not, along with the pricing model for the parking slot.
M02 Personalized Smart Mirror with Voice
Controlled Home Automation Using Raspberry Pi 3
Anushree Dash, Shobna Bangera, Supriya Jadhav, Umesh Channapnor, Suchitra A Patil
Abstract: This paper presents a design of interactive voice controlled Smart Mirror.The mirror
is converted into personalized digital device equipped with peripherals such as Raspberry PI-
3, Google Assistant, and LED Monitor that is covered with two way mirror that provides the
most basic common amenities such as weather, latest news and local time. With the help of
speech processing techniques we can also control the equipments or devices of the home
such as light, fan, blub . The Smart Mirror interacts with help of verbal commands to people.
It responds to user‘s questions.
49
M03 Analysis of the Social Media Role in Smart
Learning Dhanamma Jagli [email protected],
Prajwal Jumde, [email protected]
Suysah Kholapure, [email protected]
Roma Motwani, [email protected]
Abstract: The paper describes and evaluates the role of social media in Smart Learning.
―Smart learning is a broad term for education in today's digital age. It reflects how advanced
technologies are enabling learners to digest knowledge and skills more effectively‖ [9]. The
data in this module were collected from students in the survey is mainly held in student‘s
perspective, what they prefer to study now this day, is it really useful as study material for
effective and latest knowledge, all these basic questions are asked for the student and collect
the facts of social media or other commercial online platform of learning sites. Data was
saved in a database and algorithm was applied to it. The algorithm we used in this model
was the decision tree algorithm. The algorithm was applied to a database based on the data
decision tree was constructed and showed the results considering various possibilities.
M04 Explore Mumbai Tour Guide: Application for
Android Mobile
Akshada Shelke [email protected]
Namrata Mukane [email protected]
Gayatri Padwal [email protected]
Prakash Parmar [email protected]
Abstract— Tourist needs brief idea about destination and how to reach destination. They
have to pay a part of amount of travelling budget to local guides and agents to get
information. A tourist wants to visit maximum places of a city with his budget and limited
time. A ―Explore Mumbai Tour Guide App‖ that combines information resources and
location-based service category. Many projects have been undertaken on the use of context
aware mobile technologies for tourism that rely on the use of mobile phone devices. The
concept of mobile tourism, wherein user access tourist content through mobile application
has recently emerged. In accordance with mobile travel guides have to provide context
dependent, multimedia, rich touring services for tourist. Traditional travel guide application
contains basic modules such as, offline map and tourist journal, hotel bookings. In this
project we are implementing new features with traditional modules to make travelling
convenient in today‘s modern and fast world. Some features of this applications are available
offline so user will always have access to their information.
50
M05 Assessment of factors causing delay in
Construction Projects Khot Zain . M , Magar Rajendra , Parkar Fauwaz
Abstract - Construction industry is the backbone for development of any country across the
globe. In all the countries, the most common problem in construction industry is deviation
from a planned time schedule. The most common problem at construction sites is delays, i.e.
time overrun to complete the project. There are various factors at construction sites which
prevent systematic flow of work which results in time based anomalies. Delays may vary in
severity and their effects from areas to areas. However, one can find out ways to minimize
such delay by identifying the causes and effects of delays. This paper focuses on finding out
the most important factors causing delays in construction project by conducting a
questionnaire survey with the various contractors, clients and consultants. By random
sampling technique the questionnaire survey concluded that there are 38 causes of delay
and 6 effects of delays. Out of which the most commonly found top 10 causes of delays have
been shortlisted with respect to Mumbai construction industry and to avoid delays in
construction projects certain remedies are given. The study focuses on pergola activity also,
using MSP i.e. Microsoft Project, delays of sub activity is measured. The assigning of
resources educate about the project in terms of cost. Furthermore the rank of each delay
factor is assigned through both the questionnaire survey and a particular site experience
through MSP. The spearman rank co relation has been used to compare the parameters to
find out whether the delay factors are dependent or independent of each other.
