Title                      : Co-operative Housing Society

 

Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Hemant Bhojane [01]

2.Babalu Yadav[64]

 

Abstract               : “Simplicity is the ultimate sophistication”. Co-operative housing society management system exactly follows this phrase and aims at making the current situation in the society simple and efficient. Society management system reduces the conflicts that arise within the society by providing facilities such as online voting system, online hall allocation, etc. It automates certain attributes that occur within the society and makes it easy for the members of the society an easy access to society happening and on goings.

Society affairs management aims at simplifying and managing the different affairs in your society. A society is the well-formed committee in the building or a particular area. The application revolutionizes the way people deal with the affairs and issues of the society. This leads to ease of handling even complicated matters. Planning of meeting, discussion of issues, doubts regarding society law, communication with each other, group discussion is possible using this application.

 

 

Black Book Serial Number  :  
Title                      : Co-operative Housing Society

 

Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Hemant Bhojane [01]

2.Babalu Yadav[64]

 

Abstract               : “Simplicity is the ultimate sophistication”. Co-operative housing society management system exactly follows this phrase and aims at making the current situation in the society simple and efficient. Society management system reduces the conflicts that arise within the society by providing facilities such as online voting system, online hall allocation, etc. It automates certain attributes that occur within the society and makes it easy for the members of the society an easy access to society happening and on goings.

Society affairs management aims at simplifying and managing the different affairs in your society. A society is the well-formed committee in the building or a particular area. The application revolutionizes the way people deal with the affairs and issues of the society. This leads to ease of handling even complicated matters. Planning of meeting, discussion of issues, doubts regarding society law, communication with each other, group discussion is possible using this application.

 

 

Black Book Serial Number  :  
Title                      : Implementation of Forecast Mechanism Using Dynamic Data

 

Guide Name        : Prof. Ravi Prakash

 

Group Members : 1.Harshit Gautam [11]

2.Shivali Naik[24]

3.Ayshi Sane[40]

 

Abstract               : With billions of followers all around the world, cricket enthusiastic use the internet for variety of reasons to stay updated with the latest happenings in the data mining will be performed using “Datascope”.The project involve fundamental 3 types of analyses – generation of association rules, performing clustering and generation of decision trees. The application is built using Weka Data mining tool. The statistics for different players are retrieved periodically from howstat.com.

The project will give us a hands-on experience in analyzing huge masses of data and will actually teach us the values of data mining.

Black Book Serial Number  :  
Title                      : Partial Face Recognition For Criminal Investigation
Guide Name        : Prof. Ravi Prakash

 

Group Members : 1.Garima Singh [48]

2.Swati Singh[51]

3.Shubhangi Srivastava[55]

 

Abstract               : Over the past two decades, a number of face recognition methods have been proposed in the literature. Most of them use holistic face images to recognize people. However, human faces are easily occluded by other objects in many real-world scenarios and we have to recognize the person of interest from his/her partial faces.

In this paper, we propose a new partial face recognition approach by using feature set matching, which is able to align partial face patches to holistic gallery face automatically and in robust to occlusions and illumination  changes. Given each gallery image and probe face patch, we first detect key points and extract their local features. Then, we propose a Metric Learned Extended Robust Point Matching (MLERPM) method to discriminatively method local features sets of a pair of gallery and probe samples. Lastly, the similarity of two faces is converted as the distance between two features sets. Experimental results on three public face database are presented to show the effectiveness of the proposed approach.

Black Book Serial Number  :  
Title                      : Customization Using Web Services
Guide Name        : Prof. Pravin Jangid

 

Group Members : 1Chauhan Chandani [03]

2.Chauhan Rohan[04]

3.Tyagi Mayank[57]

 

Abstract               : Now a day’s Customer Relation Management has become very important factor in defining the enterprise growth because of economic globalization and rapid development in e-commerce. Today’s world enterprise uses the context data mining tool to extract the very critical information that can help in strategic decision making by the managerial decision maker.

The idea that the context is important when predicating customer behavior has been maintained by scholars in marketing and data mining that context does matter when modeling the behavior of individual customers and that it is possible to infer the context from the existing data with reasonable accuracy in certain cases. In this, we study how important the contextual information is when predicting customer behavior, decreasing the costs of gathering contextual information and how to use the application of Data Mining method in Customer Relation such as Classification, Clustering, Association mining, Prediction and Correlation. When building customer models. These findings have significant implications for data miners and marketers.

Black Book Serial Number  :  
Title                      : Policy Agent

 

Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.Divya Panesar [29]

2.Nidhi Shetty[45]

3.Vinita Vaishnav[60]

 

Abstract               : Today mobile is an essential tool; a mode of communication which is prevalent in every section of the society. Our objective is to utilize mobile as tool to facilitate an efficient, convenient and quick mode of electronic collection primarily through a Mobile based solution. The process of MI is to map the targeted customers with the help of its MI(micro insurance) collection agent. The individual who goes and collects money from the customers. The MI agents meets the target customer and initializes the collection process by invoking the Micro Insurance App through his mobile device. The MI Agent authenticates himself by entering his username and password and policy number as well as mobile number of the customer. Based on the policy number, the MI Agent’s Mobile application collects the outstanding amount, Name of the policy etc. from the IC-MI MI server and displays the same on the MI Agent’s Mobile. The MI agent verifies /communicates the Name/Policy details etc. to the customer. The customer pays the amount as per policy guideline amount to MI agent. The information with the Customer’s Policy Number and amount collected is sent to the MI Server. The MI agent and the customer receive a message on successful payment made. The following receipt is generated for the MI Agent and the customer.
Black Book Serial Number  :  
Title                      : Centralized Wireless Home Automation System
Guide Name        : Prof. Ravi Prakash

 

Group Members : 1.Ashima Saini [39]

2.Avinash Tiwari[56]

3.Atul Upadhyay[59]

 

Abstract               : The theme of this project is to have centralize control of the home, housework or household activity on one command of your smartphones through app and hardware switches. These are products which facilitates such wireless switches. One of them is Belkin, which is more emphasizing on hardware use and has many disadvantages in their software part or smart phones applications, which are reflected in reviews of their apps. Our project has the capability to overcome these disadvantages and also, increase the user friendliness of it with additional features. Unique features of our project are electricity consumption chart and graph, feedback from electrical components back to smart phone (most unique), Artificial Intelligence. The project is based on establishing dynamic Bluetooth connection on switches, electrical devices and on the smart phone and with apk app. Bluetooth connected Arduino switches components and microprocessor for feedback purpose from device with some LED light indication. Application of this project can be used at commercial as well as Institutional level. It is one of the software which can be used on daily basis in home and colleges in order to cut down the waste use of Electricity consumption and achieving automation.
Black Book Serial Number  :  
Title                      : Database Driven Website For Student Recruitment
Guide Name        : Prof. Uday Naik

 

Group Members : 1.Danish Japanwala [16]

2.Smit Panchal[27]

3.Vivekkumar Singh[52]

 

Abstract               : Training and Placement is the crucial part of any educational institute in which most of the work till now is being done manually. The aim of our project is Automation of Training and Placement unit that will include minimum manual work and maximum optimization, abstraction and security. This is web application which will help students as well as the administration authority to carry out each and every activity in this department.

The main objective of this project DATABASE DRIVEN WEBSITE FOR ASSISTANCE IN STUDENT RECRUITMENT is automatic calculation, sorting, updating and maintenance of data i.e. AUTOMATION. The data currently maintained is in the form of access sheets so any one access of these data if the administrator has logged in, we are, going to maintain the privilege access by storing the password in encrypted form that will enhance the security. The data about students is not in optimizing form so while sorting its is not sorted efficiently. Our aim is to maintain data in maximum optimized form. The objective of design is to determine how the problem will be solved. Data elements are grouped to physical data structures, screens, reports, fields and database. Our system will ensure easy and efficient placement options for eligible students as per mentioned criteria of various firms. We also include automatic mailing system for updating eligible students both the different firms and their recruitment details.

Black Book Serial Number  :  
Title                      : Credit society transaction system
Guide Name        : Prof. Kiran Patil

 

Group Members : 1.Shah Hareram Jawahar [43]

2.Pal Amitkumar Shobhnath[26]

3.Pandey Vikas Ramkishore[28]

 

Abstract               : We are going to implement the “Credit Society Implement System” for making the manual work automated so there will no need of the paper, the aim of making this is to make the manual work automatic so it will be fast and correct, this automated system will be helpful for the credit society admin, agents and its members. The members will be given an account number with username and password. Whenever members will demand his transaction details it will be available 24×7.

Collection agents will also be satisfied with the outcome of this project as the system will be automated. Also the collection agent will be provided with the unique username and password so that they can log in with their own account.

 Black Book Serial Number  :  
Title                      : Semantic web semantic search engine
Guide Name        : Prof. Uday Naik

 

Group Members : 1.Neel Patel [31]

2.Chinmay G Prabhu33]

3.Priyesh G. Singh[49]

 

Abstract               : Most of the existing search engines retrieves web pages by means of findings exact keywords. Traditional keyword-base search engines suffer several problems

In this project, we develop a Semantic Search Engine. First a fuzzy ontology is constructed by using fuzzy logic to capture the similarities of terms in the in the ontology, which offering appropriate semantic distance between terms to accomplish the semantic search of keywords. The semantic search engine can thus automatically retrieve web pages that contain synonymous or terms similar to keywords. Second, users can check or uncheck the page results based on their needs to show or hide it next time they search for it. The totally satisfactory degree of keywords scan be aggregated based on their degrees of importance and degree of satisfaction. Third, the domain classification of web pages offers users to select the appropriate domain from searching web pages, which exclude web pages in the inappropriate domains to reduce the search space and to improve the search result.

 Black Book Serial Number  :  
Title                      : Edunet learning system
Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.Ajay H. Upadhyay [58]

2.Priya Vicahre[62]

 

Abstract               : Edunate learning channel system is basically a system which aims at creating an E-learning portal for a campus. This allows registered users of the system to join a course available in the site and access the material published for the course. People can join as students of a course or a faculty for a course.

There will be an admin approval page where admin can approve the faculty members for the course. The E-learning home page should contain the title of the course and a brief description. There will be a discussion forum for each course  where students can interact, an announcement section ,which contain the latest announcements ,and the course content section which give the links for the material available for the course. For faculty member there will be an extra link for uploading the course contents in a zip file format.

 Black Book Serial Number  :  
Title                      : Location Alarm
Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.Anjali D. Dwivedi[10]

2.Priyanaka N. Darji[06]

3.Kunal B. Jadhav[15]

 

Abstract               : The idea of using the mobile handsets and phones is to deliver the valuable services. Location based services or LBS refer to a set of applications that exploit the knowledge of the geographical position of a mobile device in order to provide services based on that information. Location based services (LBS) provide the mobile client personalized services according to their current location. They also open a new area of developers, cellular service network operators, and service providers to develop and provide values added services; advising clients of current traffic conditions, providing routine information, helping the users to find nearby shopping malls. Location-based services offers many merits to the mobile clients. For the mobile user, the example of location based services are:

·         Profile changed based on place or area

·         Person location tracking by family

·         Nearest friends notification remainder

·         Location based service can be classified in 3 categories

Public safety/Emergency services:

The location of the client can be determined by the mobile carrier hence if it finds great use during Emergency since it can be used during the Emergency health hazards to locate the mobile clients.

Consumer services:

Now day’s smart phones like (Android, blackberry and iPhones) provide a set of location based application and services which helps the users to access the multiple services based on the user location.

 

 

 Black Book Serial Number  :  
Title                      : Verifying Cryptographic protocols using formal methods
Guide Name        : Prof. Uday Naik

 

Group Members : 1.Aditya Hitesh Raval [37]

2.Kailash Parasmal Solanki[53]

3. Krishan Dilip. Soni[49]

 

Abstract               : Cryptographic protocols provide secured service sin communication. Methods like model checking and theorem proving are used to verify the correctness of cryptographic protocols. But model checking methods can only check a bounded number of states, and theorem proving methods generally do not find attacks.

Our work provide a method of verifying protocols automatically and also finding attacks on protocols automatically if there is one, by using the automated theorem prover SPASS format, and then verify the protocol in SPASS . We also provide a method to figure out the steps of attack from the SPASS output. The advantage of our method are that it is completely automated; we use ordered resolution for efficiency and also equations to model Cryptographic primitives, while differ our methods from other methods.

 Black Book Serial Number  :  
Title                      : Dynamic Timetable Generator
Guide Name        : Prof. Kiran Patil

 

Group Members : 1.Jaynit Sagar [23]

2.Sumit Singh[50]

3.Abhay Yadav[63]

 

Abstract               : A college timetable is temporal arrangements of sets of lectures and class rooms in which all given constraints are satisfied. Creating such timetable manually is complex and time consuming process. Computer assisted Time table Generator can save a lot of precious time of creator who are The manual system usually involved.

The manual system usually ends up with various classes clashes either at same room or same teacher having more than one classes at one time. These are just due common human errors which are very difficult to prevent in such process. To overcome these process people usually taking the previous years’ time table and modifying it but still it is tedious job to incorporate changes. To overcome such problem we propose to a dynamic timetable generator.

This project introduces a practical time tabling algorithm a capable of taking care of both strong and weak constraints effectively, used in automated time tabling system. So that teachers and student can view.

 Black Book Serial Number  :  
Title                      : Enhanced Automated Departmental Management System For Educational Organization
   
Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Amish A. Mhatre  [22]

2.Charu R. Dubey[09]

3.Pramod O. Gupta[63]

 

Abstract               : World is contracting with the growth of Web Technologies. As the number of users is increasing day by day, facilities are also increasing. We are planning to create a new and an innovative application which can be used by colleges to manage the staff records efficiently. We have usually observed that staff members i.e. the faculties face many problems while managing the student’s records and other academic records. Keeping this basic idea in mind we are going to create an application named as “M.I.S.”.

This application will basically have four modules such as Attendance Records, Notice Board, Exam Records, and feedback system etc. Within this modules a faculty will be able to do a lot of more stuff like generating “Defaulter List”, “Issuing notices to students, other junior faculties”, “Managing Exam Records”, “Analysis of Student’s Academics”, Getting feedback from faculties to improve the department working”, “Getting overall Departmental Analysis” etc.

This application will reduce a lot of manual task which is done by the teachers usually to calculate attendance and doing all the analysis work. Faculties will get more flexibility to maintain all the records easily. No faculty can do partiality in attendance or exam marks to support nay student as all the records will be under observation by senior faculties like H.O.D. of the department, Vice Principal, Principal etc. The students will also get the flexibility to cross check there record so that if any wrong data found they can use feedback system to get the issue resolved. The “Leave Application” which used to be approved manually before now will be approved through this application,

In this case the applicant faculty can view the status if it is approved or not and also the senior staff like H.O.D., Vice Principal and Principal can have a check on the leaves granted and the previous records too.

