Title                      : Android Based Meter-Reading using OCR


Guide Name        : Prof. Madhuri Gedam


Group Members :
  1. Medha Arya
  2. Nikhil Khanna
  3. Chhaya Kulkarni
  4. Deepak Yadav


Abstract               :  

Automatic meter reading is an application designed to automatically collecting consumption, diagnostic, and status data from utility meters (electric, water and gas) and transferring the retrieved data to a central database for billing, troubleshooting, and analyzing etc.

Meter reading is an application that will help you monitor your consumption of e.g. electricity, gas or water. But in fact anything that has a meter can be monitored with Meter Reading. You may have potential savings in your budget if you monitor your consumption and change the way you consume energy.

The application is built essentially to monitor the energy usage and accessing the daily energy data which can result in better energy management. Enabling accurate data stored, analyzed and presented to a customer on demand.

Tracking the real-time consumption on a day to day basis in the most cost effective way to identify energy wastage coupled with analysis, can help both utility providers and customer’s control the use and production of electric energy, gas usage, or water consumption. The Application used in utility meters for collecting the data that’s needed for billing purposes.

Black Book Serial Number  :  
Title Digital Ticketing.
Guide Name Prof. Priti Rumao.
Group Members Ashish Suresh Horambe.

Indrabhan Vijay Bhamare.

Abstract Digital ticketing is a system based on GSM Technology .Digital ticketing would allow railway travels to purchase journey ticket using mobile handset. The ticket request would be send by the traveler using SMS (Short Message Service). The requested ticket will be received by a server system and an appropriate response, will be generated. and would be send using SMS .To accomplish the process of ticket checking the ticket checker would be provided with application wherein the unique code of passenger ticket would be validated.

The passenger first has to register himself via SMS to Digital Ticketing server, wherein passenger’s name would be provided. The passenger has to refill his account balance using voucher coupons through SMS. The request for ticket can be send using SMS to the Digital Ticketing Server which would include number of adults, source station and destination station. The Digital Ticketing system will validate the syntax and balance of requested ticket and would generate appropriate response. If the ticket request is valid then system would send SMS to the passenger containing the passenger name, number of adults, source station, destination station, date and time along with a unique code. To accomplish the process of ticket checking the ticket checker would be provided with application wherein the unique code of passenger ticket would be validated.

Title Sms Based FTP
Guide Name Prof. Anil Chaturvedi
Group Members Nikunj S. Upadhyay, Bhupendra G. Kachadiya, Sujit P. Gevariya, Meet H. Shah
Abstract The exceptional growth of the mobile phone market has motivated the design of new forms of mobile information services. With the growth of Twitter, SMS Gup Shup & other social messaging networks, the past few years have witnessed a growing prevalence of Short Messaging Services(SMS) based applications and services. SMS-based services are also increasingly common in developing regions. Despite the increasing power of mobile devices with the advent of “smart phones”, a significant fraction of mobile devices in developing regions are still simple low-cost devices with limited processing & communication capabilities. Due to combination of social channels available for a non-trivial fraction of the population in developing regions.


For any SMS-based web service, efficient SMS-based search is an essential building block. SMS-based search is a rapidly growing global market with over 12 million subscribers of July 2008. An SMS message is constrained to 140 bytes which drastically limit limits the amount of information in a search response. SMS-based search is also non-interactive due to the search response time; anecdotally, existing SMS-based search engines take on the order of tens of seconds to several minutes per response. Even without the 140-byte SMS size constraint, tailoring traditional web search to mobile devices is a challenging problem due to the small form factor and low bandwidth. Unlike desktop search, users on mobile devices rarely have the luxury of iteratively refining search queries or shifting through pages of results for the information they want. In this project, we address the problem of SMS-based search: how does a mobile user efficiently search the file on the remote machine and get that file on this email.



Black Book Serial Number  
Title Integration Of ERP And CRM In E-Commerce Environment
Guide Name Prof.Aarti Patil
Group Members Saba Balsari, Pankaj Tiwari, Abhishek Singh, Shraddha Painjane
Abstract The aim of this project is to implement an ERP for a Mobile and Electronics dealer which is integrated with CRM in an E-Commerce Environment. ERP for manufacturing, wholesale distribution and retail has been a part of our everyday life for years now. ERP is adopted by many enterprises today. A modern ERP system not only integrates the core internal functions of one company but also integrates to the business network and is accessed by multiple stakeholders, including customers and business partners.

The recent study of the market suggests that many companies are opting for cloud-based modules for the ERP business systems.

Many companies are opting for the cloud implementation of the CRM system to the ERP systems. Although often beneficial, such an implementation should be carefully evaluated based on the Return On Investments (ROI) and on delivering positive returns.

In this system to make it more efficient by adding few features:

1)      A concept of ETL (The process of extracting data from source systems and bringing it into the data warehouse is commonly called ETL, which stands for extraction, transformation, and loading.) will be implemented, where data from heterogeneous places can be extracted.

2)      All the Data will be maintained in the MySQL and Cloud Storage will also be implemented. The data maintained will be time variant.

3)      Implementation of opinion mining concept in CRM (For eg. To check whether the customer feedbacks are positive, negative or neutral).


Black Book Serial Number  
Title Health  Proactive
Guide Name Prof. Anil Chaturvedi
Group Members Ronak Merai,Himanshu Rai,Abhishek Mishra,Pranav Rathod
Abstract The mission of our project is to organize the Health information and make it universally accessible and useful. Health information is very fragmented today, and we think we can help.  We believe the Internet can help users get access to their health information and help people make more empowered and informed health decisions. People go to web sites like Google to search for health information, so why don’t we make facility available directly.

This type of idea is rarely used in India, so our project might help in major extinct especially in Insurance sector, where the patient is tested rather  to test him or trusting the patient they can easily retried the previous history of patient from this  application Saving medical information in one secure location helps you and your doctors have accurate and up-to-date information about your health when you need it the most. This in turn means that your medical treatments may be safer and more effective. You can also use Health Pro to access a host of online services and tools that can help you better manage your Health Pro offers a single location to consolidate and store your medical records and personal health information. It provides the means for computerized collection, organization and retrieval of the data.

The most important aspect of the system is the quality and the experience it gives to the user. The System is connected with the Medical database, is an excellent information retrieval system and has a carefully designed content format and classification structure.

Health pro can be defined as the mobilization of healthcare information electronically across various users within a region or community. Health Pro provides the capability to electronically move clinical information between disparate users say a doctor or a patient while maintaining the meaning of the information being exchanged.


Black Book Serial Number  
Title  Travel Mate
Guide Name Prof. Saurabh Suman
Group Members Sonali R. Chonkar ,Nikeeta A. Kolte ,Madhuri V. Sangle
Abstract The language barrier among tourists was one of the major difficulties when travelling. The tourists can rely on mobile phone for travelling purposes. Mobile dictionary is used for word search for a better travelling guide. Android platform has gained popularity in recent years in terms of market share and number of available applications.

Android makes it easier for consumers to get and use new content and applications on their Smart phones. This project aims to develop an Android-platform based text translation application that is able to recognize the text present on signboard images taken with a mobile phone camera, translate the text from Marathi to English, and display the translation result back onto the screen of the mobile phone. This application is useful

for native Tourists and Travelers who possess Android Smart phones. It enables Travelers and Tourists to easily capture the native country language Books pages, signboards, banners and hotel menus etc. The built-in OCR converts the text.