51
Theme: Education Pedagogy, social Impact,
financial forecasting
52
M06 Building An Expert System Based On Data
Mining Sagar Bhushan Gawde
Abstract— This work presents a novel framework for predicting stock trends and making
financial trading decisions based on a combination of Data and Text Mining techniques. The
prediction models of the proposed system are based on the textual content of time-stamped
web documents in addition to traditional numerical time series data, which is also available
from the Web. The financial trading system based on model predictions uses three different
trading strategies. In this work, our system is simulated and evaluated on real-world series of
news stories and stocks data using Decision Tree Induction Algorithm. The main
performance measures are the predictive accuracy of the induced models and, more
importantly, the profitability of each trading strategy using these predictions.
M07 Current Features Regional Development of
Organizations Of The Sphere Of Engineering In
Ukraine Morhachov I.V [email protected]
Abstract. Features of modern regional development of organizations of the sphere of
engineering in Ukraine are considered. The hypothesis that according to the dynamics of the
main indicators of activity of regional organizations of the sphere of engineering can be
determined or refuted the presence of a trend for deindustrialization both of the national
economy and individual regions, to determine the corresponding changes in the
intensification of regional scientific and technological and innovation activity was justified.
The analysis of the relevant indicators allowed to reveal a trend towards deindustrialization
of the economy not only in relation to depressed regions, but also relatively progressives.
There was a confirmation of the continuation of the laws of the concentration of factors of
activity of organizations in the field of engineering in Kiev and other industrialized regions.
The stochastic dynamics of the main structural indicators of the organizations of the sphere
of engineering is revealed, which determines the differential influence of regional factors on
regional organizations of the sphere of engineering, which increases the role of the regional
bodies of state power in the activity of these organizations.
53
M08 Detecting Stress Based on Social Interactions
in Social Networks Krushna Jadhav [email protected] Pankaj Vanwari [email protected]
Abstract—Psychological stress is ominous person‘s health. It is non-trivial to detect stress
timely for proactive care. With the attractive of social media, person are used to sharing their
daily task and communicating with friends on social media platforms, making it feasible to
leverage online social network data for stress detection. In this paper, we find that users
stress condition is closely related to that of his/her friends in social media, and we employ a
large-scale dataset from real-world social platforms to systematically examine the
connection of users‘ stress condition‘s and social interactions. We first define a set of stress-
related textual analysis, visual, and social attributes from various aspects, and then propose a
novel hybrid model – a factor graph model combined with Convolutional Neural Network to
leverage tweet content and social interaction information for stress detection. Experimental
results show that the proposed model can better the detection performance by 6-9% in F1-
score. By further analysing the social interaction data, we also discover several intriguing
phenomena, i.e. the number of social structures of sparse connections (i.e. with no delta
connections) of stressed users is around 14% more than that of non-stressed users,
indicating that the social structure of stressed users‘ friends tend to be less connected and
less complicated than that of non-stressed us.
M09 Blockchain Technology Used In Taxation Akash Nemade, [email protected].
Shashank Kadam, [email protected].
Ria Choudhary, [email protected].
Saurabh Fegade, [email protected].
Ankita Raut, [email protected].
Abstract—Assuring the gathering of incomes is essential for the working of governments, as
it is their essential, if not their sole wellspring of pay. Various proposed use instances of
blockchain in tax collection can possibly trigger an upheaval in the manner in which
governments gather and spend their monies. As much as individuals may abhor paying
them, charges are important to empower the customary working of countries and
economies. Despite the fact that administrations don‘t work revenue driven like
organizations, they do expect to subsidize to take care of expenses for the administrations
they give to general society. Be that as it may, most governments neglect to recoup a
noteworthy part of the assessments owed to them and work under money related obligation
and shortfall, which, in the long haul may prompt financial stagnation and a decrease in the
nature of open administrations. In this way, recuperating charges is the best money related
need for governments. To recoup these expenses, some of the time, government
organizations end up going to broad lengths, prompting extra costs, making the whole
procedure loaded with wasteful aspects. Utilizing Blockchain in tax collection can make the
procedure progressively productive and powerful, and guarantee that administration offices
get paid what they‘re expected.
