Shree L. R. Tiwari College of Engineering

Catalog of BE Projects

Catalog of Information Technology BE Projects, Showcasing Student Innovation
Welcome to the SLRTCE Catalogue of Information Technology BE (Bachelor of Engineering) Projects. This page is a showcase of the innovative and creative projects created by our talented students as they pursue their BE degrees in IT. Each project demonstrates their commitment, technical expertise, and problem-solving abilities.
Explore Our BE Projects Catalog
Title 1 Kalasaraswati: where campus creativity mints digital NFTs
Guide Name: Dr. Deven Shah
Group Members: Pradeep D. Prajapati, Swati Inchanalkar, Rohanreddi Jalareddi
Abstract: Kalasaraswati is a visionary NFT trading platform, empowering college students/faculty to showcase their boundless creativity through digital tokens. Inspired by Kalasaraswati, the Vedic goddess of wisdom, the platform establishes a decentralized marketplace where students/faculty can seamlessly transform their unique creations into tangible digital assets. By fostering responsible creation and ethical practices, Kalasaraswati cultivates a vibrant community where students/faculty collaborate, gain recognition, and inspire others in diverse creative endeavours. Beyond a traditional marketplace, it redefines the campus experience, bridging academia with the digital world and becoming a testament to the limitless creativity thriving within college campuses. With Kalasaraswati, students leave a lasting artistic legacy in the global NFT community, exemplifying the profound and transformative power of their creative expression.
Title 2 Rakshak: Where Safety Meets Technology
Guide Name: Dr. Roopali Lolage
Group Members: TanmayJha, Dhaval Joshi, Vidhi Shah

In India, creating a safer environment for everyone, especially in remote areas facing potential dangers, is a crucial goal that demands innovative solutions.Our idea is to develop a clever app that takes advantage of the numerous petrol pumps spread across the country. These petrol pumps, conveniently located every 2-3 kilometers, serve as crucial points for rapid assistance during emergencies. We gathered this insight through extensive surveys, discovering that these petrol pumps are well-distributed and can serve as dependable rescue points. Here's how it works: Imagine someone finds themselves in an emergency situation, perhaps injured or feeling unsafe. With just a simple press of a button on their phone, they can activate the app. In a matter of minutes, nearby petrol pump staff, who are trained to respond swiftly, will rush to provide the necessary help. This becomes especially valuable in remote areas where reaching a hospital in time can be a challenge.

If an individual senses trouble but cannot communicate, the app steps in. It automatically shares their precise location with trusted contacts, even if there's no internet connection available at that moment. This feature is derived from our focus group discussions, ensuring that people can seek help discreetly and efficiently.

Moreover, our app acts like a watchful guardian, especially looking out for individuals when they might feel unsafe. If someone is in a situation where they're scared and can't call for help, the app comes to their aid. It not only sends an automatic message to people they trust, but it also lets them talk with them using the app. They can share what's happening through audio, pictures, or even live video. This special chat helps them stay connected with their loved ones and the nearby petrol pump workers, who are ready to help. This idea shows how much we care about safety, making sure everyone can get help quickly and privately.

In rural areas, where access to immediate assistance is often limited, our integrated solution offers a transformative impact. By making the most of the existing petrol pump infrastructure and employing cutting-edge technology, we create a safety net that spans across vast geographies. The app's accessibility without the reliance on conventional emergency numbers or constant internet connectivity extends its benefits to remote corners of the nation. This harmonious fusion of resources and innovation manifests our commitment to empowering individuals, cultivating secure surroundings, and setting a precedent for the remarkable influence of pragmatic inventions.

Our integrated approach combines these innovative features to create a safer society. This forward-thinking solution doesn't rely solely on emergency numbers or internet access, making it highly reliable and accessible to a wide range of people, regardless of their location or connectivity. By embracing the power of existing infrastructure and smart thinking, we are working hard to help people feel stronger, create a safe place, and show how simple but smart ideas can make a big and positive difference

Title 3 Depression Detection using Machine Learning
Guide Name: Mrs. SonaliPadalkar
Group Members: RohitGhongade, Rani Rai, AmanRastogi
Abstract: The goal of this project is to develop a strong, robust, efficient, and accurate depression detection system using machine learning techniques. Depression, a common mental health problem, often goes unnoticed or unclear. The proposed system addresses this challenge by analyzing diverse data sources, including text and speech, to identify potential indicators of depression. The project starts with the collection and pre-processing of a large dataset on the various characteristics of  related to depression. These features include linguistic, physiological, and behavioral features that may be associated with depressive states.The data is treated with care to ensure compliance with a number of rules related to ethical guidelines and user privacy. Feature extraction and transformation techniques are applied to the collected data, enabling the creation of information representations for machine learning models. It then uses supervised learning algorithms such as logistic regression, decision trees, and neural networks to build a model that can predict or estimate  future values. Models are trained and tuned to optimize accuracy, precision and recall. To facilitate user interaction, a user-friendly interface was developed that allows entering relevant information such as text or voice samples. System predictions are presented to users in an understandable way with relevant information.
Title 4 Multiple Disease detection using ML
Guide Name: Dr. VikasKaul
Group Members: Rohan Pal, Ramesh Yadav, Rohan Yadav

Mostly in healthcare, analysis of one particular disease is considered at a time. For e.g. analysis of diabetes is done separately and analysis of heart disease is different. Since existing systems analyses only a specific disease,if we have to analyse a patient report then we have to use multiple systems for multiple diseases.

A particular system can detect a particular disease but it cannot detect the effects of that disease e.g. A system may detect diabetes but it effect like heart disease or hearing loss or dementia go unnoticed. Our ML model will consists of multiple diseases like diabetes, Diabetes Retinopathy, heart disease and cancer detection data sets. Based on user input or report parameters, our ML model will  perform analysis of multiple diseases and then produce maximum identification of relevant diseases. Since we are detecting multiple diseases at one place and one time, a lot of time and cost of patient analysis can be reduced signficantly.

Title 5 EcoNourish: A secure IoT based food waste management system with food spoilage detection and prediction.
Guide Name: Dr. VikasKaul
Group Members: DikshaPardeshi, Soumya Gupta, VaishnaviGuttal

A major concern in the long term sustainability of food supply chains and production has always existed. All living beings rely upon meals as a source of nutrition so the quality and security of meals have been high priorities for a long time. As a result food spoilage tracking schemes are required to sustain food quality level.

A system is to be designed which will monitor the gas emission level, humidity level and temperature of various cooked food items by using sensors and actuators to check the level of food spoilage. We are visioning to check parameters like temperature, humidity and methane emission from different cooked food items i.e rice, bread, samosa, dal etc.

This data is used for decision making to determine whether the food is spoiled or not . If the food is not spoiled then it will calculate the lifespan of the food. We will prepare our own data set for a few food items at different places under different conditions of temperature and humidity. This data will be used for prediction and analysis.

