SURVEY ON VARIOUS HAND GESTURE RECOGNITION TECHNIQUES

Bhoomi Shah 1,Shubham Singhal2  

1Department of Computer Engineering MIT College Of Engineering Pune, India  

2Department of Computer Engineering MIT College Of Engineering Pune, India 

ABSTRACT:  Pattern recognition of hand gestures associated with different alphabets and key press events contributes enormously towards human computer interaction. Nonverbal communication using hand gesture provides user friendly way of interaction with the computer. A recognition system is developed to translate hand gestures into key press events using only shape parameters. Real time system for hand gesture recognition is largely based on detection of meaningful shape based features. This paper is a survey on gesture recognition approaches in which includes static hand posture methods that are explained with different tools and algorithms applied on gesture recognition system namely hidden Markov model and fuzzy clustering.

Keywords: PUI, kinesis, k-means clustering, HMM, fuzzy c logic, threshold

 

pdf

By | 2017-07-06T10:08:13+00:00 July 6th, 2017|Conference Publications|0 Comments

MACHINE LEARNING APPROACHES FOR HUMAN CHARACTERISTICS IDENTIFICATION VIA SPEECH- A SURVEY

Prof. Dr.Prachi Joshi1, Vinit Bhosale1, Ketan Kodmelwar1, Ninad Naik1, Komal Ramole1

1Department of Computer Engineering, MIT College of Engineering, Pune 

ABSTRACT:  In recent years, interactions between machine and humans has become an issue of concern. Speech is most natural form of thought in which human communicate. Speech recognition involves transformation of speech signal into sequence of words with help of algorithm. Analysis of speech can lead to capture the certain important aspects which can help in determining individual characteristics. This further can also help in capturing grasping power and detecting speech disabilities of children with special needs. This paper gives a survey of techniques used for speech processing.

Keywords: Communication, Speech, KNN, SVM, Machine Learning, Speech features

 

pdf

By | 2017-07-06T10:05:43+00:00 July 6th, 2017|Conference Publications|0 Comments

WRIST PULSE ANALYSIS-A SURVEY

Prof. Sumitra Pundlik 1, Pritam Rikame2, Neeraj Upadhyay3, Mayuresh Kakade4,  

Yash Tatkondawar  5  1Department of Computer Engineering   2Department of Computer Engineering MIT College of Engineering, Pune, India 

ABSTRACT:  Recently there has been drastic change in how people take care of their health. So the modern health care system must be capable of identifying any diseases symptoms that might appear in the individual. For detecting these symptoms modern system makes use of different signals that were collected from the individual under test. Further processing of these signals are done and finally machine learning algorithm are applied for predicting the final result.

Keywords: Ayurveda, Wrist pulse analysis, Tridosha, ANN, SVM, Random Forest Algorithm

 

pdf

By | 2017-07-06T10:01:49+00:00 July 6th, 2017|Conference Publications|0 Comments

Prof. Sumitra Pundlik 1,Vedashree Patil2, Sejal Upadhye3, Chaitanya Ujeniya4, Rajul Badal  5

 1Department of Computer Engineering   2Department of Computer Engineering MIT College of Engineering, Pune, India

 ABSTRACT: Deep learning is the newest field of machine learning that is gaining widespread popularity in almost all fields and has piqued the interest of all major technology giants including the likes of Google, Facebook, Amazon etc. With the availability of large volumes of data-sets along with the widespread use of GPUs that make parallel processing faster, cheaper and more powerful, machines can learn representations of image, text and audio and produce abstractions with the deep learning approach with lower error rates.

Keywords: Deep learning, GPU, Computer Vision, Object detection and recognition 

 

 

pdf

By | 2017-07-06T09:43:38+00:00 July 6th, 2017|Conference Publications|0 Comments

MACHINE LEARNING AND COMPUTER SECURITY

 

1Prof.Anita Thengade,2Anurag Bohra

 1,2Department of Computer Engineering, MIT College of Engineering, Pune, India 

ABSTRACT

Computers have become more pervasive and linked to Internet, they are open to a cornucopia of security threats ranging from unsolicited e-mail messages to drive-by downloads to botnets. These threats have become more vulnerable in recent years and the conventional methods used till now have become obsolete. Machine Learning is considered to be an ideal solution for this issue. This report considers all the aspects of integrating machine learning and computer security and based on those aspects and facts conclude whether it causes an advancement in securing computers or deteriorate the same.