54
M10 Financial Planner and Asset Allocation
Using Machine Learning Amit Kawad [email protected] Moksh Khajanchi [email protected]
Ambarish Patankar [email protected] Prachi Patil [email protected]
Abstract—While the rise in the Mutual Fund industry has been meteoric, the analytical tools
necessary to make intelligent investment decisions have been a laggard. It is generally the
small cap stocks which provide the alpha (additional return generated beyond the returns
generated by investing in stock indices such as the Nifty or the Sensex). As the small cap
sector is generally ignored by the analyst community they tend to be the most inefficiently
priced stocks. Also, since large institutional investors don't invest in these companies they
tend to be relatively illiquid. By developing right kind of statistical tools, alpha can be
generated by intelligently switching from large cap to small cap fund after serious episodes
of volatility or market turmoil had taken place. The statistical tools will aid in gauging the
level of market turmoil and will provide us appropriate switching signals. The starting point
of this kind of alpha generation is a balanced portfolio between all the asset classes with
extremely low correlated asset stream returns. This balanced portfolio is optimized by using
the modern portfolio theory.
55
Bio Medical Track
Theme: Biomedical Instrumentation, Bio –
Sensors & Healthcare, Biomedical Signal
Processing
56
BM01. Walk Assist Ritika Patil, Ankita Kale, Priya Dutta, Prafful Gajula
Prof Harish Ojha [email protected]
Abstract— Lower leg activity plays a vital role in daily life of human being. Due to uncertain
accidents that are occurring in human life results in immobilization. For such cases, external
or artificial supports are developed and this study is known as orthosis, which is a device
added to the body to stabilize or immobilize a body part, prevent deformity or assist with
function. Robotic devices have the potential to make therapy more affordable and thus more
available for more patients and for more time. It is a training device that efficiently supports
walking which is based on the inverted pendulum model, the theory for bipedal walking. In
consideration of the motion pattern of the swinging phase, the Flexion/Extension rotations at
the hip, knee have largest ranges, which are all on the sagittal plane. One of the main thing
to make leg move forward, backward or to bend is the measurement of the angle at the hip,
knee, and ankle. These angle measurements have been calculated using different sensors.
Some of the sensors that are used to measure the angle are gyroscopes, accelerometers,
electronic goniometer. Analysis of torque required at the joints, various actuators, drive
technologies and power analysis is reviewed. People convert movement of the pelvis that
uses the legs as pivot points into kinetic energy and potential energy in order to achieve
smooth and efficient bipedal walking.
BM02. Lung Cancer Detection and Classification
Using SVM Vedika Hande [email protected]
Prerana Prajapati [email protected]
Aarti Ingale [email protected]
Sanjeev Dwivedi [email protected]
Abstract—Image processing techniques are widely used in several medical problems for
image enhancement in the detection phase to support the early medical treatment. In this
research, we aim to improve quality and accuracy of early detection of lung cancer through a
combination of image processing techniques and machine learning. The Cancer Imaging
Archive (TCIA) dataset has been used for training and testing purpose where DICOM is the
primary format used for image storage .Classification is done using SVM (Support Vector
Machine) classifier which identifies whether the CT image is cancerous and non-cancerous.
Before training the classifier, we are performing image processing techniques on CT images
such as converting the image into HU (Hounsfield Unit) scale to get the binary image of
lungs followed by nodule segmentation where nodules are detected within the lungs.
Further, features are extracted from CT images using GLCM (Gray Level Co-Occurrence
Matrix) .The enhanced image is then given to the classifier to provide accurate results. As an
enhancement, we have also performed Early Stage Detection for reducing the growing
cancer burden. MATLAB image processing toolbox based has been used for the
implementation on the CT scan images.
