65

vit.edu.invit.edu.in/wp-content/uploads/2019/04/[email protected] Ashutosh Dwivedi [email protected] Swapnil Sonawane [email protected]

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 2: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 3: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 4: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 5: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 6: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

CONFERENCE COMMITTEE

Conference Chair

Dr. Swati Sinha

Conference Co-Chair Program

Dr. Dhananjay Patel

Advisory Members (Internal)

Dr. Saurabh Mehta

Dr. Sangeeta Joshi

Dr. Anjali Deshpande

Organizing Secretary

Vipul Dalal

Publication Chair

Geeta Narayanan

Anuradha Bhatia

Umesh Kulkarni

Yash Shah

Finance & Logistic Chair

Shrikant Velankar

Sandeep Kamble

Publicity & Public Relations Committee

Girish Gidaye (Chair)

Sunil Kavatkar

Vivek Patker

Prita Patil

Amit Maurya

Abhishek Barve

Sandeep Kamble

Manoj Suryavanshi

Dhananjay Patel

Bhanu Tekwani

Poonam Shah

Registration Committee

Vidya Chitre (Chair)

Shradda Panbude

Anuradha Bhatia

Akshay Loke

Local arrangement & Hospitality

Manoj Suryavanshi

Snehal Andhare

Sneha A.

Web Masters

Deepali Vora

Ajay Dhruv

Shruti Agarwal

Anchoring

Manasi Pathak

Photography

Deepali Shrikhande

Bhupesh Hate

Review Heads

Deepali Vora

Geetha Narayanan

Invited Session

Chairs

Dr. Murugan

Dr. Dhananjay Patel

Food arrangements

Poonam Shah

Page 7: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

List of Reviewers

Abhishek Anurag Dr. Saurabh Mehta

Dr. Poonam Bathla Charusheela Nehete

Dr. Kiran Bhandari Seema Nehete

Asha Bharambe Dr. Amit Oak

Prof. Anuradha Bhatia Pranita Padhye

Dr. Gresha Bhatia Prof. Dilip Motwani

Deepak Bhoir Dr Gajanan Nagare

Dr.Deepak Bhoir Prof. Geetha Narayanan

Dr.Girish Bhole Shachi Natu

Dr.Mita Bhowmick Shraddha Panbude

Dr.Sachin Bojewar Dr. Dhananjay Patel

Dr.Arun Chavan Varsha Patil

Hariram Chavan Dr. T. Prasad

Prof. Vidya Chitre Dr. Rekha Ramesh

Dr. Shalu Chopra Dr. Y.S. Rao

Dr. Neelam Choudhary Sandeep Raskar

Dr. Neelam Choudhary Dr Arpit Rawankar

Prof. Vipul Dalal Asha Rawat

Smita Dange Bindu S

Dr. Anand Darji Rashmi Salvi

Dr. Narendra Kumar Dasare Dr. Shailesh Sathe

Dr. Anjali Deshpande Anagha Shastri

Prof. Sachin Deshpande Kavita Shirsat

Prof. Girish Gidaye Dr. Swati Sinha

Dr.Murugan. Gopal Dr. Subha Subramaniam

Jayashree Hajgude Dr. Sanjay Singh Thakur

Kavita Jain Neeta Thakur

Dr Sangeeta Joshi Dr.Jitendra Toravi

Nilakshi Joshi Kushal Tuckley

Ramesh Karandikar Harshula Tulapurkar

Uday Kashid Srija Unnikrishnan

Dr.Faruk Kazi Prof. Pankaj Vanwari

Page 8: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

3

Prachi Kshirsagar Prof. Shrikant Velankar

Umesh Kulkarni Dr. Alok Verma

Dr. Sudhakar Mande Varsha Wangikar

Dr.Sheetal Mapare Rama Rao

Deepali Vora

Page 9: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

4

Table of Contents

Electronics Track ....................................................................................................................................... 8

Theme: Robotics, Automation and Control ................................................................................... 8

E01. Automatic Hand Braking System .......................................................................................... 9

E02. Geofencing for Disaster Management System ................................................................... 9

E03. Navigation and Depth Control in Autonomous Underwater Vehicle ............................ 10

E04. Semi-Autonomous Pneumatic Pick-Place & Autonomous Electrically Actuated

Quadruped Robots ............................................................................................................... 10

E05. Navigation Using Beacon For Building .............................................................................. 11

E06. Farmbot- A CNC Based Backyard Farming System. ......................................................... 11

E07. Automatic Power Factor Controller Using Synchronous Condenser ............................. 12

Electronics and Telecommunication Track ....................................................................................... 13

Theme: VLSI Design, SP, RF Microwave ........................................................................................ 13

ET01. 3D Pose estimation using CNN and 3D depth map probabilistic model. ..................... 14

ET02. ―Creating Interactive Mirror‖ ............................................................................................... 14

ET03. Automated Essay Generation using Tensor flow .............................................................. 15

ET04. Design of Folded Cascode Operational Amplifier ............................................................ 15

ET05. Index modulation for 5G networks ..................................................................................... 16

ET06. An Empirical Review of UV Measurement Methodologies.............................................. 16

ET07. Development of Advance Smart Electric Vehicle using Hybrid Energy Storage

System .................................................................................................................................... 17

ET08. Analysis of Various Maximum Power Point Tracking Techniques for Photovoltaic

Cell .......................................................................................................................................... 17

ET09. A Methodology for Secure Content Transmission Using Video Cryptography ............ 18

ET010. V Chef: A Hot Food Vending Machine ............................................................................... 18

ET011. Advancements In Lithography Techniques: Nanoimprint Lithography (NIL) ................ 19

ET012. Use Of Mel Frequency Cepstral Coefficients For The Implementation Of A Speaker

Recognition System .............................................................................................................. 20

Computers and IT Track ........................................................................................................................ 21

Theme: Soft Computing and Deep Learning ............................................................................... 21

C01. Survey Paper on URL Based Phishing Detection............................................................... 22

C02. Crop Prediction System using Machine Learning ............................................................. 22

Page 10: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

5

C03. Employee Performance Appraisal System Using Hybrid algorith .................................. 23

C04. Automatic Question Paper Generator Using Semantic Approach ................................. 23

C05. Multilevel Authentication Based On Sclera Vein Recognition ........................................ 24

C06. SPARK – An Android Application for Parking Reservation System. ............................... 24

C07. Automated Music Transcription .......................................................................................... 25

C08. ―V-TRANSLATE‖- A Speech to Speech Translation System ............................................ 25

C09. Predictive Modelling of Life Insurance Data: A Comparative Study of Machine

Learning Approaches ............................................................................................................ 26

Theme: AI, Expert system, network security ................................................................................ 27

C010. Recent Life Prolonging Techniques in Wireless Sensor Network (WSN) ....................... 28

C011. Mood Therapist: Emotion Based Music Player .................................................................. 28

C012. Spam Detection using Sentiment Analysis ........................................................................ 29

C013. Active Learning in Mathematics through Think-Pair-Share ............................................ 29

C014. Ear Biometric Techniques: A Comparative Approach ....................................................... 30

C015. Sybil Defender: A Defense Against Sybil Attacks in Social Network .............................. 30

C016. Security System and Automation using Raspberry Pi ...................................................... 31

C017. Comparative study of fake news detection ....................................................................... 31

C018. Two-Tier Energy Compensation Framework Based On Smart Electric Charging

Station .................................................................................................................................... 32

C019. Agent Driven ETutoring System .......................................................................................... 33

C020. Neural Network ..................................................................................................................... 33

C021. Estimating the Stereo Information in an image with Disparity map using

Minimum Sum belief Propagation ...................................................................................... 34

Theme: Data mining, Ware house, Data analysist, GIS, & Remote Sensing......................... 35

C022. Survey on Mining Frequent Item Sets Over Uncertain Databases ................................. 36

C023. Virtual Chemistry Lab ........................................................................................................... 36

C024. Data Mining using K-means and Hierarchical Clustering Algorithms: A Case Study

Approach ................................................................................................................................ 37

C025. Analysis of the Social Media Role in Smart Learning ....................................................... 37

C026. 3D pose estimation using CNN and 3D depth map probabilistic model. ..................... 38

Theme: Cloud computing, computer networks, IoT, Computer graphics, VR, CV,

parallel & grid computing, distributed systems ......................................................................... 39

Page 11: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

6

C027. School Automation System ................................................................................................. 40

C028. Face Recognition Home Security Using Raspberry Pi &IOT ........................................... 40

C029. IOT Based Energy Meter Android Application .................................................................. 41

C030. Hierarchy Based Secured File Sharing ................................................................................ 41

C031. Secured Re-Encryption in Un-Reliable Cloud Using File Sharing ................................... 42

C032. Dynamic Report Generation ................................................................................................ 42

C033. Dynamic Vehicle Parameters Assessment using Web Application................................. 42

C034. Personalized Smart Mirror with Voice Controlled Home Automation Using

Raspberry Pi 3 ........................................................................................................................ 43

C035. Smart Visitor Detector .......................................................................................................... 43

C036. Child Safety Using IOT .......................................................................................................... 44

C037. Real Time Sensing with IoT and Environmental Monitoring Using Raspberry Pi ......... 45

C038. IoT Based Biometric School Bus Attendance and Tracking System ............................... 45

C039. IOT for Monitoring Oil Well Production and ensure Reliability ...................................... 46

C040. Explore Mumbai Tour Guide: Application For Android Mobile ...................................... 46

Management Track ................................................................................................................................ 47

Theme: Service, Marketing consumer behavior business process & Re-Engg. Future

Workplaces and Challenges for HR ................................................................................................ 47

M01 SPARK – An Android Application for Parking Reservation System. ............................... 48

M02 Personalized Smart Mirror with Voice Controlled Home Automation Using

Raspberry Pi 3 ........................................................................................................................ 48

M03 Analysis of the Social Media Role in Smart Learning ....................................................... 49

M04 Explore Mumbai Tour Guide: Application for Android Mobile ....................................... 49

M05 Assessment of factors causing delay in Construction Projects ....................................... 50

Theme: Education Pedagogy, social Impact, financial forecasting ........................................ 51

M06 Building An Expert System Based On Data Mining .......................................................... 52

M07 Current Features Regional Development of Organizations Of The Sphere Of

Engineering In Ukraine ......................................................................................................... 52

M08 Detecting Stress Based on Social Interactions in Social Networks ................................. 53