Keywords: Computer Security, Machine Learning, Supervised Systems

 

pdf

By | 2017-07-06T09:39:32+00:00 July 6th, 2017|Conference Publications|0 Comments

A LITERATURE SURVEY: EDUCATIONAL DATA MINING AND WEB DATA MINING

Sarvesh Tendulkar, Swarada Adavadkar

Department of Computer Engineering   MIT College of Engineering Pune, India 

ABSTRACT:

Data Mining (DM) is extracting information from large set of data and obtaining meaningful results from it. Data Mining has evolved into diverse fields which requires development of data collection, creation, data management (including data storage retrieval and database transaction processing) and advanced data analysis (data warehousing and mining).This paper explains about two of Data Mining fields : Educational Data Mining (EDM) and Web Data Mining (WDM). Educational Data Mining (EDM) is an emerging field of data mining which applies various data mining algorithms for betterment of students and improving quality of student courseware. Web Data Mining (WDM) is a technique used to crawl through various web resources to collect information which an individual or a company use to promote business. In this survey, different published research papers on methodologies used in EDM and WDM are compared. Also, it gives an insight into techniques used in EDM and WDM.

Keywords: Keyword Indexing, Search engines, document frequency, term weights, data mining, neural network, predicting school failure, job trends analysis

 

 

pdf

By | 2017-07-06T09:36:56+00:00 July 6th, 2017|Conference Publications|0 Comments

SCOPE OF JAVASCRIPT IN DATA ANALYSIS AND DATA VISUALIZATION

Jayshree Ghorpade1, Pratik Kataria2, Prachi Dwivedi 3, Kiran Rode 4, Akshay Jain 5

Department of Computer Engineering, Maeer’s MIT-COE, Pune, India

ABSTRACT: JavaScript has advanced significantly as an integrated technology stack for building user interfacing applications on the front-end as well as the back-end. There is a school of thought that the future of JavaScript is so tightly coupled to the web that it must exist if the client side web does. JavaScript is widely used. It can be used for Full-Stack Development and many other languages or supersets can be compiled into JavaScript. This paper is written to explore the idea of using JavaScript for Small Data as well as Big Data platforms. The front-end as well as the back-end is explained to infer whether the concept of ‘JavaScript Everywhere’ is actually possible in the future. Thus taking into consideration the past and present of JavaScript, the future of JavaScript is anticipated. If there’s a browser, then there has to be JavaScript associated with it. It may happen that JavaScript is also used for kitchen appliances or home amenities as a whole for IoT.

Keywords : Data analysis, Data visualisation, JavaScript, D3.js, front-end, back-end, JSON

 

pdf

By | 2017-07-06T09:33:42+00:00 July 6th, 2017|Conference Publications|0 Comments

IOT BASED REMOTE HEALTHCARE MONITORING: COMPREHENSIVE STUDY

Prof. Anita Gunjal1, Akshata Talele1, Chinmayee Mundhe1,  Nikita Adkar1 , Manodnya Bhoite1

1MAEER’s MIT College of Engineering, Pune 

Abstract: When Internet first came to the world it was considered a revolution and now we are at a precipice of the applications of Internet and time has come when we take a leap to a new revolution and that is the connection of people and processes i.e. Internet of Things (IoT). It is a world where physical objects are integrated in the network to share information. Over the last few years, the development in IoT enabled the fascinating applications. The aging population is constantly rising worldwide, both in urban and regional areas. Hence, there is a need of IoT based remote healthcare monitoring. These systems can take care of the elderly people without compromising their preferences and convenience. In this paper, we identified the network requirements of remote healthcare monitoring systems in the terms of bandwidth requirements, data generation and real-time event update. Further we studied about the protocols such as XMPP, HTTP, CoAP and MQTT.

Keywords : Internet of Things, Remote healthcare monitoring system, Protoc

pdf

By | 2017-07-06T09:29:19+00:00 July 6th, 2017|Conference Publications|0 Comments

A SURVEY OF VARIOUS CHATBOT IMPLEMENTATION TECHNIQUES

Aditya Deshpande1, Alisha Shahane 2, Darshana Gadre3, Mrunmayi Deshpande4, Prof. Dr. Prachi M. Joshi

1Department of Computer Engineering, MAEER’s MIT College of Engineering, Pune, India 

Abstract: Today is the era of intelligence in machines. With the advances in Artificial Intelligence, machines have started to impersonate different human traits today. Artificial intelligence conversational entities, also called chatbots, are an excellent example of such machines. Chatbots are computer programs capable to carry out near – natural conversation with people. In this work, we describe the evolution of chatbots from a rudimentary model to an advanced intelligent system. Chatbots are currently gaining a lot of popularity especially in business sector as they have the potential to automate customer service and reduce human efforts. For a chatbot to perfectly emulate a human dialogue, it must analyze the input given by a user correctly and formulate a relevant and appropriate response.