Embedded in the captured image into Unicode text format. It also provides translation facility so that Tourists can translate the Native Language Unicode text into their own country language. This Application has an advanced search feature so that recognized as well as translated text can be used to copy, paste, share and search for travel related queries like museums, places, restaurants, books, culture, hotels, etc. There is no remote computing overhead because the application has built in OCR suite as well as Image Processing suite both installed in the Android device. It provides fast, robust and extremely high Quality performance because of having improved Auto focus behavior, continuous dynamic preview and improved noise tolerance feature.

Black Book Serial Number  
Title  Code Injection And Prevention Approach
Guide Name Prof. Saurabh Suman
Group Members Nikita D. Ghavali,Avinash V. Khandekar,Pooja R. Patil
Abstract Along with the explosive growth of information, the attack to relevant data has also increased. Many different performance enhancement techniques were developed, but they didn’t meet the actual requirement of the users in terms of security. Hence to overcome these existing systems drawback we have investigated the user requirements to secure the data at every possible stage and we developed the new technique called “CODE INJECTION AND PREVENTION APPROACH”. In this approach code injection attacks can be prevented by virtual splitting of memory. It is based on Harvard Architecture. Also, the tracking facility enables the administrator to detect the intruder with their IP address, system name, path, location etc. It allows the administrator to take necessary action on the intruder
Black Book Serial Number  
Title  Industrial Resource Planning & Accounting System
Guide Name Prof. Reena Ostwal
Group Members Rahul Palav,  Dipesh Loke, Vatshal Makawana
Abstract The use of IRPAS software popularity with a great majority of various types of businesses. Compare to traditional methods of manually taking down records and counting stocks and issuing and receiving products and maintain inventory and other resources, IRPAS software is miles away in terms of speed, accuracy and dependability.

Usually, items moved as stocks for transfer are recorded in the database using the IRPAS software. Since it is software based, enormous amounts of data can he inputted depending on the preference of the managers or user the biter lace. The software is usually linked to the accounting system; it automatically reflects and updates the data. By using the software, one is able to know exactly the amount of stocks are available, what stocks are lacking and details for each and every transaction made for the stocks moves.

IRPAS system have options to maintain products, customer, customer order, purchase order, payment receive from customer, payment to supplier, issuing and receiving of stocks, transfer stocks from one warehouse to another warehouse, generating various inventory and other resources related reports.

Black Book Serial Number  
Title Student Attendance and Tracking Using RFID
Guide Name Prof. Reena Ostwal
Group Members Puskar B.Jha Sumit Nagotkar
Abstract In day-today lives there are different types of identification system are present For the detection of Animals, students, products and also for transportation. The system like Barcode system, Smart-card and Bin-metric technology are present. As compare to them RFID is faster than barcode and smart card system and cheaper than hio-metric system, Hence we preferred to the R RD for our Project. Our project is Monitoring of Student using RFID. RFID stands for Radio Frequency Identification and Detection_ In this we are using RFID reader and RFID chips. Reader is located on fixed location sends signal to RFID chip detected in range of reader. Chip re-transmits the acknowledgement signal with its unique Identifier code, hence chip is identified. Also, a single reader can identify many no of chips in very short period of time. So, we arc using these properties of RFID reader and tag to monitor the student.

The project focuses on automation of tasks regarding academia and concerning the student’s physical presence within the campus area e.g. class attendance, examination/student authentication etc. The intended automation is to be achieved using Radio-frequency identification (RFID) using radio frequency identification chips having unique identification and their scanners/antennas. All the data collected by the above mentioned method will be stored for further processing eliminating the possibility of human element in keeping a track of student’s physical presence.

Student’s id with complete details will be created in the system REID tag will be assigned to the each students. When student entered in classroom or in other place of the college campus along with Id i.e. RFID tag gets monitored by the RFID reader RFID reader will fetch the details from card search for the student assigned to that tag an make an entry in for check in or check out.

Black Book Serial Number  
Title Mobile PC Explorer
Guide Name Prof. Manish Belande
Group Members Samir Deshpande
Abstract The mobile revolution is under everybody eyes. The epidemic diffusion of smart phones has moved the Web and all sort of popular applications from our desks to our pockets. It has also allowed the raise of new ubiquitously available, location based applications, no longer being driven solely by humans typing on keyboards but, increasingly, by sensors. This new scenario clearly offers unprecedented potentialities for entertainment applications.

Nowadays it is common practice to handle any type of _le with the personal computer. Yet, smartphones still suffers from some limitations such as, for instance, a limited memory for data storage.

The aim of the application is to provide smartphone users with a virtually infinite mass storage. This _le manager presents _les located on remote servers – as they were available on a local directory. Users will hence be allowed to use the Internet connectivity on their smartphones to automatically retrieve _les and use them any time a user needs them. To speed up the transfer process in download, use of 3G internet can be made.

Black Book Serial Number  
Title Firewall For Mobile Phone
Guide Name Prof. Gayatri Dantal
Group Members Karishma Kalawatia Rupali Path] Prajna Kalmady
Abstract In this project, we are trying to find solutions to the security risks in mobile phones, GI’RS technology, With the help of firewall, the threat to the system will be prevented to a fairly large extent. With the introduction of 30 technologies and use of mobile phones payments and other financial and legal matters this technology assumes a great importance in the coming era.

Firewalls will prevent attacks from the network, protect user during the internet connectivity and downloading applications from the internet. Furthermore, personal firewall shall support standard mobile phone specific functions. One of the greatest advantages with implementing personal firewall is that it will keep the mobile phone protected during internet connectivity. Thus, we aim at designing a methodology to prevent unauthorized access through GPRS.

A mobile firewall is a hardware and software system that is designed to protect wireless communication networks from unauthorized access and use_ The whole system works when it is used connectively and if the mobile node, the firewall hardware and software system, and the network itself are present and operational. The mobile communications firewall system is made and designed to safeguard the network’s system together with all of the mobile clients or subscribers that make use of the services offered by the network. The firewall system is designed to ensure that no unauthorized access will be allowed to pass through the mobile communication system.

Firewall on the mobile phone shall prevent attacks from the network, protect user during the GPRS connectivity. Sites that might include insecure content will be blocked and firewall shall broadcast a warning message. Thus with the use of firewall mechanism user will be able to access only those IP addresses that are safe and essential.

Black Book Serial Number  
Title SMS Secure
Guide Name Prof. Manish Bhelande
Group Members Bhagyashree Bhati Vibha Bhatt Mrunal Bhogte Silkesha Kadam
Abstract With the global increase in the usage of mobile phones as millions of people own a mobile phone these days, there is a rapid growth in the use of its allied services. One such allied service is SMS, short message service. Short message service (SMS) is a very popular and easy to use communications technology for mobile phone devices. Originally, this service was not designed to transmit secured data. so the security was not an important issue during its design. Yet today. it is sometimes used to exchange sensitive information between communicating parties. So security for SMS is crucial issue these days.

We have concentrated on its security with encryption and compression. When sensitive information is exchanged using SMS, it is crucial to protect the content from the eavesdropper as well as ensuring that the message is sent to the legitimate user. Therefore our app encrypts the content in the SMS using robust algorithm, and sends the SMS. The next aspect focuses on compression.

Black Book Serial Number  :  
Title Comparative study of AODV DSR & DSDR Protocol
Guide Name Prof. Madhuri Gedam
Group Members Shanbhag Tanvi Krishna,  Ropewala Ahemadhussain Afzal,  Shah Dhruv Harshad
Abstract Now a day’s there is lot of growing interest and penetration in the wireless technologies and hence various new challenges are been faced in order to develop the wireless networks. In wired medium proper guidance is given to the flow of the data, but it is not able to provide the flexibility related to the data transfer and the hardware and software requirement for the purpose of the communication these parameters can be easily maintained and managed in the wireless Traditionally available protocol architecture’s follow strict layering principles, which ensures interoperability, fast development, and efficient implementations. However, lack of coordination between layers limits the performance of such architectures due to specific challenges posed by wireless nature of the transmission links.