Guide Name Mr. Saurabh Suman
Group Members:
  1. Aditya Waskar
  2. HimanshuUpadhyay
Abstract The "QR CODE CRYPT” is an innovative project that leverages Flutter for cross-platform Android application development. It encompasses three critical sections: basic functionality for user-friendly data collection and QR code generation, encryption and decryption using the robust Chacha20-poly algorithm, and the implementation of digital signatures (Elliptic Curve Cryptography ) for data authenticity. Additionally, the project addresses the challenge of efficient image compression within QR codes. By combining these elements, the system offers a secure, versatile, and user-friendly solution for data storage, offline data retrieval, and verification, with potential applications in offline e-pramaan. Keywords - Chacha20-poly Algorithm, Elliptic Curve Cryptography, QR Code Generation, Cryptography, Image Compression, Offline Data Retrieval.
Title 8 Dynamic Data Anonymization Tool
Guide Name: Mrs. MadhuriGedam
Group Members:
  1. Jay Kawa
  2. OmkarGhogale
  3. Ritesh Singh
Abstract: "Dynamic Data Anonymization Tool" (DDAT), a solution designed to protect sensitive information in big data environments. As the use of big data continues to grow, preserving privacy has become crucial. The DDAT utilizes smart techniques like k-anonymity, l-diversity, and t-closeness to adapt to changing privacy needs and different data formats. The tool can anonymize data in real-time, making it suitable for handling data streams and quickly addressing privacy concerns. The Dynamic Data Anonymization Tool ensures strong privacy protection while maintaining data usability through context-aware privacy policies, scalability, efficiency, and fine-grained access controls. Extensive testing demonstrates that the DDAT effectively preserves privacy without compromising data analysis, making it a valuable tool for various data environments.
Title 9 Early Alzheimer disease detection with ML/DevOps in healthcare
Guide Name: Mrs. MadhuriGedam
Group Members:
  1. Brijesh Kori
  2. SatyendraJaiswar
  3. Manish Madhesia
Abstract: The powerful convergence of two distinct yet complementary technologies in the healthcare domain: Deep Learning (DL) for early Alzheimer's Disease (AD) diagnosis and DevOps for IT and operational improvement. We first delve into the potential of DL in enabling early AD diagnosis, highlighting its ability to analyse complex datasets and identify patterns indicative of AD at its nascent stages. Next, we shift focus to the implementation of DevOps in healthcare, examining the benefits it brings in terms of enhanced collaboration, continuous delivery, and improved IT efficiency. Drawing on successful examples from other industries, we assess the applicability of DevOps principles to healthcare and discuss its impact on patient care and organizational performance. Ultimately, we emphasize the synergistic effects of integrating DL and DevOps, envisioning a future where early AD diagnosis and streamlined healthcare operations converge to deliver superior patient outcomes and drive advancements in the healthcare landscape.
Title 10 Decentralized Crypto Exchange with Multi-Deployment
Guide Name: Prof. MadhuriGedam
Group Members: HrithikDiwedi, MeehirChoudhary, Anas Khan
Abstract: The major project aims to design and implement a decentralized cryptocurrency exchange that facilitates the trading of various cryptocurrencies while supporting multiple token deployments. The exchange will be built on blockchain technology to ensure security, transparency, and immutability of transactions. Users will be able to trade a wide range of cryptocurrencies, including popular ones like Bitcoin, Ethereum, and altcoins. Additionally, the platform will enable the seamless integration of new tokens by accommodating different deployment mechanisms, such as ERC-20, BEP-2, and TRC-20. This flexibility will empower blockchain projects to easily list their tokens on the exchange, fostering a diverse and vibrant ecosystem of digital assets. Through smart contract-based automation, the exchange will provide efficient and secure order matching, trade execution, and fund management. The project endeavors to contribute to the growth and adoption of cryptocurrencies by providing a robust, decentralized, and user-friendly trading platform for the global crypto community.
Title 12 Campus: Empowering College Selection with 3D insights using Machine Learning Approach
Guide Name: Mrs. Reena Kothari
Group Members: Aditya Mishra, Satya Prakash Mishra, Utkarsh Mishra, Siddhant Singh
Abstract: The project focused on the 3D modeling of a dispersed campus, with the dual purpose of creating virtual tours of the University's cultural heritage sites and developing a new website for the campus area. Through the utilization of various modalities and techniques, a prototype was successfully generated as an outcome of this initiative. After a thorough assessment, the most suitable techniques were selected for their informative value. Subsequently, a comprehensive 3D model of the campus was developed, encompassing all major areas. This model was integrated into the new University website, allowing for the widespread dissemination of its rich cultural heritage. The complexity of the dispersed campus, segmented into distinct sections, further underscores the significance of consolidating all relevant information within an accessible web platform for the broader society's benefit. Concurrently, this study explored an advanced technique for designing historical heritage objects with heightened precision, utilizing a constructed environment. The modeling process involved comprehensive monitoring of the fortress's surroundings, meticulous analysis of archival, librarian, and cartographic sources, followed by the meticulous creation and replication of the research object within a virtual environment, utilizing a diverse array of software tools.
Title 16 CareerHub - Job assessment and career growth platform
Guide Name: MrsRupaliPashte
Group Members:
  1. KunalSalunke
  2. Saloni Pandey
  3. Pradeep Prajapati
Abstract CareerHub is a ultimate tool for optimizing the job search and career growth.It has an array of dynamic features, including intuitive job application tracking, personalized job rating, and advanced keyword extraction to align you with your ideal role. Elevate your job hunt with resume building, email templates, insightful note-taking capabilities, and guided support throughout every stage of your application process. It has a student community, where you can connect, collaborate, and grow together. Unleash the true potential of your job search journey with our comprehensive suite of tools tailored to your success and a supportive community by your side.
Group Members:
Abstract: With the ever-increasing dependence on digital services, ensuring the security of user accounts has become a paramount concern. Traditional authentication methods, such as passwords and PINs, have demonstrated vulnerabilities to various attacks. Keystroke dynamics, a behavioral biometric, offers a promising solution for adaptive authentication by analyzing typing patterns unique to everyone. This project explores the implementation of keystroke dynamics in adaptive authentication systems using machine learning algorithms. The primary objective is to create a robust, secure, and user-friendly authentication mechanism that continuously adapts to the changing typing behavior of users while maintaining a high level of accuracy. The proposed system employs a diverse dataset collected from users performing various typing tasks to train machine learning models. Features such as keystroke latency, flight time, and typing rhythm are extracted and used as inputs to the algorithms. Several popular machine learning techniques, including support vector machines, neural networks, and random forests, are employed to build classification models capable of distinguishing between legitimate users and unauthorized intruders. This project advocates for the adoption of keystroke dynamics in adaptive authentication systems, utilizing machine learning algorithms to create a secure and user friendly experience. By combining behavioral biometrics with cutting-edge technology, the proposed approach offers a robust defence against unauthorized access, paving the way for more secure and convenient authentication methods in the digital era.
Title 18 SmartSpeak: Voice Chat Assistant
Guide Name: Mrs. RupaliPashte
Group Members:
  1. Vishal Singh
  2. Aniket Varma
  3. Dipanshu Bandoliya
Abstract: In this world AI(artificial intelligence) is advancing rapidly, the integration of voice assistants with cutting-edge language and image processing models has garnered significant attention. Chat-GPT's advanced natural language understanding empowers the voice assistant to improve conversational abilities and expand its knowledge base. Meanwhile, DALL-E's exceptional image synthesis capabilities enrich the user experience by generating relevant images in response to text-based queries. The proposed architecture seamlessly combines both models, enabling the voice assistant to interpret voice commands using Chat-GPT and utilize DALL-E for visual information, fostering interactive dialogues. Ethical, privacy, and computational concerns are thoroughly addressed, and extensive experiments and user studies demonstrate the superiority of this integration over traditional voice assistants. The results showcase significant enhancements in capabilities, leading to more engaging and contextually-aware voice assistants, setting a path for smarter voice-based applications in the future
Title 20 Crowdfunding Blockchain Application
Guide Name: Mrs. SonaliPadalkar
Group Members:
  1. Sapan Shah
  2. Shrikrishna Sharma
  3. Vishal Vishwakarma
  4. Anuj Yadav
Abstract: The majority of the current crowdfunding sites are centralized systems, which might cause certain issues. As previously said, internet crowdfunding exposes donors to fraud because established legal and reputation protection safeguards could not be effective. Crowdfunding is the process of a group of people obtaining money for a project or campaign without the help of reputable organizations like banks or lending companies. Crowdfunding is a strategy for obtaining a number of small donations using an online financing platform to raise money
Title: Lane Detection System Using AI
Guide Name : Dr. Roopali Lolage
Group Members : 68. Avinash Vishwakarma 29.Siddhant Nigam 39.Hariom Pareek (TL) 40.Ritik Pareek
Abstract : ABSTRACT Lane Line detection is a critical component for self driving cars and also for computer vision in general. This concept is used to describe the path for self-driving cars and to avoid the risk of getting in another lane.
Title : Detection of diabetic retinopathy in primary care using AI
Guide Name : Dr. Roopali Lolage
Group Members : Shubham Vartak (TL) 67 Ajinkya Parte 42 Soham Ajgaonkar 1 Hitesh Ghagave 11
Abstract : ABSTRACT Diabetic retinopathy is a leading problem throughout the world and many people are losing their vision because of this disease. The disease can get severe if it is not treated properly at its early stages. The damage in the retinal blood vessel eventually blocks the light that passes through the optical nerves which makes the patient with Diabetic Retinopathy blind. Therefore, in our research we wanted to find out a way to overcome this problem and thus using the help of Convolutional Neural Network (ConvNet), we were able to detect multiple stages of severity for Diabetic Retinopathy. There are other processes present to detect Diabetic Retinopathy and one such process is manual screening, but this requires a skilled ophthalmologist and takes up a huge amount of time. Thus our automatic diabetic retinopathy detection technique can be used to replace such manual processes and the ophthalmologist can spend more time taking proper care of the patient or at least decrease the severity of this disease.
Title : An Effective Food Waste Management System with Food Spoilage Detection
Guide Name : Dr. Vikas Kaul
Group Members : 64.Suraj Tiwari (TL) 45.Sana Quresh 26.Harsh Mishra
Abstract : ABSTRACT Recent years have seen an increase in food wastage, and researchers are exploring innovative ways to reduce that. It is a major concern in the long-term sustainability of food supply chains, demand, and production. All living beings rely upon meals as a source of nutrition, so the quality and security of meals have been high priorities for a long time. As a result, efficient food spoilage tracking schemes are required for monitoring food quality levels. This project deals with development of Food waste management system to detects food quality and manages storage systems. Food quality tracking is done by monitoring the gas emission level, humidity level, and temperature of fruits and veggies by using sensors and actuators to check the food spoilage level. In this work, NodeMCU is used as a Microcontroller and related sensors which comprise of MQ2/MQ4 as a methane sensor and DHT11 as a humidity and temperature sensor to detect gas emission from different food items. The data from the sensors is processed by the microcontroller and is used as input to the machine learning model which determines whether the food is spoiled or not. If food is not spoiled, then it is proposed to further predict the life span of the food. Experimental results show 92.6% accuracy in our system. Further this project can be enhanced by increasing the no of sensors for covering more parameters to detect the food quality for enhanced accuracy.
Title : Development of Machine Learning Based Flight Price Prediction System for Indian Market.
Guide Name : Dr. Vikas Kaul
Group Members : 51. Aarish Siddiqui (TL) 71. Shubham Yadav 72. Suraj Yadav 53. Aakash Singh
Abstract : The Flight ticket prices increase or decrease every now and then depending on various factors like timing of the flights, destination, duration of flights. In the proposed system a predictive model will be created by applying ML and AI to the collected historical data of flights which gives the best result to the user..
Title : Event Management Application
Guide Name : Mrs. Deepali Patil
Group Members : 50. Kshitiz Sharma (TL) 58. Vaibhav Singh 60. Vivek Soni 41. Saiyam Parmar
Abstract : ABSTRACT Food holds a major role in human beings’ lives and in human socities. Food & agriculture sector is considered to be a major employer so we design a  decentralized food supply chain to trace products from end to end and provide a smart & reliable way to provide information to customer using blockchain technology.
Title Tracking Socio-Economic development
Guide Name Mrs. Deepali Patil
Students 52. Aditya Singh (TL) 32. Anuj Pandey 35. Devesh Pandey 22. Snehal Latam
Title : Helmet Detection using Machine Learning and Automatic Number Plate Recognition using YOLO
Guide Name : Mrs. Deepali Patil
Group Members : 15. Shivam Jaiswal 17. Vishal Jha 19. Diya Kathait (TL) 24. Rohan Maurya
Abstract: In modern world, the increasing use of Motorcycles has increased in road accidents and injuries. Helmet which are not utilized by the motorcycle rider is one of the causes. Currently, one procedure is to physically check use of helmet at the pavement junction or through the CCTV footage video, which needs human intervention to detect motorcyclists without helmet. The proposed framework presents a computerization machine structure to inform apart the motorcycle rider with or without helmet from images. The system extracts objects class supported feature extracted. The system uses You Only Look Once (YOLO) which consists of Convolutional Neural Networks trained on (COCO) which stands for Common Object in Context and are combined with computer vision.
Title : Product Authentication using Blockchain
Guide Name : Mrs. Aari Puthran
Group Members : Chanchal Kothari (TL) Yashkumar Gupta Preeti Chauhan Ishan Malavia
Abstract : ABSTRACT We plan to implement a proof-of-concept system employing a blockchain-based decentralized application which gives a customer the entire history of a product (eg - brand info, owner, etc).
Title : Aadhar based Blockchain based E-Voting System
Guide Name : Mrs. Aarti Puthran
Group Members : 31. Pandey Aniket (TL) 69. Yadav Niraj 14. Gurav Devashish
Abstract : The foundation of democratic society is laid by its voting mechanism.Casting a Ballot isn’t evident to guarantee the result in regards when the choice is monetarily or politically related.Therefore it is necessary to ensure election integrity by fulfilling the security, privacy, transparency and compliance requirements, there are chances of tampering of results as in used models are Centralized thus affecting the integrity of democratic elections.Thus integretting blockchain in the system will solved the issues stated.
Title : Serverless Webpage using AWS services such as Lambda, API Gateway and DynamoDB etc.
Guide Name : Mrs. Aarti Puthran
Abstract : Web services have become quintessential in web application development. RESTful web services are one way of providing interoperability between computer systems on the internet. RESTcompliant web services allow requesting systems to access and manipulate textual representations of web resources using a uniform and predefined set of stateless operations. These services, which are online APIs, can be accessed from various applications and the results can be used to offer specific functionality to users. This project consists of an Android app, a Server application and a Client application. The Server application exposes a REST API (Web Services developed using REpresentational State Transfer (REST) protocol) using, which the consuming client applications can make use of various functionalities as services across the network. The Android app would be installed in the smart phone present in each vehicle of the fleet, this app would send live location data to the database using the REST API. The manager uses the client application to track the vehicles in real time, the manager can also choose to track a particular vehicle. The API could also be used to integrate the services with other systems. This project serves to a wide variety of users, from small local businesses owning tens or hundreds of vehicle to parents who would like to track the location of their children in real time. This project aims to help the managers/owners better control and track the vehicles. Also, the exposed API could be used by other developers to customize or extend this application. This project is easy to install, use and hence friendly for users with even minimal computer skills.
Title : Retail Analytics using facial detection and analysis
Guide Name : Mrs. Madhuri Gedam
Group Members : 46. Akansha Rai (TL) 12. Bansi Ghanva 38. Saiprasad Parab 49. Nishant Sawant
Abstract : This project serves to a wide variety of users, from small local businesses owning tens or hundreds of vehicle to parents who would like to track the location of their children in real time. This project aims to help the managers/owners better control and track the vehicles. Also, the exposed API could be used by other developers to customize or extend this application. This project is easy to install, use and hence friendly for users with even minimal computer skills.
Title : Graduation Admission Predictor
Guide Name : Mrs. Madhuri Gedam
Group Members : 37.Pandey Sonali Kaushalkishor 43.Patil Pratik Kishor 48.Rakesh Kumar
Abstract : This project predicts the admission of a student based on different features including university rating, student’s undergrade GPA, GRE score, research experience and etc. This predicts that how much chances are there that the student will get admission in his selected university or not.
Title : Smart Attendance Capturing Mobile App
Guide Name : Mrs. Saurabh Suman
Group Members : 07. Siddhesh Chotaliya 18. Prince Kanojia 66. Ishika Vaish
Abstract : The current process of manual attendance recording is not only time consuming but also inaccurate. Irregular attendance at classes can have a significant impact on a student's overall academic performance. Therefore, it is important to have a consistent attendance system. We will be developing a smart mobile attendance application with facial recognition and GPS tracking devices. Face recognition uses the CNN algorithm and uses a GPS service to get the student's location. This project is being developed for speed and accuracy, and is more convenient than current approaches, so it will likely replace your current attendance system.
Title : Intrusion detection system using Face Recognition
Guide Name : Mrs. Reena Kothari
Group Members : 03. Zuhair Bhati 09. Ayush Dubey 30. Ajay Pandey (TL) 36. Riya Pandey
Abstract : This project ensures security by preventing thefts, by monitoring its surrounding using some specialized sensors and camera footage. It works in a different way as compared to existing IDS. As when some motion is detected in a restricted area, camera records a video. This recorded video will be mailed to the user on the spot. So, there is no need for user to maintain a database of whole day recordings etc. User will receive notification along with video attachment whenever intrusion is detected. Additionally, Owner will also receive notification on telegram. Programming is completed with the help of python and shell script.
Title : Leaf Disease Detection and Remedies
Guide Name : Mrs. Reena Kothari
Group Members : Takalikar Akash KIshor Singh Ravi Akhilesh Rajput Aniket Avinash Pandey
Abstract : Every other field has got some benefits from new technologies as compared to the agricultural field. According to past studies,42% of agricultural production is in loss and that too is only because of the increasing rate of loss due to plant leaf diseases. Crop diseases are a major threat to food security, but their rapid identification remains difficult in many parts of the world due to the lack of the necessary infrastructure. Various efforts have been developed to prevent crop loss due to diseases. Historical approaches to the widespread application of pesticides have increasingly been supplemented by integrated pest management (IPM) approaches in the past decade. Independent of the approach, identifying a disease correctly when it first appears is a crucial step for efficient disease management. Historically, disease identification has been supported by agricultural extension organizations or other institutions, such as local plant clinics. In more recent times, such efforts have additionally been supported by providing information for disease diagnosis online, leveraging the increasing Internet penetration worldwide. Even more recently, tools based on mobile phones have proliferated, taking advantage of the historically unparalleled rapid uptake of mobile phone technology in all parts of the world. This site aims to give a better understanding to the surrounding about the disease that has been adjacent to agriculture and thus gets to know about it. We would be using technology such as Python, Artificial Intelligence, Tkinter, or Flask and tools such as Anaconda, PyCharm, or Spyder as per the need.
Title : IOT and Blockchain based energy trading system
Guide Name : Mrs. Komal Champanerkar
Group Members : 02. Abhishek Bandekar (TL) 20. Laiba Kazi 61. Hudaibiyah Syed 08. Sumeet Choudhary
Abstract : As the use of energy is increasing day by day hence different types of renewable energy trading platforms are being developed and established. So our aim is to develop a decentralized blockchain based peer to peer energy trading system with IoT .Since IoT can play a significant role towards the decentralized energy management. Blockchain provides a secure data validation for the transactions of energy. Pricing mechanism is based on peer negations which may be lower than the local energy markets .and hence is adds an advantage to both prosumers and consumers.
Title : Soil fertility and Plant disease analyzer
Guide Name : Mrs. Komal Chmapnerkar
Group Members : Nilesh Gahlot(TL) ShivamKumar Prasad Aadrash Mishra Sandeep Yadav
Abstract : Agriculture is an essential part of human lives. It is one of the major source of employment in India. More than half of the population depend upon agriculture. It is the backbone of our economy. Crop yield depends on many factors. The major factors which affect the yield of the crop is soil and plant diseases. The early detection of diseases is important in agriculture for an efficient crop yield. The bacterial spot, late blight, septoria leaf spot and yellow curved leaf diseases affect the crop quality of plants. Automatic methods for classification of plant diseases also help taking action after detecting the symptoms of leaf diseases. Improvising the techniques to predict crop yield in different climatic conditions can help farmers and other stakeholders in better decision making in terms of agronomy and crop selection. Crop yield prediction includes forecasting the yield of the crop from previous historical data which consists of factors such as temperature, humidity, pH, rainfall and crop name.
Title : WHO WINS - a cricket analysis webapp
Guide Name : Mrs. Rupali Pashte
Group Members : Hariom Tripathi (TL) Gautam Nahar Arun Pandey Kamlesh Tiwari
Abstract : We have developed a web application to predict the final score and to also predict the winner of the contest before the match begins...
Title : Med Bot (Medical Chatbot)
Guide Name : Mrs. Rupali Pashte
Group Members : Soham Chikane (TL) Mahima Chaubey Sneha Singh Chetan Singh Solanki
Abstract : Many times a patient might underestimate an underlying health condition and neglect it, which may worsen over time and cause a life-terminating disease and sometimes a person might irrationally worry about having a serious medical condition leading to unnecessary health anxiety. Patients in both these scenarios can be helped by having an interface that can provide preliminary diagnostics regarding if he/she has a serious medical condition or it’s just health anxiety. A chatbot can be one such interface that can be deployed to gain information of a patient’s symptoms and determine the underlying medical conditions if any, based on the information given by the patient. Chatbots can be deployed using various technologies such as Deep Learning, Natural Language processing and long-short term memory networks.
Guide Name: Mr. Sunil Yadav/Mrs. Deepali patil
Group Members: Nair Anjana Anilkumar, Nair Abhirami Ajish, Verma Roshan Ranjeet
Abstract : Social distancing is a recommended solution by the World Health Organization (WHO) to minimize the spread of COVID-19 in public places. The majority of governments and national health authorities have set the 2-meter physical distancing as a mandatory safety measure in malls, shopping centres, schools and other covered areas. To ensure social distancing protocol in public places and workplace, the social distancing detection tool that can monitor if people are keeping a safe distance from each other by analyzing real time video streams from the camera, we can integrate this tool to their security camera systems and can monitor whether people are keeping a safe distance from each other or not. Correct facemask wearing is valuable in infectious disease control, but the effectiveness of facemasks has been diminished mostly due to improper wearing. The CCTV captures the images of people not following social or not wearing mask and sends an notification to the authorities alerting them to take necessary action against them. With the help of Artificial Intelligence and Image Processing technologies the social distancing detection tool will alert the public to follow the protocols as well as serve as an emergency fire alarming tool. A fire detection system based on light detection and analysis is an intelligent system that detects fires early, using modern technology. The system uses HSV and YCbCr color models with given conditions to separate orange, yellow, and high brightness from the background. Fire growth is checked based on frame differences. The system works very well when fire occurs, by providing significantly faster detection based on light detection and analysis. With such computational capacities, fire may be observed through monitoring at the early level, and can be beneficial to emergency relief programs, preventing massive ecological and economic casualties, as well as protecting a significant amount of human lives.KEYWORDS: Covid19,Social Distancing, Artificial Intelligence, Image Processing,Fire Detection, Mask Detection,CCTV.