 Black Book Serial Number  :  
Title                      : RTO Automation System
Guide Name        : Prof. Neha Jain

 

Group Members : 1.Anuja Suryakant Hodage  [14]

2.Siddhesh Mahendra Manakme[20]

3.Sagar Balkrishna Shinde6]

 

Abstract               : RTO Automation System is basically a digital system to overcome the manual task. It is the system which handles the work based on NFC (Near Field Communication). Many modern smart phones and tables have an integrated scanner that can read NFC chips.

All one needs to do for driver’s license checks is attach a single low-cost NFC chip to the driver’s license. The NFC chip stores a unique combination of numbers. This ID will read by the smartphones and the NFC to web application with the underlying NFC technology and uniquely associated with the driver’s master data in the web application.

We are going to develop a mobile application, database and NFC technology that enables the exchange of data between different devices over distances. In our project, we will use the smartphones equipped with NFC can be paired with NFC Tags or stickers which can be programmed by NFC apps to automate this task.

We proposed and describe a secure mobile payment system. Solution for use in a traditional instore environment, which contains the NFC secure element. Communication of NFC, and could replace the use of payment or service specific smart cards.

 Black Book Serial Number  :  
Title                      : Healthy Diet Recommendation System
Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Kinnari Nitin Patil  [32]

2.Vivek Rajesh Darji[07]

3.Rhushikesh Mohan Sankhe[41]

 

Abstract               : “An ounce of prevention is worth a pound of cure.

A survey of medical study reveals that people set bigger possibilities of countering free radicals and preventing illness by consuming healthy foods and increasing their immunity. People suffer from multiple diseases due to poor eating habits. In the current scenario, fast food has become an important part of the daily routine as it’s easily available but consumption of these fast food may increase the risk of disease like Heart attack, diabetes and obesity as well.

Healthier diet helps us to maintain our health and also keeps as away from many fatal disease. For better recovery from diseases or surgeries an individual might have special needs per their medical profile, cultural background and the nutrient requirements.

Existing system provides with a generalized diet charts for the clients. These diet charts do not consider the specification of the clients or medical issues. They just give generalized chart that everyone can follow.

In this system the client will first update their health and medical issues. Only after the health and medical profile is updated and diet will be suggested to the client as per the requirements. Also the diet keeps us changing as the medical profile gets updated. Reviews will be taken from the users to keep the diet chart up to date.

The system will make use of ID3 and C4.5 fro generation of diet charts. The Decision Tree Algorithm will be used for altering and updating te charts based on Clients reviews.

 Black Book Serial Number  :  
Title                      : Self Growth
Guide Name        : Prof. Neha Jain

 

Group Members : 1.Nikhil Kuttan  [25]

2.mangesh Suresh Patade[30]

3.Hemant Khemraj Rajguru[35]

 

Abstract               : Self-growth is an Android application which has all the information regarding the undergraduate courses, the idea behind this project is to give awareness to each and every student about their destiny early on. It has a forum section where the users having this application can interact with each other and can ask doubt regarding any question where the admin will reply with appropriate suggestion or solution.

We are going to implement this project for making the career counselling for undergraduate very easy. The aim for developing an android application is that any common man can use this application via data connectivity i.e. Internet as maximum people use android phones.

The user opens the application where he or she can enter into any of the cluster of internet and can get ample of information on the dedicated courses which are stored in the database moreover there is an interactive section where user can ask any questions and the doubt can be solved by the admin by fiving the appropriate solution to the users questions.

 

 Black Book Serial Number  :  
Title                      : Fast Air Connect
Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.Gupta Sanju Hariram [13]

2.Sah Neha Hemucahnd[38]

3.Variya Kishita Ashok[61]

 

Abstract               : Theme of project: The theme of this project is to have wireless transmission of data across laptops and Android smart phones at a speed much higher than Bluetooth.

Existing Technology: There are rarely any product which facilities such wireless transmission. One of them is Super Beam

, which is not feasible to use and has many disadvantages. Our project has the capacity to overcome these disadvantages and also, increase the user friendliness of it.

Disadvantages of Super Beam:

1.      Maximum three files can be transformed at once.

2.      IP address needs to enter manually in the browser.

3.      UI is not user friendly.

 

Working Principal: The project is based on establishing dynamic Wi-Fi connection on one device and tethering of data on the other.

Hardware Modules required:

1.      Wi-Fi chip for testing on Desktops.

2.      Windows Desktop needed for development and testing.

3.      Android Smartphone for Testing.

Software Modules required

1.      Eclipse IDE is used for development of Android Application.

2.      NetBeans and Visual Studio is used for development of windows Laptop Application.

3.      JAVA, XML, HTML, PHP, CSS, are the languages used.

4.      Code for configuring the Wi-Fi and tethering in device will be developed.

 

 

 

 

 Black Book Serial Number  :  
Title                      : Preventing System From Anonymous Users
Guide Name        : Prof. Kiran Patil

 

Group Members : 1.Samad Ali Khan [17]

2.Manoj Kuamr[19]

3.Abhishek Dubey[08]

 

Abstract               : Misbehaving activities of malicious users have been a major problem in anonymizing network. In normal network, misbehaving activity can be routinely checked and the IP address of malicious users can be clocked, but in anonymizing network, blocking IP address is not possible. To prepare a system in which, server can blacklist misbehaving users, therefore blocking users without compromising their anonymity. Users acquires an authentication, a special type of pseudonym, to connect to server. The system can blacklist a user by obtaining a seed for a particular request. Server can therefore blacklist anonymous users without knowledge of their IP address.

Anonymizing networks such as Tor allows users to access Internet services privately by using a service of routers to hide the client’s IP address form the server. The success of such networks, however has been limited by users employing this anonymity for abusive purposes such as defacing popular web sites. Web sites administration routinely rely on IP address blocking to disabling access to misbehaving users, but blocking IP address is nit particular if the abusers route through an anonymizing network. As a result, Administrators block all known exit nodes of anonymizing network, Denying anonymous access to misbehaving and behaving users alike. To address this problem, an efficient solution is proposed, Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity. This system is thus agnostic to different server’s definitions of misbehavior servers can blacklist users for whatever reason, and the privacy of blacklist users is maintained.

In Nymble, users acquires an ordered collection of nymbles, a special type of pseudonym, to connect to Websites. Without additional information, these nymbles are computationally hard to link, and hence, using the stream of nymbles simulate anonymous access to services. Websites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymble from the same user those used before the complaints remain unlikable. Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously.

 

 Black Book Serial Number  :  
Title                      : Smart Security Surveillance System with Intrusion Detection and Handling

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.Sharma Pushkar Naresh[44]

2.Rai Karan Gunapal[34]

3.Mewada Deepak Bhawralal[21]

 

Abstract               : Current video surveillance system which use CCTV camera requires constant human vigilance for effective outcome. Our project tries to remove that need of human and makes those cameras smart by implementing human detection algorithm on them.

This report is also written with the purpose of documenting the design and development of a prototype human motion detection system. Here, we presented some basic ways to perform a human motion detection algorithm and also a new way to consider for background updating using spatial information instead of temporal.

This project makes use of OpenCV library to capture camera and detect intrusion using comparision technique. Once the comparison is done and an intrusion is found, it senda the image to administrator.

 

 Black Book Serial Number  :  
Title                      : AAMCI MAATI AAMCI MANSE (THE SYNERGISTIC FARMING SYSTEM)
Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Sonal Kiran Borakar  [02]

2.Ankita Manohar Chowkekar[05]

3.Amar Balkrishna Rane[36]

 

Abstract               : India is an agricultural country. Several percent of the Indian people are farmers. They are the backbone of the nation. They produce he food crops and oil seeds. They produce common commercial crops. The produce raw material of our industry. Hence they are life blood of our nation . Nowadays, in a number of states, the days of plugging the fields with the help of oxen are almost over except or the farmers who are too poor to purchase a tractor. The farmers has many kinds of work to do. He ploughs his fields. He sows the seeds. He water the field regularly. He has to take care of his crops. He has to protect them against hail and frost. HE has to apply compost and fertilizers. He also has to sprinkle insecticides and pesticides to protect the crops against pests and insects. Most of the old farmers are illiterate. But the farmers of new generation are mostly educated. Their being educated helps them a lot.

They got soil of their fields tested in a laboratory. Thus, they know what kind of crop will grow best in their fields. The aim of our project is to make available the information of various crops based on the land quality, the water supply, compost and fertilizers, the insecticides and pesticides needed for the optimum growth of the crop through simple user’s friendly software. It will also contain the information about the newer facilities provided by the government to these farmers, their right and rules and regulations to be followed by them.

In chapter 1, we have given an introduction and description about our project; and also we have defined our project that how much and which particular area we are going to cover to implement our project.

In chapter 2, we have mentioned a review of literature survey and some of existing system features and the new features that we are going to provide in our project. Such as dynamic nature of our web application i.e. the end user will be able to select a location on that instance and get every information related to type of soil, different type of crops that can be cultivated in that soil.
etc.

The chapter 3, specifies the system requirements i.e. functional and non-functional requirements and along with some hardware and software requirement for our web application; which describes the front end and the back end of our web application.

The chapter 4 describes design details of our project which contain the DFD i.e. Data Flow Diagrams for our project that gives the entire idea about our flow of project. A data flow diagram (DFD) is a graphical representation for the “flow” of data through information system, modeling its process aspects. A DFD is often used as a preliminary step to create an overview of the system, which can later be elaborated.

The chapter 5, describe implementation plan for our project that how we started our project and how we made a way to the implement the project. In this we have provided the phases through which we went in (months required and tasks performed) order to achieve the goal.

In chapter 6 describes implementation details of our project that specifies the coding for different webpages in our project. It also contain the flow of our project to the end user.

The chapter 7 gives an overview on the technologies that we have used in our project.

The chapter 8, describes the details about the test classes. We performed some test cases on our project to observe whether it gives the desired output or not.

We have positive response for the test cases that we performed on our web application i.e. the result of test cases we pass.

The chapter 9 concludes our project as what are the goals of our project and how we will be looking forward to achieve those aims and objectives and also how useful our project is for end users specially the farmers. Also this chapter says about the future scope for the project that how it can be useful for end users.

The chapter 10 contains list of references that helped gathering information for our project.

 

 Black Book Serial Number  :  
Title                      : Unhabit: Android based Application’s Session Scheduler
Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.Zubeen Sayed[42]

2.Poonam Yadav[65]

3.Waman Shirodkar[47]

 

Abstract               : There are many applications in the market which are available to limit the user from accessing the applications without the proper authentication process on the user’s phone. These application are used to provide such features for all the application available on the phone. And there are other application available which are also allows users to block the call services. Messaging services and other service providers. From the unknown users. The call blocking application will block the number for a specific a specific time period as set by the user. The proposed system will help the users to block the application on their phone. However rather than blocking the application for a specific time period, this system will give the user a specific time to access the applications. Which means. The application will thus help the users to set the session limit for each application available on the phone and thus help the user to set the session time limit for an entire day. The implantation of this project will help the user to eradicate the habit of over-using the application on the phone. Since we are also over-obsessed with the social and gaming application that it is affecting our mental state of mind, drastically, thus this project sees the overall aspects of today’s life and hence it intends to ease up the user’s life in this over-exposed world of mobile application.
 Black Book Serial Number  :  
Title : LI-FI (Light Fidelity)
Guide Name :  

Prof. Vinayak D. Shinde

 

Group Members : 1. PremParmar[30]

2.Raj Parmar[31]

3. Utsav Mishra[23]

 

Abstract               : Whether you are using wireless internet in a coffee shop, stealing from the guy next door, or competing for bandwidth in a conference, you have probably gotten frustrated at the slow speeds you face when more than one device is tapped into the network. As more and more people and their many device access wireless internet, clogged airwaves are going to make it.

 

One German physics Harald Hass has come up with a solution he calls “data through illumination” – taking the fiber out of fiber optic by sending data through an LED light bulb that varies in intensity faster than human eye can follow.

 

IT’s the same idea behind infrared remote controls but far more powerful. Hass says his invention, which he calls DLIGHT, can produce data rates faster than 10 megabits per seconds, which is speedier than your average broadband connection. He envisions a future where data for laptops, smart phones, and tables is transmitted through the light in a room. And security would be snap – if you can’t see the light, you can’t access the data.

 

 

Black Book Serial Number  :  
Title                      :  

Private Cloud

 

Guide Name        :  

Prof. Vinayak D. Shinde

 

Group Members : 1.Kalve SiddheshUday [16]

2.Kumar ManojKanhaiyalal[19]

3.Mewada Deepak Bhawrlal[21]

 

Abstract               : Private cloud is basically an Internet based network made up for large numbers of servers- mostly based on open standards, modular and inexpensive. Cloud contain vast amount of information and provide a variety of services to large number of peoples. The benefit of cloud computing are Reduced Data Leakage, Decrease evidence acquisition time, they eliminate or reduce service downtime, they Forensic readiness, they decrease evidence transfer time. The main factor to be discussed is security of cloud computing, which is a risk factor involved in major computing fields. This is a very important concept which have a very bright future as a technology as well as future aspects for students.
Black Book Serial Number  :  
Title                      : Management Information System for College
Guide Name        :  

Prof. Pravin Jangid

 

Group Members : 1.AkshayWarke [70]

2.Kamlesh Sharma[56]

3.Divya Rao[48]

 

Abstract               : MANAGEMENT INFORMATION SYSTEM deals with the maintenance of college, faculty and students information within the colleges. MIS is an automation system, which is used to store the college, faculty, students, courses, and information of a college.

 

Starting from registration of a new student in the college, it maintains all the details regarding the attendance and marks of the students. The project deals with retrieval of information through an INTERNET based campus wide portal. It collects related information from all the departments of an organization and maintain files,   which are used to generate reports in various forms to measure individual and overall performance of the students.The privilege for each user is fixed. The modules are Admin, Teacher, Lab Assistant and students. THE admin is able to view all other modules.

 

Black Book Serial Number  :  
Title                      : SCALA- THE NEW AGE PROGRAMMING LANGUAGE
Guide Name        : Prof. Anil Chaturvedi

 

Group Members : 1. Kuttan Nikhil [26]

2.Patade Mangesh Suresh [32]

3.Rajguru Hemant Khemraj [37]

 

Abstract               : Scala is an object-functional programming and scripting language for general software plications. Statically typed, designed to concisely express solutions in an elegant, type-safe and lightweight Vow ceremonial) manner. Scala has full support for functional programming including currying, pattern matching, algebraic data types, lazy evaluation, tail recursion, immutability, etc.). It cleans up what are often considered poor design decisions in Java (such type erasure, checked exceptions, the non-unified type system) and adds a number of other matures designed to allow cleaner, more concise and more expressive code to be written.

 

Scala is an acronym for “Scalable Language”. This means that Scala grows with you. You n play with it by typing one-line expressions and observing the results. But you can also lay on it for large mission critical systems, as many companies, including Twitter, LinkedIn, and Intel do. To some, Scala feels like a scripting language. Its syntax is concise and low ceremony, its types get out of the way because the compiler can infer them. There’s a REPL IDE worksheets for quick feedback. Developers like it so much that Scala won the criptBowl contest at the 2012 Java One conference.