M09 Blockchain Technology Used In Taxation .......................................................................... 53

M10 Financial Planner and Asset Allocation Using Machine Learning ................................... 54

Bio Medical Track ................................................................................................................................... 55

Page 12: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

7

Theme: Biomedical Instrumentation, Bio – Sensors & Healthcare, Biomedical Signal

Processing ............................................................................................................................................ 55

BM01. Walk Assist ............................................................................................................................. 56

BM02. Lung Cancer Detection and Classification Using SVM ..................................................... 56

BM03. Assisting technologies for Alzheimer‘s patients and caretakers ..................................... 57

BM04. Interactive Bus System For Visually Impaired .................................................................... 57

BM05. Proposed Model for Predictive Diagnosis of Chest Diseases ......................................... 57

BM06. Diagnosis of Alzheimer‘s Disease By Means Of Synchrony & Wavelet Features &

Machine Learning Algorithms ............................................................................................. 58

BM07. Medical Image retrieval by contour based shape signature for CT Images.................. 58

Page 13: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

8

Electronics Track

Theme: Robotics, Automation and Control

Page 14: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

9

E01. Automatic Hand Braking System

Sayali Lad [email protected]

Drishti Kwatra [email protected]

Sanika Hadatgune [email protected]

Mahima Srsivastava [email protected]

Abstract—The increasing cases of accidents on road due to incompetency of drivers have led

to inclusion of collision avoidance systems, automatic hand braking being one of them. This

system assists the driver to calculate the distance between itself and the obstacle and apply

brake when needed. An ultrasonic emitter is kept on the front part of the car which produces

and emits ultrasonic waves. Ultrasonic receiver which is also fixed on the front portion of the

car receives an ultrasonic signal from obstacles positioned within the predetermined distance

in front of the car. The reflected wave gives the information about the distance between the

vehicle and the obstacle. Then 8051 is used to control servo motor based on information

obtained from reflected wave and gradually slows down the speed which would ultimately

result in termination of speed using the handbrake, if the driver himself doesnt take

necessary action required at that time. Our System is a collision avoidance system but in

worst case if collision takes place then we have installed a GSM based system which will

notify the relatives on the front end about the incident.

E02. Geofencing for Disaster Management

System

Anish Deshpande

[email protected]

Abhishek Shingte

[email protected]

Ashutosh Dwivedi

[email protected]

Swapnil Sonawane

[email protected]

Abstract- We are designing an android application which is useful for saving many human

lives. Help me app is working on an android operating system. Number of people squander

their precious life in natural calamities such as accidents, floods etc. However, the

implementation of new solutions using these technologies requires concepts based on

information and resources sharing and inter-services communication. Sharing the

information between services allows acquiring more knowledge about the current events on

the Disaster area that helps participants making appropriate decisions. This paper also

discusses about what features could be added in the app in future to make it more effective

in information management in a post disaster scenario. We create Geo-fences that will help

to alert about the restricted area which is made by the user manually in the app. Database

likewise complete data of the user and the coordinates of the Geo-fences is store on server.

Later we will access those data from server to our mobile by using this application.

Page 15: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

10

E03. Navigation and Depth Control in

Autonomous Underwater Vehicle Siddhesh Soyane, Dushyant Pal, Chetan Shelar and Shripal Jain

Abstract-In this paper, controls, and navigation systems of the latest AUV technologies have

been discussed. Different techniques have been developed so far to achieve desired vehicle

stability and tracking accuracy by processing voluminous image data picked up by expensive

sensors. Hence, brief accounts of underwater image processing and data fusion techniques,

and complex computational algorithms for navigation are also highlighted in this paper. The

main proposed method in this review paper focuses on the vehicle‘s depth and stability

control by using the discrete control approach.

E04. Semi-Autonomous Pneumatic Pick-Place &

Autonomous Electrically Actuated Quadruped Robots Sanjana Patil [email protected]

Rahul Panchal [email protected]

Atharva Pande [email protected]

Vedant Shrungarpawar [email protected]

Mrinali Parida [email protected]

Shreya Nair [email protected]

Rachita Nair [email protected]

Jenny Nadar [email protected]

Yogesh Gholap [email protected]

Abstract— This paper describes the techniques used for implementing Messenger Robot-1

(MR1) and Messenger Robot-2 (MR2) for ABU Robocon 2019. The MR1 is a semi-

autonomous bot which transfers the Gerege (a token) to the Messenger Robot-2 (MR2) and

throws the Shagai (an object of around 700 grams) into the landing zone. It is capable of

switching between automatic line following mode and manual control mode established via

a Bluetooth interface between the robot and a PS3 remote controller. Pneumatic actuating

cylinders are used by MR1 to grab and throw the Shagai. MR2 is an autonomous four-legged

robot which incorporates servo-based leg drive mechanism providing three degrees of

freedom for each leg. The obstacle detection system of MR2 comprises of laser ranging

sensors to avoid or cross the obstacle. In addition to this, a control system consisting of

three Arduino mega boards featuring Inter Integrated Circuit (I2C) control for managing the

dynamic behaviour, gait generation and transition method for MR2.

Page 16: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

11

E05. Navigation Using Beacon For Building Bhavika Salunkhe ShrutiAdivrekar, Kalyani Donthula Sandeep kamble

[email protected]

[email protected],

[email protected]

[email protected]

Abstract — Now a days, the technology keeps improving drastically, especially on smart

phones or mobile devices. The customer‘s requirement will increase day by day. But it is time

consuming. Also from which site online shopping is done it is not feasible to customer as

distance wise. To overcome this problem we are going to develop ―Navigation ions on

mobile phone when they are pass through any building using Beacons for Building.‖ The

goal of this research is to implement mobile based indoor positioning with the beacon

solution based on the Bluetooth Low Energy (BLE) technology. For estimating the locations

based on localizations we use RSSI (Received Signal Strength Indicator). Compass is used for

calculate the current location of mobile phone. Beacons provide accuracy in proximity and

distance estimation. In our application customer saves their time because customer‘s gets

notification.

E06. Farmbot- A CNC Based Backyard Farming

System. Nayana Mahajan Pooja Karmokar, Kedar Kulkarni, Pratik Devle, Shubam Kaul

Abstract - When we are presented with the current food production system and when it

comes to mass harvesting of crops and vegetables, we have surrendered our control on how

our food is been produced and as a result affecting our health and environment. In this fast

pace life where no has time to carry out gardening and grow desired fruits, vegetables and

other plants, this farmbot is a backyard robot that is developed for a fully automated

gardening for food production on personal and small-scale level. This robot can also be used

as accessibility technology, i.e. it can help individuals with disability in growing their own

business in horticulture and also to empower individuals who might not otherwise be able to

grow their own food.

Page 17: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

12

E07. Automatic Power Factor Controller Using

Synchronous Condenser

Sayad Fahiz, [email protected]

Shah Rahul, [email protected]

Salmani Ramzan, [email protected]

Yakub Khan, [email protected]

Shaikh Afsar Ali, [email protected]

Syed Kaleem, [email protected]

Ankur Uadhyay [email protected]

Abstract— The power factor correction of electrical loads is a problem common to all

industrial companies. Earlier the power factor correction was done by adjusting the

capacitive bank manually .The automated power factor corrector (APFC) using capacitive

load bank is helpful in providing the power factor correction. Proposed automated project

involves measuring the power factor value from the load using microcontroller. The design

of this auto-adjustable power factor correction is to ensure the entire power system always

preserving unity power factor. For the low maintenance cost and long life, synchronous

condenser is used for correction method instead of capacitor bank. Harmonics are put down

by synchronous condenser which can‘t be possible by using capacitor bank. For controlling

the DC excitation of synchronous condenser as well as to improve the power factor, the

power factor and generation of required control signal from microcontroller are needed to

measure and monitor continuously which is also involved in this method.

Page 18: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

13

Electronics and

Telecommunication

Track

Theme: VLSI Design, SP, RF Microwave

Page 19: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

14

ET01. 3D Pose estimation using CNN and 3D

depth map probabilistic model.

Prof. Nayana Mahajan, Mayur Bharankar, Rishikesh Mudaliyar, Sourabh Kothari, RoshanKumar Poojari

Abstract - We have integrated the techniques of 3D pose estimation and action recognition

from 2D images. By using Convolutional Neural network and training the network by

providing a set of images from the pretrained data for detection of pose from the images.

This estimation of the pose will further be used for the human computer interface for other

projects. With this method we intend to reduce the challenges between 2D joint detection

and 3D pose/model reconstruction.

ET02. ―Creating Interactive Mirror‖

A smart mirror in the education sector

Srujan Jadhav [email protected] Anuja Jadhav [email protected]

Sonali Khaire [email protected] Swapnil Sonwane [email protected]

Abstract- We have been using mirrors since a very long time. When you see a mirror in front

of you, you see it in its capability of a mere decorative item or a basic requirement. In today‘s

world, smart mirrors are used in the automobile industry, at malls for aesthetic as well as

navigational purposes, medical and healthcare purpose. These applications are done world-

wide in almost every major city of the world. However, our application of the smart mirror

involves using the smart mirror in an educational backdrop using Internet of Things as well.

We aim at designing and implementing a solution to the problem of manual work of the

students and to avoid any mistake in keeping track of events, notices, deadlines which they

may miss. It also solves the problem of asking for directions in a big campus and simplifying

this by providing directions to the targeted location provided by the user via voice

command.

Page 20: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

15

ET03. Automated Essay Generation using Tensor

flow

Nikhil Jawale [email protected]

Bijali Mulgir [email protected]

Vaishnavi Pednekar [email protected]

Umesh Kulkarni. [email protected]

Abstract-Essay Generation is the process of creating a condensed form of a text document

which maintains significant information and general meaning of source text. It is the process

of creating a shorter version of one text document. Automatic essay generation becomes an

important way of finding relevant information precisely in large text in a short time with little

efforts. In this, the extracted information is achieved as a summarized report and conferred

as a concise (shortly) summary to the user. [16][22]

ET04. Design of Folded Cascode Operational

Amplifier

Tejal Pawar [email protected],

Karishma Nimje [email protected]

Kajal Vidhate [email protected]

Abstract: This paper proposes to design the Folded Cascode CMOS Operational Amplifier

with Moderate Gain and Low Power Dissipation. The circuit is designed using 180nm

Technology and its performance parameters are measured using LTspice Simulation Tool.