Black Book Serial Number : SLRTCE/IT/Blackbook-1/2021-22
Title: Algorithm Visualizer System
Guide Name: Mr. Sunil Yadav/Mrs. Aarti Puthran ,
Group Members: Gulab Singh, Durgesh Prajapati, Sujeet Pandit
Abstract : Sequences of execution of algorithms in an interactive manner using multimedia tools are employed in this project.It helps to realize the concept of fundamentals of algorithms such as sorting method in a simple manner. Visualization gains more attention than theoretical study and it is an easy way of learning process. We propose methods for finding runtime sequence of each algorithm in an interactive way and aims to overcome the drawbacks of the existing character systems.System illustrates each and every step clearly using text and animation. Comparisons of its time complexity have been carried out and results show that our approach provides better perceptive of algorithms Keywords: Algorithms, Sorting, Visualization.
Black Book Serial Number: SLRTCE/IT/Blackbook-2/2021-22
Title: Cryptocurrency price analysis with ML
Guide Name: Prof. Deepali A. Patil,
Group Members Jain Tanmay Anoop, Joshi Bhargav Divyesh, Khot Mohamed Azeem Riyaz
Abstract : Cryptocurrency is playing an increasingly important role in reshaping the financial system due to its growing popular appeal and worldwide acceptance. While many people are making investments in Cryptocurrency, the dynamical features, uncertainty, the predictability of Cryptocurrency are still mostly unknown, which dramatically risk the investments. It is a matter to try to understand the factors that influence the value formation. In this study, we use advanced artificial intelligence frameworks of Long Short-Term Memory (LSTM) and Linear Regression(LR) to predict the price of different cryptocurrencies. Evaluation of these algorithms is carried out to determine which among the two is better for the prediction to analyse the price dynamics of different cryptocurrencies including Bitcoin, Etherum, and Ripple. However, the explanation of the predictability could vary depending on the nature of the involved machine-learning model. Keywords: LSTM ; Linear Regression ; Cryptocurrency ; Machine Learning
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2021-22
Title: Green Building Price Prediction using Machine Learning
Guide Name: Mrs.Deepali Patil
Group Members Amit Dubey, Munaf Khan, Niraj Jha
Abstract : In the era of Industrial 4.0, many urgent issues in the industries can be effectively solved with artificial intelligence techniques, including machine learning. Designing an effective machine learning model for prediction and classification problems is an ongoing endeavor. Besides that, time and expertise are important factors that are needed to tailor the model to a specific issue, such as the green building housing issue. Green building is known as a potential approach to increase the efficiency of the building. To the best of our knowledge, there is still no implementation of machine learning model on GB valuation factors for building price prediction compared to conventional building development Keywords : Algorithm, Green building, Machine learning, Phyton, Prediction.
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2021-22
Title: Image Encryption using Chaotic System and CML
Guide Name: Mrs. Deepali Patil
Group Members Dave Deep Vikesh, Jain Dhaval Narendrakumar
Abstract : Abstract- The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. Keywords- Coupled-map lattice, fractional-order chaotic system, permutation-diffusion, image encryption, secret keys.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2021-22
Title: Stock Market Prediction And Recommendation System
Guide Name: Mrs. Aarti Puthran
Group Members Khushboo Dattani, Devansh Shah, Ashutosh Shukla
Abstract : Since its inception, the Stock market has become a sophisticated way of investing money and a reliable source of income. But, performance of stock relies on multiple factors which makes it very unpredictable and volatile. This project proposes use of Machine Learning Algorithms, concepts of Neural Network, Sentiment Analysis to predict price of stock. Combining the results of both the data analysis and sentiment analysis, the project recommends on whether given stock should be sold or bought.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2021-22
Title: Pothole Detection Using Machine learning And Image Processing
Guide Name: Mrs. Aarti Puthran
Group Members Prajapati Surajkant, Upadhyay Vipin, Gupta Neeraj
Abstract : Pothole detection is one of the most importanttasks for road maintenance. Proposed system is based on an image processing method. The main advantage of this method is that there is no need for costly hardware or software. Citizens can report a pothole by capturing its picture with their mobile devices and later by uploading or sending to a website. Keywords- Image detection, Pothole detection, Road Maintenance, Machine Learning, Map
Black Book Serial Number: SLRTCE/IT/Blackbook-7/2021-22
Title: A Secure Text Transfer System
Guide Name: Mrs. Madhuri Gedam
Group Members Jash Nimje, Pallavi Mestry, Vineet Shinde
Abstract : Advent of Cloud Computing has been a phenomenal phase in the history of computer science. It provided capabilities to solve many problems that were earlier deemed impossible to be computed by a machine. It removed the pressure from those responsible for manufacturing better machines to keep up with the increasing complexity of the problems that the machines are intended to solve. Cloud Computing provided a platform for better utilization of the resource spread across the world. Being a nascent field, it is crowded with many different problems that the engineers and scientists are working assiduously to eliminate. One of the main drawbacks with cloud is security. So, this project proposes a mechanism for a secure file transfer system using encryption and Diffie-Hellman. The algorithm involves encrypting the file stored on the cloud and using Diffie-Hellman for authenticating the user to decrypt the required file. Keywords: Cloud Computing, Secure text transfer, Diffie-Hellman, Integrity, Confidentiality, Availability
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2021-22
Title: security and privacy in smart farming
Guide Name: Mrs. Madhuri Gedam
Group Members Achal singh, pawan suttar, Ankit yadav
Abstract : In all human history, agriculture is one of the most important industries and a backbone for prevalence of life. The industry has provided and still provides of the essence imperative resources like food, energy, and raw materials.In this paper, we present a holistic study on security and privacy in a smart farming ecosystem. The paper outlines a multi layered architecture relevant to the precision agriculture domain and discusses the security and privacy issues in this dynamic and distributed cyber physical environment. Further more, the paper elaborates on potential cyber attack scenarios and highlights open research challenges and future directions.In this we are providing security using uml diagram KEYWORDS : Security, privacy, precision agriculture, cloud computing, IoT, artificial intelligence (AI),
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2021-22
Guide Name: Mrs. Madhuri gedam
Group Members Mehreen Malik, Shrusti Gupta, Pradyum Joshi
Abstract : Microservice architectures offer small services that may be deployed and scaled independently of each other, and may employ extraordinary middleware stacks for his or her implementation. Microservice architectures emphasize transaction-less coordination among offerings, with express attractiveness of eventual consistency. Microservice architectures are "cloud local" bearing in mind computerized and fast elasticity. Considering that it provides easier governance, decentralized data management, multi language implementation since offerings/features can fail at any time, it's crucial so that it will detect the failures speedy and, if viable, robotically restore the features.Microservice architectures are "cloud local" bearing in mind computerized and fast elasticity. Since an application is composed of multiple micro services which is containerized which share no external dependencies, scaling a particular micro service instance in the flow is greatly simplified: if a particular microservice in a flow becomes a bottleneck due to slow execution, that Microservice can be run on more powerful hardware for increased performance if required, or one can run multiple instances of the Microservice on different machines to process data elements in parallel. Keywords: Microservices, middleware stacks, transaction-less coordination, containerized, decentralized.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2021-22
Guide Name: Mr. Anil Chaturvedi/ Mr. Saurabh Suman
Group Members Aman Gupta Ankit Jha Vivek Dubey
Abstract : Recommender system comprises of two prime methods which help in providing meaningful recommendations namely, Collaborative Filtering algorithm and Content-Based Filtering. In this paper, we have used a hybrid methodology which takes advantage of both Content and Collaborative filtering algorithm into account. The algorithm discussed in this article is different from the previous work in this field as it includes a novel method to find the similar content between two items. The paper incorporates an analysis that justifies this new methodology and how it can provide practical recommendations. The above approach is tested on existing user and objects data and produced improved results when compared with other two Favorite methods, Pure Collaborative Filtering, and Singular Value Decomposition. Keywords: - Recommender Systems, Sparsity, Collaborative Filtering, Content Based Filtering, Singular Value Decomposition, Hybrid Approach
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2021-22
Title: Le Loger
Guide Name: Mr. Anil Chaturvedi/Mrs. Aarti Puthran
Group Members Aaditya Singh, Manish Pandey Harshith Salian
Abstract : In a youth dominant country like India , education is the key aspect of every individual and so thus the quality and availability of resources in terms of education research and infrastructure . People in villages tends to move in the urban and developed cities for the resources and education . People with diversified culture tends to have different priorities in terms of accomodation like nearest availablity of their cultural departmental stores , libraries , sports complexes , easiest transportation and cuisine priority . Solving the problem with exploratory analysis of geolocational data seems to be a vaiable option with a GUI interface . So the proposed method to fetch the data from relevant location (nearest priorities) , to diversify the data set to prepare them for the analysis as per the priorities fetching the geolocational data from best vaiable map API's using the REST API method , to cluster the priorities using machine learning algorithm method i.e. K-Mean Clustering , finally providing the optimal solution by filtering the data as per the priorities using optimized and appropriate searching and sorting algorithms to display the result. keywords:K-Mean algorithm,Map API,searching &sortings Algo,recommandations
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2021-22
Title: Political Evaluation based on Sentiment analysis
Guide Name: Mr. Saurabh Suman
Group Members Vivek Hirpara Vaibhav Mistry Pratik Mogaveera
Abstract : Sometime the news we see and hear is not completely true. And as we all know social media is the ocean of data. Considering the fact that people spend hours on social media ,we can use it to analyze the social behavior of a person. This project is on big data and machine learning, we analyze the Social Impact of the candidate in election or the action taken by them over the people which can be positive or negative using the social media platforms like Facebook, Twitter, Reddit, LinkedIn, and so on. We will analyze the social sentiment in percentage. Using a few algorithms like Naive Bayes algorithm, Random Forest and VADER all together a very accurate result is given as output. It is widely applied to data in form of words and sentences extracted from the response of common people regarding people from political backgrounds to get favourable outcomes .
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2021-22
Title: Smart Healthcare Monitoring System in IoT Environment
Guide Name: Mr. Saurabh Suman
Group Members Tiwari Shivam Rajeshkumar Shukla Pratik Rakesh Rahul Shetty
Abstract : Health is always a major concern in every growth the human race is advancing in terms of technology.In current years, wireless technology has to amplify for the need to prolong various sectors. The Internet of Things (IoT) platform proposes a shows potential technology to accomplish the healthcare as mentioned earlier services, and can further improve the medical service systems. In most recent years, IoT grasped most of the industrial area, especially health care,automation, and control. IoT in healthcare is the key player in providing better medical facilities to the patients and facilitates the doctors and hospitals as well.The proposed system here consists of various medical devices such as sensors and web based or mobile based applications which communicate via network connected devices and helps to monitor and record patients’ health data and medical information.The proposed outcome of the paper is to build a system to provide world-class medical aid to the patients even in the remotest areas with no hospitals in their areas by connecting over the internet and grasping information through about their health status via the wearable devices provided in the kit using a raspberry pi microcontroller which would be able to record the patient’s heart rate, blood pressure. A remote health monitoring system using IoT is proposed where the authorized personal can access these data stored using any IoT platform and based on these values received, the diseases are diagnosed by the doctors from a distance.Some uses of healthcare IoT are mobile medical applications or wearable devices that allow patients to capture their health data. Keywords: Internet of Things, IoT in Healthcare, Patient Monitoring, Raspberry Pi, Smart Health Monitoring.
Black Book Serial Number: SLRTCE/IT/Blackbook-14/22021-22
Title: Self Driving Car
Guide Name: Mrs. Reena Kothari
Group Members Faisal Khorasi Jyotsna Kanoujia
Abstract : In the modern era, the vehicles are focused to be automated to give human driver stress-free driving experience. In the field of automobile various aspects have been considered which makes a vehicle automated. Tesla, the biggest world leader in electric cars has been working on the self-driving cars since a long time and is still developing new changes to give a whole new level to the automated vehicles. Our self driving car project is based on image recognition by using an optical sensor device. This vehicle will capture the image in front of it, detect elements like traffic signals, other vehicles, road signs, etc (machine learning) and take appropriate action based on logic provided. This optical image recognition system is very crucial for self driving cars since sensors cannot detect traffic signs and signals and therefore leads to dependency on the driver defeating the purpose of autonomy. By using this technology, we can teach cars what sign boards and signals mean which will let it take intelligent decisions when it detects one of the learned signs and will help to achieve autonomy on a greater scale Keywords: Autonomy, Image Detection and Recognition, Optical sensors, Optical input.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2021-22
Title: Netdriod
Guide Name: Mrs. Reena Kothari
Group Members Khalid Shaikh Supriya shelar Abhishek Prasad
Abstract : Android phones are now becoming handy to many and many people with the advance of electronics and communication technology. Android is the most popular operating system for Smartphones and other electronic devices such as tablets. Hence, for network administrators, it is essential to start managing all the Android based devices. Networks are formed by the collection or group of computers. While in office is an easy task to manage and control the activities of the network.There are the numerous tools which are available for network analysis, packet analysis such as Wireshark, Netresec, Termux. We have represented an application idea through which users can analyze the network traffic, detect malicious packet, MAC spoofing, ARP spoofing, protocol filtering. In this app we will implement multiple networking tools together such as wireshark,whois,ping,etc. Which will ease the process of network administration through mobile devices. Keywords: Android, Network Monitoring,Packet Analysis, Termux, Wireshark,Arp Spoofing,
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2021-22
Title: E-UTS
Guide Name: Mrs. Reena Kothari
Group Members Verma Sushma Yadav Ankita
Abstract : The evolution of the “SMART CITY” initiative all over the world, the need for enhancement in Transport and communication is much required. This application uses QR-code for providing security to the generated ticket. This paper also analyses what will be the future advancements and implementations of the system. Thus, this proposal will show how this system can be executed and will benefit everyone with the help of the research and survey.The online QR Based ticket generation system has its database centrally located which is accessed through an Application Programming Interface (API). The Railway reservation system involves three main actors the database, online operator and a database scheduler. The database scheduler updates the database. One of the core functions of the inventory management of railway reservation systems is the inventory control. Inventory control steers how many seats are available for the booking in the unreserved section. Keywords: Android Application, QR Code Image, Firebase, XML, Java, NoSql, Google Map API
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2021-22
Title: Diet Recommendation for Patients
Guide Name: Mrs. Komal Champanerkar/Mrs. Rupali Pashte
Group Members Shweta Kumar Shekhar Upadhyay Moksha Mathur
Abstract : In the recent aging society, studies on health care services have been actively conducted to provide quality services to medical consumers in wire and wireless environments. However, there are some problems in these health care services due to the lack of personalized service and the uniformed way in services. For solving these issues, a diet recommendation service can be proposed and implemented as it only focus on the personal disease information. Our project provides a customized diet recommendation using machine learning and Deep learning Concepts. It provides service for preventing and managing chronic disease in health care services. This system provides diet to customers by considering the basic information physical measurements and food preferences according to seasons and intakes for the customers who are concerning about the various chronic diseases. The system can be usefull for individuals as well as doctors as it supports continuous services, customization and helps in adaptation of healthy living habits. Keywords: Diet recommendation; Machine Learning; Deep learning; Customization; Healthy living.
Black Book Serial Number: SLRTCE/IT/Blackbook-18/2021-22
Title: Game Playing AI using Reinforcement Learning
Guide Name: Mrs. Komal Champanerkar/Mrs. Reena Kothari
Group Members Deepak Gupta Neeladri Chatterjee Harsh Dubey
Abstract : Reinforcement Learning is a category of machine learning, that is based on evaluative feedback. It is about taking suitable actions and maximising rewards, which is based on feedback mechanisms. Reinforcement Learning has proven to be the state of arts method for a lot of tasks related to Artificial Intelligence. This paper presents implementation of one of the most important reinforcement learning algorithms. The project uses 3 games in which the agent will learn control policies using reinforcement learning approaches to achieve a high score. The project explores two deep reinforcement learning approaches, Markov Decision Process and Deep Q-Learning, both of them are proposed by DeepMind to train intelligent agents that can interact with an environment with the help of automatic feature engineering and thus requiring minimal domain knowledge. Keywords— Reinforcement Learning, Q-Learning, Markov Decision Process.
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2021-22
Title: Payment Through Face Recognition and Password
Guide Name: Mr. Satish Ranbhise/RL
Group Members Praveen OmPrakash Vishwakarma Rakesh Yadav Rajesh Doari
Abstract : Now a days we see that most of the people are using card or mobile wallet for payment purpose. But we have to carry these cards everywhere and also we have to keep them safe. Still card fraud is happening day-by-day. The mobile wallet also lags security. This paper describes a new method of payment which is “Payment Through Face Recognition ”. The main objective of this project is to develop a secured and robust payment system using face recognition in python programming language with the help of OpenCV along with password as a method of payment and making system both card less and cashless. Keywords- biometric, face recognition, card less payment, authentication
Black Book Serial Number: SLRTCE/IT/Blackbook-20/2021-22
Title: E-menu with restaurant management system
Guide Name: Mr. Satish Ranbhise/RL
Group Members Rai Surabhi Jayprakash Maurya Rajesh Baijnath
Abstract : There are numerous ways in which the customer experience can be improved in the hotel industry. One great way to do this is through a E-menu with management system. Instead of the current system of ordering food through printed menu cards, customers will be able to order their choice of meal through an app in the restaurants. This gives the customer complete freedom to browse through the menu and placing their order, which can then be sent to the kitchen for preparation. The app will have a very simple and easy yet effective user interface for the customers. This will reduce the need for printing multiple copies of the menu card. The menu can be easily updated and maintained by the restaurant staff as well unlike in the case of printed menu cards. Keyword -Restaurant Management,Handling Reservations, Electronic- Menu, Data Retrieving;
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2021-22
Title: E - Election System Using Blockchain
Guide Name: Mrs. Rupali Pashte
Group Members Kanojia Piyush Rajesh Yadav Rachana Ramkripal
Abstract : There is a rise in e-learning for the past few years across countries due to its flexibility, availability and user friendliness. With its certain benefits in condemning situations like natural disasters (e.g. COVID-19 pandemic etc.) and war circumstances, E-learning in higher education has exponentially increased. On campus, the students are generally tested on the basis of oral and written examination. In times of COVID-19, however, a new form of education is called for students as they are unable to be physically present on campus. Due to this the education and assessments are need to take place at a distance. With online examinations in picture the major challenge to be faced is the use of proctoring techniques. An online examination system that has the ability to address academic malpractice is the main concern to be able to trim down those acts at some degree. Online exams are conducted with the physical absence of students and instructors on E-learning platforms. This leads to several issues like security and integrity during online exams. As we know online examination is an integral part of E-learning solutions for the genuine and fair assessment of students’ performance . In this paper we introduce a proctoring method to detect and reduce the cheating.
Black Book Serial Number: SLRTCE/IT/Blackbook-22/2021-22
Title: E - Election System Using Blockchain
Guide Name: Mrs. Rupali Pashte
Group Members Kanojia Piyush Rajesh Yadav Rachana Ramkripal
Abstract : Blockchain may be a system of recording info in a very means that produces it troublesome or not possible to vary, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the total network of laptop systems on the blockchain. Instead of a centralized data, all the group action information that's shared across the nodes within the blockchain is contained in bundles of records known as blocks, that square measure in chains along to make the general public ledger. Using blockchain, option methods are often created safer, clear, immutable, and reliable. Using traditional net portals are often led in tamper of information however blockchain stores everything as a transaction. The identification of the voters will be done using smart contracts. We will be using Ganache throughout the procedure which will enable us to test our system. Hence we are proposing this method wherever whole voting procedures are done securely. Convenient to everyone staying away from their homelands and taking part into the Democratic elections by voting . A true case of democracy can be seen here. Keywords : blockchain , ledger , centralized data , immutable , smart contract , ganache
Black Book Serial Number: SLRTCE/IT/Blackbook-23/2021-22
Title: Content management system for music company
Guide Name: Mrs. Rupali Pashte
Group Members Prabhat Singh
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-24/2021-22
Title: Driver Drowsiness detection system and technique
Guide Name: Mrs. Madhuri Gedam
Group Members Dipesh patil
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-25/2021-22
Title: Forest fire prediction system
Guide Name: Mr. Satish Ranbhise
Group Members: Pratima chaubey, Abhishek chaurasiya, nidhi yadav
Abstract : Forest fires, usually occurring in the forest area or wild land and are uncontrolled fires and cause significant damage to natural and human resource, which are one of the most dangerous disasters to the ecological environment .The Recommended system use various technology like machine learning techniques and Artificial Intelligence and Wireless network utilized for collecting 24-hour weather data continuously, which provides a high chance to reflect accurately the status of forest environment. Depending on the system, we can obtain which days are the high possibility of forest fires danger and paid special attention to prevent forest fire for forest guards. Forest fire prediction constitutes a significant component of forest fire management. It plays a major role in resource allocation, mitigation and recovery efforts. This system presently analyzed of the forest fire prediction methods based on artificial intelligence. A novel forest fire risk prediction algorithm, based on support vector machines, is presented. The algorithm depends on previous weather conditions in order to predict the fire hazard level of a day. The implementation of the algorithm using the present data and accurately predict the hazard of fire occurrence.
Black Book Serial Number: SLRTCE/IT/Blackbook-1/2020-21
Title: Breast Cancer Detection using machine learning
Guide Name: Prof. Sunil Yadav
Group Members: Rohit Yadav, Aditya tripathi, Rahul lata
Abstract : Breast cancer is one of the most common type of cancer and cancer is quite difficult to detect based on traditional diagnosis and many woman loose their life due to this lack of efficiency but with advancement in machine learning and AI we can use machine learning algorithms to improve detection of cancer in this method of detection we will use various features of the tumour which includes. radius,perimeter,smoothness,compactness,concavity,concavepoints,symmetry,fractal dimensions. Based on these features one can increase the chance of detection.
Black Book Serial Number: SLRTCE/IT/Blackbook-2/2020-21
Guide Name: Mr. Saurabh suman
Group Members Anupam Kumar Singh, Megha Dave, Ankit Shukla