A Wireless Distributed System (WDS) appears to be a promising approach to resolving critical networking limitations prevalent in centralized wireless topology. Information is routed to intermediary nodes to reach its destination. In a WSD there are much possible route that a packet may traverse. An efficient way to remove congestion is to efficiently rote packets to the network maze. Hence, routing protocols must be carefully designed to maximum network efficiency.

In this project we have analyzed and compared three routing protocols i.e. AODV, DSR, DSDV implemented in ns-2. The protocols are simulated in a wireless environment with routing protocols, number of nodes mobility as varying parameters. Routing is the task of directing data packets from a source node to a given destination. The On-demand protocol performs better than the table-driven protocol. We investigated the performance metrics namely Packet Delivery Ratio (PDR), Average end-to-end delay and throughput by varying network size up to 50 nodes through NS-2 simulation. The performance of protocol is one of the interesting issue.

Black Book Serial Number  
Title Mouse navigation through eye gesture
Guide Name Prof. Madhuri Gedam
Group Members Shah Aakash  Vipul, Kawali Vihang Sudhir, Suram Pooja
Abstract Technology is advancing at a rapid pace, automating many everyday chores in the process. Information technology (IT) is changing the way we perform work and providing society with a multitude of entertainment options. Unfortunately, in the past designers of many software systems have not considered the disabled as active users of technology, and thus this significant part of the world population has often been neglected. A change in this mindset has been emerging in recent years, however, as private-sector organizations and governments have started to realize that including this user group is not only profitable, but also beneficial to society as a whole. This paper introduces an alternative method to the traditional mouse input device, using a modified Lucas-Kanade optic1al-flow algorithm for tracking head movements, and speech recognition to activate mouse buttons. Head Tracking technology is an alternative to the mouse that allows the person control over the movement of the cursor by using only the movement of his head. We present a simple prototype system for real time tracking of a human head. This system uses a simple yet an effective face tracking algorithm. The general requirements of a real time tracking algorithm – it should be computationally inexpensive, should possess the ability to perform in different environments and should be able to start and initialize itself with minimum knowledge about the environment, are well addressed by the elliptical head tracking algorithm.

The objective of this project is to create an alternative user interface uniquely using real time video of the user’s face captured using an off-the-shelf web-camera.The position of the head is tracked and converted into two-dimensional coordinates on a computer screen; additionally, it is intended to enable the recognition of a deliberate blink in order that this could be considered as a command from a user.

Black Book Serial Number  
Title Image Steganography
Guide Name Prof. Madhuri Gedam
Group Members Tiwari Alka Lalchand, More Ashwini Chandrakant, Sawant Meghana Kamlakar
Abstract One of the reasons that the intruders can be successful is, if the information they acquire from a system is in a form that they can read and comprehend. The two popular ways to send vital information are cryptography and steganography. Plainly visible encrypted messages, no matter how unbreakable, will arouse interest of the intruders. Steganography helps in

concealing the encrypted message into a carrier medium, to avoid intruder’s interest. One of the major challenges in cryptography is key sharing and in steganography is to assure message integrity. This paper focuses on implementation of an application where message is encrypted using Advance Encryption Standard (AES), the most popular symmetric encryption algorithm and is then concealed in an image file using Least Significant Bit (LSB) insertion approach that provides a high degree of visual quality and a large amount of capacity for the concealed data. In this implementation, the application will derive a symmetric key, derived from carrier image and the message integrity is assured by validating the cryptographic hash function SHA-256.This implementation used by a novice computer user.

Black Book Serial Number 3


Title Unified Web Service
Guide Name Prof. Saurabh Suman
Group Members Sudarshan Shankar, Ashutosh Vaidya, Durgesh Yadav
Abstract The rapid growth of the web in the last decade makes it the largest publicly accessible data source in the world. There are several websites which allows user to post reviews on particular product or service. Customers also want to know the opinions of existing users before they use a service or purchase a product; even businesses want to find public or consumer opinions about their product and services. Hence there is need to do automatic feature based opinion mining for buyer to take smart decision. However, since the polarity of features is varied according to domain the task of feature based summary is challenging itself. This paper presents an approach for mining online user reviews to generate feature-based sentiment analysis that can guide a user in making an online purchase.

In this work, feature based sentiment analysis on car domain is presented. In which features are extracted using domain ontology, then by using the feature description table the features are classified into positive and negative polarity. Since the polarity of each feature is varied according to the domain. The outcome of the system is a set of reviews organized by their degree of positivity and negativity based on each feature. The system helps to reduce the manual effort of evaluating reviews according to features in which user is interested. The polarity obtained for each feature from our approach is with good average accuracy.


Black Book Serial Number  
Title Advanced Library Management and Administration System
Guide Name Prof. Madhuri Gedam
Group Members Ninad Patil, Israf Phansopkar, Shaihan Asi
Abstract Generally Library Management Systems are often seen in many libraries, but those are like maintaining a database of books and members who have issued books. Our system is a web based server application where student makes a login by scanning a barcode, and get his/her homepage where he can view all the books which are available in the library or anywhere on internet, if the book is not in  library student can also get it by our software. Members can also suggest a publication to the library. Our system will provide three types of application, namely, for admin, for library staff and library members. The admin will manage the entire system if the library, the infrastructure of the library, the database of the library users. The library members can view the list of books that will be available in the library and can also make a web search, and can recommend the library if any book is not available in the library.
Black Book Serial Number  
Title E-Voting System
Guide Name Prof. Anil Chaturvedi
Group Members Dheeraj Yadav , Anil Vairagi ,Suraj Singh ,Deepak Yadav
Abstract The foundation of a strong democracy is an informed and engaged citizenry. And so what is the better way to both inform and engaged citizen through the power of today’s information and communication technologies? Citizen around the world recognize and embrace the benefits of e-government services such as online tax filling, license renewal, and benefits claims etc.

Now government are initiating strategies that support e-democracy, engaging more citizens in democratic processes. This addresses the highly formal processes of e-democracy in particular e-voting to offer governments and democratic based entities worldwide the infrastructures, applications and services necessary to implement and manage reliable and secure e-voting systems.

This project is based on an E-voting scheme based on mobile technology that integrates an electronic voting scheme with the mobile infrastructure. Because of this we are able to exploit existing secure mobile authentication mechanism and provide enhanced voter authentication and mobility while maintaining voter privacy. E-voting systems have the potential to improve traditional voting procedures by providing added convenience and flexibility to the voter.

Black Book Serial Number  
Title Intrawork Institute System
Guide Name Prof. Anil Chaturvedi
Group Members Parvez Khan, Parth Parikh, Tinesh Janavalekar
Abstract The motive of this project is to develop an Intranet web server which makes the user to use the functions such as receiving the result and notification mail through the server. The users are provided with the environment of user friendly GUI, which helps the users to access of functions easily.

The web server which develops first starts with the welcome page and the page prompts the user to sign in for verification and validation.

The facilitate of displayer to easy understand of the matter and it can be made more efficient by making the message to scroll from right to left thereby creating a sense of a continuous message being displayed to the staff or students.

This application demonstrates the use of a P89V51RD2 40-pin microcontroller to control a 7-row by 64-column multiplexed moving message LED display. Because of the number of LEDs (448), a microcontroller or microprocessor with external RAM buffered and clocked out a leisurely place by moving some pointers around. A 6-character message buffered this way requires a minimum of 378 bytes of RAM storage. It is possible, however  to display a message of reasonable length using only the   P89V51RD2 internal register space., if the message is kept in ASCII and decoded in real time. By keeping the message in ASCII form, a 63-character message can be stored in only 63 register locations.