The proposed Folded Cascode Op-Amp provides an Open Loop Gain of 54dB and a Slew

Rate of 87V/µs using 5V DC supply voltage

Page 21: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

16

ET05. Index modulation for 5G networks

Sohan Juvale, [email protected]

Mansi Nikam, [email protected]

Sagar Virkar, [email protected]

Aditya Singh, [email protected]

Namita Agarwal [email protected]

Abstract- Multicarrier transmission has been proved quite beneficial for Wireless and

Wideband Communication community. 4G wireless systems has availed several features in

today‘s fast world in the field of wireless communications. But the researches still need to

seek solutions for increasing demand for higher data rates, better quality of service, fully

mobile systems and lower latency. Along with these services, problems relating to data

integrity and security are needed to be fulfilled. Recent developments on 5G and beyond

wireless networks can support can help in availing these services. The researchers are seeking

various solutions for increasing demand for higher data rates, better quality of service, fully

mobile systems and lower latency. A new emerging Modulation technique called Index

Modulation is proving to be quite futile for paving way toward 5G wireless networks. [1] IM

has three significant forms: Spatial Modulation, Channel Modulation and Orthogonal

Frequency Division Multiplexing with Index Modulation (OFDM-IM), which are seem to be

helpful for providing application scenarios as needed in future wireless networks. [3]

Orthogonal Frequency Division Multiplexing (OFDM). OFDM divides the wide band

frequency selective fading channel into narrow flat sub band channels. It mainly combats the

effect of multipath reception. Incorporating Index Modulation with OFDM leads to an Index

Modulation technique OFDM-IM which can be used in 5G and beyond networks. Orthogonal

Frequency Division Multiplexing with Index Modulation (OFDM-IM) allows on-off mechanism

of subcarriers based on the use. In this paper it is revealed that OFDM-IM with interleaved

grouping out performs classical OFDM for small modulation index and certain ranges of

signal-to-noise ratio. Finally the effects of modulation types on the performance of OFDM-

IM are studied.

ET06. An Empirical Review of UV Measurement

Methodologies Dr. Jitendra Toravi [1] Prutha Deshpande [2] Aishwarya Kura [3] Saurabh Joshi [4]

Abstract-Ozone layer depletion has led to an increase in UV exposure. UV radiation can be

divided into three spectral bands namely UVA, UVB & UVC. Literature [1] mentions the effect

of UVA and UVB resulting in skin tanning and burning respectively. Prolonged exposure to

UV Radiation can lead to different skin diseases and skin cancers [2]. This review aims to

study various UV measurement methods for precautionary purpose. [3] UV sensitivity varies

for different skin types. It is necessary to study and develop a method which evaluates how

individual‘s skin reacts to UV radiation.

Page 22: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

17

ET07. Development of Advance Smart Electric

Vehicle using Hybrid Energy Storage System

Mr. Shobhit K Khandare, Mr. Wilson Alen, Mr. Akshay Bhopani, Mr. Kalpesh Kolhe, Ms. Sakshi Potdar

Abstract: Hybrid Electric Vehicles (HEVs) utilize electric sources power as well as mechanical

engine for propulsion. The performance of HEVs is directly proportional to the characteristics

of the Energy Storage System (ESS). The requirement that an ESS for HEVs should have are

high power performance, long life cycle, reliability and cost effective. So the Hybrid Energy

Storage System (HESS), which combines different kinds of storage devices has been

considered to fulfill both performance and cost requirements. In this paper a hybrid power

system is designed with solar energy, wind energy and plug-in charge whose energies are

stored in a rechargeable battery.

ET08. Analysis of Various Maximum Power Point

Tracking Techniques for Photovoltaic Cell

Ansari Rabi [email protected]

Shaikh Shafiqurrahman

[email protected]

Yadav Avdheshkumar [email protected]

Khan Saif [email protected]

Yakub Khan [email protected]

Syed Kaleem [email protected]

Abstract: This paper acknowledges about the maximum power point tracking for

photovoltaic system. Many papers have been registered and published up to the date, but

it‟s been mere to select a particular tracking technique for PVC. However, crisis arises

because each tracking has its own merits and demerits. It‟s very vital to give a proper and

detailed review of the technique. In previous decades power generation was done with the

help of conventional sources like coal, water and wind. This paper emphasizes on the various

maximum power point tracking techniques, controlling strategies, features and types of

different circuits used in PV system. The intention of this paper is to serve as a guideline for

the future MPPT users.

Page 23: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

18

ET09. A Methodology for Secure Content

Transmission Using Video Cryptography

Dattakumar Malkhede

[email protected]

Shraddha Pandey [email protected]

Saurabhi Shingade [email protected]

Shivanjali Sangale [email protected]

Prof. Somnath R.Wateganokar [email protected]

Abstract—Picture and video are the two most essential types of transmitting data. With the

assistance of Image and video encryption techniques, a specific arrangement of pictures or

recordings can be transmitted without stressing over security. In the proposed paper an

extremely straightforward and constant calculation, utilizing pixel mapping, is utilized for the

encryption of the pictures which are the fundamental building squares of any video record.

In the proposed research paper the video is conveyed into the photograph outlines utilizing

a Matlab code and every one of the edges are consecutively put away. Each such edge

contains a mix of red, blue and green layers. On the off chance that we consider a pixel as an

8 bit an incentive than every pixel has the incentive in the scope of 0 to 255. In the proposed

work for each casing, two pixels arranged at the upper left and the base right corner are

changed in order to embed a message in each picture. After the fulfillment of the pixel

esteem changing every one of the pictures is set in a successive way and afterward, every

one of the edges is fell for an age of the first video document with encryption. This new

video is relatively like the first video record without any progressions unmistakable to the

stripped eye.

ET010. V Chef: A Hot Food Vending Machine Rashmitha Nair, Shreyas Gawali, Sanket Makwana, Rincy Joy, Prof. Shrikant Velankar, 6Prof. Poonam Shah

Abstract: Employees of any institute may not be able to avail canteen services due to limited

working hours of the canteen staff. In such situations, they have to resort to the packed food

dispensed by vending machines which may not be healthy. VChef is a vending machine

which makes and serves hygienic, healthy and hot dosas as and when required.

Page 24: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

19

ET011. Advancements In Lithography Techniques:

Nanoimprint Lithography (NIL)

Akshada Tukaram Thube

[email protected]

Akshata Sunil Kawale

[email protected]

Dr. Sangeeta Joshi

[email protected]

Pranali Sampat Shelar

[email protected]

Pranjali Shivshankar Jadhav

[email protected]

Dr. Venu Gopal Achanta

[email protected]

Abstract The fabrication of an integrated circuit (IC) requires a variety of physical and

chemical processes performed on semiconductor (e.g., silicon) substrate. In general, the

various processes used to make an IC fall into three categories: Film deposition, Lithography

and semiconductor doping. According to the Moore's Law made by Intel co-founder Gordon

Moore in 1965, the number of transistors on a chip doubles every two years while the costs

are halved. In order to satisfy moore‘s law, the number of transistors in an integrated circuit

should be doubled every two years while the chip size needs to be the same. This is made

possible by the advancements in lithography process. The word lithography comes from

Greek word lithos, meaning stones, and graphia, meaning to write. In case of semiconductor

lithography our stones are silicon wafer and our patterns are written with light sensitive

polymer called a photoresist. Lithography is the process of transferring geometrical patterns

from a mask to the silicon wafer. The Importance of lithography can be stated in two ways.

First, due to the large number of lithography steps needed in IC fabrication, lithography

typically accounts for about 40 percent of the cost of manufacturing. Secondly, lithography

tends to be the technical limiter for further advancements in feature size reduction, transistor

speed and silicon area. The currently used lithography techniques are E-Beam Lithography

(EBL), Dip-Pen Lithography, Nano-shaving Electron Projection Lithography (EPL), Nano-

grafting, Lithographically Induced Self-Assembly (LISA), Atom Lithography, Micro and Nano-

Contact Printing, Ion Beam Lithography (IBL) and Nano-Imprint Lithography. In any

lithographic process the two main figure of merits are resolution and throughput and we

reviewed each of the existing technology with respect to these factor. This paper discusses

the advancement in lithography process: nanoimprint lithography.

Page 25: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

20

ET012. Use Of Mel Frequency Cepstral

Coefficients For The Implementation Of A Speaker

Recognition System Rachel T. Pol, Dhanashri S. Sawant, Priyanka S. Sharma, Bhoomika V. Purohit, Pratibha R. Dumane

Abstract: The paper proposes a Speaker Recognition system which does the task of

validating a user‘s claimed identity using characteristics extracted from their voices. It is one

of the most useful and popular biometric recognition techniques in the world especially

related to areas in which security is a major concern. A direct analysis and synthesizing of the

complex voice signal is due to too much information contained in the signal. Therefore, the

digital signal processes, Feature Extraction and Feature Matching were introduced to

represent the voice signal. Mel- Frequency Cepstral Coefficients (MFCC) were extracted from

the speech signal which were used to represent each speaker and recognition was carried

out using weighted Euclidean distance. MATLABR2017b platform was used to implement

feature extraction process.

Page 26: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

21

Computers and IT Track

Theme: Soft Computing and Deep Learning

Page 27: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

22

C01. Survey Paper on URL Based Phishing

Detection

Abstract—Looking at the current situation faced by farmers, we have observed that there is

an increase in suicide rate over the years. The reasons behind this situation are weather

conditions, debt, family issues. Sometimes farmers are not aware about the crop which suits

their soil quality, soil nutrients and soil composition and rain fall value. The work proposes to

help farmers check the soil quality depending on the analysis done based on data mining

approach. Thus the system focuses on checking the soil quality and rainfall value to predict

the suitable crop for cultivation and that can maximize the crop yield by using machine

learning algorithm like decision tree algorithm and SMA.

C02. Crop Prediction System using Machine

Learning Manali P. Lokhande, Saili S. Chavan, Pragya R. Pandey, Prof. Sanjeev Dwivedi

Abstract: It is a Desktop Application for Teachers and Students for the Computer Department

which helps us again Phishing attackers that can damage, haram or destroy any computer

with just a single click.In this paper Exisiting we propose a heuristic-ased phishing detection

technique that uses uniform resource locator (URL) features. We identified features that

phishing site URL contain. The proposed method employs those features for phishing

detection. The Technique was evaluated with a dataset of 3,000 phising site URLs and 3,000

legitimate site URLs. The result demonstrates that the proposed technique can detect more

than 98.23% of phsing sites.