 

Scala is designed to interact well with mainstream platforms such as Java or C#. It shares with these languages most of the basic operators, data peps, and control structures. For simplicity, we compare Scala in the following only it Java. But since Java and C# have themselves much in common, almost all similarities with Java carry over to C#. Sometimes, Scala is even closer to C# than to Java, For instance in its treatment of genericity. Listing 1 shows a simple program in Java and Scala. The program prints out all options included in the program’s command line. The example shows many similarities. Both languages use the same primitive class String, calling the same methods. They also use the same operators and the same conditional control construct. The example also shows some trances between the two languages.

 

Black Book Serial Number  :  
Title                      : Cloud Based Email Server
Guide Name        :  

Prof. Pravin Jangid

 

Group Members : 1.Ehsaan Bhati [02]

2.Santosh Kewat[16]

3.Kiran Shinde[58]

 

Abstract               : Mail Severs are an important necessity for every small, middle and large enterprise, needs its needs its mails to secure and attached with its domain name. So most

of the enterprises follow the trend of having and mail exchange server hosted in companies host network. This set of configurations needs a dedicated set of mail server and group of people to monitor, manage the troubleshoot it. All this activities has extra overhead of machine cost and IT and network engineer’s salary which in a big enterprise goes as high as 30-50 Lacks annually.

This project eases the problem of creating, managing, monitoring and troubleshooting the exchange mail servers by provided web based solutions on cloud for mail, keeping mails secure and accessible on desktop and mobile phones with support to SMTP, POP and IMAP protocols.

This project aims to replace dedicated email servers with all the benefits of cloud.

Black Book Serial Number  :  
Title                      : Communicator
Guide Name        :  

Prof. Pravin Jagid

 

Group Members : 1.Shital Nyahale[34]

2.Vikas Gage [08]

3. Mitali Lade[21]

 

Abstract               : Our project. “COMMUNICATOR” aims at providing different means of communication and a facility of transferrin2 files between the clients in the network through an intermediary server. This project is mainly divides into four modules of communication. The project contains: A Chat application which is capable of sending_ messages to other clients on the same network. A File Transfer application which is able to send tiles to other clients on the same network. It also contains an error detection and recovery mechanism which searches for errors which may occur while sending, the file and if any error occurs then the file is retransmitted .A Voice chat application which will allow users on the same network to have a voice chat. The voice of the sender is transmitted to the receiver within a delay of 1000ms.A Video chat application which will allow users on the same network to have a Video chat using webcam. This project will mostly be used where there is a need of client to client communication inside a network. This project does not contain any use of Internet.
Black Book Serial Number  :  
Title                      : HEALTH CARE
Guide Name        :  

Prof. Pravin Jangid

 

Group Members : 1.Mukesh Bandale [01]

2.Tejas Desai[06]

3.Rahul Gupta[12]

 

Abstract               : A special topic conference focused on point-of-care technologies for global healthcare issues is proposed. The proposed conference will bring research presentations and technology discussion forums on recent technological advances and global issues on implementation of technologies. Though the challenges of providing healthcare in developing cities. There is a common goal to provide access to health monitoring and assessment technologies to people with limited healthcare facilities. While the developed city may find technologies as effective means for reduce-healthcare by online websites and improving efficiency of technologies by search the best hospitals nearby areas for all the details. The user has to login the website and get information. It also has the process to take the appointment with doctors, specialist and by using online messaging appointments and cancelling. The basic challenge of providing for healthcare to all people.
Black Book Serial Number  :  
Title                      : Employee Beat Plan Tracker
Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1.Dhaval R. Shah [51]

2.Kashyap H. Kotecha[19]

3.Ketul B. Raghani[45]

4.Ronak S. Gandhi[09]

 

Abstract               : In this project, we have Proposed a system which deals with beat plan tracking. Beat is all sorts of credentials with the sales executive. Plan tracking consists of employee and inventory tracking. Inventory is the collection of Subscriber Identity Module (SIM) cards and recharges with the sales executive. This application provides the solution to overcome the famous D-1, D-2 (Day minus one, day minus two problem along with many other attractive and useful features like employee tracking, inventory management, sales reporting and many more on the world’s most popular mobile operating system i.e. Android. Employee tracking is the feature by which the employees or better known as Field sales executives are tracked by their location. Inventory management deals with keeping the trace of number of SIM or the amount of recharge with the executives as well as the retailers. It will also help in replacing the traditional way of reporting with the on the go reporting style, thus reducing the overhead of paper work. This proposed system’s Graphical User Interface (GUI) is built in XML using Android operating system and it is implemented using Java language.
Black Book Serial Number  :  
Title                      : Web Enabled Society Maintenance System
Guide Name        :  

Prof. Ravi Prakash

 

Group Members : 1.Mauwiya Mashayak [26]

2.Jigna Chawda[05]

3.Priyanka Mane[25]

 

Abstract               : This project revolves around management and operations or a residential society or a complex. We want to develop a system that will be a one stop portal for the entire residence owner, tenants, and also the management office, the aim is to make this product easy to use as well as fun. Considering that to till this date majority of the society operation like maintenance bill, records of owner, tenants and shops and as well the dashboard event are carried out manually there is a high need for an automated system that can reduce the paper work and also avoid the problems in maintaining the society. Normally where a secretary has to do labor of responding to the residents about various problems and news, he even has to make sure every person has received its bill and is also make them aware about the on-going activities in the society, it not only hard work but also at times not every owner or tenant is available and someone gets missed out from the news.

 

This all can be avoided if we have a system where a person can access it according to his own sweet time and if any queries can also post it to the manager/secretary. Considering every single person in this world is using a smart phone or a computer and they prefer getting their news from the internet with the help of our idea that is fresh and new, a change can be brought in the way we handle and communicate with our society members and various activities. Our concept of having an web portal system for society maintenance will not only make paying bills and keeping a tab on the notices much easier but also will help us to connect to our residential complex and the people we live among. It will be much more accessible from any part of the world. Multitasking is the ultimate mantra of our hectic busy life and with the help of this system we are just making step towards an easier life and also keeping it simple.

 Black Book Serial Number  :  
Title                      : Unique Availater
Guide Name        :  

Prof.RadhaChawre

 

Group Members : 1.Kunal Konadkar[18]

2.Mahesh Sudke[63]

 

Abstract               : Introduction of Smart phones redefined the usage of mobile phones in the communication world. Smart phones are equipped with various sophisticated features such as Wi-Fi, (WS navigation, high resolution camera, touch screen with broadband access which helps the mobile phone users to keep in touch with the modern world. Google came up with an innovative operation system termed as ANDROID. As day to day increase in android usage and along with internet usage on cell phones to be in touch with world. This gave us an opportunity to take a step forward to develop something for user to easily find out everything using the application. Then we will start developing the application named as Unique aviator.

 

`Unique Aviator ‘ application will be developed for Google’s Android Mobile Platform. The application is basically divided into two categories

• One in which, application uses a GPS to track the location information of the user and through that it will easily find out the or place which they want it to be. So they get the resultant place easily.

 

• Second in which we provide off line facilitate also. Sometime user does not have an internet connection or out of coverage area but still it works. Because we also gave them facility to search without necessarily need of internet.

This application will be written in Java Programming which runs on Eclipse Integrated Development Kit and android SDK, and the database in coded in SQLite .

 

 Black Book Serial Number  :  
Title                      : Handwritten Recognition
Guide Name        :  

Prof. Deepali Patil

 

Group Members : 1.Manoj Dharne [07]

2. Dikshant Kadam[13]

3.Sunil Kamble[14]

 

Abstract               : Handwriting Recognition enables a person to scribble something on a piece of paper and then convert it into text. If we look into the practical reality there are enumerable styles in which a character may be written. These styles can be self-combined to generate more styles. Even if a small child knows the basic styles a character can be written, he would be able to recognize characters written in styles intermediate between them or formed by their mixture. This motivates the use of Genetic Algorithm or Back Propagation Algorithm for the problem. In order to prove this, a pool of images of characters were made which were converted to graphs. The graph of every character was intermixed to generate styles intermediate between the styles of parent character. Character recognition involved the matching of the graph generated from the unknown character image with the graphs generated by mixing. This method gives better accuracy to recognize any handwritten character.

 

Handwriting recognition refers to the identification of written characters. The problem can be viewed as a classification problem where we need to identify the most appropriate character the given figure matches to. Offline character recognition refers to the recognition technique where the final figure is given to us. We have no idea of how the writer wrote the letter. This is contrary to the online character recognition systems where the data can be sampled while the character is being written.

 

 Black Book Serial Number  :  
Title                      : Congestion Control
Guide Name        : Pro. RadhaChawre
Group Members : Chetan Borkar[04]

RohitPagdhare[36]

Ameya Patil[43]

Abstract               : Congestion in cellular networks during peak hours and at hot spots is a major problem being faced today almost everywhere especially in metro cities. Even though capacity increase seems to be a natural solution to this problem, it is not economically viable due to heavy infrastructure costs involved. As the traffic demand is continuously increasing the problem of congestion is going to remain forever and therefore needs to be effectively addressed. Proposed scheme tries to address the problem of congestion in cellular networks by introducing a new concept of call duration control coupled with dynamic pricing and call-on-hold principle. Long duration calls in the network is one of the major reasons for congestion in the network.

 

We propose to restrict the duration of such calls depending upon traffic conditions. At heavy traffic conditions the network restricts the duration of on-going calls up to a specific time beyond which the user has to pay at a higher tariff. At the same time a principle of call-on-hold is also implemented so that if a newly generated call does not get a traffic channel then it is not blocked but is put on hold in a queue hoping to get a channel soon. Our scheme reduces the level of congestion substantially without any compromise with system utilization and at the same time it also marginally increases the revenue per unit time

 Black Book Serial Number  :  
Title                      : M-Suburban Train Ticket System
Guide Name        : Pro. Vinayak D. Shinde
Group Members : 1.Pradeep R. Maurya[27]

2.Prashant A. Shah[52]

3.Jayesh A. Yadav[71]

Abstract               : The passenger flow in the western division of Mumbai Suburban Railway system is multiplying day by day. The existing ticketing system is causing a considerable increase in the travel time due to a major drawback- long queues”, which absorbs a significant portion of the travelling time. On an average, a commuter spends around 15 minutes in the queue at the suburban booking office windows of Mumbai. In this study we aim to explain the use of mobile services by looking at an area where it has been quite successful; that is mobile ticketing in public transportation. Firstly, this paper provides a brief glance at ATVM (Automatic Ticket Vending Machines) and (CVM) Coupon Validating Machines-, technologies which are already implemented in the Mumbai Suburban Railways, along with a statistical insight of its drawbacks. Later it provides an insight into our proposed technology MSTTS (M-Suburban Train Ticket System) which uses SMS (Short Messaging Service) as a medium to issue tickets. We provide a comprehensive description of our proposed architecture models along with the possible hurdles in our endeavor, and also real time solutions to it.

 

The scope of this paper is particularly for the -Mumbai Suburban Railways” (MSR) where cost effectiveness is of paramount importance. The challenge was to design a system that would be least costly, as MSR is massively used by middle class people who cannot afford even the slightest of increase in the ticket price. Hence something beyond NFC (Near Field Communication) and Automated Fare Collection (AFC) system (through contactless smart card technology) was needed. The concept and implementation of MSTTS put forth by us is completely “new and original”.

 Black Book Serial Number  :  
Title                      : Intelligent Tracking System
Guide Name        : Pro. Ritu Shukla
Group Members : 1.Nutan Khedekar[17]

2.Kiran Mahadeshwar[24]

3.Gaytri Wardekar[50]

4.Pooja Yadav[72]

Abstract               : Technologies Used: PHP, MYSQL, AJAX, JQuery, JavaScript, HTML, CSS

This project will be designed to provide and track real time data of the customer who will be accessing an ecommerce website to the Sales & Marketing Team.

 

This project will be using built in PHP function to track the IP and feeding the same to a location tracking API (Application Programming Interface) to detect the user’s location including as his City, State and Country along with his local time zone and country code. This project will also provide a real time notification system, which will be achieved by querying the database in real time.

 

The main aim of this project is to help the sales and marketing to generate leads real time. As the customer is browsing a website and once he submits the form which can be placed on the header section of the website so as to intelligently track the user information such as the product the user was viewing while submitting the form.

 

This will enable the sales team to get the detailed information of the user along with the product he was interested in thereby helping the sales team to make an informed decision which will lead to exponential increase in sales and better customer satisfaction.

 Black Book Serial Number  :  
Title                      : Security Enhancement Using Motion Detection
Guide Name        : Pro. Deepali Patil
Group Members : 1.Pandey Pankaj Shivmurti[39]

2.Patil Neha Kishor[44]

3.Singh Vikram Rajesh[62]

Abstract               : In today’s competitive environment security concerns have grown tremendously. In the modern world possession is known to be 9/10THs of the law. Hence, it is imperative for one to be able to safeguard one’s property from worldly harms such as thefts, destruction of property, people with malicious intent etc.

 

Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing has been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication it is now possible to monitor and control the environment to the advantage of the owners of the property.

 

The latest technologies used in the fight against thefts and destruction are video surveillance and monitoring. By using these technologies it is possible to monitor and capture every inch and second of the area in interest. However so far the technologies used are passive in nature. i.e. the monitoring systems only help in detecting the crime but do not actively participate in stopping the crime while it takes place.

 

Therefore, the project to detect motion in video stream is an idea to ensure that the monitoring systems not only actively participate in stopping the crime but do so while the crime is taking place. Hence we are developing this system to:

■ Capture a live streaming video and detect any motion occurring in the stream.

■ And once motion has been detected in the live stream the software will activate a warning system

 Black Book Serial Number  :  
Title                      : Feel Secured
Guide Name        : Prof.Vinayak D. Shinde
Group Members : 1.Kshitij Rangari[47]

2.Avinash Mohod[30]

3.Tejas Nyalpelly[35]

Abstract               : Introduction of Smart phones redefined the usage of mobile phones in the communication world. Smart phones are equipped with various sophisticated features such as Wi-Fi, GPS navigation, high resolution camera, touch screen with broadband access which helps the mobile phone users to keep in touch with the modern world. Google came up with an innovative operation system termed as ANDROID. As day to day increase in android, fee and along with internet usage on cell phones to be in touch with world. This gave an opportunity to take a step forward to develop something on women safety and

‘Feel Secured’application will be developed for Google’s Android Mobile Platform. The application is basically divided into two categories

• One in which, application uses a GPS to track the location information of the women (user) and send those location information to her guardian/parents which will be updated accordingly.

• Second in which security threat can occur anywhere, the application also answers for personal safety, when the user interacts with the application by pressing the button, then automatically the application generates the geographical information and sends that location information via SMS to a pre-stored emergency contact.

 

This application will be written in Java Programming which runs on Eclipse Integrated Development Kit and android SDK, and the server required will be written in .NET.