Keywords: Chatbots, OCR, Information Repositiory, Knowledge Base, AI

pdf

By | 2017-07-06T09:25:56+00:00 July 6th, 2017|Conference Publications|0 Comments

SURVEY OF MACHINE LEARNING TECHNIQUES FOR STOCK MARKET ANALYSIS

Sumeet Ghegade 1, Mandar Koujalgi 2, Garvit Raj Singhal3 

 1Department of Computer Engineering   2Department of Computer Engineering MITCOE, India 

ABSTRACT:

Stock market trading is becoming a major source of income for people in India. In order to be a successful investor the most important thing is to predict the trend of the stock you are investing in. It is a well-known fact though that stock market prices are highly volatile. Analyzing the entire data and recent updates about a company is beyond human brains comprehension. Hence, we aim to propose in this paper some models that may be able to predict accurate trends in stock market prices. The aim is to forecast closing price of a particular stock for next few days with minimal error. Combination of both technical and fundamental analysis is going to be used along with some data analysis techniques.

Keywords: Stock market, trends, fundamental analysis, technical analysis, data analysis techniques.

 

pdf

By | 2017-07-06T09:22:02+00:00 July 6th, 2017|Conference Publications|0 Comments

FACIAL FEATURE EXTRACTION AND CONCEPT MAP BASED HUMAN AFFECT RECOGNITION SYSTEM

Shweta Malwatkar 1, Rekha Sugandhi2, Dr. Anjali R. Mahajan 3

 1Department of Computer Engineering MIT College of Engineering Pune, India

2Department of Computer Engineering, MIT College of Engineering Pune, India

3Department of computer and IT, Govt. Polytechnic, Nagpur, India

ABSTRACT:

The expressions on the face is the key factor of communication among human beings. Facial expression recognition is the computer based automatic process. This process works in four major parts such as: Face detection in input image or video, preprocessing of the extracted face region, facial expression feature extraction and classification. Classification of facial expression is based on either prototype facial expression such as happy, sad, anger etc. or on Facial Action units. This paper concentrates on Facial Action Coding System (FACS) for classification. Initially system takes the video as an input and divide it into frames by using Xuggler Library. These frames are then preprocessed with Haar like features, for face, eyes and mouth detection. After this, facial point localization and facial feature point are required in FACS based classification. For improving the classification accuracy and speed and to reduce the emotion confusion, Concept Map is used. Experimental results prove that the FACS and Concept map based classification will improve the accuracy of classification results.

Keywords: Affect recognition, feature extraction, face detection, concept map.

 

pdf

By | 2017-07-01T10:15:09+00:00 July 1st, 2017|Conference Publications|0 Comments

Enhancing Tagging of Digital Documents Using OCR

Mahendra K. Ugale1, Madhuri S.Joshi2

[1][2] Dept of Computer Science and Engineering, Jawaharlal Nehru Engineering College, Aurangabad, M.S., India

ABSTRACT:

A document management system is based on management of digital documenID_62 Enhancing Tagging of Digital Documents Using OCRts used to track search and store documents and reduce paper. This is done by converting documents and other papers into digital form like pdf i.e. Portable File Format by using OCR. Document image analysis is important aspect in automating the offices. In most of the cases office consists numerous documents presenting a mixture of handwritten and printed text. The recognition of such documents is a challenging task for OCR designers. In this paper comparison is presented of different tools for searching handwritten and printed text from document images by tagging documents automatically and manually. Hence classification of handwritten and printed text from document image is important to optimize the OCR accuracy.

Keywords: OCR, Tagging, Handwritten and Printed Text, Document Management System.

pdf

By | 2017-07-01T10:11:09+00:00 July 1st, 2017|Conference Publications|0 Comments

Fire Detection Using Image Processing Using Raspberry PI

Anita Thengade1, Prateek Mishra 2,Raunak Kshatriya3,Rahul Mhaskar4,Pankaj Bodhe5

1Department of Computer Engineering MITCOE Pune,India

2,3,4,5 Department of Computer Engineering MITCOE Pune,India

ABSTRACT:

The fire can be recognised effectively through video image processing. Traditional fire recognition system based on video image analysis do not analyze the color,texture and low level visual feature information of specific fire image.The validation performance is not good,the fire image scene recognition method is proposed on image processing .A contour is a curve joining all the continuous points along the boundary with the same color value. The detecting of contours in an image is very useful if you want to detect the boundaries in images.Gray processing and binaryzation process are taken into consideration for fire image.The normalization process is taken for filtering background interface.The refined video digital image is analyzed . Fire Sensor is used to collect the visual feature of fire video monitoring images.Simulation shows algorithm has good efficiency it can recognize campus fire accurately and gives real time alarming.