The real time constraints are severe: fetching and decoding the ASCII characters column by column, then clocking out a 63-bit serial data stream 250 times per second. This application note demonstrates that the AT does just that, while producing a flicker-free display using a modest 8-MHz oscillator frequency.

Black Book Serial Number  
Title Virtual Snake
Guide Name Prof.Saurabh Suman
Group Members Farahan Shaikh,Sunil Yadav,Jay Mehta
Abstract In today’s world confidentiality and privacy is one of the most required element. Keeping the things confidential is important for a business to perform well and uniquely. This also includes the privacy for ones way of doing something. When talking about learning, it is one most the rising steps to success. Education in today’s world is not a for free, it comes at a price. We have many educational videos on net that help us in various ways. But what about lectures from some of the best known managers. One pays thousands of money to see the lectures on the internet.

Nowadays, internet hacking and intrusion has advanced to such a level that it should be seen as a threat. One can see the priced lectures the you have delivered for free using such methods. Protection is needed for such videos.

This is the main purpose of the project is to stand between the intruder and the provider so that the thief cannot steal the property on the internet. The secured video streaming provides the providers confidence to publish their videos and only authorized person is able to see it.

On the other hand, one of the most used technologies today is mobile technology. Streaming videos on mobile phones and providing security is the purpose of the project. The project provides the user to use the latest used technologies in a secured way, where the data provided to them and by them will be secured. This way the user as well as provider will provide you with what you need without any hesitation.

Black Book Serial Number  
Title Interglot.
Guide Name Prof. Saurabh Suman.
Group Members Nisha Dusad , Komal Sign , Akash Kumar.
Abstract The motivation for every location based information system is: “To assist with the exact information, at right place in real time with personalized setup and location sensitiveness”. In this era people are dealing with palmtops and Android, which are going to replace the bulky desktop even for computational purpose. There are vast number of application and usage where a person sitting on a roadside café needs to get relevant data and information. Location based service take advantage of user location and provides mobile users with a unique style of resource and service. Nowadays more and more location based application and service providers use the locations information. As location proof plays a critical role in enabling these applications, they are location sensitive. The common theme across these applications is that they offer a reward or benefit to user locating theme in a certain geographical location. But the user wants their location to be pointed. There are many kind of location-sensitive applications. One category is location based access control. Such needs can only be catered with the help of LBS. A very appealing application  includes surveillance where instant information is needed to decide if the people being monitored are any real threat are an erroneous  target. There is a need to import them on mobile devices. It is must to ensure that a person when visiting places need not carry the travel guides with him. All the information must be available in his mobile device and also in user customized format.
Black Book Serial Number  
Title SLRTCE Android Application
Guide Name Prof. Saurabh Suman
Group Members Bharat Choudhary, Hitesh Bajoria, Ronak Desai, Shivkumar Jaiswal
Abstract SLRTCE Android Application is for enabling convenient as well as on-demand network access to college resources that can be quickly provisioned and released with minimum management efforts. In today’s world widely use of internet. In this internet world all the things are online. Everyone is connected to everyone else via an application. Thus, in order to reach out the students in a better way we have created an application for our college. This project main aim is make the college resources available to affiliated student’s and guests to the college with minimal effort.

As it is competitive world and very fast world, everything in the universes is to be internet. The client machine can be a simple android device which is readily available in the market. The ability to use resources such as time table, or notice of the college, university papers at one single spot makes the life of a student not only easier and better but also reduces the time required to acquire them separately avoiding then the peril.

The software as a service is provided using android applications. The application provides a better connection between the college and the students and minimizes the friction between the management and student by providing the resources easily through the application.

Black Book Serial Number  
Title Social Networking Site with E-Classified
Guide Name Prof. Reena Ostwal
Group Members Shailesh Yadav, Ajay Kamble, Rajat Singh.
Abstract Social networking site with e-classified (SNSEC) are increasing attracting the attention of academic and industry researchers intrigued by their affordances and reach. This special theme section of the Journal of Computer Mediated Communication brings together scholarship on these emergent phenomena. In this introductory article, wedescribe features of SNSEC and purpose a comprehensive definition. We then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSEC, we discuss the articles in this special section and conclude with considerations for future research.

Social networking- it’s the way the 21st century communicates now.  Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision. Although Social networking is possible in person, especially in the workplace, universities and high schools, it is most popular online. This is because unlike most high school, colleges or workplaces the internet is filled with millions of individuals who are looking to meet other people.

Social networking is mapping and measuring of relationships and flows between people, groups, organization, computers, URLs, and other connected information/knowledge entities. The nodes in network are people and groups while the links show relationship or flows between the nodes.  Social networking provides both a visual and mathematical analysis of human relationships.

Social networking website project itself is huge project comprising various features like profile updating, friends list organization and various other application to enhance the overall look and feel of website. However, in the project I am basically working on two essential feature (PROFILE MANAGEMENT & FRIEND ORGANIZATION).

PROFILE MANAGEMENT module maintain the profile of user like name, lies dislikes hobbies etc.

FRIEND ORGANIZATION module maintain friend list handles request and sends request to other user.

Profile &friends list two key features on social network site. Third is public commenting feature.(Testimonials, Comments The Wall).

This feature allows individuals to comment on their Friends profile. These comment are displayed prominently an visible for anyone who has access to that profile.

Black Book Serial Number  
Title Noise Reduction in Audio Signal using Matlab.
Guide Name Prof. Gayatri Dantal
Group Members Hazika Warsi , Shweta Shah , Mukesh Vishwakarma.
Abstract In this modern era, there has been a lot of development in every field. In the field of technology there arises a great demand of communication .Noise create a lot of disturbance when the communication is more between people from different place. There are various source that provide disturbance in the communication .The occurrence of the noise can be naturally or manually. Noise produce by different source, results in improper communication. These communication can be through Mobile, FM Transistor, Navigation and Television.

This problem of disturbance gives rise to the need of removal of noise from audio communication. From past many years many technique has been introduce to provide good quality communication in mobile system.

Our project focus on amplifying the voice signal by removing the noise present in it using MATLAB. The name MATLAB stand for Matrix laboratory, because the system was design to make matrix computations particularly easy. The MATLAB environment allows the user to manage variables, import and export data, perform calculations, generate plots, and develop and manage files for use with MATLAB. The MATLAB environment is an interactive environment.


Black Book Serial Number  
Title Cloud based Compiler for Android
Guide Name Prof.Anil Chaturvedi
Group Members Akshay Bhujbal, Shrikrishna Pednekar, Dinesh,Gupta
Abstract     Cloud Computing model is for enabling convenient as well as on-demand network access to a shared pool of configurable computing resources that can be quickly provisioned and released with minimum Management efforts. In today’s world widely use of internet. In this internet world all the things are online. So we create software online compiler using cloud. This project main aim is we can easily write program and compile and debug it in online. In this online compiler namely, Online C, C++, java, python compiler using cloud computing which reduces the problem of probability of time, cost. So no need to install separate compiler on each mobile device.

As it is competitive world and very fast world, everything in the universe in is to be internet. The client machine doesn’t having java development kit or any compiler. The ability to use different compilers allows a programmer to pick up the fastest or the most convenient tool to compile the code and remove the errors. The errors/outputs of the code are stored in a more convenient way. Also the trouble of installing the compiler on each computer is avoided.

The software as a service is provided using android application. The services include running java application without installing java API in our mobile and just by getting interacted with server. Also the remote system which are connected with cloud server can be controlled from any system. Nobody can share the provided service with other and abuse the services by sending false message.