Page 28: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

23

C03. Employee Performance Appraisal System

Using Hybrid algorithApurva Ashtekar [email protected]

Omkar Mayekar [email protected]

Sandeep J.Kamble [email protected]

Hasnain A Shaikh [email protected]

Abstract—Employee performance appraisal system it is effective technique that contributes

to the important aspects of the organization in its business domain. The traditional methods

of evaluation are rating scale method and qualitative appraisal criteria using quantifiable

attributes however it‘s in capable of providing accurate result. This can lead to biasness with

evaluation and the employees may get dissatisfied outcomes in which they feel not

justifiable enough. Therefore, an advanced system for employee evaluation system is

proposed which evaluates performance of the employee and provide accurate result using

the hybrid algorithm (Naïve Bayes, ID3 and Linear Regression). The aim of this paper is to

compare accuracy of ID3 and hybrid algorithm for given dataset.

C04. Automatic Question Paper Generator Using

Semantic Approach Aliasgar Samiwala [email protected] Shubham Ahinave [email protected]

Atish Tule [email protected] Sandeep Kamble [email protected]

Abstract— In Today‘s age, Education is the most important way of achieving success.

Examination prepares students in their quest for knowledge. So, having a proper Examination

Paper is quite necessary. The project is Automatic Question Paper Generator Using Semantic

Approach will enable college authorities to automatically generate question paper out of

existing question set in the database. This system will use the database to harness the

question paper where the database could consist number of questions. It will produce a

random question paper set using Semantic algorithm such that the question does not repeat

in the same paper. Once the question is entered into system then you can easily generate

question paper in one click. In this way this system will help to generate question paper

uniquely and in less time.

Page 29: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

24

C05. Multilevel Authentication Based On Sclera

Vein Recognition Nikita Pai, [email protected]

Mansi Salunkhe

[email protected]

Tejas Bait, [email protected]

Prof. Geetha Narayanan [email protected]

Tushar Pardhi, pardh [email protected]

Abstract—This paper focuses on implementing sclera vein recognition as a measure of

biometric security followed by application of Global System for Mobile Technology. GSM

technology is used to send One time password (OTP) to the authorized person‘s mobile

phone via SMS. This system is being implemented using Raspberry Pi B + Model 3, hence

making it convenient and portable for real time application. Sclera being a unique

identification trait for every individual forms a compatible match with respect to biometric

implementation. Further, to improve the matching speed in real time application, we have

introduced Orb detector and Brute force matching method. The experimental result shows

that the productivity of our proposed two stage matching method is not only efficient but

also pragmatic.

C06. SPARK – An Android Application for Parking

Reservation System. Ramchandra E.Gawade [email protected]

Sunny Dhotre [email protected]

Akash A. Vaidya [email protected]

Amit K. Nerurkar [email protected]

Abstract— The parking problem in big cities, especially the metro-cities, has become one of

the key reasons of causing traffic in the city. Finding a parking spot is a very hectic and time-

consuming job. Even after finding a parking lot there is no guarantee that drivers will get an

empty parking space to park. To solve this issue, we have proposed a system that will allow

users to reserve a parking spot beforehand. This paper offers an android based reservation

system through Firebase where users will be able to view the various parking lots in user‘s

proximity or in proximity of the destination, the user is travelling to and see whether any

parking space is available or not, along with the pricing model for the parking slot.

Page 30: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

25

C07. Automated Music Transcription Tejas Sodhi [email protected]

Sayed Abdur Rehman [email protected]

Prof. Devendra Pandit [email protected]

Yash Rajput [email protected]

Abstract— In this paper, we are proposing the idea of making an automated software that

will transcribe each note while the musician plays the instrument. The software will take the

sound of the instrument as an input and will process the frequency of each note and the way

it is played and transcribe the note visually. In this project, we will consider recordings

consisting of only monophonic notes i.e. only a single note will be played at a time. This

paper focuses on extracting audio, detecting pitch and displaying symbols. The project

makes extent use of audio signal processing and python libraries (pyAudio)..

C08. ―V-TRANSLATE‖- A Speech to Speech

Translation System Shashank Mahale [email protected]

Ronit Motiwale [email protected]

Sami Rumani [email protected]

Sachin Deshpande [email protected]

Abstract- V-Translate, A Speech to Speech Translation Platform, is a system which will take a

voice input of a certain uniform language, say English, and will translate that particular

language into another language, say Hindi, and provide a voice output of the same. The

input will be stored in the database in the form of audio files. It can be used in future by a

user by selecting a particular language out of the provided options. Moreover, our

application will recognise the input language on its own given it is consistent. This

application has 4 modules. First, to take the Voice input and identify the language. Second,

to convert this Audio input to Text format. Third, to translate the Text format of the input to

the Text format of the desired language. And Fourth, to convert the translated Text to an

Audio format and hence provide the output.

Page 31: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

26

C09. Predictive Modelling of Life Insurance Data: A

Comparative Study of Machine Learning

Approaches Ramnath Sharma, Dr. Nilam Choudhary, Geetika Gautam, Rohan Singhal

Abstract: Predictive modelling is being utilized by companies and people everywhere

throughout the world to extract information from historical datasets [8]. These are the

mathematical calculations, which are utilized to "take in" the examples covered up on

specific datasets. The term supervised learning or classification is additionally utilized which

implies that you have past cases tagged or classified (yes or no). So this learning will be

utilized on the proposed dataset. In this study, there is going to be extraction of influential

features for classification. Some features are in numerical form and some in categorical. It‘s

easy to extract numerical data filled features but not for categorical value features. By the use

of a ―Chi Square Test‖ we will determine what categorical variables are impacting the result

[6]. Then 4 classification algorithms along with one regression algorithm will bere viewed to

find out which model predicts accurate results.

Page 32: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

27

Theme: AI, Expert system, network security

Page 33: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

28

C010. Recent Life Prolonging Techniques in

Wireless Sensor Network (WSN) Pramodkumar H. Kulkarni , Samruddhi Palande , Devika Dhoke , Akshay Netkar4

Abstract: Wireless sensor network is ever growing field in today‘s society. Smart homes with

wirelessly connected and controllable devices, continuous monitoring in environmental,

health care and industrial settings, and automated, self-adjusting systems in homes and

factories are all growing technologies that are built using wireless sensor networks (WSNs).

Based on network structure, routing protocols in WSNs can be divided into two categories

flat routing and clustering routing. As there are variety of advantages, clustering is becoming

an active branch of routing technology in WSNs. Also wireless sensor network is an emerging

technology that promises a wide range of potential applications in both civilian and military

areas. In many of these systems, energy consumption can be a major concern. Most devices

in the network rely on small batteries as their energy source. Because ofthis, any energy

usage optimization can lead to greatly increased lifetime.

C011. Mood Therapist: Emotion Based Music

Player Sathvika Selvandurai

[email protected]

Isha Shyam Repal

[email protected]

Prof. Prita K. Patil

[email protected]

Abstract— In this fast paced and stressful world, music plays a very important role in a lot of

people's lives. It could be for entertainment purposes and sometimes even for therapeutic

reasons. To satisfy basic user‘s requirements there are a lot of music players available with

basic features and a large library.One‘s tastes in music vary mostly according to their current

mood and have to manually select the songs to soothe them. Hence to be even more

personal and efficient understanding human emotions is desirable for better human-

machine interaction. Humans express emotions in different ways like facial expression,

gestures, speech and even by written text. In this paper we propose a system which uses

facial features and speech as inputs to detect the mood and give the corresponding playlist.

It also takes the user‘s feedback into consideration while doing so.

Page 34: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

29

C012. Spam Detection using Sentiment Analysis Aishwarya Ashok Aagte [email protected]

Vrushali Wagh [email protected]

Prof. Sandeep Kamble [email protected]

Prince Vishwa karma [email protected]

Abstract— the rapid growth of internet has made us dependent on it for most of our

activities. One such growing area is e – commerce. Today, there are hundreds of e –

commerce sites and millions of products available on them. These sites allow its users to

write a review about the product or the service provided. These reviews can act as a great

source of information for the service provider for analyzing sales or decision making. It can

also be useful for potential users to decide whether to buy a product or not. However, these

reviews can be useful only if they are true. Rapid growth of e – commerce has also led to

great competition among companies/brands. Hence, some parties try to add fake reviews on

the competitor‘s site in order to raise the popularity or to criticize a product/brand. This

paper talks about the various techniques for detecting spam.

C013. Active Learning in Mathematics through

Think-Pair-Share Deepti Saxena,

[email protected]

Rachana Desai,

[email protected]

Abstract - The aim of this paper is to investigate the influence of think-pair-share (TPS) on

improving undergraduate engineering students‟ learning in the subject of applied

mathematics. From the data, paper shows that the students were active than the traditional

teaching techniques and showed more enthusiasm and participation during math lectures.

Also they find that TPS played a big role in developing interest in topic and also useful to

learn basic concepts of mathematics.

Page 35: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

30

C014. Ear Biometric Techniques: A Comparative

Approach Siddharth Nandargi

[email protected]

TejalNanaware

[email protected]

Kavya Parag

[email protected]

ChandanSingh Rawat

[email protected]

Neha Pote

[email protected]

Abstract—Biometric technology has always been about innovation and new technology. It

was the world of passwords and identity proofs that ruled the world of security before

biometrics happened. Ear biometric is invariant from childhood to early old age as compared

to other biometrics. Ear biometric is a non-invasive type of recognition. This paper presents a

delineated comparison between two techniques which are used for recognition based on

various characteristics of the ears. Use of SURF features along with K NearestNeighbours

classification technique has been incorporated along with the training of Convolution Neural

Network model where the features extracted in the first few layers are classified in the last

layer. The experimental results show the relationship between computational time taken and

varying number of features for different scenarios with the aid of KNN classifier, also the

proposed approach of recognition by training CNN model gives an accuracy of 86% on AWE

database.