Keywords: Pi,Diode,Resistor,Image Processing,Binaryzation

pdf

By | 2017-07-01T10:07:18+00:00 July 1st, 2017|Conference Publications|0 Comments

COLLEGE MANAGEMNT SYSTEM BASED ON ANDROID APPLICATION USING CLOUD COMPUTING

Akshay Khedaskar 1, Suyog Gaikwad 2 , Ruchir Tawade3 , Megha Naik4 

1Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani. Raigad, India akhedaskar@gmail.com

2Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani. Raigad, India akhedaskar@gmail.com

3Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani. Raigad, India, rtruchir33@gmail.com

4 Department of Computer Engineering, Pillai HOC College of Engineering and Technology, Rasayani. Raigad, India, meghanaik09@gmail.com 

ABSTRACT:

This is an Android application which is very useful for college students. In the previous system, all the information must be viewed in a website. At that time searching any information is too difficult and it takes a lot of time to search the particular website for each and everything like (Question papers, Aptitude Test, Information of Syllabus etc.), and it needs additional browser to search any website. Hence, to overcome this problem a smart phone based application using Android can be used to make this process easier and faster. Android is an open source Linux based system developed by Google. We will be using it to accomplish our daily task. One application that falls into this category is the Android Application for College. This College application provides a wide range of useful information which splits into several functionalities. These include: Syllabus, Question papers, Aptitude Questions, College Notices or Notifications, What’s New Today and Important Videos. Users can install this application in their android mobile to view all this Information and use it.
The design and implementation of this system is to provide services in institute. This application is used to provide comprehensive student information and user interface. The system plans for student user interface, allowing students to access resources as provided by college. Previously, college students relied heavily on browsers which had its own disadvantages like searching all websites for each and everything, but this system helps us to maintain all required information in single app.

1.2 This application decreases time needed to search all information. This system provides a simple interface for the maintenance of student information. This app will provide information in an easy and interactive manner which provides facilities like online registration, questionnaire system, syllabus viewing, providing Aptitude Questions, Important Educational videos related to Syllabus, College Notification and many more activities. The results can also be displayed on web server.

Keywords: Android, Cloud Storage, Library Books, Notification, Syllabus, Question Paper, Aptitude Questions, Important Videos.

pdf

By | 2017-07-01T10:03:35+00:00 July 1st, 2017|Conference Publications|0 Comments

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA

Akshay Sharma1, Ameya Ambekar2, Pavan Dahale3, Priyansh Bendre4, Prasad Halgaonkar5

1,2,3,4,5Computer Engineering Department MIT College of Engineering, Pune India

ABSTRACT:

NFC holds the potential of eliminating the requirement of setting up high-cost and complex IT infrastructure for solutions and services. It provides flexible and secure environment for easy access and development through lightweight portable devices. In NFC, a small amount of information stored in the tag is used to authenticate a device. The goal of this paper is twofold. First in this paper we trying to compare various wireless data transfer technology standards. And Secondly this paper further gives details about the benefits of using NFC over other mediums for secure authentication.

Keywords: NFC, Bluetooth, BLE, Infrared, RFID

 

pdf

By | 2017-07-01T09:58:38+00:00 July 1st, 2017|Conference Publications|0 Comments

SMARTPHONE BASED SURVEILLANCE SYSTEM WITH INTRUSION DETECTION

Sneha Khandare1, Ifreen Raveen2, Sachin Gahlot3, Saurabh Kumar4, Mr. Pranav Shriram5  

1Department of Information Technology MIT Academy of Engineering, Pune, India

ABSTRACT:

Smartphone based systems have gained popularity over the years and android is about to become the most widely used OS on mobile phones. In the rapidly advancing world of technology, mobile applications are a continuously growing segment of the global mobile market. Mobile applications are evolving at an astounding pace to give users a rich and fast user experience. The intention is to provide surveillance of an area with motion detection feature remotely through an android application. The CCTV captures images and videos and sends them to the server, which operates and handles motion detectors and video cameras for remote surveillance, streams live video and records it for future playback. The server transmits this data to the authorized smart phones through HTTP connections where we can access them through an application. There are two important aspects, first is the image processing. Second is the connectivity between the server and the CCTV camera and server and the application.