 Black Book Serial Number  :  
Title                      : Implementation of 3D modeling and Artificial Intelligence in Game Development
Guide Name        : Prof.Ritu Shukla
Group Members : 1.Nikhil Latkar[22]

2.Salil Sharma[57]

3.Suraj Tripathi[68]

4.Anshul Verma[69]

Abstract               : The project is designed to learn application of scripting languages to develop and create a visually stimulating first-person shooter video games. This project will be using built in libraries and scripts created using scripting languages. JavaScript and C#.

 

This project will also provide’ real-time application of artificial intelligence in a virtually simulated video game environment.This project is made with the help of integrated development environment stimulating software Unity 3D engine. Unity is a game development ecosystem: a powerful rendering engine fully integrated with a complete set of intuitive tool and rapid workflows to ante interactive 3D and 2D content.

 

The modelling of the characters, environment’, and objects in the game is implemented with the help of Autodesk Maya 2014. Autodesk Maya is a 3D animation, modelling, simulation; rendering and compositing offer a comprehensive creative feature set for 3D computer animation, modelling, and simulation and rafting on a highly extensible production platform. Maya provides high-end character and effects toolsets along with increased productivity fine modelling, texturing and shader creation task.

 

 Black Book Serial Number  :  
Title                      : Pattern Discovery Using Associative Rule
Guide Name        : Prof.Vinayak D. Shinde
Group Members : 1.Ashutosh Tiwari[66]

2.Prathmesh Sawant[49]

3.Sanket Tare[64]

Abstract               : Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems.

 

Data mining (DM), also called Knowledge-Discovery in Databases (KDD) or Knowledge-Discovery and Data Mining, is the process of automatically searching large volumes of data for patterns using tools such as classification. association rule mining, clustering, etc.. Data mining is a complex topic and has links with multiple core fields such as computer science and adds value to rich seminal computational techniques from statistics, information retrieval, machine learning and pattern recognition.

 

Data mining techniques are the result of a long process of research and product development. This evolution began when business data was first stored on computers. continued with improvements in data access, and more recently, generated technologies that allow users to navigate through their data in real time. Data mining takes this evolutionary process beyond retrospective data access and navigation to prospective and proactive information delivery. Data mining is ready for application in the business community

 Black Book Serial Number  :  
Title                      : A new approach of data mining and warehousing for comprehensive web based project management software
Guide Name        : Prof. Anil Chaturvedi
Group Members : 1.Amit Shobhnath Pal[27]

2.Salil  Sanjau Panchal[28]

3.Vikas Ramkishore Pandey[29]

Abstract               : The project Management Software will be used to collect the information from the different levels of software development and different people involved in the project and product development. It provides Status and Reports of different levels of project and product of entire day, week and month. It will maintain the details of the client and the developer interaction as all the documentation work will be done by both the client project and the software development team who are working on the client project and product .The client who is giving the project and product to be developed to the company can view the documentation that is prepared .PMS provides a collaborative suite for mining, the data for different people involved in the PMS, from the PMS warehouse where the data is stored. Keywords— Data mining ,Data warehousing , PMS.
 Black Book Serial Number  :  
Title                      : Network Security and Attack
Guide Name        : Prof.GayatriDantal
Group Members : 1.Shah Hareram M. Jawahar[45]
Abstract               : Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The Internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the Internet by means of firewalls and encryption mechanisms. The businesses create an “Intranet” to remain connected to the interplay but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.

 

 Black Book Serial Number  :  
Title                      : Gesture Recognition
Guide Name        : Prof.Anil Chaturvedi
Group Members : 1.Rai Karan Gunapal[36]

2.Rane Amar Balkrishna[38]

3.Nagar JaynitkumarDineshkumar[24]

Abstract               : In the present world, the interaction with the computing devices has advanced to such an extent that as humans it has become necessity and we cannot live without it. The technology has become so embedded into our daily lives that we use it to work, shop. Communicate and even entertain our self. It has been widely believed that the computing, communication and display technologies progress further, but the existing techniques may become a bottleneck in the effective utilization of the available information flow.

 

To efficiently use them, most computer applications require more and more interaction. For that reason, human-computer interaction (HCI) has been a lively field of research in the last few years. Firstly based in the past on punched cards, reserved to experts, the interaction has evolved to the graphical interface paradigm. The interaction consists of the direct manipulation of graphic objects such as icons and windows using a pointing device. Even if the invention of keyboard and mouse is a great progress, there are still situations in which these devices are incompatible for HCI. This is particularly the case for the interaction with 3D objects. The 2 degrees of freedom (DOFs) of the mouse cannot properly emulate the 3 dimensions of space.

 

 Black Book Serial Number  :  
Title                      : Web Based Application Programming Computer
Guide Name        : Prof.RadhaChawre
Group Members : 1.Nirav Kuber[20]

2.Jugal Panchal[38]

3.Dhruv Parekh[42]

Abstract               : Web-based computing is a model that provides computation, warfare, data awe and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the service, Parallel to this cc incept can be drawn with the electricity grid, wherein end-users consume pitcher without needing to understand the component devices or infrastructure required to provide the ‘-mice. The paper aims to describe centralized compiler which helps to reduce the problems of time. Cost and storage space by making use of the concept of Web-based computing. Also, the trouble of installing the compiler on each computer is avoided. In this paper Code Dom (Code Document Object Model) Technology is used to generate Centralized C# Compiler. The Code Dom allows program to be dynamically created, compiled. and executed at runtime. The Code Dom provides a language independent object model for representing the structure of source code in memory. The System, Code Dom Namespace contains number of classes, interfaces and enumerations.
 Black Book Serial Number  :  
Title                      : Application Of Association Rule Mining Algorithm
Guide Name        : Prof.DeepaliPatil
Group Members : 1.Tiwari AnupShyamdhar[65]

2.Parasrampuria Ronaksunil[41]

3.Sharma GouravJagmohan[55]

Abstract               : Data mining on large relational databases has gained popularity and its significance is well recognized. However, the performance of SQL based data mining is known to fall behind specialized implementation since the prohibitive nature of the cost associated with extracting knowledge, as well as the lack of suitable declarative query language support. Frequent pattern mining is a foundation of several essential data mining tasks. These facts motivated us to develop original SQL-based approaches for mining frequent patterns.

Association rules mining are one of the major techniques of data mining and it is perhaps the most common form of local-pattern discovery in unsupervised learning systems. The technique is likely to be very practical in applications which use the similarity in customer buying behavior in order to make peer recommendations. Association Rules will permit you to discover rules of the kind If X then (likely) Y where X and Y can be particular items, values, words, etc. , or conjunctions of values, items, words, etc.

 Black Book Serial Number  :  
Title                      : Recognition and risk factors of Anemia along with classifiers
Guide Name        : Prof.RadhaChawre
Group Members : 1.Trikha Nitish Girish[67]

2.Singh Pranoy Kumar Anil Kumar[59]

3.Rajbhar Dipak Rajendra Prasad[46]

4.Pal Yogesh Tirthraj[37]

Abstract               : Health problem is the leading cause of death all over the globe. Today in this ever growing technological world, data analysis is essential in healthcare environment. There is gigantic amount of data available within the healthcare environment. In Healthcare system, it becomes very important to develop an automated tool that is capable of identifying relevant healthcare information. This work focuses on retrieval of updated, accurate and relevant information from Medline datasets using Machine learning approach. Recently, researchers have been investigating the effect of hybridizing more than one technique showing enhanced results in the diagnosis of diseases. However, there is a scarcity of effective analysis tools to discover hidden relationships and trends in data. Therefore, Data Mining should be applied on the healthcare environment’s datasets to extract hidden information.

 

This paper analyzes the prediction of survivability rate of health problem patients using data mining techniques. The analysis had been carried out using various classification algorithms such as ID3 and Rule Induction on the datasets and decision tree for the same has been prepared. In this paper, the various anemic issues had been investigated using data mining techniques.

 Black Book Serial Number  :  
Title                      : JAVA Remote Application Launch Using JNLP
Guide Name        : Prof. Reena Ostwal
Group Members : 1.Kunal Gosavi[10]

2.Shakir Shaikh[53]

3.Sohail Shaikh[54]

Abstract               : Remote application launching is a phenomenal feature for large scale network where number of node already exists and scalable in nature. The application installation, version control is very difficult to manage in large organizational set up. Considering this problem we proposed the novel approach to use remote application launch using JNLP. J.N.L.P Java Network Launching Protocol provides effective way to launch various applications from web application The interaction of the user with the web is based on the client-server architecture.

 

Consider a situation where an administrator wants to install multiple software’s on every client machines situated in any business enterprise or organization. This approach imposes cognitive load on administrator when he has to visit each system for the installation of software’s and applications. The focus of this project is to develop a common web application where each user visits on its own distributed system and can use the application as per the needs. In this way the user can get rid of installing each software manually on individual system. The proposed system java based web application using JSP (Java Server pages) technology with glassfish server with JNLP protocol provides complete central processing for all software as .-,entice.

 

The main feature of the application to provide various software services to the client user as and when required in the secure environment. The administrator can manage various applications from server. Co> the benefit of the system we thought why not to implement the system for engineering colleges where this task is very difficult to manage in the current scenario. As a part of B.E project we will try to implement the idea for engineering colleges and for the particular enterprise as well.

 Black Book Serial Number  :  
Title                      : Training and Placement Cell
Guide Name        : Prof.Namrata Modi
Group Members : 1.Ravi Gupta

2.Chirag Mehta

Abstract               : Training And Placement Cell is a web based application developed in the windows platform for the training and placement department of the college in order to provide the details of its students in a database for the companies to their process of recruitment provided with a proper login.

 

The Training and Placement Cell contains all the information about the students. The system stores all the personal information of the students, like their personal details, their aggregate marks, their skill set and their technical skills that are required in the CV to be sent to a company.

 

The system is an online application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an application for the tpo of the college to manage the student information with regards to placement.

 

This project contains all the details of the students that can be viewed by all the users but can be modified only by the student with an authorized service.

 Black Book Serial Number  :  
Title                      : Biometric Authentication System Using Human Ear
Guide Name        : Prof. Ravi Prakash
Group Members : 1.Subhajeet Biswas

2.Prashant Mishra

3.Pratik More

4.Tarannum Mulla

Abstract               : The main aim of the project is to develop a biometric authentication system using the ear. The ear biometric base recognition system is divided into five main parts – image acquisition, preprocessing, and feature extraction, extraction of feature vector and classification & comparison. The image will be acquired using a digital camera. The photo is then processed, stored and used for the identification process. For every individual, there are some distinct features that can be used for identification. The portion or segment that contains these unique features is known as the Region of Interest. After the raw data is obtained, the Region of Interest (ROI) which is the area containing the ear image is chosen. The final stage involves comparison with the database and then the decision is taken on the basis of the result.
 Black Book Serial Number  :  
Title                      : Exam Grade Management
Guide Name        : Prof. Vinayak D. Shinde

 

Group Members : 1. LokareHanmantrao Suresh[38]

2.Muni Nikhil Rabindranath[36]

3.Agarwal Sidharth Manish[1]

4.Ratnaparkhi Hemant Rajendra[48]

 

Abstract               : College examination software is useful for displaying complete result of particular student. In current system all the activities are done manually. It is very time consuming and costly. Our system software deals with various activities related to student academics. This software include;

Result analysis:During analysis, data is collected on various files, decision point and transaction handle by present system.In our system software we have the provision for adding the details of the students. The marks of the students are added in the database and so students can also view the marks whenever they want.In this software we can register as a user and can provide with unique login ID and password

The technology we use in this are :-

1.Java development kit (jdk)

2.MYSQL  database

 

Black Book Serial Number  :  
Title                      : Automated Payroll System(A-Pay)
Guide Name        : Prof. Uma Goradiya
Group Members : 1.Singh Arjun (65)

2.Chaphekar Siddesh Vijay (08)

3.Sawant Yogesh (56)

 

Abstract               : In today’s world data management is much more important, using conventional system is becomes a pain staking process which results in much more difficult to manage the data. So here payroll system comes in the picture which focuses on managing the faculties’ data including their leaves, attendance, deduction details and Personnel Management etc which helps in managing the data more efficiently and easier to access. It also provides features such as payments intimation through SMS and graphical representation of growth of the college and faculties.  All databases of faculties are secured and can be accessed only by the authorized user. The payroll system was developed to override the problems prevailing in the practicing manual system.

 

This software is supported to eliminate and in some cases reduce the hardships that are faced by the existing system. Moreover this system is designed for the particular need to carry out operation in a smooth and effective manner. Thus by this all it proves it is user friendly. A-PAY should take care of Personnel Management, Payroll, and Attendance Management by using biometric machine, Leave Management, statutory compliances like PT, PF, ESIC, TDS and IT etc. The system should be able to generate pay slip, attendance and salary summary, graphs and other MIS reports. It will provide SMS intimation for attendances and salary to each faculty and it also provides appointment letter, promotion letter to the faculty etc. This System provides an option to restore or get the backup of all databases of faculties by just clicking a button. Payroll is method of administering faculty’s database in an organization. Proper documentation of every faculty there is no need to look after manual folder and files. Complete detail of collage maintaining payroll software on a single click.

 

Black Book Serial Number  :  
Title                      : Virtual classroom
Guide Name        : Prof.Garima Mishra
Group Members : 1.Bandal Vicky Mahadu[04]
2.Bharti SunilkumarVijayshankar[07]
3.Jaiswal Rahul Girijashankar[20]
4.Mishra Abhishek Jayprakash[35]

Abstract               :

Virtual Classroom represents an innovative shift in the field of learning, providing rapid access to specific knowledge and information. It represents an interface between the students and a professor and provides personalized learning materials to the users. It offers a possibility to the attendees to share different resources at once and work with them as if they were at the same place where (real) resources are.

 

In the system design, agents are used as entities that work on different tasks in the system. A set of agents of the same type is responsible for handling different users and their requests. The cooperation among agents is established through the act of exchanging messages. A wide variety of classroom techniques are being advocated to increase learning: active learning, collaboration, integration of assessment and feedback.

Black Book Serial Number  :

 

Title                      :  

Online voting system

 

Guide Name        :  

Prof.  Neha Jain

 

Group Members : 1.Vishwakarma AnilkumarMatadin   (71)

2.Pednekar SiddheshUlhas(46)

3.Singh OmprakashChhotelal   (64)

 

Abstract               : This abstract will introduce the online voting system: Android based Application’s. Today suggestion or review about any product or any topic can be easily handled by this polling system. In other hand the rapid development in operating system of the mobile phones gives rise to the application development on the large scale. The main reason behind the tremendous development in android application development is that the android is an open source operating

 

System. It means that the software developers can have customization rights. As well as the software development kit provides tools to build and run android applications. The paper will be describing the basic idea of the project online polling system on android and its advantages, disadvantages and applications.