C015. Sybil Defender: A Defense Against Sybil

Attacks in Social Network Bharati Bargot [email protected] Prof.Umesh Kulkarni [email protected]

Abstract—Social media have gained increased usage quickly as online social network (OSN)

has connected to people‘s everyday lives as virtual gathering places that facilitates

communication. OSNs such as Facebook, Whatsapp, Twitter, Google+ and LinkedIn have

hundreds of millions of daily active users. Distributed systems are vulnerable to sybil attacks

in which opponent creates many fake identities called ‗Sybil Identities‘ and deals with

running of the system or violates the system with fake information. Because of fake

identities, it is vulnerable to sybil attack. The proposed system is a mechanism that influences

the network structures to defend against Sybil attacks in social network. The mechanism

works based on limited number of random walks on the social graph. The system will be

having algorithms such as sybil identification algorithm and sybil community detection

algorithm and also the combination of both algorithms.

Page 36: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

31

C016. Security System and Automation using

Raspberry Pi Joseph Patole,

[email protected]

Chinmay More

Gaurav Kolapate

Professor Jayen Modi

Dr. Deepak Bhoir

Abstract: As an essential part of many organization security and safety precedence, video

surveillance has established its importance and benefits many times by providing immediate

supervising of possessions, people, environment and property.Our paper ‗Security System

and Automation using Raspberry pi‘ deals with embedded technologies using image

processing and speech processing for raspberry pi, microphone and camera module.In this

paper we present a security system and home automation technique. The camera module,

microphone and buzzer will be interface with Raspberry pi. The camera will be able to

identify the authorized person and will trigger the raspberry pi to open the door link. The

microphone is used for automation process like controlling the electronic and electrical

appliances in the room. The mic also works as an chat-box. This paper will serve as an

example of how with the help of image processing and speech processing we can have fast

and more secured system and make our life easier.

C017. Comparative study of fake news detection

Amol Belgaonkar [email protected]

Hiral Mahadik [email protected]

Darshan Tandel [email protected]

Mohini Chaudhari

[email protected]

Abstract— Internet and social media made the access to the news much easier and

convenient. Mass media has a huge influence on society, and as it often happens, there is

someone who wants to take advantage of this fact. It is cheap to provide news online and

much faster and easier to disseminate through social media, large volume of fake news.

Sometimes to achieve some goals mass media may manipulate the information in different

ways. This lead producing of the news articles that are not completely true or even false. This

paper shows simple approach for fake news detection using multiple algorithms of

classification. Using a dataset obtain from BuzzFeed and Kaggle, we apply TF-IDF (Term

frequency inverse document frequency) and N-gram detection to 20,000 above articles. We

test our dataset on multiple classification algorithms Support Vector Machine, Decision Tree,

Logistic Regression, Naive Bayes and Perceptron. We achieved 98.02 % accuracy on Kaggle

dataset using Logistic Regression.

Page 37: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

32

C018. Two-Tier Energy Compensation Framework

Based On Smart Electric Charging Station Sandesh D. Patil

[email protected]

Akshay B. Phalphale

[email protected]

Sushant M. Nagare

[email protected]

Abstract: Traditional cars produce a lot of carbon dioxide (CO2) emissions that are ejected

into the atmosphere, causes pollution and greenhouse gases today, electric vehicles (EVs)

have received much attention as an alternative to traditional vehicles. The traditional vehicles

are powered by internal combustion engines. The electric vehicle is developed because of

the advancement in battery technology and motor efficiency. The secondary batteries are the

main energy sources of the EV. Thus, energy management is the key factor in EV or Hybrid

Electric Vehicles (HEV) design. Moreover, the charge capacity of the battery will influence the

endurance of electric vehicles. The main challenge in the HEV is the charging time required

for the batteries and insufficiency of charging stations (CS) and therefore charging within

existing distribution system infrastructure is problematic. Up to now the HEV s CS ‟ is in the

range of 100 km per charge due to the on-board energy which is needed to be optimized.

The second challenge for the EV‟s is their battery capacity which ranges from 8.6KWh to

15.2KWh. The consequent disadvantage is that the charging time for above mentioned size,

in a level 1 household charger (120V, 50Hz, 15-20A) is more than 15 hours. Due to these

constraints, the vendor (EV charging station supplier) needs a convenient distribution system

to cater to customer demand as well as maximize benefits. A special attention must be given

to the charging station. In future, the number of electric vehicles will be increasing to a

greater extent, these electric vehicles have to re-charge their battery in a place (i.e.) charging

station, so there will be a growing need of public accessing charging stations. This will have a

significant impact on the power systems like transformers, protection devices etc. With

respect to the varying load, it will have an impact on the consumers and vendors due to the

traffic at these station, waiting time for charging the vehicles will increase etc. Therefore both

the consumer and vendor will get assistance from a communication system which shares

useful data regarding the charging station, whether the charging slots are free, rate at which

charging is done, cost per unit etc.

Page 38: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

33

C019. Agent Driven ETutoring System Jugal Yadav Kedar Sambhus Amit Dey Satvinder Singh

Abstract —ETutoring system is a process of teaching and learning for students of differing

abilities in the same class in a more personalised manner. The intent of ETutoring is to

maximize each student's growth and individual success by meeting each student where he or

she is, and assisting in the learning process. Many specialists in the domain of teaching have

recently identified ETutoring as a method of helping more students in diverse classroom

settings experience success. The entire curriculum is designed to increase flexibility in

teaching and decrease the barriers that frequently limit student access to materials and

learning in classrooms based on student's intellectual knowledge. The system gives students

multiple options for taking in information and making sense of ideas thus in turn helping to

develop student's mind map in order to help the tutors to be much more flexible in their

approach to teaching and adjust the curriculum and presentation of information to learners

rather than expecting students to modify themselves for the curriculum. The work flow of the

system includes the student taking up a particular course and understanding the concepts

with the help of the course materials provided by the system which he or she can view

multiple times and then finally taking up a test. Based on the responses given by the learner

his or her performance and accuracy will be evaluated.

C020. Neural Network Nikki Singh, Sachin Bojewar

Abstract - A conversation between humans and computers is regarded as one of the most

hard-core problems in computer science, which involves interdisciplinary techniques in

information retrieval, Machine Learning, natural language processing, and artificial

intelligence. It is an Interactive Entity which automatically generates conversations to

exchange information smoothly between people with little knowledge of the computer. The

challenges lie in how to respond so as to maintain a relevant and continuous conversation

with humans. This research applies a generative model-based method for conversation

generation. This research is for the development of conversational agent, which generates

conversations using recurrent neural network and its coupled memory unit.

Page 39: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

34

C021. Estimating the Stereo Information in an

image with Disparity map using Minimum

Sum belief Propagation Chitra Suresh [email protected]

Kushal R. Tuckley [email protected]

Abstract—Stereoscopic images or stereo pair image consists of two images of the same

object/ terrain taken slightly horizontally separated points, known as left view and the right

view. Generally an image contains multiple objects and the objects situated at different

depth show different displacement in these two images. This ‘stereo information‘ is

presented using the concept of disparity. The disparity for stereoscopic images is the

horizontal distance between two matching pixel and the disparity-map is an image showing

disparity of each pixel. Disparity map is indicative of the stereo information, or the relative

depth at which different objects are located. In this paper we have presented an iterative

technique for computation of the disparity map using minimum sum message update

scheme of belief .The paper also presents the results of this technique and assesses the

efficacy of this technique.

Page 40: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

35

Theme: Data mining, Ware house, Data

analysist, GIS, & Remote Sensing

Page 41: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

36

C022. Survey on Mining Frequent Item Sets Over

Uncertain Databases Sudhir Lawand [email protected] Umesh Kulkarni [email protected]

Abstract— Uncertain data mining frequent itemsets over uncertain databases have attracted

much attention due to its wide applications. In uncertain databases, instead of counting fixed

occurrence of item sets, we use the support of an item set as random variable. The data

modified from sensor tracking system and data integration rigorousness is highly

ambiguous. One of the major issues is extracting frequent itemset from a large uncertain

database, interpreted under the Possible World Semantics. The mining process can be

modeled as a Poisson binomial distribution by observing that an uncertain database contains

an exponential number of possible worlds. Mining such manifold itemset from generous

ambiguous database illustrated under possible world semantics is a crucial dispute.

Approximated algorithm is established to ascertain manifold itemset from generous

ambiguous database exceedingly. A data trimming framework is used to improve mining

efficiency. The data trimming technique can achieve significant savings in both CPU cost and

I/O cost. We focus on the problem of mining frequent itemsets (MFI) over uncertain

databases. In order to solve the MFI problem over uncertain databases, we use an efficient

mining algorithm, named U-Apriori. Extensive experiments on both real and synthetic

datasets verify that this algorithm is effective and efficient.

C023. Virtual Chemistry Lab Mrudula Sadaye [email protected]

Shrutika Nikalje [email protected]

Aishwarya Deokar [email protected]

Prof.Snehal Andhare [email protected]

Abstract: Nowadays, computers and Internet has changed the way in which the information

is delivered. Technologies nowadays provide a valuable opportunity to practise new learning

techniques. In recent times Virtual Reality has proven to have a larger fundamental impact in

most of the domains. Teaches should also use Virtual Reality environment inorder to

facilitate learning. The aim of this paper is to develop an application that allows school

students to perform chemistry laboratory experiment in Virtual Reality. The students can

perform the experiments in Virtual Reality using a VR headset and a VR controller that allows

interaction in VR. On completion of the experiment the student will be provided with the

chemical equation associated with the chemical reaction. The students can also experiment

with different combination of the proportion of the reactants to know the result obtained.

This application is developed using Unity 3D that provides support for development of

Virtual Reality.

Page 42: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

37

C024. Data Mining using K-means and Hierarchical

Clustering Algorithms: A Case Study

Approach Akshata Prabhu [email protected]

Abstract— Data mining is the processing of analyzing large datasets and database so has to

derive patterns and establish relation between them. There are various disciplines available

under Data mining and clustering is one of them. Clustering is the process of dividing data

into groups that have similar objects. Each similar group is a cluster. The distance between

the objects in the same group is minimum. It is possible to implement clustering algorithms

via number of methods. This paper shows study & comparison between different clustering

algorithms – Partition methods and hierarchical methods.

C025. Analysis of the Social Media Role in Smart

Learning Dhanamma Jagli, Prajwal Jumde, Suysah Kholapure, Roma Motwani [email protected],

[email protected], [email protected]

Abstract: The paper describes and evaluates the role of social media in Smart Learning.