Black Book Serial Number


Title Student Performance Evaluation
Guide Name Prof.Gayatri Dantal
Group Members Mihir Mistry,Shweta Tripathi,Anvay Nevrekar
Abstract  Predicting students’ academic performance has long been an important research topic in many academic disciplines. The present study is the first study that develops and compares four types of mathematical models to predict student academic performance in engineering dynamics – a high-enrollment, high-impact, and core course that many engineering undergraduates are required to take. The inputs (i.e., predictor variable) of the models include student’s cumulative GPA, grades earned in four pre-requisite courses (statics, calculus I, calculus II, and physics), and scores on three dynamics mid-term exams (i.e., the exams given to students during the semester and before the final exam).

The analysis reveals that the type of mathematical model has only a slight effect on the average prediction accuracy (APA, which indicates on average how well a model predicts the final exam scores of all students in the dynamics course) and on the percentage of accurate predictions (PAP, which is calculated as the number of accurate predictions divided by the total number of predictions).

The research findings from the present study imply that if the goal of the instructor is to predict the average academic performance of his/her dynamics class as a whole, the instructor should choose the simplest mathematical model, which is the multiple linear regression model, with student’s cumulative GPA as the only predictor variable. Adding more predictor variables does not help improve the average predictor accuracy of any mathematical model. However, if the goal of the instructor is to predict the academic performance of individual students, the instructor should use the support vector machine model with the first six predictor variables as the inputs of the model, because this particular predictor combination increases the percentage of accurate predictions, and most importantly, allow sufficient time for the instructor to implement subsequent educational interventions to improve student learning.

Black Book Serial Number  
Title Share My Ride
Guide Name Prof. Anil Chaturvedi
Group Members Vivek Bhushan Das,Tanmoy Dhang,Ankit Gupta
Abstract Many carpool and ride-sharing have been proposed and even developed in the previous decades, but rarely have been able to attain a global user base, at least not up until recently. That was mostly because many of them were not initially designed as scalable, leaving their users with a sub-par user experiences as their mobile or desktop client reach was not ubiquitous enough, leaving them available only to small portion of mobile client devices and/or desktop browsers. This paper describes the design concepts, distribution and ride sharing solution could follow, making it very scalable and ubiquitous enough to successfully reach and serve global user base.

They are many problems of great concern that exits in the world today. One major problem affecting our society is air pollution, caused by automobiles. Solutions are required to help reduced and controlled the emissions caused by gas-fuelled automobiles. An effective way to decrease such emissions is through a developing a carpool system. This enable a group a people to share daily driving times and expenses and intern help reduced air pollution by decreasing the number of automobiles travelling on road ways. Another way of reducing air pollution is to eliminate traffic jams. If travel paths of carpool members were known then this information could indicate congestion points and thus be used to better plan new road ways or even improve current road ways. To implement both solutions web based carpool system was designed. This system allows registered members to perform a search that enables them to create a carpool group. The carpool system also enables the administrator to access database information belonging to each member and perform an analysis that provides traffic flow details about all carpool members.

The objective of the project is to present a web based which provide a communication platform between car owners and passengers. Car owners will be able to post a  notice announcing that is he has been travelling between some particular location regularly or just once to search a travel mate In order to reduce to

The ride costs.

Black Book Serial Number  
Title Product Search Engine
Guide Name Prof. Saurabh Suman
Group Members Jameel Kahan, Vishal Singh, Kalpesh Kadam, Shilpa Daware
Abstract A web search engine is a software system that is designed to search for information on the World Wide Web. The search result are generally presented in a line of results often referred to as search engine results pages (SERps). The information may be a mix a pages, images, and others types of files. Some search engines also mine data available in database or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on web crawler.

Product search engines allow you to search specifically for products for sale from online merchants. They typically provide features different form regular search engines such as price sorting, showing product availability and merchant ratings. Unlike regular search engines, most shopping search engines charge merchant to be included in their listings. If merchants don’t play, they don’t appear – and searchers might miss out on findings the rights bargains.

Google runs Google shopping, which allows for dedicated product search, and it also surface some product search results within regular Google searches. Google shopping shifted to an all-advertising format in 2012, reversing a strong stance Google had previously taken against that practice.

Black Book Serial Number  
Title Bus Ticketing application using Near Field Communication
Guide Name Prof. Madhuri Gedam
Group Members Kunal Datta, Dhruti Desai, Shraddha Tiwari
Abstract The project is implemented using NFC technology. This project suggest building a NFC system that can identify passengers in public transport as well as does all accounting purpose related to travelling expenses. Automated accounting of public transport can be used to provide useful estimates of the cost of travelling from one bus stop to another as well as the crowd density can be measured inside the public transport. But in case of India measuring crowd density is of no use. Near Field communication (NFC) tags has been proposed to use in this project.

Public would carry NFC cards with them. As soon as they enter into bus they have to show NFC card to the conductor. The conductor will read the NFC tag by using his NFC based Android cell phone. The cost will be automatically deducted according to distance travelled.

Black Book Serial Number  
Title Mitigation Of Sql Injection Attack
Guide Name Prof. Madhuri Grdam
Group Members Rahul.K.Oza , Shaikh Mohd Tanveer
Abstract Web application have been playing a critical role in many areas such as financial transactions, commercial business, cyber community services. The ability to access the web anywhere and anytime is great a advantage; however, as the web becomes more popular, web attacks are increasing. Web applications usually take inputs from users through form fields, cookies, or some other standard channels and use these input data in further processing operations, such as querying databases, generating web pages, or executing commands. Because the input data are from the remote user and may contain malicious values, they need to be validated before use. Once a web application fails to do so, attacks can exploit the vulnerabilities to launch particular attacks. Examples of popular input validation attacks are SQL injections, cross site scripting, and command injections. These attacks can cause many serious problems, such as leak of sensitive information and corruption of critical data.

The aim of developing the system is to ensure a high security environment before execution of any transaction which would enable safe environment for business and reliability of using the application. It improve security standard thereby reducing the vulnerability enabling a safe and secure environment for business. The system developed would provide reliability along with safety for the web application users. Ensure high security in transactions. Create safe environment for business. Improve reliability of the application.

Black Book Serial Number  


Title Cafeteria Online Ordering System
Guide Name Prof. Deepali Patil
Group Members Advait Joshi, Bhumit Patil, Deepak Yadav, Jayesh Pandey
Abstract The challenges encountered by the existing system serve as a major drawback to the realization of efficiency and student satisfaction. The experience of ordering in most cafeterias is not pleasant for the students. . So what we propose is a online ordering system for the cafeteria of the college which will greatly simplify the ordering process between the students and the café. When the student visits the ordering application, they have to register and will be provided with login ID & password. They are then presented with an interactive and up-to-date menu, complete with all available options and dynamically adjusting prices based on the selected options. After making a selection, the item is then added to their order, which the student can review the details of at any time before checking out. This provides instant visual confirmation of what was selected and ensures that items in the order are, in fact, what was intended. This system also greatly lightens the load on the cafeteria’s end, as the entire process of taking orders is automated. Once an order is placed on the application, it is entered into the database and then retrieved, in pretty much real-time, by a desktop application on the restaurant’s end. Within this application, all items in the order are displayed along with the unique order no. provided to the student in a concise and easy to read manner. This allows cafeteria employees to quickly go through the orders as they are placed and produce the necessary items to the respected student with minimal delay and confusion.
Black Book Serial Number 1
Title SLRTCE Placement Application
Guide Name Prof. Madhuri Gedam
Group Members Pandey Sarita Beerchand, Vadhaiya Vaibhavi Narendra
Abstract It has been observed that there is no particular application for the placement cell of SLRTCE. So we thought of an application that could help the management as well as students to be updated with the placement information.