Abstract : As Indian Railways has one of the largest railway networks in the world, crisis- crossing over 1,15,000 km in distance, all over India. However, with regard to reliability and passenger safety Indian Railways is not up to global standards. Among other factors, cracks developed on the rails due to absence of timely detection and the associated maintenance pose serious questions on the security of operation of rail transport. A recent study revealed that over 25% of the track length is in need of replacement due to the development of cracks on it. Manual detection of tracks is cumbersome and not fully effective owing to much time consumption and requirement of skilled technicians. This project work is aimed towards addressing the issue by developing an automatic railway track crack detection system. This work introduces a project that aims in designing robust railway crack detection scheme (RRCDS) using ULTRASONIC SENSOR assembly system which avoids the train accidents by detecting the cracks on railway tracks. And also capable of alerting the authorities in the form of SMS messages along with location by using GPS and GSM modules. The system also includes distance measuring sensor which displays the track deviation distance between the railway tracks.
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2020-21
Title: Analysis and prevention from phishing attacks
Guide Name: Prof. Madhuri Gedam
Group Members Abu sad Chaudhary, luvkush gupta, Rucha desai
Abstract : One of the biggest problems with the Internet technology is the unwanted spam emails. The well disguised phishing email comes in as part of the spam and makes its entry into one’s inbox quite frequently nowadays. Phishing is one of the major problems faced by cyber-world and leads to financial losses for both industries and individuals. Detection of phishing attack with high accuracy has always been a challenging issue. At present, visual similarities based techniques are very useful for detecting phishing websites efficiently. Phishing website looks very similar in appearance to its corresponding legitimate website to deceive users into believing that they are browsing the correct website. Visual similarity based phishing detection techniques utilize the feature set like text content, text format, HTML tags, Cascading Style Sheet (CSS), image, and so forth, to make the decision. These approaches compare the suspicious website with the corresponding legitimate website by using various features and if the similarity is greater than the predefined threshold value then it is declared phishing. While phishing is normally considered a consumer issue, the fraudulent tactics the phishers use are now intimidating the corporate sector as well. Phishing attacks are increasing with burgeoning rate which is highly problematic for social and financial websites. Many anti phishing mechanisms currently focused to verify whether a web site is genuine or not.
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2020-21
Title: Fake news detection
Guide Name: Prof. Reena Kothari
Group Members Deepa bhat, kinari Shetty, Priyanka Chaudhary
Abstract : Fake News is a term used to represent forged news that consists of misleading information that is widely spread through traditional media channels like print, and television as well as newly emerged media channels like social media which include software like “Twitter”, “WhatsApp” and “Instagram” which are most used apps to do so. The drastic increase in forging of factual news into fake data poses an immediate need for automatically tagging and detecting such twisted news articles. In this paper we are keen on finding the solution to possibly end the spread of fake news by using Deep Learning algorithms. This paper also focuses on the challenges introduced by the unknown characteristics of fake news among news articles, creators and subjects. The paper also focuses on how to analyse the nature of the news and accordingly categorize it on the basis of the type of forgery performed on the data and will also simultaneously focus on the side-by-side comparison between fake and real news. We would like to further dig deep and evaluate the effects of such news propagation on the readers and come up with simple techniques for faster prediction. The research can borrow qualitative models built on similar tasks by other disciplines and re-evaluate feature engineering and pre-processing techniques used.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2020-21
Title: Chest disease detecting using chest x-ray images
Guide Name: Prof. Anil chaturvedi
Group Members Rajan verma, sachin tripathi, sunil yadav
Abstract : Chest X-Rays image classification is an active research area in medical image analysis as well as computer-aided diagnosis for radiology. The main goal of our project is to improve the quality and productivity of radiologists’ tasks by providing a system for detecting, classifying prediction of chest diseases. A few studies have been conducted in applying machine learning methods to produce a high-quality chest X-ray image classification approach but this project aims to classify and predict the chest X-ray images and also provide a localization of the disease detected with the help of gradient weighted class activation mapping (Grad-Cam) which will help in prediction of a disease.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2020-21
Title: Playstore app analysis
Guide Name: Prof. Anil chaturvedi
Group Members: Akhlak ali, sunasara, nancy jaiswal, suchit poojari
Abstract : Software application is important because specific software is needed in almost every industry,in every business,amd for every function.It become more important as time goes on.Mobile app distribution platform such as Google play store gets flooded with millions of new applications uploaded by developers everyday. So in this project, we aim on analyzing Google play store that provides a particular app description and data such as reviews, ratings, price and number of downloads. The objective of this is to analyze the desire of the customer through the reviews provided in the feedback section and apps trend in the market to help the organization & developers. To this end, we provide an idea about app that managed to get maximum and minimum number of downloads and predicting the category of apps that is most likely to be downloaded in the coming years. Moreover, doing sentimental analysis on the apps that generated most positive and negative sentiments, sustainibility of app in market on basis of previous data and current market situation. Futhermore, also analyzing the apps that has maximum downloads have they managed to get average rating so that concluding the co-relation between number of downloads and ratings received.
Black Book Serial Number: SLRTCE/IT/Blackbook-7/2020-21
Title: Integrated cctv survilence system for public transportation
Guide Name: Prof. Saurabh suman
Group Members Dhaval, vibhakar, Aditya kamble, suraj jha
Abstract : The Western Mumbai Suburban Railway is one of the busiest railway stations in India and carries more than 7.5 million commuters daily.The Western railways spreads over 123.78 km (76.91 mi).The Western Railways consist of 39 stations.Trains usually start from and terminate at important stations. According to a survey ,the total stats given by the RPF(Railway Police Force) & GRP(GOVERNMENT RAILWAY POLICE), 2,700 railway commuters killed, over 1,400 while crossing tracks up till last and this number has been increasing day by day.This is making railways a dangerous option for travelling and transportation.The video surveillance system used is irving to be not helpful and not updated.To overcome this problem we are making an integrated video surveillance system for detection of crimes and left out objects and explains in this paper.We are using high resolution cameras which can focus and can be easily used to identify a person and also can be useful in night time.
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2020-21
Title: Expression Analysis System
Guide Name:
Group Members
Abstract : Expression is the most basic personality trait of an individual. Expressions, ubiquitous to humans from all cultures, can be pivotal in analyzing the personality which is not confined to boundaries. Analyzing the changes in the expression of the individual can bolster the process of deriving his/her personality traits underscoring the paramount reactions like anger, happiness, sadness and so on. This paper aims to exercise Neural Network algorithms to predict the personality traits of an individual from his/her facial expressions. In this paper, a methodology to analyze the personality traits of the individual by periodic monitoring of the changes in facial expressions is presented. The proposed system is intended to analyze the expressions by exploiting Neural Networks strategies to first analyze the facial expressions of the individual by constantly monitoring an individual under observation. This monitoring is done with the help of Open CV which captures the facial expression at an interval of 15 secs. Thousands of images per expression are used to train the model to aptly distinguish between expression using prominent Neural Network Methodologies of Forward and Backward Propagation. The identified expression is then be fed to a derivative system which plots a graph highlighting the changes in the expression. The graph acts as the crux of the proposed system. The project is important from the perspective of serving as an alternative to manual monitoring which are prone to errors and subjective in nature.
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2020-21
Title: Age Estimation (Juvenile)
Guide Name: Prof. Saurabh suman
Group Members Nitish pandey, ravi sharma, yash singh thakur
Abstract : Age estimation models have been developed by many but no one has been able to build it with much accuracy and precision. This becomes even more challenging while estimating age of juveniles. This project aims to find a solution to this challenging problem. Juvenile age estimation can be used in multiple domains. It can be used majorly to stop criminal activities affecting children and teenagers. Faces of the subjects are captured and then the images are analysed using neural networks. The project is based mainly on concepts of machine learning like computer vision and convolution neural networks. This project has enormous scope as the algorithm applied can be continuously optimised as per requirements. Convolution Neural networks are highly used for tasks involving image analysis and identification. Computer vision deals with how the computer perceives and visualises the input provided to it. The fundamental concepts used in any machine learning based image analysis are Computer vision and Convolution Neural networks. These fundamentals have been developed by researchers across the world but still have some improvements to be done. With accurate dataset and proper optimisation of algorithms it is possible to create an age estimation model more precise and accurate than the existing ones.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2020-21
Title: Face liveness detection system
Guide Name: Prof. Saurabh suman
Group Members Asma khan, jaydeep dave, bhaskar gupta
Abstract : The objective of the project is to build a spoof-free Face Liveness Detection system with an active approach that uses the challenge-response methodology which detects the motions and gestures of the system user, thereby differentiating a real face from a photo. With the ever-escalating volumes of digital data, systems that pertains to having unsupervised authentication procedures and are hence vulnerable to cyberattacks like identity thefts has led to serious security concerns. Face liveness detection assures the user’s actual presence and validates their identities. Fraudulent reproduction of 2D facial images that were intended to spoof the system would be declined access and thus effectively protects privacy rights of the legitimate user. Review of the many scholarly pieces of the literatures revealed works of some of the existing systems that used or suggested various active and passive techniques to test liveness; Human-Computer Interaction (HCI)-based approach proving to demonstrate substantially high accuracy amongst them. The aim is to create a system that is his highly accurate, efficient and can be integrated with the existing systems.
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2020-21
Title: Space X : The unreal reality
Guide Name: Prof. komal champanerkar
Group Members Yutika donga, rupal ghervada, ritika shukla
Abstract : The project aims in designing a simulation that can be operated on Android and IOS mobile comprising of gyroscope. The interactive simulation of SpaceX: The unreal reality is demonstrated in our smartphone using coordinative combination of virtual reality and augmented reality. Here in the project the VR Box 2 is used is used to view the simulation of Virtual Reality with Gaze Interaction and Virtual Buttons are used to interact in Augmented Reality. Android and iOS is the software stack for mobile devices that includes an operating system, middleware and key applications. Gyroscope present in the device is used to detect the orientation that is used to augment the objects in real world and view through virtually designed world. In addition, Unity plays a key role in developing the application providing vast plugins to embed AR and VR technologies and also provide cross platform applicability. Augmented reality is the mixture of virtual reality with real life, using layers of computer generation to enable us an enhanced interaction with reality. This is usually done through apps (such as Pokémon GO), but can also be used for sporting events, driving, and much more. Virtual reality, on the other hand, is a completely artificial, computer-generated simulation of a real-life experience. This typically required the use of a virtual reality headset, such as Oculus Rift or HTC Vive, in order to fully immerse the user. This project contains various user interaction by means of virtual buttons, gaze interaction and speech recognition The project at last provides the Mixed Reality Simulation combining both AR and VR technologies and depicts the vision of Elon Musk’s Mission of SpaceX to colonise Mars. Keywords: Unity, Virtual Reality, Augmented Reality, Mixed Reality, Virtual Buttons, Gaze Interaction, Speech Recognition, Android and iOS.
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2020-21
Title: Video based covid monitoring system
Guide Name: Prof. sunil yadav
Group Members Asfaq Parkhetiya , Devesh Shetty , Fayeq Zaidi
Abstract : This project aims at creating a system that will contribute to improve the situation in this COVID-19 pandemic. In this covid-19 situation the main thing is prevention and precaution and to do so people in all over the world people are suggested/instructed to wear face mask and to maintain social distancing while being at public places like grocery shops, markets, workplaces etc. to help maintain and control the virus. So, to help government to monitor that the people are following the instructions our project will be useful here. Here we are planning on building a video-based monitoring system that will help government to monitor that people are following the instructions to contain the spread of the virus. Here the monitoring will be done through CCTV cameras. The project will use the concept of machine learning and computer vision to help in detection. Here the system will use CCTV camera for periodic monitoring and with the help of machine learning algorithms our system will detect if people are wearing mask or not and it will also help in the detection of whether they are maintaining social distancing or not. It will also help detecting crowded place and whether people are entering no entry zones. The system will be also useful to detect whether people are sneezing or spitting in open out in public places. Hence, they will be very effective in this covid-19 situation.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2020-21
Title: Predictor – The decision crafter
Guide Name: Prof. Satish ranbhise
Group Members Dishant Chandura Darshit Shah Harsh Shah
Abstract : Prediction System plays very important role in today’s digital world. Recommendation System makes use of information retrieval, machine learning, big data, cloud computing and data mining to provide better information, better statistics and helps businesses grow. “Prediction” refers to the output of an algorithm after it has been trained on a historical dataset and applied to new data when forecasting the likelihood of a particular outcome, such as whether or not a customer will churn in 30 days. The algorithm will generate probable values for an unknown variable for each record in the new data, allowing the model builder to identify what that value will most likely be. The main intension behind the development of this project is to make actual use of the prediction software’s. This will collect information from the users in form of quiz and also with the help of web-scraping. In this way it will not only make use of old data but also new data gathered from the users. Which can be further used to help the government as well as businesses. Data of all the users will be secure and no use of personal data will be done. Only data collected with the help of quiz will be used for prediction and rewards to the user will be given on that basis.
Black Book Serial Number: SLRTCE/IT/Blackbook-14/2020-21
Title: Image Caption Generator
Guide Name: Prof. komal champanerkar
Group Members: Prashant Yadav, vishal vishwakarma, aakash tiwari
Abstract : As one of the most intelligent beings on the planet, we are equipped with the most powerful visual and language system as it is easy for us to extract visual information from a given image and transform it into proper linguistic description. Image Caption Generator deals with generating captions for a given image. The capturing mechanism involves a tiring task that collaborates both computer vision and image processing. The mechanism must detect and establish relationships between objects, people, and animals. The aim is to detect, recognize and generate worthwhile captions for a given image. We use transfer learning CNN on sentences, and extract image representation with Neural Networks. The proposed system is based on using the Computer Vision for object identification and Natural Language Processing for caption generation, more than 8000 images are being fed for training model of different categories to cover a range of objects and enough for an adequate accuracy.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2020-21
Title: Rainfall Prediction and irigation Recommendation
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Group Members: Abhishek Jain, Shakib Badrapura, Aniket Gupta
Abstract : Rainfall prediction is one of the most important and challenging tasks in the modern world. In general, climate and rainfall are highly non-linear and complicated phenomena, which require advanced computer modeling and simulation for their accurate prediction. An Artificial Neural Network (ANN) can be used to predict the behavior of such nonlinear systems. ANN has been successfully used by most of the researchers in this field for the last twenty-five years. The survey also reports that rainfall prediction using ANN technique is more suitable than traditional statistical and numerical methods. After the prediction of rainfall, the system also recommends different crops that can be grown as per the rainfall and the type of soil found in a particular area or a region. The results show that it is possible to predict annual rainfall with acceptably accuracy.
Black Book Serial Number: SLRTCE/IT/Blackbook-1/2019-20
Title: Traffic Sign Detection and Recognition
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Group Members: Ashika Poojari, Jayesh Choudhary, Siddharth Gaglani
Abstract : A road sign detection and recognition system is providing a comprehensive assistance to the driver to follow the traffic signs by developing a system that will automatically detect and recognize traffic sign, thus providing accurate information to the driving system. This system comprises of capturing signboards using camera installed in the vehicle. This captured image will undergo for analysis, processing and identifying the signboard. The detected sign board will be notified to the user by sending a notification. This paper classifies the methods applied to road sign recognition and a comparison of the features of these methods is given.
Black Book Serial Number: SLRTCE/IT/Blackbook-2/2019-20
Title: Secure Grocery Recommendation System using Block Chain
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Group Members Rahul Vishwakarma, Akarsh Rai, Shakib Shaikh
Abstract : Recommendation System plays very important role in todays digital world. Recommendation System makes use of information retrieval, machine learning and data mining to provide better user experience. Recommendation System provide personalized recommendation to the end user and help in decision making . This recommendation system will provide latest and best price from different online store such as Amazon, Bigbasket, Grofers. It will make recommendation on the basis of recent search and the most frequent item which a user may require.Traditionally a user has to search across various sites in order to get the best deal which was a bit tedious and time consuming but our project will provide seamless experience as all the data regarding a product will be available at one place where the user will have freedom to choose the best price and merchant as per his/her requirement.
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2019-20
Title: Hybrid Recoomendation System Using Blockchain
Guide Name: Prof. Reena Kothari,SLRTCE,Mira Road,M.Tech IT
Group Members Satish Prajapati, Abhiram Yadav, Anurag Wankhede
Abstract : A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity Block chain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare.In this project we present a Block chain-based approach to store & share patient data. With block chain applications in healthcare, now you can publish your medical records safely on block chain (i.e. uses block chain technology to securely store Health records and maintains a single version of the truth).
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2019-20
Title: Crime Analysis and Prediction Using Data Mining
Guide Name: Prof. Reena Kothari,SLRTCE,Mira Road,M.Tech IT
Group Members Raj Singh, Rishab Singh, Pintu Prasad
Abstract : Crime analysis and prevention is a systematic approach for identifying and analyzing patterns and trends in crime. Our system can predict regions which have high probability for crime occurrence and can visualize crime prone areas. Crime is one of the biggest problem in our society and its prevention is an important task. The objective of this project is to analyse large data sets which consist of numerous crimes and predicting type of crime which may happen in future.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2019-20
Title: Cloud Based Secured FIR Storage System
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members Mangesh Tiwari, Ajit Yadav, Rahul Yadav
Abstract : As Internet usage is growing daily the world is coming closer making it a smaller place to live for its users. However, it has also managed to create problems for people because of the increase in cyber-crimes. So there is a need for monitoring and analyzing both user and system activities and thus tracking as well as blocking the Following Attack. IDS and IPS have a substantial societal impact on reducing the number of cyber-crimes and providing a platform to facilitate basic security amenities for small scale firms and budding entrepreneurs. Data capture and data control are used by the research community to study issues in network security, such as Internet worms, sql injection, spam control, and Denial of Service (DoS) attacks. In this paper, we will be focusing on prevention from the attacks.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2019-20
Title: Providing Security Casscmdog Data Base By Encryption
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members Manoj Raut, Shivansh Pandey
Abstract : The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications. These algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.
Black Book Serial Number: SLRTCE/IT/Blackbook-7/2019-20
Title: Health Med Application Based on online Medicine Shoping
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members Saurabh Vishwakarma, Krishna Vishwakarma, Omprakash Yadav
Abstract : This paper implements an E-Commerce site for online medicine shopping. This website is developed to facilitate online medicine purchase by verifying the prescription uploaded by the user or can be manually purchased by the user and to confirm the order. This system includes pharmacist interface, database, web service provider for intermediate process to provide service through website. When the user wants to make purchase through website, necessary to upload the authorized prescription from a doctor and the prescription will be stored in the database. Then the system will show the list of nearby pharmacy store which is recorded in database to the user then user will be asked to select the particular pharmacy store. When the medicine is available in the pharmacy, the user allowed to add the medicine in the cart list, if the medicine is not available in the pharmacy, the system will hold the process for the pharmacist response to post a suggestion and get confirmation for providing equivalent brand of medicine. The prescription uploaded by the user is compared with the cart list and will be approved by the pharmacist before placing the order. The domain of this system is web application.
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2019-20
Title: Handwriting Analysis Detection Personality
Guide Name: Prof. Komal Champanerkar ,SLRTCE,Mira Road,M.Tech
Group Members Dhiraj Lotlikar, Pratikshit Mishra, Punit Solanki
Abstract : Among all the unique characteristics of a human being, handwriting carries the richest information to gain the insights into the physical, mental and emotional state of the writer.Graphology is the art of studying and analysing handwriting, a scientific method used to determine a person‟s personality by evaluating various features from the handwriting. The prime features of handwriting such as the page margins, the slant of the alphabets, the baseline etc.can tell a lot about the individual. To make this method more efficient and reliable, introduction of machines to perform the feature extraction and mapping to various personality traits can be done. This compliments the graphologists, and also increases the speed of analysing handwritten samples. Various approaches can be used for this type of computer aided graphology.
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2019-20
Title: Automated Turberculesis Detection Through Chest X-Ray Image Using Neural Networks
Guide Name: Prof. Komal Champanerkar ,SLRTCE,Mira Road,M.Tech
Group Members Ankit Tiwari, Riti Singh, Shreyash Pandey
Abstract : Tuberculosis is a fatal disease that is a major health concern in developing countries. A lack of treatment and error in diagnosis results in death of many patients every year. Timely diagnoses of tuberculosis are very important. A number of methods have been developed. A computer aided diagnosis (CAD) can help in early diagnosis of tuberculosis. The paper explores the usefulness of deep learning (DL) in tuberculosis detection. Currently major computer aided diagnosis (CAD) systems use handcrafted features, however recently there is a shift towards deep learning based automatic extractors. This paper proposes the ideology of detection of tuberculosis with automated classifiers using convolution neural network (CNN) in chest x-ray (CXR) graphical images.Keywords:computer aided diagnosis(CAD); deep learning; chest x-ray; convolution neural network
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2019-20
Title: Arumeneted Reality For Teleprere Robot
Guide Name: Prof. Rupali Pashte, SLRTCE, Mira Road,ME
Group Members Sadaf Mirza, Shreya Jagtap, Kamna Jha