Keywords: Surveillance, Android Application, Intrusion Detection, Image Processing, Remote Monitoring

 

pdf

By | 2017-07-01T09:54:32+00:00 July 1st, 2017|Conference Publications|0 Comments

MPLEMENTATION OF DIGITAL LIBRARY USING HDFS AND SOLR

H. K. Khanuja, Amruta Mujumdar, Manashree Waghmare, Mrudula Kulkarni, Mrunal Bajaj

Department of Computer Engineering Marathwada Mitra Mandal’s College of Engineering Pune, India

ABSTRACT:

Majority of the digital libraries implemented in worldwide use server-client architecture. Such libraries require a large infrastructure investment in server setups and maintenance. Servers are also very difficult to scale as they are based on changing institutional requirements and needs. These drawbacks can be overcome by using a distributed database system. Apache Hadoop is one of the large scale data processing projects that support data-intensive distributed applications. Hadoop applications utilize a distributed file system for data storage called Hadoop Distributed File System (HDFS). Apache Solr is used for processing and searching the required data. Apache Solr provides search features like Full-Text Searching, Hit Highlighting. Solr searches the index instead of searching the text. Because of this feature Solr achieve fast search responses.

Keywords— Hadoop, HDFS, Digital Library, Replication, SOLR

 

ID_53_PaperICRACA

pdf

By | 2017-07-01T09:51:02+00:00 July 1st, 2017|Conference Publications|0 Comments

Topic Modeling on Online News and News Clustering

Aashka Sahni1 and Prof. Sushila Palwe2

Department of Computer Engineering, MIT College of Engineering, Pune 

ABSTRACT: 

News media includes print media, broadcast news and internet. Print media contains newspapers, news magazines, broadcast news contains radio and television, while internet contains online newspapers, news blogs, etc. The online news has been the prevalent form of information on the internet. Often, the occurrence of the same event or happening is depicted differently in different news websites or sources due to the varied perceptions of the same circumstance. Proposed system intends to collect news data from such diverse sources, capture the varied perceptions, summarize and present them at one place. Another goal of the proposed system includes detecting topics accurately in case of short news data. Previous approaches like LDA and its variants are able to identify topics efficiently for long texts (news), however, fail to do so in the case of short texts (news) due to data sparsity problem. Since sophisticated signals are delivered by the short news, it is an importnat resource for topic modeling, however, the issues of acute sparsity and irregularity are prevalent. These pose new difficulties to existing topic models, like LDA and its variations. In this paper, a lucid but generic explanation for topic modeling in online news has been provided. System presents a word co-occurrence network based model named WNTM, which works for both long as well as short news articles by managing the sparsity and imbalance issues simultaneously. WNTM is modeled by assigning and reassigning (according to probability calculation) a topic to every word in the document rather than modeling topics for every document. It effectively improves the density of information space without wasting much time and space complexity. Along these lines, the rich context saved in the word-word space likewise ensures to detect new and uncommon topics with convincing quality. The system extracts real time online news data and uses this data for system implementation. Firstly, topic modeling algorithm is applied on this online news data to identify the key topic of the incoming news and also to identify the most trending topic. Once we identify the topic of news, the system uses k-means document clustering algorithm to cluster all latest news associated to a particular topic together. Likewise, classify the news on the basis of topic. After clustering, generation of the summary is done from the output and we intend to present the summarized news along with the topic to the user.

Keywords: Data mining, Topic modeling, document clustering, online news

ID_51_ijcea_paper

pdf

By | 2017-07-01T09:45:07+00:00 July 1st, 2017|Conference Publications|0 Comments

NATURAL LANGUAGE PROCESSING PREPROCESSING TECHNIQUES

Swapnil Vaidya1, Jayshree Aher2

1,2Department of Computer Engineering MITCOE, Pune, India

ABSTRACT:

Data mining also known as knowledge discovery, is a process of discovering useful information or patterns from different perspectives. Data mining involves the intersection of other domain fields, such as artificial intelligence, machine learning, statistics etc. Text mining is a subset of data mining, as data can be of any form, text, image, video, signals from sensor devices etc. Text data includes text files, scholarly articles, short text (tweets), may be tabular representation as in relational databases etc. Documents are in natural language, i.e. English (most preferably), which needs to be processed in more efficient way. Natural Language Processing is a method which can increase the efficiency of text mining, by converting the text documents into more understandable form. In natural languages, most important task is preprocessing of text, we need the data in correct format for analyzing it efficiently. To extract some information from a bulk of data (unstructured text data), which will lead to some meaningful pattern or knowledge preprocessing plays very important role. This paper presents some preprocessing methods which are involved in preprocessing of unstructured text data, such as social networks (twitter, facebook, etc.) applications of Natural Language Processing.