The main purpose of this application is to manage, inform as well as keep the track of the companies coming in SLRTCE. It has three main aspects: 1.Students android application 2.Webpage for the TPO/Admin 3.Database handling on the server side. Android application features will include students personal account asking to upload its details along with the resume. They would be provided with the notifications of any company coming to SLRTCE and can apply for the same in just one click. The admin panel will input the news about upcoming companies including eligibility criteria and every detail. It will keep the record of the students applied for the company and get all the details of the particular student. The database server would consist of the students personal details, recruitment details, etc. Notification would be sent only to those students who are eligible to apply for the company.

Future Scope: There will be an option for the student to apply for the mock aptitude test sessions and the record for the same will be maintained by the admin. The time schedule of the lectures conducted for the aptitude sessions will be provided and the attendance will be maintained for the same by the Admin.

Black Book Serial Number 15
Title NFC based Attendence Monitoring System
Guide Name Prof. Anil Chaturvedi
Group Members Akshata Sagwekar, Sanika Raul, Vishal Pandey
Abstract NFC Based Attendance System deals with the maintenance of student’s attendance details using NFC Sensors. Near Field Communication (NFC) is one of the most emerging technologies in the world. NFC cards would be implemented around different classrooms of the campus on which the students just have to tap their NFC enabled smartphones or NFC tags to mark their attendance. A simple tap would be enough for the students to get their

attendance and the attendance record would be automatically generated by the system. As this is an automated computerized system there are very less or negligible scope of mistakes in the record of the system. The most interesting part of this system is that the faculty members can share their notes with the students through these sensors. With one tap on the NFC card the files can be directly transferred into the student’s smartphone within a second, this is due

to high speed transmission rate of the NFC cards.

Black Book Serial Number 11
Title Advance 3D Game Using UNITY 5
Guide Name Prof. Madhuri Gedam
Group Members Abhijit Sathe, Rahil Hussain Shaikh, Saifin Prasla, Ketan Vanara
Abstract Gaming sector today is growing four times faster than other industries and with each game earning millions of dollars making gaming industry of worth $55 billion in 2015 alone .With this boost in gaming sector there has also been advancement of gaming developing software with Unity 5 being the latest and one of the most advanced software for development of PC games. Unity 5 is the new edition of the best development platform for creating 2D/3D games and interactive experiences Unity 5 brings you awesome new artistic power. Improved efficiency makes the hard work smoother and more fun, and with the industry’s most comprehensive multiplatform support.Unity 5 supports JavaScript and C# for programing and implementing the graphics of game.

The aim of this project is to develop a Survival game which will be based on a fiction story that will consist of a virtual environment which will be viewed by the user as First Person View. First-person shooters are a type of three-dimensional shooter game featuring a first-person point of view with which the player sees the action through the eyes of the player character. The purpose of this game is first to benefit all the users by boosting their abilities to greater vision, mental rotation and task-switching. The user will be able to interact with the environment, game will consist of various obstacles, BOTS and Levels. The difficulty level at each level will higher than the previous level. The Game will also be uploaded so any one will be able to download and play the game.

Black Book Serial Number 12
Title All in One Compiler
Guide Name Prof. Reena Kothari
Group Members Aakanksha Bhatt, Pavankumar Jansali, Amit Redkar, Ankita Singh
Abstract Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. The concept of cloud computing fills a perpetual need of IT: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software.

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. The paper aims to describe an online compiler which helps to reduce the problems of portability and storage space by making use of the concept of cloud computing. The ability to use different compilers allows a programmer to pick up the fastest or the most convenient tool to compile the code and remove the errors. Moreover, a web-based application can be used remotely throughout any network connection and it is platform independent. The errors/outputs of the code are stored in a more convenient way. Also, the trouble of installing the compiler on each computer is avoided. Thus, these advantages make this application ideal for conducting examinations online.

Black Book Serial Number 19
Title Sales and inventory prediction using data mining
Guide Name Prof. Sunil yadav
Group Members Priyanka sonar,Snehal more
Abstract Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed databases isn’t always feasible because merging data sets from different sites incurs huge network communication costs. Local Site also finds a centre site to manage every message exchanged to obtain all globally frequent item sets.. Therefore, the research is to develop a distributed algorithm for geographically distributed data sets that reduces communication costs, superior running efficiency, and stronger scalability than direct application of a sequential algorithm in distributed databases.
Black Book Serial Number 22
Title E- Commerce Web Data Comparator
Guide Name Prof. Madhuri Mam
Group Members Garima Agarwal,Kunal Nayyar,Ankit Hingu
Abstract This application describes a comparator for E-Commerce web application,
which is designed around the concept of Crawler, Yahoo pipes & web page
mash-ups. Here we have proposed a system of conducting E-Commerce,
keeping at the forefront, the customers’ demand for good quality reliable
products while maintaining a profitable and sustainable business model using
Web based latent benefits. We believe this modelled approach has great
potential and can be implemented for start-ups and other ambitious projects as
well. It is a comparator technique to ease the use of the customer, saving his
time and make tedious task easier all at a mouse click. This model will fetch a
product’s price from all the other existing E-Commerce site for the customer to compare the prices and get the best deal.
Black Book Serial Number 14
Title Android Application for Ordering at a Mall’s Food Court
Guide Name Prof.  Sunil Yadav
Group Members Prathmesh Narkar, Nikhil Pujary, Ashlesha Ramteke
Abstract Malls are the latest trend among the young generation and so are the fast foods available at the mall’s food court. A number of fast food joints are occupied throughout serving the orders placed by people wasting their time standing in queues. However this application would list all the food joints present in a particular mall along with their complete menu. Payment could be done online. It would save the consumer’s time in standing in long queues by simply ordering online beforehand. Once registered on the application the consumer could choose for a destination mall. After selecting a mall, the list all the food joints present in there would be displayed. The consumer would then have to select a joint and place an order from the displayed menu. Payment details would be mandatory to complete the transaction. A token no. would be provided to the consumer which he would have to show at the respective food counter to take his/her order.
Black Book Serial Number 23
Title Using association classifier for predictive analysis in health care
Guide Name Prof. Sunil Yadav
Group Members Grijesh patwa, Deepak maurya, piyush singh, suryaprakash Yadav
Abstract Association classifier for predictive analysis is to develop a project which is used to analysis on the data of the patient’s and on the basis of that data the prediction can be done. This is the new technique where we are integrating the two technique which were used earlier for data mining. Those two technique are association rule mining and classification rule mining by combining these two techniques we are developing a new classification Approach .Till now, the association rule mining are used for data mining of descriptive task, such as market basket analysis and the classification rule mining was used for predictive analysis technique that is used to discover a small set of rule in database that focus on accurate classifier. Now, we are using this association classification technique in medical field. We are going to collect the data of patients such as age, smoking habits, BMI, Hypertension, and the predictive analysis will be done on the basis of above data which will show the chances of heart diseases. By using association classification the accuracy of data will be higher than other techniques.
 Black Book Serial Number 21
Title Optical character recognition using Android
Guide Name Prof. Saurabh Suman
Group Members Sanjay singh,ronak Solanki,ankith vishwakarma
Abstract Paper deals with the development of a mobile application that based on Android platform for capturing digital photography and subsequent processing by OCR (Optical Character Recognition) technology.The project aims at using scanning and comparing techniques to identify printed text into a digital format. It reduces the effort of typing the whole documents down to get a digital format of the particular document. The OCR takes image as the input and gets text from that image .This system can be very useful in various applications like banking, legal industry, and home and office automation…etc. In this paper, this method is presented by using android phone with higher quality camera and OCR technology.
 Black Book Serial Number 2
Title Mobile Attendance Evaluation System
Guide Name Prof. Anil Chaturvedi
Group Members Nirbhay Kularia, Ajit Rajpurohit, Niraj Tripathi.
Abstract Mobile Attendance Evaluation System is an Android application to manage student attendance on mobile. In many colleges teachers use to take attendance manually.  Main objective of this project is to add mobility and automation in the existing attendance process. This system helps teachers to take attendance through mobile and also keep in touch with student in some aspect. This System allow teachers to take attendance, edit attendance, view student’s bunks and also helps teachers to inform students about the  events that college is going to organize. Parents and students will be sent SMS alerts. This system gives a prior intimation to student as soon as his attendance goes below the specified attendance deadline in the form of an alert. This system helps students to keep in touch with the events that college is going to organize. This application will help to eliminate most of the paper work.
 Black Book Serial Number 8
Title Expertise Diagnostic System
Guide Name Prof. Saurabh Suman
Group Members Mithilesh Jaiswal, Dhirendra Jha, Niraj Soni
Abstract In every field the amount of data stored and collected is growing at a very rapid pace. In the medical field also like other fields the collection of old data is very important. Even though this information is very important for the treatment of the people for next time, it is rarely used after once the treatment is completed for first time, because of this they work on same type of hypothesis, if these data’s are preserved and used for diagnosis then it may be easy for the doctors to do the diagnosis of the patients, and it may also be possible by analyzing these data’s to come up with some new medical hypothesis or we can say some new ways of treatment and can give the proof of some of the existing hypothesis. For this the data can be preserved or stored in databases and can be retrieved and modified with the data mining
algorithms like test selection, association mining etc. which helps in finding the almost appropriate treatment for the problems from which patients may be
suffering. With the Data mining techniques Artificial Intelligence is also
required which helps in making the system behave as an expert. These systems
with artificial intelligence will be used in future for assisting the doctors their
work and while analyzing do the proper analysis of the subjects and give
appropriate results. Artificial Intelligence techniques like Artificial Neural
Network, Reinforcement Learning etc can be used.
 Black Book Serial Number 4
Title E-Tender Management System
Guide Name Prof. Reena Kothari
Group Members Akash Devbanshi, Rajan Gupta, Anurag Mishra, Jitendra Prajapati
Abstract The E-tender management system is very important things. It is help to save the time, cost and reduce the paper work etc. E- Tender management system helps the users in many ways. E-tender management system is committed to providing smarter way to manage the on line tendering process without wasting the time. In the E-tender management system tender manager can raise the tender and proposal side can bid that tender online, which is helpful for both tender manage as well as proposal side.
E-tender management system can maintain all the tender record that is may raise by the tender manager or bid by the proposal side. E-tender management system will automatically invite and manage submissions. This means the people responsible for procurement can focus on things other than ensuring bids are submitted on time and with the right information.
 Black Book Serial Number 18