 

Black Book Serial Number  :  
Title                      : A Real- Time Strategic Game – Hunt Master
Guide Name         : Prof. K. Jayamalini
Group Members : 1. SardesaiAbhyudaya Nitin

2. Kamble Ganesh BalasahebSulochana

3.Kushtey TanmayRajendra

 

Abstract               : In an era where videogames are beginning to surpass the film industry’s gross product, the gaming landscape has changed quite drastically during the last console cycle. Most people play games, a natural extension of our childhood, and have connections to Monopoly and solitaire to cite just two. Today, games are found in almost everyone’s pocket in the form of applications (apps) downloaded to smartphones and tablets. The global user base of online games exceeds 2 billion users, according Credit Suisse estimates.

 

We intend to develop an exciting real-time strategy game which involves much of an exciting in First Person mode. In video games, the first person refers to a graphical perspective rendered from the viewpoint of the player character. Games with a first-person perspective are usually avatar-based, wherein the game displays what the player’s avatar would see with the avatar’s own eyes. Thus, players typically cannot see the avatar’s body, though they may be able to see the avatar’s weapons or hands. This viewpoint is also frequently used to represent the perspective of a driver within a vehicle, as in flight and racing simulators. We will use Unity as a platform to create the model and C# language to code the movements of the player and the environment

Black Book Serial Number  :  
Title                      : Get Ur Kaarigar
Guide Name        :  

Prof. Pravin Jagid

 

Group Members : 1. Vyas Vivek  Naresh[72]

2. Sharma Kunal Vinod [56]

3. SiddheshKavle

4. Siddharth Sharma

 

 

Abstract               : In today’s world the working class do not acquire enough time to manage their household problems along with their professional life. To maintain their house they have to depend on others to find a perfect contact for professionals to complete the task on hand. Even if people find a worker for the repairs work they are not available on the required time slot. This way the work to be done is postponed for the time and is done when the repairing professional is free from his other jobs. This way just because of the indirect approach made to the workers the work is not done on time.

 

This web App will be a solution to this problem and will help the users to handle their household works along with their professional life easily and simultaneously. This Web App will have two major segments for efficient and secure working.

 

One Segment will have the user registration and login where the user will enter his work details that need to be done and on what time slot. On the other hand the web app will have some professionals in the field who will provide their contacts to the web app database.  The quality of work done by the workers will be the assured by the respective professional. The amount to be given to the worker on completion of work will be fixed before the work starts and will be taken care by the web app to assure the user about the amount to be given on SMS.

 

Black Book Serial Number  :  
Title                      : REMOTE DROID
Guide Name        :  

Prof. Garima Mishra

 

Group Members : 1.Singh Ankita Suresh(60)

2.Dhuri SuchitaGajanan (10)

3.Dubey RoshniVijaydhar (12)

 

Abstract               : As we all know, joystick is used for gaming purpose and available in various types in today’s market like in the form of USB enables or Bluetooth enabled. Android based phone, through the help of Wi-Fi or Bluetooth, it will act as a gamepad and play your game from specific distance using your phone. There is a setting menu by which you can also launch your gamepad as keyboard using your android phone. Even not that, you can also enable your android phone as wireless mouse to control the various activity of your system. Its optimized code will able to connect on any latest version of window operating system like windows 7 or windows 8.By default, all gaming control keys will appear on screen, but users can increase the controlling button, as per their choice and requirements.

 

Black Book Serial Number  :  
Title                      : Image Steganography
Guide Name        : Prof. K.Jayamalini
Group Members : 1. Singh Gaurav Dinesh      (63)

2.Tiwari GeeteshPrasidhnarayan    (67)

3. Dubey Shashank Ramnayan   (13)

4.Singh AshishkumarSuryapal       (62)

Abstract               : In the present digital scenario secure communication is the prime requirement. Commonly, cryptography used for the said purpose. Another method related to cryptography is used for the above objective is Steganography. Steganography is the art of hiding information in some medium. Here we are using image as a means for covering information. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden.

 

Image steganography proposes a job to transfer the embedded secure data to the target destination without being detected through the unauthorized user. Various carrier file formats would be used, but digital images are large enough used due to the frequency and huge users on the worldwide Internet. To hide the secret data in images, there are large ranges of stenographic methodologies exist some are complex in used than others method. Every method has respective strong and weak points.

 

 Black Book Serial Number  :  
Title                      : Android Application for Indoor Positioning Using Augmented Reality.
Guide Name        : Prof. K. Jayamalini
Group Members : 1. Bansal PrakharHarikumar [5]

2. Bardia Pratik Poonam [6]

3. Khan AnamShamim Ahmad [24]

4. Seema PreethamSreelakshmi[52]

 

Abstract               : Indoor positioning systems help in the localization of objects and spaces inside a building, where Global Positioning System (GPS) and cellular network don’t work effectively. These systems can be much more useful than just localizing objects, if they are augmented with relevant information on the user interface. With this application we would demonstrate, one such use case where an indoor positioning system can be made more useful by rendering relevant 3D graphics on the mobile display. Localization is achieved by creating a location API simulator and using the orientation sensor in phone and tablet. Relevant graphical information based on the users context and selection, is rendered using OpenGL on top of the live camera stream. User studies indicated that overlaying points of interest on the camera view significantly enhanced the user experience in indoor navigation.

Localization can be made even more robust with the help of object detection techniques. Our attempt is to demonstrate our application the strong untapped potential in augmented reality techniques in the context of indoor. The application will be a generic solution and can be easily configured to be use in any indoor space such as malls, hospitals, museums, etc.

 

 Black Book Serial Number  :  
Title                      : Development of fuzzy neural network software for groundwater modelling
Guide Name        : Prof . Pravin Jangid
Group Members : 1.Gupta AtulkumarVirendrakumar

2. NirmalHiten Mahesh

3.Valnagar ParthkumarAshokbhai

 

Abstract               : So far fuzzy logic has been extensively used to better analyze and design controllers for chemical processors. It has also been used for other applications like parameter estimation of nonlinear continuous time systems but in general  fuzzy logic has been intensively used for heuristics based systems .Recently fuzzy logic has been applied successfully, in many areas where conventional model based approaches are difficult  or not cost effective to implement . Mechanistic modelling of physical systems is often complicated by the presence of uncertainties. When models are used as purely predictive tools, uncertainty and variability lead to the need for assessment of plausible range of outcomes.

 

A systematic uncertainty analysis provides insight into the level of confidence in model estimates, and can aid in accessing how various possible model estimates should be weighed. In this paper, generalized fuzzy α –cut is used to show the utility of fuzzy approach in uncertainty analysis of pollutant transport in ground water. Based on the concept of transformation method which is an extension of α – cuts, the approach shows superiority over conventional methods of uncertainty modelling .A 2-D groundwater transport model has been used to show this utility of this approach. Results are compared with commonly used probabilistic method and normal fuzzy α –cut technique. In order to provide a basis for comparison between the two approaches, the shape of the membership functions used in the fuzzy methods are the same as the shape of the probability density function used in Monte-Carlo Method. The extended fuzzy α – cut technique will present a strong alternative to the conventional approach.

 

 Black Book Serial Number  :  
Title                      : Helping Hands
Guide Name        : Prof. Vinayak Shinde
Group Members : 1.MandalKomalIndradev [31]
2. Lakhani Kruti Nitin [29]
3.Jadhav Swati Madhukar [21]

Abstract               :

In today’s world, food wastage is an alarming issue in India. Our street and garbage bins, landfills have sufficient proof to prove it. Weddings, canteens, hotels, social and family functions, households spew out so much food. Wastage of food is not indicative of only hunger or pollution, but also many economic problems. People’s high standard of living has affected all this wastage of food, clothes etc due to quick change in habit. Instead of wasting such things we can make them put in use by donating to needy, orphans and many below poverty line people. As many people wish to donate such things to needy but there is no source available through which they can make it available to them. We thereby are trying to develop an android application through which we can satisfy the needs of the people in ways as possible as people are used to smart phones.

 

By analyzing user’s requirements, we will create a user friendly interface and at backend database will be there which will provide tracking information and delivery reports which will help to inspire people for donations. We will make it beneficial for needy people .Although our basic aim is food wastage reduction, our application will also fulfill other requirements like clothes, books, etc.

 

Black Book Serial Number  :

 

Title                      : Software Development Scheduling and Tracking
Guide Name        : Prof. Vinayak Shinde
Group Members : 1.Agrawal Amit Pawan

2.Naik AakashArun

3.Sharma Amit Omprakash

4.Khanolkar Omkar Vinayak

 

Abstract              : We all know that in the real world we, as project managers, are given the deadline of the project before we even have a chance to plan for it. This is a good enough reason why we need to get better at scheduling and tracking our projects. To complete the software project within a specified time limit, we allocate a start and end date that determine the milestones and outcomes of the tasks, determine which tasks are depend on another task to complete its operation, save time, build consistency, enhance visibility scheduling along with special tracking features that will update the project manager about the shortcomings as well as delayed time line.

 

Team Leader will update the progress weekly or monthly depending on the scope of the project they are working on. This information will reflect in the database and Project Manager will be notified automatically about updated status. Resource constrained project scheduling is a major problem in current systems available, data allocation problem at database level, incomplete knowledge or false information given to Project Manager and different software models which cannot be used with single system. Our project will overcome this problem using various models (Waterfall, RAD and Spiral model) that can be selected and used for development of project to provide more flexibility, visual representation by either using a graph or pie-chart that can be provided for better understanding of the development scheduling and tracking. So our project will help to minimize cost, duration of project and overtime of employees with proper validation, outcomes and milestones.

Black Book Serial Number  :  
Title                      : Secure Online Transaction using Text Steganography and Visual Cryptography
Guide Name        : Prof.Neha Jain
Group Members : 1)      Gupta SurajMataprasad [16]

2)      PrajapatiAjaykumarHarshnarayan [47]

3) VermaManojJairam[70]

 

Abstract              : This project present the approach for secure online transaction using cryptography and text steganography. An online payment system allow people to make payment through a channel using various security tools to hide the personal detail, card detail, during the payment transaction. However the security from tool is not completely protected an information in specific form. This expose a consumer payment information to hackers that can be misused.

 

In this project we use a new approach for online transaction to hide the information in a securely and secure transaction. A consumer sends his payment information directly to a payment portal verifying the consumer, allows the transaction and sends a payment receipt to the appropriate merchant .we will use the text steganography and visual cryptography to secure online transaction to protect consumer data from hacker and an internet susceptibilities.

Black Book Serial Number  :  
Title                      : PC Assembly Based On User Benchmark
Guide Name        : Prof. DeepaliPatil
Group Members : 1. ChhajedArihantViswanath [9]

2. KhanolkarAzharShabbir

3.Kondappan Abitya Viswanathan[26]

4.Nikhil AnandBirendrakumar[38]

 

Abstract               : Nowadays, purchasing branded Desktop PC from a single Vendor is getting expensive day by day. Also consumers are required to rely on single Vendor for their whole Desktop PC and thereby compromising on the hardware so as to reduce cost. To overcome this problem a new approach was developed i.e. to assemble the PC by purchasing its essential component from different vendors. A large number of websites allow users to post reviews about product they bought. People who find it difficult to understand the technical specification of a product often tends to read reviews. There are thousands of reviews of customers available on different e-commerce portal related to a product. So it is difficult for the customers to get an idea about the product from wide range of reviews. In this project we aim to summarize the customer’s reviews in factual form using part-of-speech tagger (POS),

 

Lexicon algorithm, and Naive Bayesian classifier which are all based on Natural language processing (NLP). Our focus is to cluster different user opinion or reviews and find the similarities and dissimilarities, so as to extract sufficient information to provide appropriate rating to a product. There are number of product available in the market with different vendors and it creates a bit confusion in the mind of consumer that which component to buy. Therefore it becomes necessary to design effective system to summarize the pros and cons of product characteristics so that consumer can quickly find their favorable product so as to develop an efficient and cost effective desktop PC. We have developed a rating system which rates each computer peripherals based on its performance & cost and thereby calculating the final rating of assembled system virtually so that consumers can judge whether the assembled product meets all the requirement as expected.

 

 Black Book Serial Number  :  
Title                      : Introduction of CRM in Pharmacy Administration
Guide Name        : Prof. Pravin Jhangid
Group Members : 1.      GajjarYash Ashok (17)

2.      Marge Priyanka Duttaray(35)

3.      Maurya Krishna Suresh(36)

4.      Upadhyay Anish Manoj (73)

Abstract               : Customer Support and Inventory management is the most basic problem of a company. It is however a vital part of any retail business, whether it’s a traditional brick-and-mortar shop or an online website. It provides us with critical information about the condition of our products such as whether you are low on stock and your inventory needs to be replenished and customer relationship. It gives us insight into which products are selling well and which products are not. This information allows you to make better business decisions on how to market your products and whether or not to carry them. Approximately 85.0% of annual Pharmacy budget is spent on buying materials and supplies which including medicines. We can bring about substantial improvement in the pharmacy inventory and expenditures by the CRM and inventory control techniques.

 

A transaction history file is maintained automatically of entire as well as individual customer so that detailed view of the receipts and shipment of product is available through the system. Our software is a complete medical store administrative software designed so as to ease the work load of medical store professionals and improve business taking into consideration customer support. The main feature includes benefits for the customer by facilities like Membership, automatic SMS reminders etc and invoicing, inventory and stock control, accounting, client and vendor management. This software helps you to track all the customer details and their health records along with profits, loss, profitable clients and products of medical shop. Moreover it’s a medical shop accounting software that uses the combination of CRM and conventional inventory control techniques. It is a flexible and adaptive software suited to medical shops or stores or pharmacies of any size.

 

 Black Book Serial Number  :  
Title                      : Intelligent Knowledge Based Conversation
Guide Name        : Pro. Uma Garodiya
Group Members : 1.      Dubey AmitkumarPremnath

2.      MauryaSuryaprakashShyamji

3.      Patel Deepak  Mavji

4.      Gupta VikasMotilal

Abstract               : In this paper we have proposed an application called CHATTER BOT. Chat bot can be online based or desktop based but we are going to develop application Intelligent Knowledge Based Conversation (I-KBC) which is desktop based. Chat bots are simple to use, in which you “chat” textually with the bot over a computer screen. The bot usually introduces itself. You respond with a statement or question. The bot consults its knowledge base or programming language and replies. The conversation continues as long as it is interesting or useful for the human. There are hundreds of different bots, developed for a variety of reasons; they range from hardwired programs with simply coded patterns to systems built upon embedded learning algorithms that continuously expand their language knowledge base. The I-KBC is based on programming language AIML which is used to store the bots knowledge and profile.

 

Bots are created purely for fun or as part of interactive games, Internet information services, web site guides, ecommerce agents and more. Many bots are designed to provide specific information and direct the dialogue to specific topics. Most chat bots have no capability of learning from conversations and maintaining its emotions in reaction to every previous scenario. These concepts are important, according to our vision, because the main goal of a bot should be to mimic real human conversations. More or less, we visualize this character as a personalization of someone who has some knowledge about some things but is constantly learning everything that is said to it. We can see this as a kid who doesn’t know enough but with time his/her knowledge will expand and future conversations with that kid will hopefully be more solid.