Abstract : The revolution in interfaces that are built for interaction with computer has been tremendous in the past few years and Augmented Reality (AR) is the part of this revolution. AR is the modification in the real world by augmenting it with virtual objects. It is related to mediated reality where we see a reality that is modified by the computer.In this project, our aim is to develop a grid based navigation model on the real time video input that is obtained by the camera. A remote user of a tele-robot will be able to navigate through the working environment with the help of this calibrated grid on a fixed sized marker which will be developed using OpenGL in the real time video feed. This will be achieved using the Augmented Reality techniques.
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2019-20
Title: Face Recogonised Based Attendance and Door Unlock System
Guide Name: Prof. Rupali Pashte, SLRTCE, Mira Road,ME
Group Members Mandar Khandagale, Akshay Damodarn, Sunil Kumawat
Abstract : In recent years, the security constitutes the most important section of the human life. At this time, the cost is the greatest factor. This system is very useful for reducing the cost of monitoring the movement from outside. In this project, a real time recognition system is proposed that will equip for handling images very quickly. The main objective of this system is to protect office by recognizing people who are working in the office and give access to them and mark attendance. For this purpose, when the user press the button. Afterwards, the Raspberry Pi will capture the images. Then, the face will be detected and recognized in the captured image. If someone outsider came in the office the images and notifications will be sent to a Smartphone based application and. The proposed systems are real-time, fast and have low computational cost. The experimental results show that the proposed face recognition system can be used in a real time system.
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2019-20
Title: Driver Drowsiness Detection System
Guide Name: Prof. Rupali Pashte, SLRTCE, Mira Road,ME
Group Members Nandini Upadhayay, Rinkiy Singh, Sundaram Dubey
Abstract : Today, Driver drowsiness is the major cause for most of the accidents in every country. Detecting the eye of the driver for tiredness is the easiest way for measuring the drowsiness of driver. For the face detection, the system uses the certain algorithm to detect face position and face size, and the face geometrical position is used for reducing the searching range of eyes. Next, the proposed eye detection algorithm for the eye Location is to judge whether the driver wears glasses or not.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2019-20
Title: Biometric Hand Vein Authentication
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Anisha Poojary, Avinash Chourasiya, Karan Jha
Abstract : Biometric authentication is a method of identifying individuals for security purpose based on the distinctive physiological characteristics of a person for verification and authentication.Vein pattern is an extensive network of blood vessels beneath a person’s skin. These vein patterns in the hands are considered to be distinct and unique to eachindividual and they do not change over time except in proportions. Taking in considerations the drawbacks of other biometric recognition methods, hand vein biometric is selected, as it is efficacious, guaranteed, secure and highly reliable for identification, authentication of individuals.
Black Book Serial Number: SLRTCE/IT/Blackbook-14/2019-20
Title: Smart Diseases Prediction
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Prachi Govekar, Siddhi desai, Ishank Darekar
Abstract : There happens a case where so many times that someone needs doctor’s help immediately may be at midnight, but they are not accessible due to some reason. The Disease Prediction system is an end user support and online consultation venture. Here we propose a system that allows the end users to get instantaneous assistance on their health issues through an intelligent health care system online.If the system is not able to provide any suitable results, it informs the user about the type of disease or disorder it feels user’s symptoms are associated with. If user symptoms do not exactly match any disease in our database, it shows the diseases user could possibly have judging by his/her symptoms. It also consists of doctor address nearby and contacts along with Feedback and administrator dashboard for system operations.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2019-20
Title: Obstacle Avoiding Arduino Vehicle
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Anita Duvey, Chandesh Chaubey
Abstract : The use of autonomous systems in the world to perform relevant and delicate task is fast growing. However, its application in various fields cannot be over emphasized. This paper presents an obstacle detection and avoidance system for an unmanned Arduino vehicle. The system consists of Ultrasonic sensors, an Arduino uno ,motor drivers and a gear DC motor.In conclusion, an obstacle detection circuit was successfully implemented using ultrasonic sensors modules which were placed at the front of the robot to throw both light and sound waves at any obstacle and when a reflection is received, a low output is sent to the motor boards which interprets the output and makes the robot to stop and move in opposite direction.
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2019-20
Title: Automated Carrer Anaysis and Recommendation System
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.E
Group Members Harshan Sarvaiya, Harshit A Singh, Namrata Poswal
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2018-19
Title: Wink Talk- Sign to Speech Converter
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.E
Group Members Jyoti Halemani, Aditi Kumar, Vibhangi Srivastava
Abstract : Technology has always been of great help to the disabled and given them a helping hand to allow them to live a normal and healthy life as others. Human beings have a natural ability to see, listen and interact with their external environment. Unfortunately, there are some people who are differently abled and do not have the ability to use their senses to the best extent possible. Such people depend on other means of communication like sign language. This presents a major roadblock for people in the deaf and dumb communities when they try to engage in interaction with others, especially in their educational, social and professional environments. Therefore, it is necessary to have an advance gesture recognition or sign language detection system to bridge this communication gap.
Black Book Serial Number: SLRTCE/IT/Blackbook-18/2019-20
Title: Medicine Recommendation
Guide Name: Prof. Komal Champanerkar ,SLRTCE,Mira Road,M.E COMP
Group Members Dilip Parmar, Varun Goyal, Namaskar Joshi
Abstract : Smart medicine recommender is a project where a person will be able to get to know about different medicine when he/she enters about the diseases ,along with medicines they will also be able to know about alternative medicines
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2019-20
Title: Smart Parking System
Guide Name: Prof. Saurabh Suman ,SLRTCE,Mira Road,M.E
Group Members Saylee Raut, Omkar Salunke, Mohit Sawant
Abstract : In recent times the concept of parking system has gained importance.To make the parking system smart we will use artificial intelligence(Ai),Internet of things (IOT), Android app, mechanical movements etc.In order to decrease increasing traffic congestion and to get rid out of it, effective parking management is essential and hence Multi-level smart parking is brought into picture.Parking can become easier and congestion can be avoided by using Multi-level Smart Parking.Another challenge due to increase in number of vehicles, is undisciplined driving, which creates an obstacle for traffic management.
Black Book Serial Number: SLRTCE/IT/Blackbook-20/2019-20
Title: IoT Based Health Care
Guide Name: Prof. Saurabh Suman ,SLRTCE,Mira Road,M.E
Group Members Tejas Patel, Vikas Yadav, Pradeep Sharma
Abstract : With an improvement in technology, there have been attempts to utilize the new technology in various areas to improve the quality of human life. One of the major field of research that has seen an adoption of the technology is the healthcare sector. As a result, our project is an attempt to solve a healthcare problem currently people are facing. The main objective of our project is to design a remote healthcare system. It covers of three main parts. The first part is, detection of patient’s condition with the proposed system, second is to storing data on cloud storage and the last part is to provide the data for remote viewing. Remote viewing of the data enables a doctor or guardian to monitor a patient’s health progress from anywhere. In this project, we have presented an IoT architecture customized for healthcare applications. The aim of the project is to come up with a Remote Health Monitoring System that is made with locally available sensors with a view to making it affordable for everyone
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2019-20
Title: Fake News Detection
Guide Name: Prof. Sunil Yadav SLRTCE,Mira Road,M.E
Group Members Siddharth Singh, Shripad Shukla, Mahendra Solanki
Abstract : Social media for news consumption is a double-edged sword. On the one hand, its low cost, easy access, and rapid dissemination of information lead people to seek out and consume news from social media. On the other hand, it enables the wide spread of “fake news”, i.e., low quality news with intentionally false information. The extensive spread of fake news has the potential for extremely negative impacts on individuals and society. Therefore, fake news detection on social media has recently become an emerging research thatis attracting tremendous attention. Fake news detection on social media presents unique characteristics and challenges that make existing detection algorithms from traditional news media ineffective or not applicable. First, fake news is intentionally written to mislead readers to believe false information, which makes it difficult and nontrivial to detect based on news content; therefore, we need to include auxiliary information, such as user social engagements on social media, to help make a determination. We also discuss related research areas, open problems, and future research directions for fake news detection on social media.
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2019-20
Title: Detecting Fake Follwered Twitter
Guide Name: Prof. Sunil Yadav SLRTCE,Mira Road,M.E
Group Members Makul Maurya, Pratik Jaiswal
Abstract : All Social networking sites, such as Facebook and Twitter, have become increasingly popular over the last few years. The social media platforms are being used on daily basis and has become an important part of our lives. Twitter is one of the most popular social networking platforms that people use to communicate and interact. Organisations and companies use Twitter, as well as other social media platforms, for the marketing of their products or services. Most Social Networking platforms provide some form of metric which can be used to define the popularity of an user such as the number of followers on Twitter, number of likes on Facebook etc. However, in recent years, it has been observed that many users attempt to manipulate their popularity metric with the help of fake accounts to look more popular.
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2019-20
Title: Food Supply Chain Management Using Block Chain
Guide Name: Prof. Reena Kothari,SLRTCE,Mira Road,M.Tech IT
Group Members Chaurasia Nikil, Sharma Sandeep, Pandey Aditya
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2019-20
Title: Obstacle Detection System for visually impaired person
Guide Name: Prof. Sunil Yadav SLRTCE,Mira Road,M.E
Group Members Sapna Bali, Tripati Sharma
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2019-20
Title: Food Recognition Recommendation App
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Group Members: Prathamesh Godse ,Rohan Kanwar ,Pravin Lohare,Chandan Kesarwani
Abstract : Health and nutrition has always been a very important aspect of a person’s life. It is one of the emergent concerns in today’s world. Technology has its crcuial part in enhancing and promoting the wellness and health of its users. With the rise in moblie technology it has become convinient in keeping track of one’s health due to its mobility and availiblity. Many applications have been intro-duced to help its user record the amount of calories and nutrition they will be gaining after consuming a certain food product. In this project we attempt to develop an Android based application that will let users take a photo of the food and recognise it using deep learning and tell user the nutritional value of it and using calssification it will tell whether it is healthy for particular group of people (like diabetic paitents). We belive this will be an effective way to recognize the food category and efficiently analyse the nutritional value of it. It will be convinient for the users as well as promote healthy lifestyle and better nutrition.
Black Book Serial Number: SLRTCE/IT/Blackbook-1/2018-19
Title: Smart emotion based music player using facial recognition
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Group Members: Himanshu Barai , Deepak Tiwari, Gopal Ghelot, Mohit Yadav
Abstract : Facial expression provides current mind set of a person.The most natural way to express emotions is using facial expression.Human often use non verbal cues such as hand gestures faical expressions and tone of the voice to express feelings in interpersonal communication. It is very time consuming and difficult to manage large playlists and to select songs from the playlist.Thus, it would be very useful if the music player itself selects the song according to the current mood of the user.Thus , an application can be developed to minimize thses efforts of managing playlists. In this project we will built an application that will automatically detect the mood of the user and present him a playlist of the songs, that is suitable to it's current mood.The face is captured using webcam and the image is passed under the different stages to detect the mood or emotion of the user.athe application is thus developed in such a way that it can manage the content accessed by the user, analyze the image properties and determine the mood of the user.
Black Book Serial Number: SLRTCE/IT/Blackbook-2/2018-19
Title: Cognitive Estimation and Prediction of Neurological Disease using Machine Learning
Guide Name: Prof. Gayatri Dantal, SLRTCE,Mira Road, ME
Group Members Smit Supeda ,Abhishal Yadav,Ganesh Mishra,Kaushal Yadav
Abstract : According to the UN World Health Organization, nearly one in every six of the world’s population is affected by a neurological disorder. Neurological disorders which involves both CNS and PNS are being visualized through patient CT or MRI scans; however, this study focused on the shared SNPs in different neurological disorders generated from pre-existing data. Mining discriminative patterns from graph data has attracted great interest in recent years. It has a wide variety of applications in disease diagnosis, neuroimaging, etc. Children with Global development delay (GDD) can also have Gradable Tumors and Neurological disease symptoms. Clinical patients who are diagnosed for EEG can have different neurological diseasee and also children with Different Development Rate gets affected by this neurological disease. Prediction of Survival rate in Neurological disease such as Glioblastoma using various prediction algorithms such as Linear regression, Non-Linear Regression, etc. We classified three classes and also conducted classification of neurological disorders for different combination.
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2018-19
Guide Name: Prof. Gayatri Dantal,SLRTCE,Mira Road,M.Tech
Group Members Ananya Padey ,Shweta Pandey,Deepak Sharma,Pranav Ravindran
Abstract : The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this , an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2018-19
Title: Itinerary Planner
Guide Name: Prof. Aarti Puthran,SLRTCE,Mira Road,M.Tech
Group Members Saish Narvekar ,Pranit Rale,Sanat Mistry,Robinsali Maredia
Abstract : With increase in user's demand and new emerging points of attraction, tourism has becoming more popular as days pass by. However, offline booking of trips provides us with limited set of places to visit. Moreover, not all the itineraries match the user's expectation. As a solution to this, this system will provide the users with multiple itineraries of a single location which are effectively mined from quantities of attractive places. This approach uses association mining to find the frequent places in set that attract users. The different itineraries provided will be segregated into number of days required for the trip. This approach is user friendly and performs much better than offline trip planning.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2018-19
Title: Profile based agriculture system
Guide Name: Prof. Aarti Puthran,SLRTCE,Mira Road,M.Tech
Group Members Tanmyee Nimbalkar ,Mehazabin Sayed,Navneet Pandey,Nitesh Pawar
Abstract : Agriculture is the most basic function to accomplish food demand all over the globe; it contributes nearly sixteen percent to total GDP(Gross Domestic Product) of India and ten percent of the total exports which helps in increasing foreign exchange. Agriculture is a backbone particularly in the developing countries like India. The population of India is continuously increasing and to meet the food necessities of this growing population, agricultural yield should be boosted. The application of Data mining techniques in agriculture especially on soils can improve cultivation yields in a better way as well as knowledge discovered from raw data is useful for many purposes. Data mining techniques are better choices for the same the analysis of soils plays an indispensable role for resolution making on several issues related to agriculture field.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2018-19
Title: IOT based smart garbage collector under swachchta abhiyan
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members Dhrumil Ajudiya,Vishal Kortla,Nitesh Khamble,Govinda Gupta
Abstract : In today's busy world time is a vital issue which can't be managed by noticing each and every phenomenon with our tight schedule. So now a day's Automatic systems are being preferred over manual system to make life simpler and easier in all aspects. To make it a grand success Internet of Things is the latest internet technology developed. The number of users of internet has grown so rapidly that it has become a necessary part of our daily life. Our matter of concern in this project is development of Internet of Things based Garbage Monitoring System. Waste management from its inception to its disposal is one of the important challenges for the municipal corporations in all over the world. Dust bins placed across cities set at open places are flooding because of increment in the waste each day and making unhygienic condition for the citizens, to maintain a strategic distance from such a circumstance we have proposed wireless solid waste management system for smart cities which allows municipal corporations to monitor status of dustbins remotely over web server and keep cities clean very efficiently by optimizing cost and time required for it. As soon as dustbin has reached its maximum level, waste management department gets alert via SMS via gsm module placed at dustbin so department can send waste collector vehicle to respective location to collect garbage. In this paper, proposed IoT technologies with management of waste and trip management in cities is done, so that cost and time are reduced with optimized path for waste collection. The objective of the project is to enhance practicality of IoT based solid waste collection and management system for smart city.
Black Book Serial Number: SLRTCE/IT/Blackbook-7/2018-19
Title: IOT based gas detection system
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members Aniket Tiwari ,Shivam Tharthare,Vikashkumar Singh ,Shubhansh Rai
Abstract : Nowadays gas leakage and gas detection is a major problem in our daily lives. Also gas wastage is a major issue that needs to be countered. GAS is highly flammable and can inflict damage to life and property. To avoid such situations, a considerable amount of effort has been devoted to the development of reliable techniques for detecting gas leakage. As knowing about the existence of a leak is not always enough to launch a corrective action, some of the leak detection techniques were designed to allow the possibility of locating the leak. Our aim is to reduce the risks In gas pipe using Internet of Things. The main aim is to propose the design and construction of an SMS based Gas Leakage Alert System. Gas sensor are used to detect gas leakages in a pipe. With the help of an infrared sensor the issue of gas wastage is also monitored. An alarm goes off whenever the sensor doesn’t detect any vessel over the burner beyond a particular time period
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2018-19
Guide Name: Prof. Anil Chaturvedi ,SLRTCE,Mira Road,M.Tech
Group Members Gulamwarsi Warsi ,Nuruddin Warsi,Komal Bhatnagar,Hetansh Shah
Abstract : The research on Augmented Reality and Virtual Reality technology is one of the most important directions in current information technology field, these two technologies have been applied in various fields, such as education, medical treatment, construction, military affairs, entertainment, and the research on technical level is improving at the same time, while the research on evaluation of these two technologies and putting forward optimization program based on the user experience is quite unwonted. This paper choose the real estate exhibition as entry point, through comparative experiments of AR and AI technology in real estate display field, finally construct a user experience evaluation model of AR and AI technology.
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2018-19
Title: Efficient method of preserving medical documents using cloud computing
Guide Name: Prof. Saurabh Suman, SLRTCE, Mira Road,ME
Group Members Vrushali Yadav ,Ajay Singh,Shraddha Singh,Sagar Sen
Abstract : Medical healthcare is an area where technology in certain sections is not entirely evolved. There persist certain issues like hoist medical documents, requisite information, indespensable services and medical extremity. In this paper we make use of IOT and cloud computing to tackle and block these challenges and move from paper to electronic world. There is use of RFID to fetch the patient's data which can be directly accessible to doctor for further assessment, providing them with verified data which focuses on eliminating the need of carrying the medical documents and also the doctor is provided with the history of the patient's health which helps the doctor to treat patients based on his past health and treatment .In case of an emergency(accident) nearby access of ambulance/hospitals will be easily available to patient which results in time efficiency. The paper also emphasis on amplifying the use of cloud for storage and security of medical data. The application encapsulates a number of medical services which is required in case of an emergency which also includes secure access of medical information and available insurance data of patient enabling a renewed focus on patient-centered care which makes it time as well as money efficient.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2018-19
Guide Name: Prof. Sunil Yadav, SLRTCE, Mira Road,ME
Group Members Divya Tiwari ,Kantilal Vishwakarma,Vranda Khetan,Kunal Ruhela
Abstract : Brain tumor is an abnormal intracranial growth caused by cells reproducing themselves in an uncontrolled manner. Most researches in the developed countries shows that main cause of death of people having brain tumor is incorrect detection of brain tumor. It is one of the most dangerous diseases and therefore it should be detected quickly and accurately. Generally, MRI or CT scan that is directed into the intracranial cavity produces the complete image of the brain tumor. Magnetic Resonance Imaging (MRI), a highly developed technique of medical imaging is used to visualize internal structure of human body without any surgery. For the accurate detection of brain tumor segmentation of MRI image is important. Classification of brain tumor through segmented MR images, is a difficult task due to complexity and alteration in tumor tissue characteristics like its location, size, gray level intensities and shape. Nowadays due to increasing tumor cases it is difficult to examine all the reports manually also it sometimes becomes hazardous for a patient due to delay in the detection of the tumor or the right time required for its surgery. In order to eradicate this problem an intelligent System is required for the detection and classification of brain tumor automatically. Intelligence can be generally described as the ability to perceive information and retain it as knowledge to be applied towards adaptive behaviors within an environment or context. We propose a method which can automatically consider the MR images as an input and further analyse and process the input image and classify according to its presence and absence along with the type of tumor detected. This can be done using two machine learning based techniques like neural networks and deep learning which can be used to solve many real-world problems.
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2018-19
Title: SpyD: An Automated Security Tool
Guide Name: Prof. Reena Kothari ,SLRTCE,Mira Road,M.Tech
Group Members Sumit Awinash ,Harshwardhan Dubey,Abhishek Pandey,Pratik Verma
Abstract : As people are realizing the importance of cyber security, the price for hacking tool such as Pineapple is increasing rapidly. One Pineapple device can cost up to Rs. 21000+Tax+Shipping charges. Due to high cost people do not prefer buying such a product which hamper their security as an organization. By building SpyD we can provide a similarly effective product at a very considerably lower price which will help the organization to manage the security. SpyD is an automated network penetration device/bot which will be able to perform all major operations through the means of an automated script with built in failsafe which can be performed be any professional ethical hacker. This will ensure that the routine jobs are performed more precisely as compared to a hired professional, thus, eliminating the threat of any man-made errors. Additionally, SpyD will automate the work of softwares like Nmap, Aircrack-NG, Karma, Tcpdump etc.
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2018-19
Title : Voice controlled intelligent personal Assistant using Raspberry pi
Guide Name: Prof. Komal C,SLRTCE,Mira Road,M.Tech
Group Members Hannan Patel ,Shivam Gupta,Rishabh Singh
Abstract : The purpose of this project to illustrate the implementation of a Voice Command System as an Intelligent Personal Assistant (IPA) that can perform numerous tasks or services for an individual. These tasks or services are based on user input, location awareness, and the ability to access information from a variety of online sources (such as weather or traffic conditions, news, stock prices, user schedules, retail prices, telling time, local traffic, travel assistant, events, plus one can ask questions to the system, invoke its machine learning otherwise get it from Wikipedia). Using Raspberry Pi as a main hardware to implement this model which works on the primary input of a user’s voice. Using voice as an input to convert into text using a speech to text engine. The text hence produced was used for query processing and fetching relevant information. When the information was fetched, it then be converted to speech using text to speech conversion and the relevant output to the user was given.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2018-19
Title: Emergency response application
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Sankalp Mukadam ,Lallan Pandit,Samant Sahani,Rishabh Pathak