Title Web Services On Instant Messaging
Guide Name Prof. Saurabh Suman
Group Members Parmar Hiren Bipin, Patel Jamin Kantilal Manisha, Savli Tejas Nitin
Abstract Today, we access a variety of services via Internet using different platform for each. E-mails, social networking, bill payments, ticket booking, etc. everything has a related web service to it. Even services like updates on a live match score, weather forecast, astrology, emergency services etc. are available as a web service. The main issue here is that they are all discrete services and lacks a communication between them. The aim of this project is to provide a centralized interface to the users for various web services. Instead of visiting different websites each time to access these services, the users can just use this interface. Here, we will develop an interactive centralized interface in the form of an intelligent chat assistant using existing Instant Messaging services. This project will utilize the modern concepts of artificial intelligence to provide the most interactive environment to the user. User’s queries will be recognized based on the semantic analysis rather than using only keywords. This project will provide an easy access to various services and also save the bandwidth that may be used while browsing the services individually. As this project is based on Instant Messaging service, it will minimize the data transfer and maximize the accessing time. In this project whatsapp is used as an Instant Messaging service that will be used as an interface between the intelligent chat assistant and users that will provide different services directly on whatsapp. Most of the major web services like google, facebook, etc. provide an API for the developers to communicate with their services. This project will use these API to bring all services together. But not all services provide an API; hence data mining concepts will be used for such services. This project utilizes existing instant messaging services rather than creating a different service. Hence this project will minimize the access time for various services in an interactive way which will also reduce the data transfer to increase the speed.
 Black Book Serial Number 3
Title Home Automation  for Disabled Person
Guide Name Prof. Saurabh Suman
Group Members Chauhan  Indrajeet Lavkush, Chauhan Karanjeet Indrajeet, Jethwa Vicky Ashok Kumar, Yadav Shashikant Phoolchand
Abstract Advancement of technology has made our life simpler where everything is available at our fingertips. Implementation of home automation using the latest technology gives us more convenience, security and safety. Smartphone affordability increases every year and they have begun to play important roles in our daily life due to its size and portability. People are tending to carry this mobile gadget wherever they go. Google’s Android Operating System (OS) is a leading mobile gadget OS in the market and Android phones are one of the most preferred smartphones.

Controlling home appliances using an Android phone gives users the ability to control the home appliances anywhere, anytime in their home and saves the time spent searching for the remote control unit of home automation systems since the user’s phone is usually kept close at hand. Replacement of home automation system remote control unit with Android phone effectively reduces the number of remote control unit in home and saves on the fabrication cost of remote control unit.

This project presents the design and implementation of a low cost prototype of Bluetooth based home automation system using Android phone. The design is using Arduino Uno board and the home appliances are physically connected to input/output ports of this board via relays. HC-05 is used to establish wireless communication between the Android phone and the Arduino Uno board. An Android application is developed to provide a user friendly graphical user interface (GUI) for remotely controlling on home appliances.

 Black Book Serial Number 5
Title E-Health Care
Guide Name Prof. Saurabh Suman
Group Members Aadke Harshada Madhusudan,Chand Anjali Kailash,Ginde Niteesh Shripad
Abstract In today’s quick lifestyle the health is ignored by the people. The ignorance may be due to time shortage, cost etc. So for such a lifestyle E-healthcare system helps the users in many ways. E-healthcare is committed to providing smarter healthcare system to maintain the patient’s good health without visiting the doctor itself. Booking appointment with or receive health advice from specialized doctors anywhere and anytime. E-healthcare helps you ask health related questions to specialized doctors and get health advice on your fingertips.

E-healthcare maintains all your medical records. E-healthcare ensures you in saving your time and enhances practice. Grow your practice by answering health question asked by users. E-healthcare enables you in managing patients’ contacts, appointments and accessing medical records (quick and paperless). Search for the doctor according to type or location and get the details of the doctor on the screen itself. This system saves your cost of re-visiting the doctor again and again. E-healthcare system provides secured information availability, interoperability and Efficient healthcare delivery.

 Black Book Serial Number 6
Title Online Educational System
Guide Name Prof. Anil Chaturvedi
Group Members Kalu Saifulla Faiyaz ,Pandey Manish Shivkumar, Tiwari Dimple Vinod
Abstract The “Online Education System” proposed by our team has integrated all the possible aspects of an advanced education system which will be beneficial to students not only in present but also in their future. We are proposing the overall design of “Online Education System” for the field of Information Technology Engineering. This system is designed to assist not only the students of Information Technology Department but also the faculty of Information Technology department.

We are trying to eradicate learning of knowledge through practical implementation which will be provided to student through videos. The theoretical knowledge will also be provided to students through books, pdf’s and various such documents.