Keywords: ID_50_SwapnilVaidya_NLP (1) (1)

 

pdf

By | 2017-07-01T09:38:20+00:00 July 1st, 2017|Conference Publications|0 Comments

AN ANDROID BASED ASSISTING AND MONITORING TOOL FOR AUTISTIC CHILDREN

Ashish Varghese 1, Tejaswini Kasture 2, Yash Gupta 3, Prithviraj Patil  4

 Department of Computer Engineering MIT College of Engineering, India 

ABSTRACT:

Autism is a lifelong development disability which affects the overall understanding of the autistic child and causes problems with speech and nonverbal communication. Autistic children have to be taught again and again which makes it a tedious task for the parents and the teachers to teach them. The child’s ability to function can be improved by the help of treatments and services. These treatments and services can be provided using the latest trends in mobile technology. So for this reason we have proposed a system which eliminates the repetitive efforts required by teachers and parents by providing a customizable, adaptable and cost efficient system. This system is built using open source tools like FFmpeg and Opensmile. It adapts itself according to the behavior and learning of the child and provides the next level of learning depending on the learning level of the child.

Keywords: ID_49_An android based assisting and monitoring tool for autistic children (1)

pdf

By | 2017-07-01T09:34:33+00:00 July 1st, 2017|Conference Publications|0 Comments

NATURAL LANGUAGE PROCESSING WITH WORD ALIGNMENT MODEL

Ankita Kale1, Jayshree Aher2  

1Department of Computer Engineering MIT College of Engineering Pune, India  

2Department of Computer Engineering, MIT College of Engineering Pune, India 

ABSTRACT:

We have number of reviews every day on the internet about different products, movies and what not, consist of valuable information like reviewer’s emotion, opinion or attitude. Capturing those sentiments of customers from that informal text is task of sentiment Analysis. This paper outlines briefly an approach based on Word Alignment Model for deriving sentiments of the reviewer at deeper level. With the Electronic Product Review dataset, system preprocess the data to obtain the segments for the Word Alignment Model which is trained using EM algorithm in unsupervised manner. Partial links from the syntactic parser is incorporated to improve the result. Association Relation between extracted words are calculated along with the confidence value for each word individually. With these probabilistic values, a graph called Opinion Association Graph depicts the relativeness between relevant product features and sentiments.

Keywords: ID_48_Ankita_Kale_CRC

 

pdf

By | 2017-07-01T09:31:54+00:00 July 1st, 2017|Conference Publications|0 Comments

EVALUATING PRODUCT/ SERVICE REVIEW VIA SENTIMENT ANALYSIS

Pooja Bhatia, Pratik P. Watwani

1,2Department of Computer Engineering, Vivekanand Education Society’s Institute of Technology, Mumbai, India

ABSTRACT:

Sentiment Analysis(SA) concentrates on investigating sentiments of regular dialect by the methods of using different algorithms and procedures. Sentiments, Opinions, Views all stand up to be the mainstays of basic decision making in today’s time. Each Product, service gets a supposition or estimation from its users. Organizations expect their products and services to beat the class. In this, SA comes into the picture. Even though SA has a great many application, there has been a constrained measure of research that has been done. Web permits the sharing of data, there is a tremendous measure of unstructured information that shapes the sentiments, feelings, considerations and so forth. Sentiment Analysis is vital, because it helps in deciding the extremity of sentiments of users. This paper focuses on determining how SA can be used by an organization or a service provider to comprehend their customers feedback and sentiments and along these lines make important steps as required.

Keywords: ID_46_[CAMERA READY]Evaluating Product Service Review via Sentiment Analysis

 

pdf

By | 2017-07-01T09:28:31+00:00 July 1st, 2017|Conference Publications|0 Comments

DETECTION OF DECEPTIVE RESOURCE CONSUMPTION OVER A WEBSITE

Abhishek Karadbhuje 1, Sukhada P. Bhingarkar2

1Department of Computer Engineering, MIT College of Engineering Pune, India

2Department of Computer Engineering, MIT College of Engineering Pune, India

ABSTRACT:

Web hosting provides a service to many organizations and individuals to post their web based application over the internet. Hosting a website over the Internet requires some resources and the resources are provided by the service provider using some billing or metered service. Most of the attackers who want to exploit the business of an organization fraudulently consume their resources and increase the financial burden. Today the main challenge is to design a system that can detect and mitigate the deceptive resource consumption by the attackers. For the same, we propose a system which identifies the deceptive resource consumption over a website. The proposed system is using a dual classifier to detect anomalous request. The first classifier classifies the request by its purchasing history and the second classifier classifies the request by its behavior.