Abstract : As now a day’s the population in India is increasing drastically also with the advance features and opportunities in technology. Also, due to rise in various fields, it gives rise to number of problems and also provides us with the opportunity to overcome them. But, it is necessary to make proper use of the available resources. In today’s world everyone has a super-minicomputer (smartphone) in his/her pocket which is easily available to everyone. Instead of such a great technology it is not used up to its fullest efficiency. This project introduces us with solution to this problems with the help of geolocation and web application. For example, if there is an accident in a particular area where the help is not available easily, with the help of this application you can get help with just one click and rest is done by the application. It grabs information about the nearest hospitals and other help and takes the required actions. Thus this project discusses the various issues and also gives an idea of the proposed system, its working details and its benefits in other application too. Keywords- GPS, Android, Latitude, Longitude, Smartphone
Black Book Serial Number: SLRTCE/IT/Blackbook-14/2018-19
Title: No Parking Alert System
Guide Name: Prof. Rupali Pashte , SLRTCE,Mira Road,M.Tech
Group Members Nihal Singh ,Dayashankar Das,Jyotish Dubey,Shah Maitry
Abstract : Radio Frequency Identification (RFID) technology is a very useful technology in automation.RFID along with Arudino can be used to monitor illegial parking of vehicles at specific places in city which is one of the most challenging issues in big cities. This paper proses a system that will monitor illegal parking of vehicle and alert the owner via email that will consist of fine amount and the due date of fine payment. The RFID tag on vehicle will act as transmitter and the Arudino along with RFID reader module will act as a receiver.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2018-19
Title: Severity Estimation and Food Recommendation for Diabetic Patient using Data Mining
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Abhishek Gupta ,Nilesh Dubey,Rohan Kadam,Deepak Rai
Abstract : Data mining plays an efficient role in prediction of diseases in health care industry. Diabetes is a metabolic disease where the improper management of blood glucose levels led to risk of generating abnormalities in functioning of critical organs like heart, kidney, eye etc. So the patients need to visit their specialist for observing sugar level related risks and sit tight for a day or more to get their conclusion report, they need to squander their cash futile as well. The proposed system calculates severity by using ID3 algorithm, Machine Learning approach based on the input given and at the same time it will recommend what food should be consumed by the patient to avoid health hazards.
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2018-19
Title: safety app
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.E
Group Members Ashish Yadav ,Nilesh Yadav,Vikas Yadav,Anish Wishwarkarma
Abstract : In today’s world, people using smart phones have increased rapidly and hence, a smart phone can be used efficiently for personal security or various other protection purposes. The heinous incident that outraged the entire nation have waken us to go for the safety issues and so a host of new apps have been developed to provide security systems to women via their phones. This paper presents Abhaya, an Android Application for the Safety of Women and this app can be activated this app by a single click, whenever need arises. A single gesture on this app send the location of place through GPS and sends a message comprising this location URL to the registered contacts and also call on the first registered contact to help the one in dangerous situations. The unique feature of this application is to send the message to the registered contacts continuously for every five minutes until the “stop” button in the application is clicked. Continuous location tracking information via SMS helps to find the location of the victim quickly and can be rescued safely.
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2018-19
Title: Management of College Information System
Guide Name: Prof. Sunil Yadav,SLRTCE,Mira Road,M.E
Group Members Kumar Gandharva Singh ,Rohit Yadav
Abstract : The college has upgraded everything from teaching methods to issuing books from library but, it still uses traditional method for taking attendance. This causes wasting of paper and poor management. Our motive is to manage attendance in a digitalized way which will result in faster processing. Our app will take attendance with the help of teacher and will update the data automatically on the computers. It will also have the function of taking feedback from students in an appropriate way. It will have the feature of sharing attendance records with different third-party apps.
  • This app is also capable of auto-generating Implementation Report.
  • It will also have the option for sending meeting notification.
  • It will be used to provide any kind of notifications to students and college staff.
Black Book Serial Number: SLRTCE/IT/Blackbook-18/2018-19
Title: Image Security Using Visual Cryptography
Guide Name: Prof. Reena Kothari,SLRTCE,Mira Road,M.E
Group Members Prashant Rai ,Pradhuman Tiwari,Priyanka Bhaskar,Rahul Jethva
Abstract : The visual cryptography is a type of cryptography that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand the distorted image and thus the data communication become secured. It exploits the human visual system to read the secret message from some overlapped shares. This technique overcomes the disadvantage of complex computations required in traditional cryptography. Visual cryptography can also be applied to color images by converting them into black and white binary images. In this research work, visual cryptographic technique is proposed and encryption and decryption are done using Blowfish algorithm. The proposed technique is implemented with Matlab coding.
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2018-19
Title: KAS Encryption for Group data sharing via cloud computing
Guide Name: Prof. Saurabh Suman ,SLRTCE,Mira Road,M.E
Group Members Shivam Mishra ,Aashukumar Kandu,Ashish Pandey,Raghavendra Jha
Abstract : The Key-Aggregate Searchable Encryption (KASE) is a public key encryption scheme which is adapted from key-aggregate cryptosystem scheme and multi-key searchable encryption scheme. KASE is a type of tree structure which will explain the type of cipher-text which can be decrypted by using the key. Key-aggregate searchable encryption is a framework scheme which is described as where a data owner only needs to generate and distribute a single aggregate key to a data user for sharing a large number of documents and on the other side only needs to submit a single aggregate trapdoor to the cloud server, so that he/she can query over the shared documents by the help of generated single aggregate trapdoor. KAS Encryption framework scheme is perfectly more secure, flexible and practically efficient. In this group of selected documents need to be shared with any group of different user’s desire by right different encryption keys to be used for different documents. However need of producing complex number of keys for both process i.e. encryption and search, and distributing to different users and those users will have to safely store the keys and put forward complex number of keywords trapdoors to the clouds in order to search for data. Keywords: Searchable encryption, data sharing, aggregate key, data owner, trapdoor. Cloud Storage, Data Privacy, Cryptosystem, Authentication.
Black Book Serial Number: SLRTCE/IT/Blackbook-20/2018-19
Guide Name: Prof.Komal C ,SLRTCE,Mira Road,M.E
Group Members Priyan Sharma ,Sujit Jawal
Abstract :
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2018-19
Title: User Based Recommendation System based on Browsing History
Guide Name: Prof. Deepali Patil ME COMPUTER
Group Members: Dhruv Bindoria, Raj Mehta, Shankarlal Bhati, Ujwal Ahir
Abstract : Recommendation systems are used widely to provide personalized recommendations to users. Such systems are used by e-commerce and social networking websites to increase their business and user engagement. Day-to-day growth of customers and products pose a challenge for generating high quality recommendations. Moreover, they are even needed to perform many recommendations per second, for millions of customers and products. In such scenarios, implementing a recommendation algorithm sequentially has large performance issues. To address such issues, we propose a parallel algorithm to generate recommendations by using Hadoop map-reduce framework. In this implementation, we will focus on item-based collaborative filtering technique based on user's browsing history, which is a well known technique to generate recommendations.
Black Book Serial Number: SLRTCE/IT/Blackbook-1/2017-18
Title: Movie Success Rate using Data Mining and web mining
Guide Name: Prof. Deepali Patil ME COMPUTER
Group Members: Naeem Deshmukh Mubbashir Ansari Amraiz Birwadkar Atul Singh
Abstract: Sentiment analysis is an area of text classification that began around 2001 and has recently been receiving a lot of attention from researchers. Sentiment analysis involves analyzing textual datasets which contain opinions (e.g., social media, blogs, discussion groups, and internet forums) with the objective of classifying the opinions as positive, negative, or neutral. Classification of textual objects according to sentiment is considered a more difficult task than classification of textual objects according to content because opinions in natural language can be expressed in subtle and complex ways containing slang, ambiguity, sarcasm, irony, and idiom. Various measures, including Information gain, simple chi-square, feature relation network, log-likelihood ratio, and minimum frequency thresholds, have previously been used as feature selection methods in sentiment analysis and classification. In this report, we investigate the performance of categorical proportional difference, a novel feature selection method used for text classification. While categorical proportional difference has previously been shown by others to be useful in sentiment classification of text documents, here we apply sentiment on online reviews. Online reviews differ from typical text documents in that they contain few features (i.e., they are short documents). We apply weighting schemes, SentiWordNet scores, information gain and simple chi-square, to classify the reviews as either positive or negative. Experimental results show that given a dataset containing labeled movie reviews. The performance of Information gain and simple chi-square varied depending on the dataset.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-2/2017-18
Title: Website catergorization using Data Mining Algorithm
Guide Name: Prof. Aarti Puthran ME Computer
Group Members: Kaustabh Rasam Harshal Solanki Abhishek V. Tushar Shinde
Abstract: The number of websites as well as the categories of the websites has increased day by day. The content and category of information are overflowing the Internet channel. These problems arise because there is lots of website information generated. This problem is faced by the user to find out some information or buy some product through the online. Finding the right information from almost a billion of websites is considerably hard, but finding the perfect and appropriate one is even harder. The solution of the given problem is that “Website Categorisation“ technique.The simple yet powerful algorithm for website categorisation such as KNN, Naive Bayes algorithms etc. which can give a multi category result, distributed system supported, and does not even need to be trained because the algorithm uses word frequency in the content of each website to match with the categories in a pre-defined dictionary. Within the “Website Categorisation” technique, Classification will be used. This technique will provide the efficient result to the user. By using website categorisation, it will provide the efficient or accurate result to the user in small amount of time. “Website Categorisation” technique will be depend majorly upon two module Classification, data pre-processing technique.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-3/2017-18
Title: Online Disease Prediction and Health Monitor
Guide Name: Prof. Aarti Puthran ME Computer
Group Members: Akshay Hartalkar Dipesh Chorat Nikhil Dange Pooja Maurya
Abstract: In today’s world information is a crucial thing and must be saved or stored correctly for later use. When it comes to information related one’s medical records or his/her medical history, this information can come handy even after couple of years where we fail to safely store medical records as they are mostly a hard copy. A digital record of the same will not wear off with time and is also easy to store, maintain and retrieve. The goal of this project is to make a web application where users can store his medical records online and have a full-time access to it. Also, one can easily share his records with his trusted doctor’s simply by a unique user record view ID, with or without giving them the permission to edit those records. Having a secure and full time available record, these medical records of a user can be put to greater use by predicting disease that has a chance of affecting the user in future, based on his previous records. User can follow-up this predicted disease with his trusted doctor’s and prevent them from happening to them.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-4/2017-18
Title: Opinion Analysis using Machine Learning
Guide Name: Prof. Gayatri Dantal MTECH CS VJTI
Group Members: Sagar Agarwal Afra Shaikh Aishwarya Sharma Neetu Yadav
Abstract: As there is an exponential growth of social network and due to large usage of social media, there is an increasing demand for data in the web for the users which leads to recent trends and ideas in the field of research. The users will be eagerly using these data for the future purpose and get information about the opinions of others thus there is a need of automatic summarization of opinion of the web users. Opinion Mining is a process of extracting and analyzing people’s Opinions regarding the given object and Sentiment Analysis explains about the hidden sentiments in the opinions. Sentimental Analysis is reference to the task of Natural Language Processing to determine whether a text contains subjective information and what information it expresses i.e., whether the attitude behind the text is positive, negative or neutral. This project focuses on the aspect based feature extraction of product review using document level sentimental analysis. In a document-level classification the main intention is to classify an opinion in the whole document as positive or negative. It speculates entire document as a single unit and it’s polarity is decided accordingly
Black Book Serial Numbar: SLRTCE/IT/Blackbook-5/2017-18
Title: Detection of Phising site using URL Features
Guide Name: Prof. Gayatri Dantal MTECH CS VJTI
Group Members: Ria Sankhyan Lubhdha Dhanopia Ankit Shetty Chetan Kaspale
Abstract: Damage caused by phishing attacks that target personal user information is increasing. Phishing involves sending an email to a user or inducing a phishing page to steal a user’s personal information. This type of attack can be detected by blacklist-based detection techniques; however, these methods have some disadvantages and the numbers of victims have therefore continued to increase. In this paper, we propose a heuristic-based phishing detection technique that uses uniform resource locator (URL) features. We identified features that phishing site URLs contain. The proposed method employs those features for phishing detection. The technique was evaluated with a dataset of 3,000 phishing site URLs and 3,000 legitimate site URLs. The results demonstrate that the proposed technique can detect more than 98.23% of phishing sites.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-6/2017-18
Title: Fingerprint Authentication System
Guide Name: Prof. Satish Ranbhise M.E Computer Engg
Group Members: Endresh Nayak Chandan Maurya Sarvesh Yadav Ajit Yadav
Abstract: The current online shopping system for transaction and sign-up, we use the traditional approach which consists of Name, email-id, contact number and password. There are many possibilities that it can be exploited by the attacker to get access of the confidential information of the authenticated user. So to overcome this flaw as per the user point of view, we propose a secure online shopping system that gives the Internet users the confidence to use their online shopping cards or their credit cards without the need to worry about the hackers or the online shopping frauds. The proposed system uses a fingerprint verification technique to verify the customer (cardholder). Since fingerprint is one of the most unique personal identity, so it can be used for the security assurance of the authentication. By using this approach we will be able to get high level of confidentiality, integrity and reliability. The fingerprint which was taken at the time of the sign-up will be encrypted and at the time of the transaction the current fingerprint of the user should match with the stored fingerprint in the database for the further access.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-7/2017-18
Title: Intelligent Heart Disease Prediction System (IHDPS)
Guide Name: Prof. Rupali Pashte Mtech CSE
Group Members: Aniket Prajapati Manish Singh Pratik Chotaliya Karan Valkunje
Abstract: Heart disease is a major cause of transience in modern society. Due to time and cost constraints, most of the people rely on health care systems to obtain healthcare services. Healthcare organizations collect and produce large volumes of data on daily basis. Information technology allows automization of processes for extraction of data that help to get interesting knowledge and regularities. In this paper we are using the Data mining techniques like Naive Bayes and Apriori Algorithm for the elimination of manual tasks and easier extraction of data directly from electronic records, transferring onto secure electronic system of medical records which will save lives and decrease the cost of the healthcare services. Naive Bayes algorithm uses Bayes theorem and assumes all attributes to be independent given the value of the class variable.The WAC has been used to get the significant rule instead of flooded with insignificant relation and the Apriori algorithm is used to find out the frequent item set from the patient database
Black Book Serial Numbar: SLRTCE/IT/Blackbook-8/2017-18
Title: Iris-The Bargain Bot
Guide Name: Prof. Anil Chaturvedi
Group Members: Dhairya Gandhi SiddhartKumar Avaiya Keyur Kalsaria Hetansh Shah
Abstract: E-commerce websites have become the recent trend in online shopping, people consisting of different age group, different communities and different localities are using e-commerce websites or apps for online shopping. Still one of the biggest drawback of e-commerce websites is that we can neither bargain nor negotiate as we can do in traditional markets, this has proved to be a concerning factor for the sellers, who in turn are open to negotiation or bargaining. Thus, an efficient system for bargaining can significantly increase the overall market sales. So we have proposed an intelligent bargain bot which will help the consumers to bargain for their desired product. IRIS will not only ease the trade but will also provide a reliable and user friendly search tool, it will have an interactive interface which will be achieved by using artificial intelligence and the bargaining skills can be applied with the help of various machine learning algorithms mainly support vector, decision tree and neural networks. We shall first conduct the tests on small datasets for the machine to learn and adapt and then move to larger datasets
Black Book Serial Numbar: SLRTCE/IT/Blackbook-9/2017-18
Title: Gesture Control AI Implemented Game
Guide Name: Prof. Anil Chaturvedi
Group Members: Syed Rayyan Ahmed Mishra Sajjan Shreeram Vinay Nair
Abstract: Gesture is a natural part of human communication and becomes more and more important in VR application. Here in this paper we are focusing on designing a gesture controlled combat game using Leap Motion which can detect palm and fingers movement. For game designing we will be using Unity game engine version 5.3.1f1. We will be working on three modules here gesture control module, game design and Artificial Intelligence module. The AI player should detect the position of the human player and react as per that, to implement this functionality we will be using A* algorithm and "Navmesh Grid" path-finding algorithm in Unity 3D.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-10/2017-18
Title: Intelligent Voting System
Guide Name: Prof. Saurabh Suman
Group Members: Mohd Samee Balsari Sufian Khot Zeeshan Kazi Amit Jalan
Abstract: The current system of election is very orthodox and not secured because it is based on only voter card which can be easily duplicated, and even bogus voter card can be provided to a person through which he/she can illegally cast a vote , now a days it is also possible that a person can cast votes multiple times, because in the current system , to verify if a voter has casted a vote or not it is checked if the person has an ink mark on index finger which is unreliable. Thus our proposed model suggests to simply connect the voter card of a person to his/her Aadhar card, the Aadhar and the voting card both will have the fingerprint data of their owner stored in their database, and this linkage is used for 2 step verification in our suggested system. The proposed model has a greater security in the sense that voter’s biometric attribute (in this model it is fingerprint) is confirmed and two step verification is done before the vote is accepted in the main database of Election Commission of India. Our system also solves the problem multiple time voting of a given voter by setting flag or a digital mark in the voter card database record of voter who has cast his/her vote and this mark will be nullified once the election process is completed. Thus the advantages of our proposed system are as follows: ● High security because of two level biometric authentication. ● No bogus voter cards for people not on the voters list. ● No voter cards for non citizens. ● No multiple Voting - Digital mark in the voter card database record of voter who has cast his/her vote .
Black Book Serial Numbar: SLRTCE/IT/Blackbook-11/2017-18
Title: Speed Medical Services
Guide Name: Prof. Saurabh Suman
Group Members: Mansi Rajput Paras Patel Saurabh Pandey
Abstract: In today’s traffic world, ambulance plays a major role when accident occurs on the road network and need arises to save valuable human life. Transportation of a patient to hospital seems quite simple but in actual it is quite difficult and gets more difficult during peak hours. Metropolitan city due to rapid increase in the number of vehicles, traffic jams, lack of footpaths and unsafe roads for people to walk or to cross.As population increases so does the importance of emergency services. The need of emergency services is increasing day by day. One such service is ambulance. Today there are a hundred ambulance services running yet unknown to people. Every hospital has its own contact number for the ambulance. Every private and government Service has its own contact number for ambulance. It becomes really hectic for a person to call all these numbers and ask for an ambulance. So we took this opportunity and thought of bringing these Ambulances under one roof. The application we are going to bring forth will bring all ambulance available in the city under one roof. On a click of a button the patient will get the nearest ambulance to his service. Even a person in distress can call an ambulance without anyone’s help. As android is one of the most booming platform, we are building our application on that.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-12/2017-18
Title: Criminal Detection Using Machine Learning
Guide Name: Prof. Sunil Yadav Phd. Pursuing, ME in IT
Group Members: Aditya Sawant Mohit Sharma Yash Sharma Varun Acharya
Abstract: important fields where the application of data mining techniques can produce important results. Crime analysis, a part of criminology, is a task that includes exploring and detecting crimes and their relationships with criminals.The high volume of crime datasets and also the complexity of relationships between these kinds of data have made criminology an appropriate field for applying data mining techniques. Identifying crime characteristics is the first step for developing further analysis. The knowledge that is gained from data mining approaches is a very useful tool which can help and support police forces. According to Nath (2007), solving crimes is a complex task that requires human intelligence and experience and data mining is a technique that can assist them with crime detection problems. The idea here is to try to capture years of human experience into computer models via data mining. The criminals are becoming technologically sophisticated in committing crimes. Therefore, police needs such a crime analysis tool to catch criminals and to remain ahead in the eternal race between the criminals and the law enforcement. The police should use the current technologies to give themselves the much-needed edge. Availability of relevant and timely information is of utmost necessity in conducting of daily business and activities by the police, particularly in crime investigation and detection of criminals. Police organizations everywhere have been handling a large amount of such information and huge volume of records. An crime analysis should be able to identify crime patterns quickly and in an efficient manner for future crime pattern detection and action. crime information that has to be stored and analyzed, Problem of identifying techniques that can accurately analyze this growing volumes of crime data, Different structures used for recording crime data
Black Book Serial Numbar: SLRTCE/IT/Blackbook-13/2017-18
Title: Augmented Situation awareness and intelligence using Datamining
Guide Name: Prof. Sunil Yadav Phd. Pursuing, ME in IT
Group Members: Swapnil Chowkekar Gurang Divyashwar Rohit Dubey Aakash Mishra
Abstract: There are a large number of publicly available datasets that enable academics and practitioners to identify and map different types of land use (e.g. residential, commercial, industrial, leisure and Public services) different types of neighborhood (e.g. Disadvantaged inner cities, affluent suburbs, Student areas), together with street networks and major transport routes. Information such as this, referred to as 'Geospatial data', can potentially be very useful in understanding crime patterns and in explaining why crime hotspots occur in particular places. However, the extent to which beneficiaries are aware that such data exists is largely unknown and the added value that such data might bring is largely unexplored.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-14/2017-18
Title: Home Automation Using Bluetooth
Guide Name: Prof. Reena Kothari
Group Members: Krunal Rane Mayuri Save Jayashree Yadav
Abstract: Security of one-time password (OTP) is crucial as a result of these days most of the E-commerce transactions are performed with the assistance of this mechanism. Replay attack or eavesdropping is one type of attacks on network-connected computing environment or isolated computing setting. For achieving 112 bits of security level, Rivest Shamir and Adleman (RSA) formula desires key size of 2048 bits, whereas Elliptic Curve Cryptography (ECC) desires key size of 224-255 bits. Another issue with most of the present implementation of security models is storage of secret keys. Crypto graphical keys are usually unbroken in en-secured manner that may either be guessed/social-engineered or obtained through brute force attacks. This becomes a weak link and leads integrity problems with sensitive information in a very security model. To beat this drawback, biometrics is combined with cryptography for developing sturdy security model. This project suggests an increased security model of OTP system using ECC with fingerprint biometric. This model also provides higher security with lesser key size than different public key crypto-model. The crypto graphical keys are not needed to memorize or keep anyplace; these keys are generated as and once required.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-15/2017-18