―Smart learning is a broad term for education in today's digital age. It reflects how advanced

technologies are enabling learners to digest knowledge and skills more effectively‖ [9]. The

data in this module were collected from students in the survey is mainly held in student‘s

perspective, what they prefer to study now this day, is it really useful as study material for

effective and latest knowledge, all these basic questions are asked for the student and collect

the facts of social media or other commercial online platform of learning sites. Data was

saved in a database and algorithm was applied to it. The algorithm we used in this model

was the decision tree algorithm. The algorithm was applied to a database based on the data

decision tree was constructed and showed the results considering various possibilities.

Page 43: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

38

C026. 3D pose estimation using CNN and 3D

depth map probabilistic model. Prof. Nayana Mahajan, Mayur Bharankar, Rishikesh Mudaliyar, Sourabh Kothari, RoshanKumar Poojari

Abstract: We have integrated the techniques of 3D pose estimation and action recognition

from 2D images. By using Convolutional Neural network and training the network by

providing a set of images from the pretrained data for detection of pose from the images.

This estimation of the pose will further be used for the human computer interface for other

projects. With this method we intend to reduce the challenges between 2D joint detection

and 3D pose/model reconstruction.

Page 44: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

39

Theme: Cloud computing, computer networks,

IoT, Computer graphics, VR, CV, parallel & grid

computing, distributed systems

Page 45: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

40

C027. School Automation System Ankita Patil ,[email protected]

Najuka Jadhav [email protected]

Supriya Sargar [email protected]

Sujay Jayachandran,[email protected]

Abstract— The main objective behind ‗School Automation system‘ is creating a central

system while traditional approach is to do a manual work in paper. So, for that it‘s very

difficult to manage all the record and also difficult to analyze all the record in any

departments. A manual work is to lengthy and its very time consuming for the entire

department. So, for that needs of central system are arising which gives the effective and

efficient result within less time. All departments can access the data with the system and also,

they can perform a desired task. With that all the data can be easily manipulated and can be

easily retrieved whenever anybody wants. With system in place, people in different

departments can view the same information about Student Information, making sure that

every single interaction with student is based on accurate information. It also means that

manual processes can be automated to free up people‘s time and make internal processes

more efficient. It‘s all about how to manage the student record in a master file as well as how

admin and faculty can manage the profile and keep information about the student. All the

information regarding student can be seen and edited if necessary, apart from that faculty

can keep record of student and they can manage information like student profile, exam and

other information.

C028. Face Recognition Home Security Using

Raspberry Pi &IOT Sahil Bhaldar [email protected]

Soheb Sayyad [email protected]

Kiran Chavan [email protected]

Gaurav Tawde [email protected]

Nikhil Jadhav [email protected]

Abstract— Home security is a growing field. To provide security to home, face recognition

system can be implemented using image processing methods. A standard USB camera

captures the image to identify the person. It is a system that identifies the visitor. If the door

recognizes the visitor, it will greet them by name, and door will be unlocked and opened. If

they are not identified the door will remain locked. The system will perform the detection

and recognition rapidly in real time. This project adds mainly four features: security, safety,

control and monitoring to home automation. Firstly the system needs a face authentication

for the user to be able to enter the home (locked/unlocked). When an unauthenticated

person tries to log in, the face will be captured and would be sent to owner via Gmail as an

attachment. The system also supports remote home control.

Page 46: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

41

C029. IOT Based Energy Meter Android

Application Komal Shirke [email protected] Tanuja Adhikari [email protected]

Meghna Brid [email protected] Dr.Swati Sinha [email protected]

Abstract— This paper presents an android application for smart energy meter. This android

application will be useful for online monitoring of domestic electricity consumption or usage by

consumer. This system provides a special feature, where a user can monitor each device in the

power consumption. An IOT based energy meter reading system based on raspberry pi and data

collaborated with an android facility is proposed in this paper. This application is useful to obtain

meter readings whenever required, so that meter readers do not need to visit each customer for

the consumed energy data utilized and to distribute the bill slips to each customer at their

places. Also this function can be installed in handheld devices such as Mobile Phones and

provides ease of access. Microcontroller can be used to monitor and record the meter readings.

Utility can cut off and reconnect the customer connection by Android Application. Though, the

customer can check the status of electricity consumption as the usage pattern from anywhere

using his /her smartphone. In this system readings of an energy meter are being transferred by

making use of dynamic readings.

C030. Hierarchy Based Secured File Sharing Akshaya Ganesan Iyer [email protected]

Harshali Poojary [email protected]

Sneha Annappanavar [email protected]

Nupur Sonve [email protected]

Abstract—As technology is advancing exponentially, anyone is able to access confidential

data if it is not secured properly. To protect the data which the administrator does not want

to share or needs the data to be confidential we use AES encryption method where the user

requires a public key to decrypt the encrypted data. Hence enhancing the security of

Hierarchical based access control model. The admin would be able to upload/delete files

from the application, declare the visibility of the file and also change the password if needed.

There are two hierarchy in case of the visibility. One is partially visible, which the admin is

willing to share with multiple users. Each of such user will be given a partial access (i.e. only

selected files would be visible) provided they have the password for it. The admin will have a

separate password which will provide him with full access to files and enable him to perform

the functions mentioned above.

Page 47: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

42

C031. Secured Re-Encryption in Un-Reliable Cloud

Using File Sharing Kalpesh Brid, [email protected]

Gopal Bhoi, [email protected]

Viraj Pawar , [email protected]

Prof Sanjeev Dwivedi [email protected]

Abstract – A key approach for secure cloud computing is for data owner to store encrypted

data in the cloud, and issue decryption key to authorized users. Then when a user is revoked,

the data will automatically be re-encrypted on the cloud to prevent the data from any

outside attack. In this the data is encrypted and decrypted in a flow. We have also done the

data file sharing and group sharing in this project so data can be shared to valid users at the

same time.

C032. Dynamic Report Generation Mr. Dipesh Hedamba [email protected]

Mr.Manoj Shelar [email protected]

Ms.Shruti Khatpe [email protected]

Ms.Bhanu Tekwani [email protected]

Abstract: This paper presents the approach of generating reports, resumes, certificate and

departmental forms. The generation of such reports will be based on the data which will be

provided by the user in the form of input. This reports will be auto formatted and justified.

This data will be stored in the database and retrieved at the time of report generation. The

generated report will be properly formatted i.e. the data will be properly justified, there will

be proper margins, images will be properly scaled and the report will be having a common

college header and footer. This tool can be used by various colleges such that they can also

use their own college logo.

C033. Dynamic Vehicle Parameters Assessment

using Web Application Rajeshwari R. Rajput [email protected]

Onkar K. Tarar [email protected]

Dr. Shreenivas Jog [email protected]

Abhishek Shrivastav [email protected]

Abstract—The objective of this paper is to describe a dynamic vehicle parameters

assessment system that remotely tracks the vehicle‘s location, speed, temperatures, humidity,

door lock status, seat belt status, fuel level of the vehicle and displays all of them on a web

application in real time with the help of an uninterrupted internet connection. It employs

sensors to find various parameters of the vehicle, GPS module to find the location of a

vehicle and a GPRS module that sends data to the data server of the web application. This

system integrates all the existing technologies that are used separately to monitor individual

parameters. The web application is specifically designed to view the vehicle‘s location on

open source map and other parameters on the dashboard. The web application handles the

user authentication by itself. This paper also discusses an additional proposition of offering a

range of control over vehicle parameters, which can be implemented by using relay based

control concept implemented in the same fashion.

Page 48: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

43

C034. Personalized Smart Mirror with Voice

Controlled Home Automation Using Raspberry Pi 3 Anushree Dash, Shobna Bangera, Supriya Jadhav, Umesh Channapnor, Suchitra A Patil

Abstract: This paper presents a design of interactive voice controlled Smart Mirror.The mirror

is converted into personalized digital device equipped with peripherals such as Raspberry PI-

3, Google Assistant, and LED Monitor that is covered with two way mirror that provides the

most basic common amenities such as weather, latest news and local time. With the help of

speech processing techniques we can also control the equipments or devices of the home

such as light, fan, blub. The Smart Mirror interacts with help of verbal commands to people.

It responds to user‘s questions.

C035. Smart Visitor Detector Amogh Rane [email protected]

Shubhangi Gupta [email protected]

Karan Chotlani [email protected]

Kajal Raut [email protected]

Rasika Naik [email protected]

Abstract— Due to the fast-paced life nowadays, people are often unaware when a person

visits their home/workplace. There are very few systems which allow the users to know about

who visits in their absence and also lets them communicate with the visitor, which allows the

user to know when someone visits their home/workplace, and also provides them with

options like raising an alarm, communicating with the visitor and taking no action. In this

paper, a new low-cost system is described. The ultrasonic sensor is used to check for the

presence of a visitor. When it detects someone, the camera is instructed by the Raspberry Pi

to click a picture. Once it has been ascertained that the image contains an unknown person,

it is uploaded to Github, Firebase, or a local server. A specially designed app for this system

will collect this image along with date and time information from the server and the

notification will be sent to the user. After viewing the received image, the user can now select

whether to communicate with the visitor, raise an alarm and notify the police, or no action.

Page 49: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

44

C036. Child Safety Using IOT Khushalsing Rajput [email protected]

Ankur Chavan [email protected]

Omkar Tanawade [email protected]

Swapnil Sonawane [email protected]

Abstract—This paper discusses the concept of child safety device with the help of IOT

(Internet of Things) technology. Recently, all over the world, crime against children is

increasing at higher rates and it is high time to offer safety support system for the children

going to schools. This paper focuses on implementing children tracking system for every

child attending school. Today, technology is growing rapidly and providing all essential and

effective solution for every requirement. The major advantage of this wearable over another

wearable is that it can be used in any cell phone and doesn‘t necessarily require an expensive

smartphone and not a very tech savvy individual to operate. The purpose of this device is to

help parents locate their children with ease. Now there are many wearables in the market

which help track the daily activity of children and also help find the child using Wi-Fi and

Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable

medium of communication between the parent and child. Therefore, the focus of this paper

is to have an SMS text enabled communication medium between the child‘s wearable and

the parent as the environment for GSM mobile communication is almost present everywhere.

The parent has to send a text with specific keywords such as ―START‖ and ―STOP‖. After

sending ―START‖ message the device will be activated, and it sends the information about

the child repeatedly after certain time of interval. Child information includes location of that

child, surrounding temperature, UV radiation index, etc. Also, after sending ―BUZZ‖ message

the alarm buzzer is activated and sounds an alarm which a bystander can easily spot. After

sending ―STOP‖ message the device will be deactivated. Finally, implementation results for

the proposed system are provided in this paper.