Keywords: Distributed Denial of Service attack (DDoS), Fraudulent Resource Consumption, Web hosting, Support Vector Machine (SVM), Proxy Server.

 

pdfID_44_IJCEA Paper_updated_CRP

By | 2017-07-01T09:14:50+00:00 July 1st, 2017|Conference Publications|0 Comments

TRAFFIC MONITORING AND REPORTING SYSTEM USING IOT

Chiranjeev V. Tapas 1, Narendra Chaudhari2

1Department of Information Technology 2Asst. Prof. Department of Information Technology RTM Nagpur University, India

ABSTRACT:

Although many traffic laws are introduced, we still don’t see any fall in traffic rule violations or death caused by such negligence. The factors causing such failure can either be people or the system. So to solve this issue we propose in this paper a device using Arduino Uno that will monitor each vehicle individually with the help of sensors and modules, that it is attached on and will store data of speed violation and impact or crash along with the location and time. The device when in the range of receivers (attached to signals) on any junctions will send data to receiver devices. This data then will be uploaded to a centralized database using IOT without any human interaction.

Keywords: ID_39_paper_ijcea

 

pdf

By | 2017-07-01T09:10:22+00:00 July 1st, 2017|Conference Publications|0 Comments

AUTOMATIC DOOR LOCKING USING FACE RECOGNITION

Ishaan Sathe1, Tanmay Telang2, Chiman Patel3, Prasad Mahajan4, Sejal Shah5

1, 2, 3, 4, 5 Department of Electronics Engineering K.J.S.I.E.T, Mumbai, India

ABSTRACT: Nowadays people use keys, security cards, password or pattern to open the door. The aim of this paper is to help people for improvement of the door security of sensitive locations by using face detection and recognition. Face is a complex multidimensional structure and needs enhanced computing techniques for detection and recognition. This paper comprises of three subsystems: namely face detection, face recognition and automatic door access control. Image acquisition is the process of capturing an image. The face is detected by using the Viola Jones method and face recognition is implemented by using the Principal Component Analysis (PCA). Face Recognition based on PCA is generally referred to as the use of Eigen faces. If a face is recognized, it is authenticated, vice-versa. The door will open automatically for the authenticated person due to the command of the microcontroller. Since PCA reduces the dimensions of face images without losing important features, facial images for many persons can be stored in the database. Therefore, face recognition using PCA can be more useful for door security system than other face recognition schemes.

Keywords: ID_38_ishaan mit pune11

 

pdf

By | 2017-07-01T09:05:31+00:00 July 1st, 2017|Conference Publications|0 Comments

SURVEY ON SMART ANALYSIS OF CCTV SURVEILLANCE

Nikita Chavan1,Mehzabin Shaikh 2 ,Priyanka Mahangare3 , Ketki Keskar4, Deepali Maske5

1Department of Information Technology 2JSPM’s Rajarshi Shahu College Of Engineering Pune, India

ABSTRACT:
As security and time are the very important aspects for everyone. So there should be some system which helps everyone to be safe. Also if any intrusion occurs we can analyze it in less time. This system helps to detect change detection by analyzing it in less time. Environmental changes can be detected up to some extent. Automation object detection analysis is usually the first task in multi camera surveillance. If there are changes then with help of CCTV recording using Open-CV it is detected and notified with some mark using different color. For analysis of these video on single machine it takes long time, to overcome this problem we are using Hadoop. It is used as it has advantage of distributed processing and centralized server processing.

Keywords: Image processing, video analysis, detection, Hadoop, Open-CV.

ID_37_Survey on smart analysis of CCTV surveillance(1)

 

pdf

By | 2017-07-01T09:01:35+00:00 July 1st, 2017|Conference Publications|0 Comments

A Novel Technique for Automatic Detection of Lesion in Colonoscopy Images

Praniti Golhar1, Siddhivinayak Kulkarni 2

1Department of Computer Engineering, MIT College of Engineering, Pune, India

2Department of Computer Engineering, MIT College of Engineering, Pune, India 

ABSTRACT:

Ulcerative Colitis (UC) is a common intestinal complication which causes polyps in the rectum which may develop further into cancer. Colon cancer causes deaths of about half a million people every year. Colonoscopy images are obtained by process called colonoscopy. There are various shapes of polyps at various stages. The proper examination of disease is not possible by naked eye alone. In an optical colonoscopy course, the endoscopist looks for colon polyps. Hyperplastic polyp is benign lesion; adenomatous polyp is likely to become cancerous. Hence, it is common practice to remove all of the identified polyps and send them to subsequent histological analysis. So we are proposing a technique in which detection of infectious area can be done with help of color analysis. So location of infectious area, blood clotting can be detected with help of color impact. The technique can be useful in designing the treatment of UC and will help in prevention of disease.