 

 Black Book Serial Number  :  

 

Title                      : Application  of Intelligent Agent in Hospital Scheduling System
Guide Name        : Pro. DeepaliPatil
Group Members : 1.      Pawar Aditya Sudhir

2.      Solanki HarshadMadhukant

3.      Tiwari Bhavna Kailash

4.      Shah Ashutosh Vipul

Abstract               : The current standard operating procedure in healthcare environment for patient registration and appointment scheduling are time consuming and somehow tiresome. Normally, we see patients coming to the hospital and filling out registration forms and waiting to be called or patient calls in for getting appointment and waits for the response for an agreed date. In some places appointment can be done online via web but still patient has to walk in with the appointment card to be swiped by the front desk personnel before being sent to the concerned doctor. However, no facility like priority appointment of patients has been developed. Also the appointment does not take into consideration emergency situations like Accidents and so on and the scheduling reported is only for general patient appointment only.

 

Taking these important aspects into consideration, we here have developed an intelligent agent based system towards negotiating and collaborating with the agents of doctors and the hospital for the appropriate appointment time for the patient which would take the above factors into consideration.In these project we are using two algorithms Genetic Algorithm (GA) and Priority Scheduling with SJF. The agents are developed using JADE Application , to make a proper decision regarding making an appointment for patient and other hospital staff.

 

 Black Book Serial Number  :  
Title                      :  

Web-based Security: Honeypots

 

Guide Name        : Prof. Neha Jain
Group Members : 1.Shirgavi Amar

2. AlhuwaliaJeetParamjit

3.Shardul Shewale

4. Kulankar Aditya Raju Sunita

 

Abstract               : The current standard operating procedure in healthcare environment for patient registration and appointment scheduling are time consuming and somehow tiresome. Normally, we see patients coming to the hospital and filling out registration forms and waiting to be called or patient calls in for getting appointment and waits for the response for an agreed date. In some places appointment can be done online via web but still patient has to walk in with the appointment card to be swiped by the front desk personnel before being sent to the concerned doctor. However, no facility like priority appointment of patients has been developed. Also the appointment does not take into consideration emergency situations like Accidents and so on and the scheduling reported is only for general patient appointment only.

 

Taking these important aspects into consideration, we here have developed an intelligent agent based system towards negotiating and collaborating with the agents of doctors and the hospital for the appropriate appointment time for the patient which would take the above factors into consideration. In these project we are using two algorithms Genetic Algorithm (GA) and Priority Scheduling with SJF. The agents are developed using JADE Application, to make a proper decision regarding making an appointment for patient and other hospital staff.

 

 Black Book Serial Number  :  
Title                      : Tap and Shop
Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.      Jathan Aishwarya Bhaskar

2.      Borana Divyansh Dineshkumar

3.      Kothari Aakash Pravinkumar

4.      Pandey Amit Vijay

 

Abstract               : This project presents a novel method to create an Android based M-commerce application using NFC. It would require Mobile Devices which support NFC technology. NFC stands for Near Field Communication technology which is a short-range, high frequency, low bandwidth radio technology that allows transferring data within few centimeters. In traditional shopping, the customer needs to physically pick up the items to be purchased and carry cash or credit/debit cards with them to make payments. The application mentioned here would read the NFC tag(s) of the product(s) & add it to the shopping cart in our application. It would also provide methods to change the quantity of product/s purchased and edit the cart. Along with this the customer would be informed about the on-going offers in the store. Payment could be made through cash or online using existing payment methods. The paper would also throw light on NFC based payments.
Black Book Serial Number  :  

 

Title                      : Project Management &Recruitment Management System

 

Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.      Bendre Karishma Subhash

2.      Sarkar Ninisha Pradeep

3.      Chavan Omkar Deepak

4.      Jadhav Santosh Subhash

5.       

Abstract               : Academic project management is a major issue which is faced by many educational institutes in India. The main reason for this is there is no automated system followed in any institute. College management/staff gathers all the project reports ,academic details from students and store them physically in some locations and similarly, at the time of recruitment the HRs have to study all of them manually which is time consuming. To overcome this problem we have decided to develop web application which is useful for every institute. College Project Management And recruitment Management System is an ideal system for students and college.
Black Book Serial Number  :  

 

Title                      : Helping Hand

 

Guide Name        : Prof. Neha Jain
Group Members : 1.      Gholap Akshay Chandrakant

2.      Kulkarni Tejas Manohar

3.      Kulaye Deepak Suresh

4.      Gupta Rohit Suresh

Abstract               : The proposed work is part of a project that aims at the control of a cursor based on hand gesture recognition. This goal implies the restriction of real-time response and the use of unconstrained environments. In this report we present an algorithm to track and recognise hand gestures for interacting with computer. For the hand segmentation step we use the colour cue due to the characteristic colour values of human skin, its invariant properties and its computational simplicity. To prevent errors from hand segmentation we add the hand tracking as a second step. Tracking is performed assuming a constant velocity model and using a pixel labelling approach. From the tracking process we extract several hand features that are fed into a finite state classifier which identifies the hand configuration. The hand can be classified into one of the four gesture classes or one of the four different movement directions. Finally, the system’s performance is evaluated by showing the usability of the algorithm in a personal computing environment.
Black Book Serial Number  :  

 

Title                      : Soldier Tracking and Health Monitoring System

 

Guide Name        : Prof. Pravin Jangid,

 

Group Members : 1.      Singh Shivani Sunil

2.      Desai Vinit Laxmikant

3.      Rane Gurudutt Vishram

4.      Mohd. Khizar Shakil Anjum

Abstract               : In today’s world the security of the nation is depends on the enemies warfare and so the safety of the soldiers is considered as important role in it. Concerning the soldiers safety there are many instruments to view their health status. In soldiers security, bio-sensors systems gives different types of small physiological sensors, Biomedical sensor, transmission modules and processing capabilities and can thus facilitate low-cost wearable unobtrusive solutions for health monitoring. GPS used to log the longitude and latitude so that direction can be known easily. These devices are being added to firearms, and militaries where possibility of embedding GPS devices into soldiers vests and uniforms so that field commanders can track their soldier’s movements in real time.GSM module can be used for effective range of high-speed transmission, and soldier-to-soldier wireless communications that will be required to relay information on situational awareness, tactical instructions, and covert surveillance related data during special operations reconnaissance and other missions. So by using these equipment’s we are trying to implement the basic life guarding system for soldier in low cost and high reliability.
Black Book Serial Number  :  

 

Title                      : Movie Recommender System

 

Guide Name         : Prof. Neelam Phadnis

 

Group Members : 1.      Gajre Mansi Kishor

2.      Parab Rohit Charudatta

3.      Raorane Prarthana Mangesh

4.      Kanade Swapnil Yeshwant

 

Abstract               : Movie Recommender is an expert system for movie recommendation. We will implement the system using machine learning and cluster analysis based on a hybrid recommendation approach. The system will take in the user’s personal information and will predict their movie preferences using well-trained support vector machine (SVM) models. Based on the SVM prediction it will select movies from the dataset, then it will cluster the movies and will generate questions to the users. Based on the user’s answers, it will refine its movie set and finally it will recommend movies for the users.

 

For a system to understand a movie, it needs movie features such as movie cast, movie genre, movie plot, etc. With these information, a system can better categorize movies. User written movie reviews is one such source of features. It carries substantial amount of movie related information such as location, time period, genre, lead characters and memorable scene descriptions. Since a user written movie review contains both useful and useless information, some text pre-processing is required before it can be used by a RS.

 

Black Book Serial Number  :  

 

Title                      : Drowsy Driver Identification System

 

Guide Name        : Prof. K.Jayamalini

 

Group Members : 1.      Singh Priyanka Anilkumar

2.      Adhatrao Asmita Janardan

3.      Sharma Suman Mantoon

4.      Maurya Sneha Virendra

 

Abstract               : Driver fatigue is a significant factor in a large number of vehicle accidents. Recent statistics estimate that annually 1,200 deaths and 76,000 injuries can be attributed to fatigue related crashes. The development of technologies for detecting or preventing drowsiness at the wheel is a major challenge in the field of accident avoidance systems. Because of the hazard that drowsiness presents on the road, methods need to be developed for counteracting its affects .The aim of this project is to develop a prototype drowsy driver identification system.

 

A Drowsy Driver Identification System has been developed, using a non-intrusive machine vision based concepts. The system uses a small camera that points directly towards the drivers face and monitors the drivers eyes in order to detect fatigue. In such a case when fatigue is detected, a warning signal is issued to alert the driver. The system first needs to find the face and then locate the eyes and the mouth. After detecting the eyes, find whether they are open or closed. Drowsiness is also detected by detecting whether driver is yawning or not. Implementing such a system would reduce the number of fatal accidents that are caused by drowsiness and would help the society.

Black Book Serial Number  :  

 

Title                      : Smart Yatra

 

Guide Name        : Prof. K.Jayamalini

 

Group Members : 1.      Sharma Pratibha Prem

2.      Mishra Vandana Gyaneshwar

3.      Bag Ankita Ananda

4.      Maurya Vandana Virendra

Abstract               : It is generally based on the idea of providing the best possible travelling to the user. The main goal of the proposed work is to improve travelling by adding the necessary additional features into the application, like accurate bus timings, train timing, train number, auto stand, fare of trains, buses, autos, even the sharing prices of auto rickshaw and moreover adding a GPS tracker into it and SOS for emergencies. This application accepts input in the form of selection of the source and destination and display the entire details about the routes and also track the location of the respective bus and give the output in various routes like minimum distance, minimum cost and minimum modes of transportations. It provides information related to local places and local stores like local stores offers, rating, etc. It also provides information related to auto stand and share autos. With this application we are providing a platform to local thing.
Black Book Serial Number  :  

 

 

Title                      : Choreography Randomizer

 

Guide Name        : Prof. Uma Goradiya

 

Group Members : 1.      Puri Aman Sanjiv Kumar

2.      Guin Debotri Debdas

3.      Shetty Sanchita Suresh

4.      Yadav Brijesh Kansraj

 

Abstract               : It is an application that uses smart features to give steps for a specific music based on the music beats or the style of dance and or a selection of a dance move for a specific beat. We will have to feed dance moves in a database and depending on the song beats and used a machine learning language which will use random algorithms depending on the music beats. The person can select also a dance style if the user wants the dance to be choreographed in a specific dance style. Also the user will be able to check a step and put it in a beat manually if he wants. If the person doesn’t likes the choreography then the user can click random button and a new choreography will be made which may or may not be based on the dance style. The output will be animated humans doing human like dance moves. The front end will be machine learning program which uses randomized algorithms. The back end will be a database which will store the dance moves.
 Black Book Serial Number  :  

 

Title                      : Ngen Server Application
Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.      Singh Aditya Rameshwarpratap

2.      Shetty Sujwal Jagannath

3.      Naik Dhananjay Hanumant

4.      Sawant Shushrut Prakash

 

Abstract               : Today’s world is moving fast towards virtualization and cloud; hence it becomes very important for the organizations to encrypt the critical data. This application provides this facility by enhancing the AES algorithm by adding custom encryption settings in the algorithm. Since AES has been cracked by attackers in the past. Any known algorithm has a probability of being cracked. So hence we here propose a configurable algorithm that allows user to modify the algorithm each time he encrypts text. The algorithm uses AES and adds some custom configurable steps in the system where user may modify the encryption process as needed. In this application more steps of encryption are added in order to make the data impossible to decipher by attackers.
 Black Book Serial Number  :  

 

Title                      : Asynchronous Web Based Proxy-Server

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Singh Abhishek Pramod

2.      Doiphode Dhanesh Dattaram

3.      Tiwari Adarsh Arvind

4.      Dubey Ashish Ramashankar

 

Abstract               : We intend to design a web based proxy server which will be faster, asynchronous, and that can continuously stream content to make it more scalable. For example, in Windows 8 home screen, you can see the widgets loading many different content like weather feed, Flickr photo, YouTube videos, RSS from many different external domains. All these are done via a Content Proxy. Content Proxy serves million URLs which is quite an engineering challenge for us to make it both fast and scalable. Sometimes Content Proxy serves megabytes of data, which poses even greater engineering challenge.

 

 Black Book Serial Number  :  

 

Title                      : Voice Control Household Appliances

 

Guide Name        : Prof.Uma Goradiya

 

Group Members : 1.      Pandey Anurag Suryanarayan

2.      Mishra Umesh Umashankar

3.      Chaubey Akash Anil

4.      Peddada Sivateja Nehru

Abstract               : Automation is a trending topic in the 21st century making it play an important role in our daily lives. The main attraction of any automated system is reducing human labour, effort, time and errors due to human negligence. With the development of modern technology, automation has become a necessity for everyone. Applications are being developed on Raspberry Pi’s that are useful to us in various ways. Another upcoming technology is natural language processing which enables us to command and control things with our voice. Combining all of these, our paper presents a micro controller based voice controlled home automation system. Such a system will enable users to have control over every appliance in his/her home with their voice. All that the user needs is a control circuit

 

 Black Book Serial Number  :  

 

Title                      : Precision Farming

 

Guide Name        : Prof. Vinayak Shinde
Group Members : 1.      Saroj Raja Rambarat

2.      Sharma Arun Rajesh

3.      Shah Santosh Gangaram

4.      Bodas Abhishek Sanjay

Abstract              : Project smart farming for precision agriculture is based on technology that we use in farming electronically and through softwares. These projects implement several technologies undertaken by Raspberry Pi INC, etc. The main purpose of these projects is to provide a farmer a new generation device that can be use in agriculture field over any electronics device using Transmission Control and Internet Protocol through any smart phone or Internet operating device. The technology implemented for this purpose is Internet Of Things operating integrated circuits.

 

This project will reduce the gap between customizable electronics devices and programming application or softwares since because of these project electronic devices can be programmed, interfaced and controlled with any other Object Oriented Languages like Java and Web based language like HTML, PHP, Node. JS, etc. The microprocessor that we use here is Raspberry Pi that will include all different types of sensors in cooperated. This robot will operate in farming place where it can sense data from agriculture like soil quality, Water Level in soil, fertility, Humidity and temperature that requires crop to grow at specific time period it will analyze data that is received from agricultural area and give farmer a statistical data that will help farmers to solve their problems.