Page 50: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

45

C037. Real Time Sensing with IoT and

Environmental Monitoring Using Raspberry Pi Nikita Tanaji Salunke [email protected] Prof. Varsha Bhosale [email protected]

Abstract - Nowadays, development in embedded system has proved to a reliable solution in

monitoring and controlling the environment monitoring system. The recent climatic changes

have increased the importance of environmental monitoring making it a topical and highly

active research area. The main objective of proposed system is to provide environmental

parameters at remote location using IoT. This paper introduces an approach to build a cost

effective standardized environment monitoring device using the Raspberry-Pi single board

computer. Raspberry pi is a small computer with most popular features like low-priced,

flexible, fully customizable and programmable tiny PC embedded Linux board and abilities of

its usage as a wireless sensor node. The system was designed using Python Programming

Language and can be controlled and accessed remotely through an IoT (Internet of Things)

platform. It takes data about the surrounding environment through sensors and send the

sensors status through R-Pi controller to the android application using inbuilt Wi-Fi and also

send to the server where it can be accessed anywhere and anytime through internet. We will

be using Raspberry-Pi as our main board and sensors will collect all the real time data from

environment and this data will be given to the controller and display it. User can access this

data anywhere through Internet.

C038. IoT Based Biometric School Bus Attendance

and Tracking System Karuna Kishor More [email protected] Varsha Bhosale [email protected]

Abstract- In the current period due to increase in number of road accident and kidnapping

cases, parents always worry about their children. This paper recommends a android based

solution which helps parents to track their children location in real time. To track the location

GPS of android application is used and to identity the child a biometric identification is used

which is in built in the system. Whenever a child boards a bus, the biometric identification

done in the bus and the system will identify the child and update log on server will send to

the parents consisting the current location and time. Parents can see the location of bus,

they will be notified when the children is getting into bus or getting down from bus.

Page 51: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

46

C039. IOT for Monitoring Oil Well Production

and ensure Reliability Karan Sonawane, Sachin Bojewar

Abstract - Unconventional resources challenge the oil industry. Exploration and development

of oil and gas reservoirs require new sensors, analytics, and processes. Systems require better

connectivity, monitoring and control, and process automation. Previously deployed

technology limits the ability to quickly and reliably integrate and robustly operate field-to-

cloud systems, especially across large field installations. The Industrial Internet of Things

represents the biggest opportunity in recent decades for the advancement of industrial

technology. This study presents an application of a multivariate regression model to estimate

the future production performance of oil wells based on monthly-production time series

data. Several engineering techniques that require expertise and data that are difficult to

obtain are used currently to predict well performance. In this report, focus is on how

innovative networking standards and protocols are enabling revolutionary system-building

approaches that greatly ease field operations, how to predict, forecast the value of oil

production over time under different condition.

C040. Explore Mumbai Tour Guide: Application For

Android Mobile Akshada Shelke [email protected]

Namrata Mukane [email protected]

Gayatri Padwal [email protected]

Prakash Parmar [email protected]

Abstract— Tourist needs brief idea about destination and how to reach destination. They

have to pay a part of amount of travelling budget to local guides and agents to get

information. A tourist wants to visit maximum places of a city with his budget and limited

time. A ―Explore Mumbai Tour Guide App‖ that combines information resources and

location-based service category. Many projects have been undertaken on the use of context

aware mobile technologies for tourism that rely on the use of mobile phone devices. The

concept of mobile tourism, wherein user access tourist content through mobile application

has recently emerged. In accordance with mobile travel guides have to provide context

dependent, multimedia, rich touring services for tourist. Traditional travel guide application

contains basic modules such as, offline map and tourist journal, hotel bookings. In this

project we are implementing new features with traditional modules to make travelling

convenient in today‘s modern and fast world. Some features of this applications are available

offline so user will always have access to their information.

Page 52: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

47

Management Track

Theme: Service, Marketing consumer behavior

business process & Re-Engg. Future Workplaces

and Challenges for HR

Page 53: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

48

M01 SPARK – An Android Application for Parking

Reservation System.

Ramchandra Gawade [email protected]

Sunny Dhotre [email protected]

Akash Vaidya [email protected]

Amit Nerurkar [email protected]

Abstract— The parking problem in big cities, especially the metro-cities, has become one of

the key reasons of causing traffic in the city. Finding a parking spot is a very hectic and time-

consuming job. Even after finding a parking lot there is no guarantee that drivers will get an

empty parking space to park. To solve this issue, we have proposed a system that will allow

users to reserve a parking spot beforehand. This paper offers an android based reservation

system through Firebase where users will be able to view the various parking lots in user‘s

proximity or in proximity of the destination, the user is travelling to and see whether any

parking space is available or not, along with the pricing model for the parking slot.

M02 Personalized Smart Mirror with Voice

Controlled Home Automation Using Raspberry Pi 3

Anushree Dash, Shobna Bangera, Supriya Jadhav, Umesh Channapnor, Suchitra A Patil

Abstract: This paper presents a design of interactive voice controlled Smart Mirror.The mirror

is converted into personalized digital device equipped with peripherals such as Raspberry PI-

3, Google Assistant, and LED Monitor that is covered with two way mirror that provides the

most basic common amenities such as weather, latest news and local time. With the help of

speech processing techniques we can also control the equipments or devices of the home

such as light, fan, blub . The Smart Mirror interacts with help of verbal commands to people.

It responds to user‘s questions.

Page 54: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

49

M03 Analysis of the Social Media Role in Smart

Learning Dhanamma Jagli [email protected],

Prajwal Jumde, [email protected]

Suysah Kholapure, [email protected]

Roma Motwani, [email protected]

Abstract: The paper describes and evaluates the role of social media in Smart Learning.

―Smart learning is a broad term for education in today's digital age. It reflects how advanced

technologies are enabling learners to digest knowledge and skills more effectively‖ [9]. The

data in this module were collected from students in the survey is mainly held in student‘s

perspective, what they prefer to study now this day, is it really useful as study material for

effective and latest knowledge, all these basic questions are asked for the student and collect

the facts of social media or other commercial online platform of learning sites. Data was

saved in a database and algorithm was applied to it. The algorithm we used in this model

was the decision tree algorithm. The algorithm was applied to a database based on the data

decision tree was constructed and showed the results considering various possibilities.

M04 Explore Mumbai Tour Guide: Application for

Android Mobile

Akshada Shelke [email protected]

Namrata Mukane [email protected]

Gayatri Padwal [email protected]

Prakash Parmar [email protected]

Abstract— Tourist needs brief idea about destination and how to reach destination. They

have to pay a part of amount of travelling budget to local guides and agents to get

information. A tourist wants to visit maximum places of a city with his budget and limited

time. A ―Explore Mumbai Tour Guide App‖ that combines information resources and

location-based service category. Many projects have been undertaken on the use of context

aware mobile technologies for tourism that rely on the use of mobile phone devices. The

concept of mobile tourism, wherein user access tourist content through mobile application

has recently emerged. In accordance with mobile travel guides have to provide context

dependent, multimedia, rich touring services for tourist. Traditional travel guide application

contains basic modules such as, offline map and tourist journal, hotel bookings. In this

project we are implementing new features with traditional modules to make travelling

convenient in today‘s modern and fast world. Some features of this applications are available

offline so user will always have access to their information.

Page 55: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

50

M05 Assessment of factors causing delay in

Construction Projects Khot Zain . M , Magar Rajendra , Parkar Fauwaz

Abstract - Construction industry is the backbone for development of any country across the

globe. In all the countries, the most common problem in construction industry is deviation

from a planned time schedule. The most common problem at construction sites is delays, i.e.

time overrun to complete the project. There are various factors at construction sites which

prevent systematic flow of work which results in time based anomalies. Delays may vary in

severity and their effects from areas to areas. However, one can find out ways to minimize

such delay by identifying the causes and effects of delays. This paper focuses on finding out

the most important factors causing delays in construction project by conducting a

questionnaire survey with the various contractors, clients and consultants. By random

sampling technique the questionnaire survey concluded that there are 38 causes of delay

and 6 effects of delays. Out of which the most commonly found top 10 causes of delays have

been shortlisted with respect to Mumbai construction industry and to avoid delays in

construction projects certain remedies are given. The study focuses on pergola activity also,

using MSP i.e. Microsoft Project, delays of sub activity is measured. The assigning of

resources educate about the project in terms of cost. Furthermore the rank of each delay

factor is assigned through both the questionnaire survey and a particular site experience

through MSP. The spearman rank co relation has been used to compare the parameters to

find out whether the delay factors are dependent or independent of each other.

Page 56: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

51

Theme: Education Pedagogy, social Impact,

financial forecasting

Page 57: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

52

M06 Building An Expert System Based On Data

Mining Sagar Bhushan Gawde

Abstract— This work presents a novel framework for predicting stock trends and making

financial trading decisions based on a combination of Data and Text Mining techniques. The

prediction models of the proposed system are based on the textual content of time-stamped

web documents in addition to traditional numerical time series data, which is also available

from the Web. The financial trading system based on model predictions uses three different

trading strategies. In this work, our system is simulated and evaluated on real-world series of

news stories and stocks data using Decision Tree Induction Algorithm. The main

performance measures are the predictive accuracy of the induced models and, more

importantly, the profitability of each trading strategy using these predictions.

M07 Current Features Regional Development of

Organizations Of The Sphere Of Engineering In

Ukraine Morhachov I.V [email protected]

Abstract. Features of modern regional development of organizations of the sphere of

engineering in Ukraine are considered. The hypothesis that according to the dynamics of the

main indicators of activity of regional organizations of the sphere of engineering can be

determined or refuted the presence of a trend for deindustrialization both of the national

economy and individual regions, to determine the corresponding changes in the

intensification of regional scientific and technological and innovation activity was justified.

The analysis of the relevant indicators allowed to reveal a trend towards deindustrialization

of the economy not only in relation to depressed regions, but also relatively progressives.

There was a confirmation of the continuation of the laws of the concentration of factors of

activity of organizations in the field of engineering in Kiev and other industrialized regions.

The stochastic dynamics of the main structural indicators of the organizations of the sphere

of engineering is revealed, which determines the differential influence of regional factors on

regional organizations of the sphere of engineering, which increases the role of the regional

bodies of state power in the activity of these organizations.