Title: Hotel Recommentation System
Guide Name: Prof. Reena Kothari
Group Members: Sanika Nar Ashwini Chaubey Imran Khan Ahuja Riya Abhijit Agrawal
Abstract: Online hotel searching is a daunting task due to the wealth of online information. Reviews written by other travelers replace the word of- mouth, yet turn the search into a time consuming task. Users do not rate enough hotels to enable a collaborative filtering based recommendation.Thus, a cold start recommender system is needed.In this work we design a cold start hotel recommender system,which uses the text of the reviews as its main data. We define context groups based on reviews extracted from and We introduce a novel weighted algorithm for text mining.Our algorithm imitates a user that favors reviews written with the same trip intent and from people of similar background (nationality) and with similar preferences for hotel aspects, which are our defined context groups. Our approach combines numerous elements, including unsupervised clustering to build a vocabulary for hotel aspects, semantic analysis to understand sentiment towards hotel features, and the profiling of intent and nationality groups.We implemented our system which was used by the public to conduct 150 trip planning experiments. We compare our solutionto the top suggestions of the mentioned web services and show that users were, on average, 20% more satisfied with our hotel recommendations.We outperform these web services even more in cities where hotel prices are high.Categories and Subject Descriptors: H.3.3 [Information Search and Retrieval]: Information Search and Retrieval – Information filtering
Black Book Serial Numbar: SLRTCE/IT/Blackbook-16/2017-18
Title: Intelliegent Agriculture System
Guide Name: Prof. Satish Ranbhise
Group Members: Aditya Ladhe Rishab Gupta Sajjan Mishra Arpit Mishra
Abstract: Agriculture has a vital role to play in the economic development of India. Agricultural crop production depends on various factors such as biology, climate, economy and geography. The common problem existing among the Indian farmers are that they don’t choose the right crop based on environmental variables and biotic attributes which ultimately results in less production. The main objective of this project is to select appropriate meteorological and fiscal parameters in this project that provides intelligence to choose optimum cultivation date for selected agriculture crop in the district of Vidharbha. The objective is considered with a view to achieve higher margin at the time of cropping of that crop. GUI of this application helps the farmer community to take decision with ease.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-17/2017-18
Title: Trusted third party for data integrity using cloud computing
Guide Name: Prof. Rupali Pashte Mtech CSE
Group Members: Madhuri Kushwah Prachi Shah Jagruti Takkekar Vaibhavi Sawant
Abstract: Cloud computing is the novel trend in all over the world. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this we will discuss how to provide security for the data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important methods. Cryptography provides various symmetric and asymmetric algorithms to secure the data. This paper presents the symmetric cryptographic algorithm named as AES (Advanced Encryption Standard). It is based on several substitutions, permutation and transformation.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-18/2017-18
Title: Enhancing student Retention and Success
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Abstract : In today’s world, most of us depend on Social Media to communicate, express our feelings and share information with our friends. Information from such instrumented environments can present valuable data to report student problem. Examining data from such a social media can be challenging task. The problem of student’s experiences reveal from social media sited need human analysis or Interaction Social Media collects the data in structured and unstructured, formal and informal data as users do not care about the spellings and accurate grammatical construction of a sentence while communicating with each other using different social networking websites. Gathered data contains sentiments and opinion of users which will be processed using data mining techniques and analysed for achieving the meaningful information from it. Using Social media data, we can classify the type of users by analysis of their posted data on the social web sites. This paper, presents a workflow to integrate both qualitative analysis and large-scale data mining techniques. This study presents a tactic and outcome that demonstrate how casual social media data can present insight into student’s learning experiences.
Black Book Serial Number: SLRTCE/IT/Blackbook-1/2016-17
Title: Fantasy League Team Prediction using Predictive and Classification Analysis
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Abstract : To solve the problem of loss of interest in Fantasy Cricket over the season, a game-changing strategy was thought of which led to the creation of this idea. Powered by an exhaustive dataset of all cricketer’s statistics of different players of different countries, it seemed exciting to allow the use of Data Mining techniques to forecast future statistics. A points system based on the success of predictions, which in turn allow buying/auctioning better players adds a greater interactive feeling to the existing system. The best team selection is always the requirement of management of the team for required results. The traditional team selection process is really lengthy and unclear due to manual process and personal judgments. These conflicting constraints and personal judgments can be translated into software for best results. This paper presents a solution to this problem with the help of data mining algorithms to find the optimal solution for the problem of fantasy cricket team selection and formation. Our approach is the combination of the existing quantitative approaches with some new extensions such as attributes regarding personal performances, team performance of players against the opposition. Secondly our method is just not specific for cricket team but it is converted to generic model for other multiplayer games. We propose an adaptation of different algorithms to optimize the selection of multiplayer sports teams.
Black Book Serial Number: SLRTCE/IT/Blackbook-2/2016-17
Title: Online fake product review and monitoring
Guide Name: Prof. Deepali A. Patil, SLRTCE,Mira Road, ME
Abstract : Although the prevalence of fake online reviews for products and services is deemed to have become an epidemic, little is known about the strategies used to write such bogus entries. Hence, this paper conducts an exploratory study to understand the process by which fake reviews are written. Participants were invited to write fake reviews for hotels in a research setting. Thereafter, they were asked to answer a questionnaire which solicited qualitative responses about their strategies. Results indicate that the process of writing fake reviews commences with extensive information gathering via common review websites such as TripAdvisor as well as search engines such as Google. The gathered information is then used as cues to write short, catchy and succinct fake review titles, as well as informative and subjective fake review descriptions. Adequate efforts are generally invested to blur the lines between fake reviews and authentic entries.
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2016-17
Title: Gear up your academic excellence
Guide Name: Prof. Saurabh Suman,SLRTCE,Mira Road,M.Tech
Abstract : With an advancement of brain computer interface (BCI), human mind control devices are getting common. In this paper an attention level indicator was proposed in aid to monitor one’s attention level. Neurosky Mindwave Headset was used to acquire brainwave attention signals. Neurosky EEG Headset was used to record and store the brainwave signals into the computer. This paper is proposed to help the students improve their academic skills by guiding them the right way. Student’s library history database was maintained in order to keep a track of one’s referred books. This maintained database from library was used as the second input command. The Students grades were also considered in order to check the academic strength of the student. This maintained database was used as the third input command. These three input commands were then sent through HADOOP for further processing. HADOOP provides a distributed file system (HDFS) that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster. It also provide a Map/Reduce, it is a programming paradigm that was made popular by Google where in a task is divided into small portions and distributed to a large number of nodes for processing (map), and the results are then summarized in to the final answer (reduce). The last part of the project is to provide the student with the final answer as per how to improve the academics. HADOOP processing considers the three input commands and summarizes the subject of interest of the student. The aim of the project is to activate the external device and collect the extract the attention level signals of the students and consider his grades and library history records and give suggestions to the students in order to gear up his academics.
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2016-17
Title: Smart Reminder using GSM
Guide Name: Prof. Saurabh Suman,SLRTCE,Mira Road,M.Tech
Abstract : With recent technological advancement of modern science people are now expecting the information about the location of any object for tracking purposes. Presently, we want more location based services for being advanced and to save time and money also. GPS is a system which is already implemented and everyone can access it without any restriction. Having the facility of GPS to develop this system we need a GPS device to calculate the location from the information taken from GPS. Hence, we have chosen Android device to perform this calculations because Android mobile phone is cost effective and offers multidimensional purposes having some special built-in features like GPS service. Thus, this system is developed for location tracking of a friend or family member with a proximity alert.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2016-17
Title: Intelligent Notifier
Guide Name: Prof. Saurabh Suman,SLRTCE,Mira Road,M.Tech
Abstract : Android application that can remind us of any event/Task we mark on it. It can be like reminding us about a meeting, time to pay any bill etc. The app can take from the user the eventname, date and time of the event. Store the details to the database and alert the user 10 min before the event. Simple Application for Android phone. Application will be used as a“reminder” for a specific type of event. With the ability to save multiple events. Events are based on alternating calendar dates and frequency (user input). Notification/reminders will be sent via Text Message.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2016-17
Title: Stock Market ForeCasting
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Abstract : Stock Market is used by many peoples on daily basis. Many users invest on Stocks. BSE (Bombay Stock Exchange) and NSE (National Stock Exchange) are the main Stock Market on which people rely on. As an individual it becomes difficult to maintain the database and analyse a particular stock. This system is intended to overcome this drawback. This system helps user to perform analysis of stocks without creating and maintaining the database. It performs past analysis of stocks, comparison between two stocks and tracking of shares. It gives the information of whether to hold, buy or sell the stock with the help of Text Based Decision Tree Model. The ARIMA (Auto Regressive Integrated Moving Average) model helps to predict the future price of the stocks based on past and current values of stocks. This system also helps to take suggestion from an expert live from the Twitter. This as a whole makes this system a proper use for users, those who invest on stocks on daily basis. This system will help them to obtain information of shares with its correct value.
Black Book Serial Number: SLRTCE/IT/Blackbook-7/2016-17
Title: Detection of video piracy using digital watermarking
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Abstract : The most important attribute of digital information is the ease of production and distribution over numerous places. The threat that there are number of perfectly congruent copies of audio , video and image in the file requires counterattacking the need of hiding secret data within the original data. In day-to-day life, internet is an important channel for digital source, but many intruders are misusing by constructing illegal copies and leaking the information which creates a bad environment in the field of software field. The solution involves using digital watermarking. The work needs to be performed cautiously in order to maintain the availability of multimedia information but, till that time the industry must develop with ways to guard intellectual property of stakeholders of such data. Out of all possible methods, digital watermarking has earned most available attention in the software industry. In the field of information hiding steganography and watermarking work parallel as well as concurrently. Generally watermarks are used where authentication or ownership is required. It is a good way by which anyone can confirm the ownership of multimedia. This paper attempts to first introduce digital watermarking as well as some of its necessary notions.
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2016-17
Title: Expert system for Agriculture plant disease
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Abstract : In the recent years, an excessive amount of computerized expert systems has been developed for various sectors of agriculture in India. The availability of low-cost computers, agricultural knowledge and information technology professionals are the principal reasons for the development of so many agricultural expert systems. Among all agricultural expert systems, the expert systems for crop protection need special mention. These expert systems are meant to be used by farmers and other persons without much experience of using computers. Hence, special care must be taken while developing them. The current paper develops a taxonomy for the expert systems for crop protection and briefly discusses four such expert systems for crop protection being used in India.
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2016-17
Title: E-Voting System
Guide Name: Prof. Aarti R Puthran, SLRTCE, Mira Road,ME
Abstract : Voting is a system used to determine the decision of the masses. It is used to mark the individual decisions and decide who is the winner of the available candidates. Voters point system will take the picture of user face and generate its key point using KLT algorithm and store it in database in matrix form. Then at the time of voting user is again authenticated by taking the picture of face and comparing it with the previously generated key points. If the image is matched, then the user is provided the otp to provide security to the voting decision. The user vote is stored in database. This application will improve the voting percentage as users can vote just from their mobile phones. Also authentication by face will make sure that a user votes only once.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2016-17
Title: Smart Surveillance notification
Guide Name: Prof. Aarti R Puthran, SLRTCE, Mira Road,ME
Abstract : This paper presents architecture to improve surveillance applications based on the android smart phones, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the Background subtraction method. The Background subtraction will compare the current frame with the previous frame i.e. background image is subtracted from the foreground image. From that the moving object is derived. So the frame algorithm and the threshold value is calculated to find the moving image. Using threshold value the detected pixel is identified. Hence the movement of the object is identified accurately. Whenever motion detected that image is saved on the server and the server will notify the Google server. The Google server will send a GCM Alert to the android application user mobile who are all registered for that application
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2016-17
Title: GPS Navigation
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.Tech
Abstract : Recently, there is an increase interest in positioning techniques based on Global NavigationSatellite Systems (GNSS) such as Global Positioning System (GPS), cellular network infrastructure or on the integration of the two technologies for a wide spread of applications such as Automatic Vehicle Location (AVL), tracking systems, navigation, Pedestrian NavigationSystems (PNSs), intelligent transportation Systems, precise positioning and emergency callers.
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2016-17
Title: Brand Bucket
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.Tech
Abstract : The business-to-consumer aspect of electronic commerce (e-commerce) is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce website for Online Shopping. It provides the user with a catalogue of different products available for purchase in the store. In order to facilitate online purchase a shopping cart is provided to the user. The system is implemented using a 3-tier approach, with a backend database, a middle tier of Apache Tomcat and J2EE, and a web browser as the front end client. In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client side scripting techniques, implementation technologies. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart application and also to know about the technologies used to develop such an application. This document will discuss each of the underlying technologies to create and implement an e-commerce website.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2016-17
Title: Real Estate Price Prediction
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.Tech
Abstract : We have a huge amount of data related to real estate business available on the internet and gathering by meeting agent of real estate. The better classifier to predict price of the house in and around Mira Bhayander. We have considered the attributes house size, number of bedrooms and the status of the house. The dataset used is extracted from real estate websites and then analyzed using software called R tool. We have to use algorithms Arima model and predicating the price of real estate business.
Black Book Serial Number: SLRTCE/IT/Blackbook-14/2016-17
Title: Android based Attendence Management system
Guide Name: Prof. Sunil Yadav,SLRTCE,Mira Road,M.E
Abstract : The existing manual class attendance signing system needs students improperly sign the attendance sheet during class. The lecturer has to keep all attendance sheets and calculate the attendance report throughout the semester manually and come out with their own, not standardize students attendance report. The problem is the existing manual class attendance signing system for subject Project Formulation is inefficient and not systematic. In the manual system, students can easily forge others signature purposely to fill in the class attendance.This project uses a web application as well as android application concept to facilitate the attendance system in educational institutes. It uses the most reliable way of uniquely identifying students through an android app. Such type of web application is very useful in school as well as in college for daily attendance. development in educational sector can be achieved through this project.All of these are possible through the effective development and use of android application in the educational institutions.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2016-17
Title: Crime Pattern Detection ,Analysis and Prdiction
Guide Name: Prof. Sunil Yadav,SLRTCE,Mira Road,M.E
Abstract : Crimes are a social irritation and cost our society deeply in several ways. Any research that can help in solving crimes quicker will pay for itself. About 10% of the criminals commit about 50% of the crimes [9]. The system is trained by feeding on previous years records of crimes taken from legitimate online portal of India describing various crimes such as murder, kidnapping and abduction, dacoits, robbery, burglary, rape and other such crimes. As per Indian statistics, with given data of various crimes for 14 years (2001-2014) a regression model is created and the crime rate for the following years in various states can be predicted [8]. We have used supervised, semi-supervised and unsupervised learning technique [4] for knowledge discovery from the crime records and to help in increasing the predictive accuracy of the crime. This work will be helpful for the local police stations in crime suppression.
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2016-17
Title: A profiling Tool Data Explorer
Guide Name: Prof. Sunil Yadav,SLRTCE,Mira Road,M.E
Abstract : Many business and IT managers face the same problem: the data that serves as the foundation for their business applications (including customer relationship management (CRM) programs, enterprise resource planning (ERP) tools, and data warehouses) is inconsistent, inaccurate, and unreliable. Data profiling is the solution to this problem and, as such, is a fundamental step that should begin every data-driven initiative. Data profiling is the process of examining the data available in an existing data source (e.g. a database or a file) and collecting statistics and information about that data. The project Data Explorer is developed to perform the data profiling activities
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2016-17
Title: Prediction of results of Football matches
Guide Name: Prof. Komal Champanerkar, SLRTCE, Mira Road,ME
Abstract : Football is the most popular game in the world. A huge amount of data related to football available on the internet. In any sport competition, there is a strong interest in knowing which team shall be the champion at the end of the championship. This data can be used to predict the outcome of the future matches. The project identifies desirable characteristics or features from the datasets to predict the outcome. Sports analytics is a fascinating problem area in which to apply statistical learning techniques. Classification algorithms like Naïve Bayesian and KNN algorithm can be used to predict the outcome of football matches using the important characteristics of the game that have a large impact on the result. The project is an application to predict the result of football matches in the English Premier League to find out which techniques and approaches are the most viable for successful prediction and also find ways to increase the accuracy of the predicted result by improving upon the previous work.
Black Book Serial Number: SLRTCE/IT/Blackbook-18/2016-17
Title: Java virtual shell
Guide Name: Prof. Komal Champanerkar, SLRTCE, Mira Road,ME
Abstract : Virtual Java Shell is developed keeping in mind the problems faced by user in windows and Linux operating systems. Commands and utilities have been made in such a way that there is no need for user to learn commands of both the operating systems. The user can be able to type the commands as we do it in Dos. The User interface will be designed simple and in sync with all of the popular shells available such as Dos shell and bash (popular Linux shelly, The user issues a command to the shell. The shell verifies the command against the valid commands available and checks for their syntax. The kernel acts on the instructions issued by the shell and executes the code with the help of Java Virtual machine or JVM. JVM interprets the code and executes it on the resources of the system.
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2016-17
Title Cafeteria Online Ordering System
Guide Name Prof. Deepali Patil
Group Members Advait Joshi, Bhumit Patil, Deepak Yadav, Jayesh Pandey
Abstract The challenges encountered by the existing system serve as a major drawback to the realization of efficiency and student satisfaction. The experience of ordering in most cafeterias is not pleasant for the students. . So what we propose is a online ordering system for the cafeteria of the college which will greatly simplify the ordering process between the students and the café. When the student visits the ordering application, they have to register and will be provided with login ID and password. They are then presented with an interactive and up-to-date menu, complete with all available options and dynamically adjusting prices based on the selected options. After making a selection, the item is then added to their order, which the student can review the details of at any time before checking out. This provides instant visual confirmation of what was selected and ensures that items in the order are, in fact, what was intended. This system also greatly lightens the load on the cafeteria’s end, as the entire process of taking orders is automated. Once an order is placed on the application, it is entered into the database and then retrieved, in pretty much real-time, by a desktop application on the restaurant’s end. Within this application, all items in the order are displayed along with the unique order no. provided to the student in a concise and easy to read manner. This allows cafeteria employees to quickly go through the orders as they are placed and produce the necessary items to the respected student with minimal delay and confusion.
Black Book Serial Number 1
Title SLRTCE Placement Application
Guide Name Prof. Madhuri Gedam
Group Members Pandey Sarita Beerchand, Vadhaiya Vaibhavi Narendra
Abstract It has been observed that there is no particular application for the placement cell of SLRTCE. So we thought of an application that could help the management as well as students to be updated with the placement information. The main purpose of this application is to manage, inform as well as keep the track of the companies coming in SLRTCE. It has three main aspects: 1.Students android application 2.Webpage for the TPO/Admin 3.Database handling on the server side. Android application features will include students personal account asking to upload its details along with the resume. They would be provided with the notifications of any company coming to SLRTCE and can apply for the same in just one click. The admin panel will input the news about upcoming companies including eligibility criteria and every detail. It will keep the record of the students applied for the company and get all the details of the particular student. The database server would consist of the students personal details, recruitment details, etc. Notification would be sent only to those students who are eligible to apply for the company. Future Scope: There will be an option for the student to apply for the mock aptitude test sessions and the record for the same will be maintained by the admin. The time schedule of the lectures conducted for the aptitude sessions will be provided and the attendance will be maintained for the same by the Admin.
Black Book Serial Number 15
Title NFC based Attendence Monitoring System
Guide Name Prof. Anil Chaturvedi
Group Members Akshata Sagwekar, Sanika Raul, Vishal Pandey