Black Book Serial Number  :         

 

Title                      : Examination System for Visually Impaired

 

Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.      Tiwari Madhav Amarnath

2.      Sharma Ashwinikumar Ravindra Kumar

3.      Tiwari Priyankar Ravindra Nath

4.      Pandey Sarika Surendra (Provisional)

Abstract              : The Online-Examination for visually impaired People is basically an online examination system. It reflects the justification and objectivity of examination. It helps to release the workload of teachers and students. The current online examination systems do not allow visually impaired people to appear for the examination. Hence, the proposed application is designed for the visually impaired people so that they can appear for examination, it is also useful for the other handicapped people with upper limb disability. This research work provides the speech user interface for visually impaired people to interact with the application. The proposed application will dictate the questions to the candidate with the help of Speech Synthesis. The application will accept the answers from candidates through voice commands using Speech Recognition. The proposed system also allows users (examiners/teachers) to add their questions to conduct the examination. The questions can be added easily by uploading a file. As the proposed system is online, result generation will be quick.
Black Book Serial Number  :         

 

Title                      : Social Enhancement Versatile Approach (SEVA)

 

Guide Name        : Prof. Vinayak Shinde

 

Group Members : 1.      Tanna Ankit Kirit

2.      Singh Mahesh Narayan Indrakumar

3.      Shetye Kajal Kishor

4.      Tulaskar Shivani Subhash

 

Abstract               : S.E.V.A. is an initiative to provide a platform to the masses of the country to raise their voice against day to day civic problem they are facing. It is a mobile application which is free and convenient to use. This application is all about providing a flexible option to the masses of the country to cast their opinions and views on day to day problems they face. It will provide the feature of amalgamating the views of the people towards an issue and reach out to the authorities or the person responsible to look after the matter. If a person finds a problem in any area e.g. road problems, he/she can capture a picture along with a short description about the problem and the information then can be submitted by the user on the S.E.V.A Portal. Individuals can give their votes over the issues posted and accordingly the issues will be prioritized. The Issues which needs immediate attention on the basis of the polling will be driven to the incumbent personality who is a part of the government.
 Black Book Serial Number  :  

 

Title                      : SLRTCE Schedular

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Sahalot Shweta Rakesh

2.      Salunkhe Aditya Bhanudas

3.      Prajapati Sanjay Manchharam

4.      Pandey Sushil Mahendra

 

Abstract               : The SLRTCE PocketApp acts a medium for the students to help, to communicate, to share, to authenticate, to know the different activities, to participate in the events, to set reminder, to get updates from the forums. The main components of this application are Database, User Interface, Reminder, Server for maintaining and organizing the users and Push notification. Once the user has installed the apk file of the application in the respected Smartphone the first step will be authentication where in the application will prompt for distinct user’s information, this information will be stored in the database installed in the server computer and will be used further for acknowledgment .Following this registration process a username and password will be provided to the applicant through which the person will be able to login the application as an authentic user to the system created. Now, the user is over to number of options like my-schedule, my-lecture’s notes, my-library, personal chats, groups, college events, forum, record lecture and reminder. The user can also get information about event details or about any precedent event in the past.

 

Features of Application include Ease of use Simple interface which allows students to browse through various options and also easily comprehensible options are provided, Schedule Experience Allow students to bring multiple schedules up side by-side and compare options. Provide the best schedule experience And Quick Installation One to two steps of registration and the user will be able to begin with the application.

 

 Black Book Serial Number  :  

 

Title                      : Smart Classroom

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Pal Brijprakash Ratipal

2.      Maurya Vedprakash Shyamji

3.      Pandit Amit Parmeshwar

4.      Maharana Mukesh Mahesh

Abstract               : The project “SMART CLASSROOM” provides a simple interface for maintenance of student information. This project can be used in any educational institutes to maintain the records of student easily. Since maintaining the information through paperwork is very difficult and also very time consuming and also today the world is going digital. Therefore, this project is created to reduce the paperwork and it is very less time consuming. Smart Classroom consists of different module such as student module, staff module, notice module, quiz module, attendance management module etc. Our main purpose is to create a website which will manage the working of these different modules. The interconnectivity among these modules reduces the time to perform different operational tasks.

 

Smart Classroom is a web app where all the basic information of student, staff stored automatically. This project manages the information of various departments including staff information, notice board, examination, result etc. This system contain feature of an online conversation using chat box and also contain video conversation. Automatic generation of ID card. In case the ID card is lost then student can generate a college ID from here. Parents can easily view his child regular college activities. Parents can also contact directly with the faculty member through our proposed system.
By few clicks one can easily gather the information about any student or staff and live classroom activity. 

 Black Book Serial Number  :  

 

Title                      : Quality Education System through Paperless Evaluation

 

Guide Name        : Prof.Uma Goradiya

 

Group Members : 1.      Singh Vinaypratap Udaybhan

2.      Tiwari Anupam Virendrakumar

3.      Shettigar Prajwal Purushottam

4.      Sharma Bhavesh Prem L

Abstract               : The maintenance of the entities record is an integral part of an organization and plays a significant role in improving the organization performance effectively. The current system for the education being used at most of the institution relies on an inflexible paper system that users outdated, labor-intensive technology and it requires sufficient administrative efforts.

            We are emphasizing on developing this project that will help the different college entities to use the services provided in the college by making use of paperless work in different college institutes. For this, we are implementing distributed application “Quality education system through paperless evaluation” based on web technology. It adds more functionality to already abundant work done in college institutes. Using this project most of the important work of college institutes can be done without making use of paper in college premises. This project involves different entities of the institute to log in and perform their respective work when they require.

            Our proposed system aims to provide benefits to different college entities to do their work efficiently and timely manner. Quality education system through paperless evaluation system will develop to significantly reduce staff workloads it requires less administrative efforts for all activities of college. Our proposed system will provides a common platform for training and placement services, student attendance and staff information.

 

 Black Book Serial Number  :  

 

Title                      : Two Wheeler Service Center Management System

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Jayswal Sahil Ramjeet

2.      Pal Surendra Rajmani

3.      Ansari Tanveer Ahmed Mohammad Yamin Farzana

4.      Yadav Akshayprasad Rajaram

Abstract               :  

Now a day technology is on a boost. People wish to live a luxurious life with minimum physical work. Here we provide a software application for “Two wheeler service centre management system”. The software will enable any two wheeler user to search and communicate with any two wheeler service centre in nearest area. This software can easily manage the customer information and service relevant inventory. Service scheduling is of the major of this software. The software will easily recognize the regular customer and generating daily service report. Currently Albion store is facing the problem of mismanaging their customer information and service schedule. Due to this they lose their important customers and it takes lot of time to do our daily operation. Albion store is currently using semi-automated excel sheet to maintain our customer and service information which has a lot of limitation and difficulties. To solve the above problem, service centre management software is compulsory because it has the ability to store the data of service information in a centralized database. The software is totally reduced to redundant of customer information and service information. The service centre software helps organization to maintain the customer information securely. In short, this application is the solution for an entire life cycle of service management.

 

 

 Black Book Serial Number  :  

 

Title                      : Cryptography Using Color Substitution

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Vichare Amey Naresh

2.      Sawant Shrihari Vijayanand

3.      Shaikh Imroz Shakeel Ahmed

4.      More Sumit Vijay

Abstract               :  

The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this project, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.

 

 Black Book Serial Number  :  
Title                      : File Transfer Through SMS

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Dete Sheetal Balkrishna

2.      Pandey Mandakini Premprakash

3.      Gadekar Akshay Ananda

4.      Sawant Harita Pradeep

Abstract               : In the last few years, SMS (Short Message Service) has made a big impact on the way we communicate. Instead of communicating over the phone using voice, people rather prefer SMS not only for messaging but also for information exchange. This project proposes a method of building an extendable generic application which can be used to search a file on remote desktop and mail it to user. Mobile users send required information through a SMS to a mobile gateway that forwards it to the generic application. Given the user-provided information, the generic application automatically searches the file on remote machine and mails it to the user. This project is based on the concept of searching a file on remote machine by just sending a simple SMS. The purpose of the project is to search a file on remote machine by just sending a simple SMS and get that file mail it to user if found. The application will be kind of desktop application where it will check for new incoming SMS. The application will first check whether the mobile number through which SMS has been sent is authorized to search the file or not. If not application will send back an acknowledgement saying that user is not authorized to search the file. If the user is authorized, than application will start the file search and if the file is found it will mail it user on the emailed that is received in SMS. While sending SMS user has to send the option, file name, file path (optional) and email id.

 

 Black Book Serial Number  :  
Title                      : Sentiment Analysis for Twitter

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Waghmare Niketan Namdev

2.      Mishra Suryanarayan Ramkrishna

3.      Dubey Prashant Pramod

4.      Chavan Rohan Arun

Abstract               : With the rise of social networking epoch, there has been a surge of user generated content. Micro blogging sites have millions of people sharing their thoughts daily because of its characteristic short and simple manner of expression. We propose and investigate a paradigm to mine the sentiment from a popular real-time micro blogging service, Twitter, where users post real time reactions to and opinions about “everything”. In this paper, we expound a hybrid approach using both corpus based and dictionary based methods to determine the semantic orientation of the opinion words in tweets. A case study is presented to illustrate the use and effectiveness of the proposed system.

 

 Black Book Serial Number  :  

 

Title                      : Smart File Manager – Sorting Files & Folders into Folders as Category & Sub-Categories using Metadata and User Templates

 

Guide Name        : Dr. Vinayak D. Shinde

 

Group Members : 1.      Narula Jasmohan Singh

2.      Patel Vrushabh

3.      Rathod Aditya

 

Abstract               : Today, we are using many digital devices which store all our information as data in the form of files. Our files (Photos, Music, Videos, Documents, code, etc.) are spread out across multiple devices inside numerous folders. If these files are not arranged properly or using a logic, it becomes a tedious task in locating the required file as we have to remember where those files are or use a search tool. We currently have to manually specify a filename so that we can easily identify the file.

 

Smart File Manager System is a GUI based application that we are proposing to make that will organize digital files and folders of a user in the same way we organize real world objects into categories and sub-categories. Here, a folder will be considered as Category Folder by our system if it finds a ‘.rfs’ file in its root. ‘.rfs’ contains the rules that will be used by our system for sorting. This is being done so that the data of the user is organized in a way that will help them easily retrieve their data through file explorers and search tools to optimize their workflow and make it easier for the user to handle & remember their data.

 

In short, the user will select their data through the application and specify the Category/Sub-Category in which their want to be organized. The rules set for the specified Category/Sub-Category will be applied and the data will be manipulated/renamed and placed into the corresponding folder.

Black Book Serial Number  :  

 

Title                      : Traffic Rules Violation Management System Using NFC

 

Guide Name        : Dr. Vinayak D. Shinde

 

Group Members : 1.      Yadav Shashikant Tirathraj

2.      Yadav Prasannakumar Ravindra

3.      Yadav Rishu Rajbahadur

4.      Korgaonkar Akhil Prakash

 

Abstract               : The project involves developing an Digital Driving License which provides a proof of identity and a way to access details about license holders past record.

The existing driving licenses consist of two memory sections, one for the public and another for personal data. The personal space will hold license data so that it can be checked by government officials in cases of any fraud or

other criminality. The space which is provided for public usage will be offered to service providers and will be easily able to be read by an NFC enabled mobile phone.

Black Book Serial Number  :  

 

Title                      : Wear our World using Sixth Sense (WoW-SST)

 

Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.      Vishwakarma Suraj Rajesh

2.      Zaveri Siddhivinayak Suresh

3.      Yadav Jignesh Ramchandra

4.      Yadav Sachin Ramkishan

 

Abstract               : Sixth Sense is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We’ve evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world. Information is confined traditionally on paper or digitally on a screen.

 

Sixth Sense bridges this gap, bringing intangible, digital information out into the tangible world, and allowing us to interact with this information via natural hand gestures. ‘Sixth Sense’ frees information from its confines by seamlessly integrating it with reality. This project deals with development of few real time applications such as calculator, camera, analog clock and a power point presentation using Sixth Sense Technology.

 

Black Book Serial Number  :  

 

Title                      : Disease Prediction System using Data Mining

 

Guide Name        : Prof. K. Jayamalini

 

Group Members : 1.      Mishra Shratik Jairaj

2.      Vasi Albar Murtuza

3.      Menon Vinay Sujit

 

Abstract               : The successful application of data mining in highly visible fields like e-business, commerce and trade has led to its application in other industries. The medical environment is still information rich but knowledge weak. There is a wealth of data possible within the medical systems. However, there is a lack of powerful analysis tools to identify hidden relationships and trends in data. Disease is a term that assigns to a large number of heath care conditions related to the body. These medical conditions describe the unexpected health conditions that directly control all the body parts. Medical data mining techniques like association rule mining, classification, clustering is implemented to analyze the different kinds of general body based problems. Classification is an important problem in data mining.

 

Given a database contain collection of records, each with a single class label, a classifier performs a brief and clear definition for each class that can be used to classify successive records. A number of popular classifiers construct decision trees to generate class models. The data classification is based on Decision Tree algorithms which result in accuracy, the data is estimated using entropy based cross validations and partition techniques and the results are compared. The general body disease database is clustered using the K-means clustering algorithm, which will remove the data applicable to any general body disease like flu, cough, cold, viral .etc from the database.

In this project, the disease prediction system will carry out data mining in its preliminary stages, the system will be trained using machine learning and data mining. The system will initially be fed data from different sources i.e. patients, the data will then be pre-processed before further process is carried out, this is done so as to get clean data from the raw initial data, as the raw data would be noisy, or flawed. Then the feature extraction will be performed on the data, this is to collect the relevant information from the initial raw set of data. This data will be processed using Data mining algorithms, the system, will be trained so as to predict the disease based on the input data given by the user.

Black Book Serial Number  :  

 

Title                      : Scene Generation From Text using NLP

 

Guide Name         : Prof. K. Jayamalini

 

Group Members : 1.      Nikhil Viradiya

2.      Ambikaprasad Tripathi

3.      Dhruv Nagpal

4.      Yash Dixit

 

Abstract               : Translating elusive ideas or statements into visual scenes is quite a daunting task. First the thought has to be laid out explicitly and clearly in the form of a written statement which acts as the foundation for the conversion. Then a professional strives to create a mental image of the given statement. Finally, another professional starts placing models according to the abstract image created in the previous stage in a model rendering software. Thus converting a single text to corresponding visual element is a rather challenging task.

 

Our project aims to automate this entire transformation. It promises to convert any arbitrary descriptive text into a representative scene. Our system parses a user written input text, extracts information using Natural Language Processing (NLP) and tags relevant units. It then associates every object with model and places them according to the derived relations and spatial dependencies. Ultimately the user can make changes and minor adjustments to the final scene using Blender in-build controls.

Black Book Serial Number  :  

 

Title                      : Enhancing Cloud Security Using ECC Algorithm.
Guide Name        : Prof: Neha Jain
Group Members : 1.       Rohit Anil Singh

2.      Punitkumar Soni

3.      Niranjan Tiwari

4.       Pankaj Sharma

Abstract               : A cloud typically contains a virtualized significant pool of computing resources, which could be reallocated to different purposes within short time frames. The entire process of requesting and receiving resources is typically automated and is completed in minutes. The cloud in cloud computing is the set of hardware, software, networks, storage, services and interfaces that combines to deliver aspects of computing as a service. Share resources, software and information are provided to computers and other devices on demand. It allows people to do things they want to do on a computer without the need for them to buy and build an IT infrastructure or to understand the underlying technology. Through cloud computing clients can access standardized IT resources to deploy new applications, services or computing resources quickly without reengineering their entire infrastructure, hence making it dynamic.