Page 58: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

53

M08 Detecting Stress Based on Social Interactions

in Social Networks Krushna Jadhav [email protected] Pankaj Vanwari [email protected]

Abstract—Psychological stress is ominous person‘s health. It is non-trivial to detect stress

timely for proactive care. With the attractive of social media, person are used to sharing their

daily task and communicating with friends on social media platforms, making it feasible to

leverage online social network data for stress detection. In this paper, we find that users

stress condition is closely related to that of his/her friends in social media, and we employ a

large-scale dataset from real-world social platforms to systematically examine the

connection of users‘ stress condition‘s and social interactions. We first define a set of stress-

related textual analysis, visual, and social attributes from various aspects, and then propose a

novel hybrid model – a factor graph model combined with Convolutional Neural Network to

leverage tweet content and social interaction information for stress detection. Experimental

results show that the proposed model can better the detection performance by 6-9% in F1-

score. By further analysing the social interaction data, we also discover several intriguing

phenomena, i.e. the number of social structures of sparse connections (i.e. with no delta

connections) of stressed users is around 14% more than that of non-stressed users,

indicating that the social structure of stressed users‘ friends tend to be less connected and

less complicated than that of non-stressed us.

M09 Blockchain Technology Used In Taxation Akash Nemade, [email protected].

Shashank Kadam, [email protected].

Ria Choudhary, [email protected].

Saurabh Fegade, [email protected].

Ankita Raut, [email protected].

Abstract—Assuring the gathering of incomes is essential for the working of governments, as

it is their essential, if not their sole wellspring of pay. Various proposed use instances of

blockchain in tax collection can possibly trigger an upheaval in the manner in which

governments gather and spend their monies. As much as individuals may abhor paying

them, charges are important to empower the customary working of countries and

economies. Despite the fact that administrations don‘t work revenue driven like

organizations, they do expect to subsidize to take care of expenses for the administrations

they give to general society. Be that as it may, most governments neglect to recoup a

noteworthy part of the assessments owed to them and work under money related obligation

and shortfall, which, in the long haul may prompt financial stagnation and a decrease in the

nature of open administrations. In this way, recuperating charges is the best money related

need for governments. To recoup these expenses, some of the time, government

organizations end up going to broad lengths, prompting extra costs, making the whole

procedure loaded with wasteful aspects. Utilizing Blockchain in tax collection can make the

procedure progressively productive and powerful, and guarantee that administration offices

get paid what they‘re expected.

Page 59: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

54

M10 Financial Planner and Asset Allocation

Using Machine Learning Amit Kawad [email protected] Moksh Khajanchi [email protected]

Ambarish Patankar [email protected] Prachi Patil [email protected]

Abstract—While the rise in the Mutual Fund industry has been meteoric, the analytical tools

necessary to make intelligent investment decisions have been a laggard. It is generally the

small cap stocks which provide the alpha (additional return generated beyond the returns

generated by investing in stock indices such as the Nifty or the Sensex). As the small cap

sector is generally ignored by the analyst community they tend to be the most inefficiently

priced stocks. Also, since large institutional investors don't invest in these companies they

tend to be relatively illiquid. By developing right kind of statistical tools, alpha can be

generated by intelligently switching from large cap to small cap fund after serious episodes

of volatility or market turmoil had taken place. The statistical tools will aid in gauging the

level of market turmoil and will provide us appropriate switching signals. The starting point

of this kind of alpha generation is a balanced portfolio between all the asset classes with

extremely low correlated asset stream returns. This balanced portfolio is optimized by using

the modern portfolio theory.

Page 60: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

55

Bio Medical Track

Theme: Biomedical Instrumentation, Bio –

Sensors & Healthcare, Biomedical Signal

Processing

Page 61: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

56

BM01. Walk Assist Ritika Patil, Ankita Kale, Priya Dutta, Prafful Gajula

Prof Harish Ojha [email protected]

Abstract— Lower leg activity plays a vital role in daily life of human being. Due to uncertain

accidents that are occurring in human life results in immobilization. For such cases, external

or artificial supports are developed and this study is known as orthosis, which is a device

added to the body to stabilize or immobilize a body part, prevent deformity or assist with

function. Robotic devices have the potential to make therapy more affordable and thus more

available for more patients and for more time. It is a training device that efficiently supports

walking which is based on the inverted pendulum model, the theory for bipedal walking. In

consideration of the motion pattern of the swinging phase, the Flexion/Extension rotations at

the hip, knee have largest ranges, which are all on the sagittal plane. One of the main thing

to make leg move forward, backward or to bend is the measurement of the angle at the hip,

knee, and ankle. These angle measurements have been calculated using different sensors.

Some of the sensors that are used to measure the angle are gyroscopes, accelerometers,

electronic goniometer. Analysis of torque required at the joints, various actuators, drive

technologies and power analysis is reviewed. People convert movement of the pelvis that

uses the legs as pivot points into kinetic energy and potential energy in order to achieve

smooth and efficient bipedal walking.

BM02. Lung Cancer Detection and Classification

Using SVM Vedika Hande [email protected]

Prerana Prajapati [email protected]

Aarti Ingale [email protected]

Sanjeev Dwivedi [email protected]

Abstract—Image processing techniques are widely used in several medical problems for

image enhancement in the detection phase to support the early medical treatment. In this

research, we aim to improve quality and accuracy of early detection of lung cancer through a

combination of image processing techniques and machine learning. The Cancer Imaging

Archive (TCIA) dataset has been used for training and testing purpose where DICOM is the

primary format used for image storage .Classification is done using SVM (Support Vector

Machine) classifier which identifies whether the CT image is cancerous and non-cancerous.

Before training the classifier, we are performing image processing techniques on CT images

such as converting the image into HU (Hounsfield Unit) scale to get the binary image of

lungs followed by nodule segmentation where nodules are detected within the lungs.

Further, features are extracted from CT images using GLCM (Gray Level Co-Occurrence

Matrix) .The enhanced image is then given to the classifier to provide accurate results. As an

enhancement, we have also performed Early Stage Detection for reducing the growing

cancer burden. MATLAB image processing toolbox based has been used for the

implementation on the CT scan images.

Page 62: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

57

BM03. Assisting technologies for Alzheimer‘s

patients and caretakers Dr.Jitendra Toravi, Amarpreet Singh Lamba, Avanti Vartak, Vaishnavi Yadav, Madhura Mengade

Abstract— In this paper, we propose an idea to assist the Alzheimer's patient to conduct

their day to day activities easily. Alzheimer's is a type of dementia that causes problems with

memory, thinking and behavior. [1] New technologies can help ease anxiety, establish

routine, and improve the quality of life for everyone involved. This kind of technology is

called ―assistive technology‖ and can promote independence and autonomy, manage

potential safety risks around the home and reduce stress.

BM04. Interactive Bus System For Visually Impaired Samiksha Thikekar,Mayuri Moorthy, Chinmay Warang, Pavan Borole, Rasika Naik

Abstract—There are millions of people in this world with visual impairment. If they need to

use public transportation, they have no other choice but to depend on the goodwill of the

people around them. This life quality of visually impaired persons (VIPs) can be improved

using technologies such as Zigbee technology. The Interactive Bus System using Zigbee

Technology is an aid for visually impaired people which can help those without good vision

utilize public transport. The simple model would involve a user module with a Zigbee

transceiver which will communicate with the bus module to notify the bus conductor of a

visually impaired person waiting at a particular bus stop. This system will also notify the user

about whether the bus has arrived or will arrive in short time. The system uses only

microcontrollers, transceivers and other electronic circuits. Thus, Visually Impaired Persons

will have the opportunity to get information about bus arrival and departure time from this

project as well as assist the bus operator to know the presence of a visually impaired person

on the road.

BM05. Proposed Model for Predictive Diagnosis

of Chest Diseases Akshay Solunke [email protected]

Pranjal Naik [email protected]

Advait Srinivas [email protected]

Umesh Kulkarni [email protected]

Abstract— the proposed system is a predictive analysis tool for medical diagnosis using

machine learning for chest conditions like Asthma, COPD, and Tuberculosis. All participants

will have a questionnaire (self-administered / physician-administered). Positive and negative

predictive values calculated for each question and the total scores of patients compared with

those of control. This tool will enable doctors with data to make better and early

differentiated diagnosis minimizing the errors and timely treatment.

Page 63: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in

58

BM06. Diagnosis of Alzheimer‘s Disease By Means

Of Synchrony & Wavelet Features & Machine

Learning Algorithms Abstract: Previous studies have highlighted that EEG signals of Alzheimer‘s disease patients

tends to be less complex and have low synchronization as compared to that of healthy and

normal subjects. These changes in EEG signals of Alzheimer‘s disease patients start at early

stage but are not clinically observed and detected. To detect these abnormalities, three

synchrony measures and wavelet based features have been computed and studied on

experimental database. After computing these synchrony measures and wavelet features, it is

observed that Phase Synchrony and Coherence based features are able to distinguish

between Alzheimer‘s disease patients and healthy subjects. Combining these features,

healthy subjects and Alzheimer‘s disease patients are classified by use of different machine

learning algorithms such as Support Vector Machine, Deep Learning and Naive Bayes

Classifier. Combining, these synchrony features and other such relevant features can yield a

reliable system for diagnosing the Alzheimer‘s disease.

BM07. Medical Image retrieval by contour based

shape signature for CT Images Dakshata Patil

[email protected]

Mrs. Shoba Krishnan

[email protected]

Dr. Saylee Gharge

[email protected]

Abstract— In Content Based Image Retrieval (CBIR) one of the significant feature for

recognition of similar images is shape. This paper includes comparative study of feature

extraction based on contour shape signatures with different similarity metrics. CT database

have been used. Shape signatures used are Radial Distance (RD), Angular Radial

Coordinate(ARC),Polar Coordinate(PC),Smallest Rectangle Distance (SRD).These shape

signatures have been compared with each other using distance metrics such as Euclidean,

Chebyshev,Cityblock,Canberra and Seuclidean distance. Top 10 similar images have been

retrieved and results in terms of Average Precision for Recall less than and greater than 50%

is obtained. Results shows that RD gives good results in terms of Precision. PC and SRD gives

good results followed by RD

Page 64: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in
Page 65: vit.edu.invit.edu.in/wp-content/uploads/2019/04/RACEM-2019-.pdfabhishekshingte7@gmail.com Ashutosh Dwivedi dwivediashutosh717@gmail.com Swapnil Sonawane swapnil.sonawane@vit.edu.in