57
BM03. Assisting technologies for Alzheimer‘s
patients and caretakers Dr.Jitendra Toravi, Amarpreet Singh Lamba, Avanti Vartak, Vaishnavi Yadav, Madhura Mengade
Abstract— In this paper, we propose an idea to assist the Alzheimer's patient to conduct
their day to day activities easily. Alzheimer's is a type of dementia that causes problems with
memory, thinking and behavior. [1] New technologies can help ease anxiety, establish
routine, and improve the quality of life for everyone involved. This kind of technology is
called ―assistive technology‖ and can promote independence and autonomy, manage
potential safety risks around the home and reduce stress.
BM04. Interactive Bus System For Visually Impaired Samiksha Thikekar,Mayuri Moorthy, Chinmay Warang, Pavan Borole, Rasika Naik
Abstract—There are millions of people in this world with visual impairment. If they need to
use public transportation, they have no other choice but to depend on the goodwill of the
people around them. This life quality of visually impaired persons (VIPs) can be improved
using technologies such as Zigbee technology. The Interactive Bus System using Zigbee
Technology is an aid for visually impaired people which can help those without good vision
utilize public transport. The simple model would involve a user module with a Zigbee
transceiver which will communicate with the bus module to notify the bus conductor of a
visually impaired person waiting at a particular bus stop. This system will also notify the user
about whether the bus has arrived or will arrive in short time. The system uses only
microcontrollers, transceivers and other electronic circuits. Thus, Visually Impaired Persons
will have the opportunity to get information about bus arrival and departure time from this
project as well as assist the bus operator to know the presence of a visually impaired person
on the road.
BM05. Proposed Model for Predictive Diagnosis
of Chest Diseases Akshay Solunke [email protected]
Pranjal Naik [email protected]
Advait Srinivas [email protected]
Umesh Kulkarni [email protected]
Abstract— the proposed system is a predictive analysis tool for medical diagnosis using
machine learning for chest conditions like Asthma, COPD, and Tuberculosis. All participants
will have a questionnaire (self-administered / physician-administered). Positive and negative
predictive values calculated for each question and the total scores of patients compared with
those of control. This tool will enable doctors with data to make better and early
differentiated diagnosis minimizing the errors and timely treatment.
58
BM06. Diagnosis of Alzheimer‘s Disease By Means
Of Synchrony & Wavelet Features & Machine
Learning Algorithms Abstract: Previous studies have highlighted that EEG signals of Alzheimer‘s disease patients
tends to be less complex and have low synchronization as compared to that of healthy and
normal subjects. These changes in EEG signals of Alzheimer‘s disease patients start at early
stage but are not clinically observed and detected. To detect these abnormalities, three
synchrony measures and wavelet based features have been computed and studied on
experimental database. After computing these synchrony measures and wavelet features, it is
observed that Phase Synchrony and Coherence based features are able to distinguish
between Alzheimer‘s disease patients and healthy subjects. Combining these features,
healthy subjects and Alzheimer‘s disease patients are classified by use of different machine
learning algorithms such as Support Vector Machine, Deep Learning and Naive Bayes
Classifier. Combining, these synchrony features and other such relevant features can yield a
reliable system for diagnosing the Alzheimer‘s disease.
BM07. Medical Image retrieval by contour based
shape signature for CT Images Dakshata Patil
Mrs. Shoba Krishnan
Dr. Saylee Gharge
Abstract— In Content Based Image Retrieval (CBIR) one of the significant feature for
recognition of similar images is shape. This paper includes comparative study of feature
extraction based on contour shape signatures with different similarity metrics. CT database
have been used. Shape signatures used are Radial Distance (RD), Angular Radial
Coordinate(ARC),Polar Coordinate(PC),Smallest Rectangle Distance (SRD).These shape
signatures have been compared with each other using distance metrics such as Euclidean,
Chebyshev,Cityblock,Canberra and Seuclidean distance. Top 10 similar images have been
retrieved and results in terms of Average Precision for Recall less than and greater than 50%
is obtained. Results shows that RD gives good results in terms of Precision. PC and SRD gives
good results followed by RD