Abstract NFC Based Attendance System deals with the maintenance of student’s attendance details using NFC Sensors. Near Field Communication (NFC) is one of the most emerging technologies in the world. NFC cards would be implemented around different classrooms of the campus on which the students just have to tap their NFC enabled smartphones or NFC tags to mark their attendance. A simple tap would be enough for the students to get their attendance and the attendance record would be automatically generated by the system. As this is an automated computerized system there are very less or negligible scope of mistakes in the record of the system. The most interesting part of this system is that the faculty members can share their notes with the students through these sensors. With one tap on the NFC card the files can be directly transferred into the student’s smartphone within a second, this is due to high speed transmission rate of the NFC cards.
Black Book Serial Number 11
Title Advance 3D Game Using UNITY 5
Guide Name Prof. Madhuri Gedam
Group Members Abhijit Sathe, Rahil Hussain Shaikh, Saifin Prasla, Ketan Vanara
Abstract Gaming sector today is growing four times faster than other industries and with each game earning millions of dollars making gaming industry of worth $55 billion in 2015 alone .With this boost in gaming sector there has also been advancement of gaming developing software with Unity 5 being the latest and one of the most advanced software for development of PC games. Unity 5 is the new edition of the best development platform for creating 2D/3D games and interactive experiences Unity 5 brings you awesome new artistic power. Improved efficiency makes the hard work smoother and more fun, and with the industry’s most comprehensive multiplatform support.Unity 5 supports JavaScript and C# for programing and implementing the graphics of game. The aim of this project is to develop a Survival game which will be based on a fiction story that will consist of a virtual environment which will be viewed by the user as First Person View. First-person shooters are a type of three-dimensional shooter game featuring a first-person point of view with which the player sees the action through the eyes of the player character. The purpose of this game is first to benefit all the users by boosting their abilities to greater vision, mental rotation and task-switching. The user will be able to interact with the environment, game will consist of various obstacles, BOTS and Levels. The difficulty level at each level will higher than the previous level. The Game will also be uploaded so any one will be able to download and play the game.
Black Book Serial Number 12
Title All in One Compiler
Guide Name Prof. Reena Kothari
Group Members Aakanksha Bhatt, Pavankumar Jansali, Amit Redkar, Ankita Singh
Abstract Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. The concept of cloud computing fills a perpetual need of IT: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. The paper aims to describe an online compiler which helps to reduce the problems of portability and storage space by making use of the concept of cloud computing. The ability to use different compilers allows a programmer to pick up the fastest or the most convenient tool to compile the code and remove the errors. Moreover, a web-based application can be used remotely throughout any network connection and it is platform independent. The errors/outputs of the code are stored in a more convenient way. Also, the trouble of installing the compiler on each computer is avoided. Thus, these advantages make this application ideal for conducting examinations online.
Black Book Serial Number 19
Title Sales and inventory prediction using data mining
Guide Name Prof. Sunil yadav
Group Members Priyanka sonar,Snehal more
Abstract Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed databases isn't always feasible because merging data sets from different sites incurs huge network communication costs. Local Site also finds a centre site to manage every message exchanged to obtain all globally frequent item sets.. Therefore, the research is to develop a distributed algorithm for geographically distributed data sets that reduces communication costs, superior running efficiency, and stronger scalability than direct application of a sequential algorithm in distributed databases.
Black Book Serial Number 22
Title E- Commerce Web Data Comparator
Guide Name Prof. Madhuri Mam
Group Members Garima Agarwal,Kunal Nayyar,Ankit Hingu
Abstract This application describes a comparator for E-Commerce web application, which is designed around the concept of Crawler, Yahoo pipes & web page mash-ups. Here we have proposed a system of conducting E-Commerce, keeping at the forefront, the customers’ demand for good quality reliable products while maintaining a profitable and sustainable business model using Web based latent benefits. We believe this modelled approach has great potential and can be implemented for start-ups and other ambitious projects as well. It is a comparator technique to ease the use of the customer, saving his time and make tedious task easier all at a mouse click. This model will fetch a product's price from all the other existing E-Commerce site for the customer to compare the prices and get the best deal.
Black Book Serial Number 14
Title Android Application for Ordering at a Mall's Food Court
Guide Name Prof. Sunil Yadav
Group Members Prathmesh Narkar, Nikhil Pujary, Ashlesha Ramteke
Abstract Malls are the latest trend among the young generation and so are the fast foods available at the mall’s food court. A number of fast food joints are occupied throughout serving the orders placed by people wasting their time standing in queues. However this application would list all the food joints present in a particular mall along with their complete menu. Payment could be done online. It would save the consumer’s time in standing in long queues by simply ordering online beforehand. Once registered on the application the consumer could choose for a destination mall. After selecting a mall, the list all the food joints present in there would be displayed. The consumer would then have to select a joint and place an order from the displayed menu. Payment details would be mandatory to complete the transaction. A token no. would be provided to the consumer which he would have to show at the respective food counter to take his/her order.
Black Book Serial Number 23
Title Using association classifier for predictive analysis in health care
Guide Name Prof. Sunil Yadav
Group Members Grijesh patwa, Deepak maurya, piyush singh, suryaprakash Yadav
Abstract Association classifier for predictive analysis is to develop a project which is used to analysis on the data of the patient’s and on the basis of that data the prediction can be done. This is the new technique where we are integrating the two technique which were used earlier for data mining. Those two technique are association rule mining and classification rule mining by combining these two techniques we are developing a new classification Approach .Till now, the association rule mining are used for data mining of descriptive task, such as market basket analysis and the classification rule mining was used for predictive analysis technique that is used to discover a small set of rule in database that focus on accurate classifier. Now, we are using this association classification technique in medical field. We are going to collect the data of patients such as age, smoking habits, BMI, Hypertension, and the predictive analysis will be done on the basis of above data which will show the chances of heart diseases. By using association classification the accuracy of data will be higher than other techniques.
Black Book Serial Number 21
Title Optical character recognition using Android
Guide Name Prof. Saurabh Suman
Group Members Sanjay singh,ronak Solanki,ankith vishwakarma
Abstract Paper deals with the development of a mobile application that based on Android platform for capturing digital photography and subsequent processing by OCR (Optical Character Recognition) technology.The project aims at using scanning and comparing techniques to identify printed text into a digital format. It reduces the effort of typing the whole documents down to get a digital format of the particular document. The OCR takes image as the input and gets text from that image .This system can be very useful in various applications like banking, legal industry, and home and office automation…etc. In this paper, this method is presented by using android phone with higher quality camera and OCR technology.
Black Book Serial Number 2
Title Mobile Attendance Evaluation System
Guide Name Prof. Anil Chaturvedi
Group Members Nirbhay Kularia, Ajit Rajpurohit, Niraj Tripathi.
Abstract Mobile Attendance Evaluation System is an Android application to manage student attendance on mobile. In many colleges teachers use to take attendance manually. Main objective of this project is to add mobility and automation in the existing attendance process. This system helps teachers to take attendance through mobile and also keep in touch with student in some aspect. This System allow teachers to take attendance, edit attendance, view student's bunks and also helps teachers to inform students about the events that college is going to organize. Parents and students will be sent SMS alerts. This system gives a prior intimation to student as soon as his attendance goes below the specified attendance deadline in the form of an alert. This system helps students to keep in touch with the events that college is going to organize. This application will help to eliminate most of the paper work.
Black Book Serial Number 8
Title Expertise Diagnostic System
Guide Name Prof. Saurabh Suman
Group Members Mithilesh Jaiswal, Dhirendra Jha, Niraj Soni
Abstract In every field the amount of data stored and collected is growing at a very rapid pace. In the medical field also like other fields the collection of old data is very important. Even though this information is very important for the treatment of the people for next time, it is rarely used after once the treatment is completed for first time, because of this they work on same type of hypothesis, if these data’s are preserved and used for diagnosis then it may be easy for the doctors to do the diagnosis of the patients, and it may also be possible by analyzing these data’s to come up with some new medical hypothesis or we can say some new ways of treatment and can give the proof of some of the existing hypothesis. For this the data can be preserved or stored in databases and can be retrieved and modified with the data mining algorithms like test selection, association mining etc. which helps in finding the almost appropriate treatment for the problems from which patients may be suffering. With the Data mining techniques Artificial Intelligence is also required which helps in making the system behave as an expert. These systems with artificial intelligence will be used in future for assisting the doctors their work and while analyzing do the proper analysis of the subjects and give appropriate results. Artificial Intelligence techniques like Artificial Neural Network, Reinforcement Learning etc can be used.
Black Book Serial Number 4
Title E-Tender Management System
Guide Name Prof. Reena Kothari
Group Members Akash Devbanshi, Rajan Gupta, Anurag Mishra, Jitendra Prajapati
Abstract The E-tender management system is very important things. It is help to save the time, cost and reduce the paper work etc. E- Tender management system helps the users in many ways. E-tender management system is committed to providing smarter way to manage the on line tendering process without wasting the time. In the E-tender management system tender manager can raise the tender and proposal side can bid that tender online, which is helpful for both tender manage as well as proposal side. E-tender management system can maintain all the tender record that is may raise by the tender manager or bid by the proposal side. E-tender management system will automatically invite and manage submissions. This means the people responsible for procurement can focus on things other than ensuring bids are submitted on time and with the right information.
Black Book Serial Number 18
Title Web Services On Instant Messaging
Guide Name Prof. Saurabh Suman
Group Members Parmar Hiren Bipin, Patel Jamin Kantilal Manisha, Savli Tejas Nitin
Abstract Today, we access a variety of services via Internet using different platform for each. E-mails, social networking, bill payments, ticket booking, etc. everything has a related web service to it. Even services like updates on a live match score, weather forecast, astrology, emergencyservices etc. are available as a web service. The main issue here is that they are all discrete services and lacks a communication between them. The aim of this project is to provide a centralized interface to the users for various web services. Instead of visiting different websites each time to access these services, the users can just use this interface. Here, we will develop an interactive centralized interface in the form of an intelligent chat assistant using existing Instant Messaging services. This project will utilize the modern concepts of artificial intelligence to provide the most interactive environment to the user. User’s queries will be recognized based on the semantic analysis rather than using only keywords. This project will provide an easy access to various services and also save the bandwidth that may be used while browsing the services individually. As this project is based on Instant Messaging service, it will minimize the data transfer and maximize the accessing time. In this project whatsapp is used as an Instant Messaging service that will be used as an interface between the intelligent chat assistant and users that will provide different services directly on whatsapp. Most of the major web services like google, facebook, etc. provide an API for the developers to communicate with their services. This project will use these API to bring all services together. But not all services provide an API; hence data mining concepts will be used for such services. This project utilizes existing instant messaging services rather than creating a different service. Hence this project will minimize the access time for various services in an interactive way which will also reduce the data transfer to increase the speed.
Black Book Serial Number 3
Title Home Automation for Disabled Person
Guide Name Prof. Saurabh Suman
Group Members Chauhan Indrajeet Lavkush, Chauhan Karanjeet Indrajeet, Jethwa Vicky Ashok Kumar, Yadav Shashikant Phoolchand
Abstract Advancement of technology has made our life simpler where everything is available at our fingertips. Implementation of home automation using the latest technology gives us more convenience, security and safety. Smartphone affordability increases every year and they have begun to play important roles in our daily life due to its size and portability. People are tending to carry this mobile gadget wherever they go. Google’s Android Operating System (OS) is a leading mobile gadget OS in the market and Android phones are one of the most preferred smartphones. Controlling home appliances using an Android phone gives users the ability to control the home appliances anywhere, anytime in their home and saves the time spent searching for the remote control unit of home automation systems since the user’s phone is usually kept close at hand. Replacement of home automation system remote control unit with Android phone effectively reduces the number of remote control unit in home and saves on the fabrication cost of remote control unit. This project presents the design and implementation of a low cost prototype of Bluetooth based home automation system using Android phone. The design is using Arduino Uno board and the home appliances are physically connected to input/output ports of this board via relays. HC-05 is used to establish wireless communication between the Android phone and the Arduino Uno board. An Android application is developed to provide a user friendly graphical user interface (GUI) for remotely controlling on home appliances.
Black Book Serial Number 5
Title E-Health Care
Guide Name Prof. Saurabh Suman
Group Members Aadke Harshada Madhusudan,Chand Anjali Kailash,Ginde Niteesh Shripad
Abstract In today’s quick lifestyle the health is ignored by the people. The ignorance may be due to time shortage, cost etc. So for such a lifestyle E-healthcare system helps the users in many ways. E-healthcare is committed to providing smarter healthcare system to maintain the patient’s good health without visiting the doctor itself. Booking appointment with or receive health advice from specialized doctors anywhere and anytime. E-healthcare helps you ask health related questions to specialized doctors and get health advice on your fingertips. E-healthcare maintains all your medical records. E-healthcare ensures you in saving your time and enhances practice. Grow your practice by answering health question asked by users. E-healthcare enables you in managing patients’ contacts, appointments and accessing medical records (quick and paperless). Search for the doctor according to type or location and get the details of the doctor on the screen itself. This system saves your cost of re-visiting the doctor again and again. E-healthcare system provides secured information availability, interoperability and Efficient healthcare delivery.
Black Book Serial Number 6
Title Online Educational System
Guide Name Prof. Anil Chaturvedi
Group Members Kalu Saifulla Faiyaz ,Pandey Manish Shivkumar, Tiwari Dimple Vinod
Abstract The “Online Education System” proposed by our team has integrated all the possible aspects of an advanced education system which will be beneficial to students not only in present but also in their future. We are proposing the overall design of “Online Education System” for the field of Information Technology Engineering. This system is designed to assist not only the students of Information Technology Department but also the faculty of Information Technology department. We are trying to eradicate learning of knowledge through practical implementation which will be provided to student through videos. The theoretical knowledge will also be provided to students through books, pdf’s and various such documents. There is a feature of online certification test which will give the institutional certification to the student who qualifies the minimum passing score and will be certified in the subject specification. We also have the feature of faculty login where concerned subject faculty can login to solve the doubts of registered students and help them while clearing their concepts. This will enable an easy way of student faculty communication. The faculty can also log in to use our premium feature of question-paper-generator. This feature enables faculty of colleges to generate question papers through a pre--determined format as stated by the administrator of the online education system.
Black Book Serial Number 7
Title Predictive Analytics: A Step Ahead for Education System
Guide Name Prof. Sunil Yadav
Group Members Pandey Vishalkumar A., Savaliya Sumita Shanti Bhai, Thanvi Madhuri Radhakishan, Yadav Supriya Mithailal
Abstract Dropout rates for students in correspondence and open courses are on increase. There is a need of analysis of factors causing increase in dropout rate. The discovery of hidden knowledge from the educational data system by the effective process of data mining technology to analyze factors affecting student drop out can lead to a better academic planning and management to reduce students drop out from the course, as well as can generate valuable information for decision making of stake holder to improve the quality of higher educational system. Data mining technique can be used for such analysis and prediction. In this project, we will use real data from study centers like SHREE L. R. TIWARI COLLEGE OF ENGINEERING and data from various sources like university database, survey form, etc. Various steps of mining will be applied on the available data to deduce useful result. Various scenarios will be compared and there accuracy will be calculated. This project presents the work of data mining in predicting the drop out feature of students and analysis of data set using data mining algorithms. After analysis the outcome will be the major factors that affect student dropping out of the open courses the most (dropout rate). Before applying classification algorithms some feature selection algorithms are also used so as to get refined prediction results. Such analysis and prediction information will help college management and teachers to make necessary changes for imparting better education. Mining of useful knowledge can be done by using many other mining techniques like association, clustering. The educational databases contain hidden information for improvement of students’ performance. Educational data mining is used to study the data available in the educational field and bring out the hidden knowledge from it. This prediction will help to identify the weak students and help them to score better marks and save them from drop. The outcome predicts the number of students who are likely to get drop. The results provide steps to improve the performance of the students who were predicted to fail. After the declaration of the results in the final examination the marks obtained by the students are fed into the system and the results were analyzed for the next session. The comparative analysis of the results states that the prediction has helped the weaker students to improve and brought out betterment in the result.
Black Book Serial Number 20
Title Hospicare+
Guide Name Prof. Anil Chaturvedi
Group Members Mishra Anurag Sunil, Momin Alfiya Nisar Ahmed, Patel Khyati Bharat, Purohit Surabhi Praomd
Abstract Hospicare + is an android application to fill the admission form online and book appointments online. In today’s world widely use of internet. In this internet world all the things are online. Everyone is connected to everyone else via an application. The user is able to view the hospitals, doctors, and organize the account by the application downloaded in their android mobiles. Hospicare + will fill admission form online, book appointments, get free health tips, get an emergency prescription and emergency numbers. The users, with their interfaces to the system, are able to view all the features mentioned above. As it is a competitive world and very fast world, everything in the universes is to be internet. The client machine can be a simple android device which is readily available in the market. The users, with their interfaces to the system, are able to view all the features mentioned above. During medication, they are able to set the alarm to let themselves know the timing to take the medicine, and will receive notifications. The software as a service is provided using android applications. The application contains full accountability and logging systems, and supports supervisor actions to account for exceptional circumstances such as providing emergency numbers.
Black Book Serial Number 9
Title RTO Based Authentication Using NFC
Guide Name Prof. Anil Chaturvedi
Group Members Mane Priti Mohan, Powale Arti Sharad
Abstract The need for manual RTO based systems is completely reduced in this method and the RTO system works through NFC. A complete NFC system consists of a transponder (tag), reader/writer and computer host. The transponder, better known as the tag. The microchip contains memory to store a unique data and to receive and send data back to the reader. These tags are powered by the electromagnetic signal received from a reader. Development in technology bring digital world to be border-less. It's proven through a developed technology, when trade and transaction can be done not only using real money but also virtual one. Shopping process using virtual money has even more supported by existed Near Field Communication (NFC) device. This particular device works using radio frequency. In the year of 2011, Google was integrating this device into an Android-based cell phone, which made transactions using virtual money gradually developed. The NFC tag is used as a unique identity for account of a particular user. When a vehicle driver caught bay a traffic police, its driver is prompted to scan his NFC tag. If the identity (serial number of the tag) is matched with the one already stored in the system, the historical records of that driver get fetch on a mobile phone. Traffic police can also place a new complaint about that driver. If police placed a new complaint then the fine amount will get deducted from his total balance. After this, the vehicle gets immediate access to drive through. This NFC based RTO system also has some additional features. A new user can register him with the system. Also an old user can recharge his account balance. The amount for recharge can be entered in the system. In beginning, the user is prompted to scan his tag or ID. The serial code of the tags identified by the reader module and is sent for comparison with stored data. If the ID is matched by the microcontroller, the fine amount is deducted from user’s balance and user gets to drive through the area.
Black Book Serial Number 10
Title Resume Parsing and Standardization
Guide Name Prof. Madhuri Gedam
Group Members Bhat Aishwarya Ram, Gupta Amit Jung Bahadur, Tiwari Sachin Deenanath
Abstract This project deals with the parsing application developed for the resumes received through emails in multiple formats like doc, docx, pdf, rtf, txt, and html. When a company is giving a requirement and requires the resumes to be sent in mails, the company receives thousands of resumes. The problem persisting here is, it’s very difficult for the Manager or the concerned authorities to go through each and every parameter of the resume and then select the candidates, for the interview. It’s also a time consuming process. In this project, an attempt is made to develop Web Application to eliminate the above. When the resume is received through emails, it will be parsed as XML code. A user interface screen will be given where the authority concerned will store the job profile for the particular post. The system will go through all the resumes and shortlist the candidates who are nearly falling under those job profiles and display it to the concerned authority.
Black Book Serial Number 13
Title YOUSHARE-The Cloud Campus
Guide Name Prof. Reena Kothari
Group Members Sapar Aishwarya Shriniwas, Ghosh Priyanka Hemanta, Makwana Jaikunj Janakbhai
Abstract Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. The project idea is about to provide service of sharing any type of file by simple upload and share. It is a file sharing application. The application provides two services i.e. Shared Drive & My Drive. Shared Drive is a drive which is shared among all the users of the batch and one can select Shared Drive option at login page to upload and share the data among all the users of same category. The data shared with a class is visible to the whole class and admin too. The Shared Data is verified by the admin before it is shared and admin has the rights to, allow, block and delete permissions of each & every shared file. My Drive is another facility provided by You Share. My Drive is a personal drive for user where user can upload & store any type of file. User can login from same login page and select my drive option to use this facility. The data uploaded into My Drive or personal drive is not verified with admin and is visible only to the user. You Share facilitates students with a separate and limited space to store and upload data with its own access privileges.
Black Book Serial Number 16
Title Online Medicine Distribution
Guide Name Prof. Reena Kothari
Group Members Gupta Satish Chhotelal, Pandey Manav Anantdeo
Abstract This project is related to online medicine distribution to medicals. In traditional approach, salesman had to manually go to every medical and collect the order. Using this approach, the cost of the travel and the time for manually doing it is very high. This project will help the distributors to directly contact the shopkeepers and place the order online. The order can be cancelled or altered only 24 hours before the delivery. This will help the distributors reduce the cost and time spent for manually receiving orders from every medical. It will also help keeping a track of every order according to the time of order and the time of delivery.
Black Book Serial Number 17
Scroll to Top