Keywords: Ulcerative Colitis, Image processing, Colonoscopy, Narrow Band Image, colorectal cancer.

 

ID_36_A Novel technique for automatic detection of lesion in colonoscopy images

pdf

By | 2017-07-01T08:57:44+00:00 July 1st, 2017|Conference Publications|0 Comments

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

Supriya Pentewad1, Siddhivinayak Kulkarni 2

 1Department of Computer Engineering. MIT College of Engineering, Pune, India

 2Department of Computer Engineering. MIT College of Engineering, Pune, India 

ABSTRACT:

From last few year data owner of the large personal multimedia files are storing their data on the cloud as it is very cost efficient as well as flexible. In above cases some of the times this outsourced data can reveal some personal information of owner’s private data. To avoid this problem we make the utilization of privacy preserving computation on multimedia information which is outsourced and Scale-Invariant Feature Transform (SIFT) feature extraction technique is applied on encrypted image data. We also made utilization of extracted feature descriptors in content dependent searching done by third party users with high level of security on image data which is encrypted. To evaluate the execution of framework, Cancer Image dataset is examined and utilized. Test outcomes will demonstrate that the proposed system is exceptionally efficient and effective for image search in encrypted picture information also gains high-level privacy preservation with SIFT feature descriptors.

Keywords: ID_33_Supriya Pentewad

 

pdf

By | 2017-07-01T08:50:46+00:00 July 1st, 2017|Conference Publications|0 Comments

Efficient and Secure Regeneration Code Based Public Auditing for Data Integrity in Cloud

Gourav Govande1,  Bharati Ainapure2

1Department of Computer Engineering MIT College of Engineering Pune, India

2Department of Computer Engineering, MIT College of Engineering Pune, India 

ABSTRACT:

Cloud computing is an on-request type of computing technique. It belongs to Internetbased computing, which creates backup frameworks. Cloud users outsource their data on cloud servers through the Internet to save their local storage. Data security becomes a challenging issue in cloud computing environment, sometimes data may be lost, outsiders or unauthorized entities might corrupt this data. This paper design and implements the public auditing technique for regeneration of the code based repository. The recovery issue is handled in the nonappearance of owners; instead of authenticators, we use a proxy. It is favored to recover the authenticators, into the ordinary public auditing method. This system is also supported by the concept of upload or downloads process resumption to save the time. Experimental results prove that the proposed system achieves data integrity, security, time efficiency, data loss recovery in a cloud computing environment. ID_31_Gourav Govande Updated

Keywords: Cloud computing, Code regeneration, data recovery.

 

pdf

By | 2017-07-01T08:47:12+00:00 July 1st, 2017|Conference Publications|0 Comments

EFFECTIVE LOAD ALANCING AND RESOURCE ALLOCATION IN CLOUD ENVIORNMENT

Sagar Ghuge1, Rushikesh Narhare2 , Himanshu Pritwani3, Divyanshu Gunjal4

1Department of Computer Engineering 2Department of Computer Engineering MIT College of Engineering, Pune, India

ABSTRACT:

Cloud Computing provides different facilities such as SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Cloud Computing is fast rising area in the today’s computing environment. Cloud computing is broadly used by many industries. There are different issues in cloud computing such as Virtual Machine Migration, Service Provisioning (Resource Allocation), and load balancing. The main issue in the cloud computing is load balancing and allocating resources dynamically. Load balancing is the mechanism that distributes the load among the different nodes in the whole cloud and achieves the high user satisfaction and appropriate resource sharing. Appropriate load balancing realizes in minimizing resource consumption, over provisioning, task failure. Availability of cloud system is one of the main concern of the cloud computing. Load balancing methods are practical across the cloud service to confirm the availability of the resources by minimizing use of resources and proper load balance. Resource consumption can be done with proper load balancing which helps not only in reducing the cost but making enterprise greener. Another feature of the resource provisioning is to guarantee that the requirements of the all applications are meeting appropriately. Load balancing is essential in distributed processes, Parallel processes, grid computing and many more applications. Resources are allocated on user’s request and priority bases. In this paper, we discuss the available load balancing techniques and allocation of the resources effectively.

Keywords: ID_29_Camera Ready PAPER IJCEA

pdf

By | 2017-07-01T07:18:08+00:00 July 1st, 2017|Conference Publications|0 Comments
Load More Posts