 

The core concept of cloud computing is reducing the processing burden on the users terminal by constantly improving the handling ability of the cloud. All of this is available through a simple internet connection using a browser connection.

 

Black Book Serial Number  :  

 

Title                      : GST Computation System

 

Guide Name        : Prof.Neha Jain

 

Group Members : 1.      Ashwin Dave

2.      Prabhat Joshi

3.      Shivam Tiwari

4.      Suraj Dubey

 

Abstract               : We begin by elaborating on the important concept of – cascading effect of taxes. It is also, logically, referred to as “taxes on taxes”. It is simple to illustrate – say A sells goods to B after charging sales tax, and then B re-sells those goods to C after charging sales tax. While B was computing his sales tax liability, he also included the sales tax paid on previous purchase, which is how it becomes a tax on tax. The GST is introduced to combat this problem, among many others. The main purpose of our software will making the invoices task easy and handles all user GST invoicing/billing needs. Customer will select the product and proceed for the invoices by retailer. Retailer will enter the product detail in system and amount of the product. System will select the Tax percentage base on the particular product and calculate the actual amount and tax.It will show the total amount of product including GST rates and generate the Invoice.

 

Black Book Serial Number  :  

 

Title                      : Restaurant Management System Using NFC Technology

 

Guide Name        : Prof.Neha Jain

 

Group Members : 1.      Tushar Moolya

2.      Arvind Pandit

3.      Rikin Parmar

4.      Rocky Kalal

 

Abstract               : Near Field Communication (NFC) is one of the latest technologies in radio communications and being a subset of RFID technology, it is growing at a very brisk rate. NFC technology provides the fastest way to communicate between two devices and it occurs within a fraction of a second. It has various applications in Mobile Communications and transactions.

 

An NFC supported ordering system in restaurants is discussed as one potential use of this technology. Customers, who visit restaurants, usually have to wait for being serviced by a waiter. One of the solutions for this is to enable the customer to order his food directly from his table without the need of a waiter by using near field communications technology.

 

Black Book Serial Number  :  

 

Title                      : Smart Cart Using Arduino
Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.      Pandey Sarika Surendra

2.      Gupta Soumya Rajeshkumar

3.      Shaikh Meenaz Mehboob

4.      Rawat Komal

 

Abstract               : There has been an emerging demand for quick and easy payment of bills in shopping malls. Quite often, when shopping in a supermarket shoppers are frustrated at locating the items on the shopping list and no assistance is available. To overcome these problems, we have designed a smart trolley. It also provides a centralized and automated billing system using RFID. Each product of shopping mall, super markets will be provided with a RFID tag, to identify its type. Each shopping cart is implemented with a Product Identification Device (PID) that contains microcontroller, LCD, an RFID reader. Purchasing product information will be read a RFID reader on shopping cart and it is displayed in LCD which is interfaced to the controller. At the billing counter, the total bill will be transferred to PC by Bluetooth module.

Every product in the shop or a mall will have an RFID tag on it. Each Cart will have an RFID reader implemented on it. After the payment of money, the Cart must get reset. There will be a USB that will be connected to the pc of the billing system through which the bill is generated. If the product is removed, it must get deleted from bill too, for that a ‘delete’ button is implemented next to LCD display. There will be a LCD 16*2 display. Display Product Info, Expiry Date, and Better Alternative.

 

 Black Book Serial Number  :  

 

Title                      : Efficiently Analysing And Detecting Fake Reviews

 

Guide Name        : Prof. Pravin Jangid

 

Group Members : 1.      Majalkar Aniket Ravikant

2.      Verma Chintaram Bhallu

3.      Das Vishal Krishna

 

Abstract               : Robust Trust Reputation Systems (TRS) provide actionable information to support relying parties taking the right decision in any electronic transaction. In fact, as security providers in e-services, TRS have to faithfully calculate the most trustworthy score for a targeted product or service. Thus, TRS must rely on a robust architecture and suitable algorithms that are able to select, store, generate and classify scores and feedbacks.

 

In this work, we propose a new architecture for TRS in e-commerce application which includes feedbacks’ analysis in its treatment of scores. In fact, this architecture is based on an intelligent layer that proposes to each user (i.e. “feedback provider”) who has already given his recommendation, a collection of prefabricated feedbacks summarizing other users’ textual feedbacks. A proposed algorithm is used by this architecture in order to calculate the trust degree of the user, the feedback’s trustworthiness and generates the global reputation score of the product.

 

 Black Book Serial Number  :  

 

Title                      : Opinion Summarization and Classification for Online

Product Reviews

 

Guide Name        : Prof. Uma Goradiya(Guide)

 

Group Members :
1.      Akshay Singh

2.      Nand Kishore Rajput

3.      Vikram Timalsena

4.      Hamza Sufian

 

Abstract              : The growth of E-commerce has led to the invention of several websites that market and sell products as well as allow users to post reviews. It is typical for an online buyer to refer to these reviews before making a buying decision. Hence, automatic summarization of users’ reviews has a great commercial significance. However, since the product reviews are written by non-experts in an unstructured, natural language text, the task of summarizing them is challenging.

 

This paper presents a semi-supervised approach for mining online user reviews to generate comparative feature-based statistical summaries that can guide a user in making an online purchase. It includes various phases like preprocessing and feature extraction and pruning followed by feature based opinion summarization and overall opinion sentiment classification.

Black Book Serial Number  :         

 

Title                      : Look Based Media Player.
Guide Name        : Prof. Uma Garodiya

 

Group Members : 1.      Harshada Naroliya

2.      Shreeya Acharya

3.      Tanvi Desai

4.      Varsha Sakpal

 

Abstract               : In this project, we are developing an advanced media player which plays and pauses the video by detecting the users face looking at screen or not and also the field of computer vision based hand gesture interfaces for Human-Computer Interaction (HCI). System monitors whether the user is looking at the screen or not using a web camera. If yes then doesn’t interrupts the video and allows it to play. Along with these, the web camera will also detect the users hand gestures which can be used for performing various events like increasing or decreasing the volume, changing to next video or previous video, etc. In case if the user is not looking at the or say the system couldn’t detect the users face then it immediately stops the video. Currently we propose to build prototype for exploring the use of marking menus in gesture-based interaction for controlling the Media player.

 

 Black Book Serial Number  :  

 

Title                      : Placement predictor and course recommender system
Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Yedhukrishnan Pillai

2.      Priyanka Wadekar

3.      Manodeep Roy

 

Abstract              : The performance in education sector in India is a turning point in the lives of all students. As the ability of the student of being placed is influenced by many factors, it is essential to develop predictive data mining model for students’ performance so as to identify the weak students’ skill wise and study the influence of the dominant factors on their performance. In any education system, student records i.e. number of KT’s, skills in the bag, course interest and academic performance may be an important consideration to analyse various trends. Since all the systems are now computer based information system data availability, modification and updating are a common process now. Although student achievement is highly influenced by past evaluations, an explanatory analysis has shown that the person’s area of interest is also an important parameter.

 

As a direct outcome of this project, more efficient student performance prediction tools can be developed, improving the quality of students and enhancing educational institutions resource management.

Black Book Serial Number  :         

 

Title                      : Hand Gesture recognition and Voice Conversion for Dumb and Deaf person

 

Guide Name        :  

Prof. Neelam Phadnis

 

Group Members : 1.      Prajapati Rupesh Vibhuti

2.      Yadav Neeraj Shitalaprasad

3.      Jamindar Nupur Sandeep

4.      Pandey Vedant Vikhram Dayanand

 

Abstract               : Communication is the main channel between people. There are many languages spoken all around the world and interpreted.  “special people”, that is people who have difficulty in speaking and hearing “The dumb” and “The deaf” people respectively find it difficult to understand what exactly the other person is trying to communicate and so with the deaf people.

 

Sometimes people interpret these messages wrongly either through sign language or through lip reading or lip sync. This project is made in such a way to help these specially challenged people hold equal par in the society.

 

 Black Book Serial Number  :  
Title                      : Shoppers Paradise With Recommender System

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Kamna Upadhyay

2.      Nabila Shaikh

3.      Reshma Pawale

 

Abstract               : This project is a web based shopping system for an existing shop. The project objective is to deliver the online shopping application into asp platform. This project is an attempt to provide the advantages of online shopping to customers of a real shop. It helps buying the products in the shop anywhere through internet by using an android device.   

 

Thus the customer will get the service of online shopping and home delivery from his favourite shop. This system can be implemented to any shop in the locality or to multinational branded shops having retail outlet chains. If shops are providing an online portal where their customers can enjoy easy shopping from anywhere, the shops won’t be losing any more customers to the trending online shops such as flipcart or ebay. Since the application is available in the Smartphone it is easily accessible and always available. We try to provide the customer with better quality recommendations. This System includes Inventory Management.

 

 Black Book Serial Number  :  

 

Title                      : Smart Classroom

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Pal Brijprakash Ratipal

2.      Maurya Vedprakash Shyamji

3.      Pandit Amit Parmeshwar

4.      Maharana Mukesh Mahesh

Abstract               : The project “SMART CLASSROOM” provides a simple interface for maintenance of student information. This project can be used in any educational institutes to maintain the records of student easily. Since maintaining the information through paperwork is very difficult and also very time consuming and also today the world is going digital. Therefore, this project is created to reduce the paperwork and it is very less time consuming. Smart Classroom consists of different module such as student module, staff module, notice module, quiz module, attendance management module etc. Our main purpose is to create a website which will manage the working of these different modules. The interconnectivity among these modules reduces the time to perform different operational tasks.

 

Smart Classroom is a web app where all the basic information of student, staff stored automatically. This project manages the information of various departments including staff information, notice board, examination, result etc. This system contain feature of an online conversation using chat box and also contain video conversation. Automatic generation of ID card. In case the ID card is lost then student can generate a college ID from here. Parents can easily view his child regular college activities. Parents can also contact directly with the faculty member through our proposed system.
By few clicks one can easily gather the information about any student or staff and live classroom activity. 

 Black Book Serial Number  :  

 

Title                      : Quality Education System through Paperless Evaluation

 

Guide Name        : Prof.Uma Goradiya

 

Group Members : 1.      Singh Vinaypratap Udaybhan

2.      Tiwari Anupam Virendrakumar

3.      Shettigar Prajwal Purushottam

4.      Sharma Bhavesh Prem L

Abstract               : The maintenance of the entities record is an integral part of an organization and plays a significant role in improving the organization performance effectively. The current system for the education being used at most of the institution relies on an inflexible paper system that users outdated, labor-intensive technology and it requires sufficient administrative efforts.

            We are emphasizing on developing this project that will help the different college entities to use the services provided in the college by making use of paperless work in different college institutes. For this, we are implementing distributed application “Quality education system through paperless evaluation” based on web technology. It adds more functionality to already abundant work done in college institutes. Using this project most of the important work of college institutes can be done without making use of paper in college premises. This project involves different entities of the institute to log in and perform their respective work when they require.

            Our proposed system aims to provide benefits to different college entities to do their work efficiently and timely manner. Quality education system through paperless evaluation system will develop to significantly reduce staff workloads it requires less administrative efforts for all activities of college. Our proposed system will provides a common platform for training and placement services, student attendance and staff information.

 

 Black Book Serial Number  :  

 

Title                      : Two Wheeler Service Center Management System

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Jayswal Sahil Ramjeet

2.      Pal Surendra Rajmani

3.      Ansari Tanveer Ahmed Mohammad Yamin Farzana

4.      Yadav Akshayprasad Rajaram

Abstract               :  

Now a day technology is on a boost. People wish to live a luxurious life with minimum physical work. Here we provide a software application for “Two wheeler service centre management system”. The software will enable any two wheeler user to search and communicate with any two wheeler service centre in nearest area. This software can easily manage the customer information and service relevant inventory. Service scheduling is of the major of this software. The software will easily recognize the regular customer and generating daily service report. Currently Albion store is facing the problem of mismanaging their customer information and service schedule. Due to this they lose their important customers and it takes lot of time to do our daily operation. Albion store is currently using semi-automated excel sheet to maintain our customer and service information which has a lot of limitation and difficulties. To solve the above problem, service centre management software is compulsory because it has the ability to store the data of service information in a centralized database. The software is totally reduced to redundant of customer information and service information. The service centre software helps organization to maintain the customer information securely. In short, this application is the solution for an entire life cycle of service management.

 

 

 Black Book Serial Number  :  

 

Title                      : Cryptography Using Color Substitution

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Vichare Amey Naresh

2.      Sawant Shrihari Vijayanand

3.      Shaikh Imroz Shakeel Ahmed

4.      More Sumit Vijay

Abstract               :  

The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this project, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.

 

 Black Book Serial Number  :  
Title                      : File Transfer Through SMS

 

Guide Name        : Prof. Neelam Phadnis

 

Group Members : 1.      Dete Sheetal Balkrishna

2.      Pandey Mandakini Premprakash

3.      Gadekar Akshay Ananda

4.      Sawant Harita Pradeep

Abstract               : In the last few years, SMS (Short Message Service) has made a big impact on the way we communicate. Instead of communicating over the phone using voice, people rather prefer SMS not only for messaging but also for information exchange. This project proposes a method of building an extendable generic application which can be used to search a file on remote desktop and mail it to user. Mobile users send required information through a SMS to a mobile gateway that forwards it to the generic application. Given the user-provided information, the generic application automatically searches the file on remote machine and mails it to the user. This project is based on the concept of searching a file on remote machine by just sending a simple SMS. The purpose of the project is to search a file on remote machine by just sending a simple SMS and get that file mail it to user if found. The application will be kind of desktop application where it will check for new incoming SMS. The application will first check whether the mobile number through which SMS has been sent is authorized to search the file or not. If not application will send back an acknowledgement saying that user is not authorized to search the file. If the user is authorized, than application will start the file search and if the file is found it will mail it user on the emailed that is received in SMS. While sending SMS user has to send the option, file name, file path (optional) and email id.

 

 Black Book Serial Number  :  
Title                      : Sentiment Analysis for Twitter

 

Guide Name        : Prof. Neha Jain

 

Group Members : 1.      Waghmare Niketan Namdev

2.      Mishra Suryanarayan Ramkrishna

3.      Dubey Prashant Pramod

4.      Chavan Rohan Arun

Abstract               : With the rise of social networking epoch, there has been a surge of user generated content. Micro blogging sites have millions of people sharing their thoughts daily because of its characteristic short and simple manner of expression. We propose and investigate a paradigm to mine the sentiment from a popular real-time micro blogging service, Twitter, where users post real time reactions to and opinions about “everything”. In this paper, we expound a hybrid approach using both corpus based and dictionary based methods to determine the semantic orientation of the opinion words in tweets. A case study is presented to illustrate the use and effectiveness of the proposed system.

 

 Black Book Serial Number  :