There is a feature of online certification test which will give the institutional certification to the student who qualifies the minimum passing score and will be certified in the subject specification.

We also have the feature of faculty login where concerned subject faculty can login to solve the doubts of registered students and help them while clearing their concepts. This will enable an easy way of student faculty communication. The faculty can also log in to use our premium feature of question-paper-generator. This feature enables faculty of colleges to generate question papers through a pre–determined format as stated by the administrator of the online education system.

 Black Book Serial Number 7
Title Predictive Analytics: A Step Ahead for Education System
Guide Name Prof.  Sunil Yadav
Group Members Pandey Vishalkumar A., Savaliya Sumita Shanti Bhai, Thanvi Madhuri Radhakishan, Yadav Supriya Mithailal
Abstract Dropout rates for students in correspondence and open courses are on increase. There is a need of analysis of factors causing increase in dropout rate. The discovery of hidden knowledge from the educational data system by the effective process of data mining technology to analyze factors affecting student drop out can lead to a better academic planning and management to reduce students drop out from the course, as well as can generate valuable information for decision making of stake holder to improve the quality of higher educational system. Data mining technique can be used for such analysis and prediction. In this project, we will use real data from study centers like SHREE L. R. TIWARI COLLEGE OF ENGINEERING and data from various sources like university database, survey form, etc. Various steps of mining will be applied on the available data to deduce useful result. Various scenarios will be compared and there accuracy will be calculated. This project presents the work of data mining in predicting the drop out feature of students and analysis of data set using data mining algorithms. After analysis the outcome will be the major factors that affect student dropping out of the open courses the most (dropout rate). Before applying classification algorithms some feature selection algorithms are also used so as to get refined prediction results. Such analysis and prediction information will help college management and teachers to make necessary changes for imparting better education. Mining of useful knowledge can be done by using many other mining techniques like association, clustering.

The educational databases contain hidden information for improvement of students’ performance. Educational data mining is used to study the data available in the educational field and bring out the hidden knowledge from it. This prediction will help to identify the weak students and help them to score better marks and save them from drop. The outcome predicts the number of students who are likely to get drop. The results provide steps to improve the performance of the students who were predicted to fail. After the declaration of the results in the final examination the marks obtained by the students are fed into the system and the results were analyzed for the next session. The comparative analysis of the results states that the prediction has helped the weaker students to improve and brought out betterment in the result.

 Black Book Serial Number 20
 Title Hospicare+
Guide Name Prof. Anil Chaturvedi
Group Members Mishra Anurag Sunil, Momin Alfiya Nisar Ahmed, Patel Khyati Bharat, Purohit Surabhi Praomd
Abstract Hospicare + is an android application to fill the admission form online and book appointments online. In today’s world widely use of internet. In this internet world all the things are online. Everyone is connected to everyone else via an application. The user is able to view the hospitals, doctors, and organize the account by the application downloaded in their android mobiles. Hospicare + will fill admission form online, book appointments, get free health tips, get an emergency prescription and emergency numbers. The users, with their interfaces to the system, are able to view all the features mentioned above. As it is a competitive world and very fast world, everything in the universes is to be internet. The client machine can be a simple android device which is readily available in the market. The users, with their interfaces to the system, are able to view all the features mentioned above. During medication, they are able to set the alarm to let themselves know the timing to take the medicine, and will receive notifications. The software as a service is provided using android applications. The application contains full accountability and logging systems, and supports supervisor actions to account for exceptional circumstances such as providing emergency numbers.
 Black Book Serial Number 9
Title RTO Based Authentication Using NFC
Guide Name Prof. Anil Chaturvedi
Group Members Mane Priti Mohan, Powale Arti Sharad
Abstract The need for manual RTO based systems is completely reduced in this method and the RTO system works through NFC. A complete NFC system consists of a transponder (tag), reader/writer and computer host. The transponder, better known as the tag. The microchip contains memory to store a unique data and to receive and send data back to the reader. These tags are powered by the electromagnetic signal received from a reader. Development in technology bring digital world to be border-less. It’s proven through a developed technology, when trade and transaction can be done not only using real money but also virtual one. Shopping process using virtual money has even more supported by existed Near Field Communication (NFC) device. This particular device works using radio frequency. In the year of 2011, Google was integrating this device into an Android-based cell phone, which made transactions using virtual money gradually developed. The NFC tag is used as a unique identity for account of a particular user. When a vehicle driver caught bay a traffic police, its driver is prompted to scan his NFC tag. If the identity (serial number of the tag) is matched with the one already stored in the system, the historical records of that driver get fetch on a mobile phone. Traffic police can also place a new complaint about that driver. If police placed a new complaint then the fine amount will get deducted from his total balance. After this, the vehicle gets immediate access to drive through. This NFC based RTO system also has some additional features. A new user can register him with the system. Also an old user can recharge his account balance. The amount for recharge can be entered in the system. In beginning, the user is prompted to scan his tag or ID. The serial code of the tags identified by the reader module and is sent for comparison with stored data. If the ID is matched by the microcontroller, the fine amount is deducted from user’s balance and user gets to drive through the area.
 Black Book Serial Number 10
Title Resume Parsing and Standardization
Guide Name Prof. Madhuri Gedam
Group Members Bhat Aishwarya Ram, Gupta Amit Jung Bahadur, Tiwari Sachin Deenanath
Abstract This project deals with the parsing application developed for the resumes

received through emails in multiple formats like doc, docx, pdf, rtf, txt, and html. When a company is giving a requirement and requires the resumes to be sent in mails, the company receives thousands of resumes. The problem persisting here is, it’s very difficult for the

Manager or the concerned authorities to go through each and every parameter of the resume and then select the candidates, for the interview. It’s also a time consuming process. In this project, an attempt is made to develop Web Application to eliminate the above. When the resume is received through emails, it will be parsed as XML code. A user

interface screen will be given where the authority concerned will store the job profile for the particular post. The system will go through all the resumes and shortlist the candidates who are nearly falling under those job profiles and display it to the concerned authority.

 Black Book Serial Number 13



Title YOUSHARE-The Cloud Campus
Guide Name Prof. Reena Kothari
Group Members Sapar Aishwarya Shriniwas, Ghosh Priyanka Hemanta, Makwana Jaikunj Janakbhai
Abstract Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. The project idea is about to provide service of sharing any type of file by simple upload and share. It is a file sharing application. The application provides two services i.e. Shared Drive & My Drive.


Shared Drive is a drive which is shared among all the users of the batch and one can select Shared Drive option at login page to upload and share the data among all the users of same category. The data shared with a class is visible to the whole class and admin too. The Shared Data is verified by the admin before it is shared and admin has the rights to, allow, block and delete permissions of each & every shared file.


My Drive is another facility provided by You Share. My Drive is a personal drive for user where user can upload & store any type of file. User can login from same login page and select my drive option to use this facility. The data uploaded into My Drive or personal drive is not verified with admin and is visible only to the user. You Share facilitates students with a separate and limited space to store and upload data with its own access privileges.

 Black Book Serial Number 16
Title Online Medicine Distribution
Guide Name Prof. Reena Kothari
Group Members Gupta Satish Chhotelal, Pandey Manav Anantdeo
Abstract This project is related to online medicine distribution to medicals. In traditional approach, salesman had to manually go to every medical and collect the order. Using this approach, the cost of the travel and the time for manually doing it is very high. This project will help the distributors to directly contact the shopkeepers and place the order online. The order can be cancelled or altered only 24 hours before the delivery. This will help the distributors reduce the cost and time spent for manually receiving orders from every medical. It will also help keeping a track of every order according to the time of order and the time of delivery.
Black Book Serial Number 17
Title Enhancing student Retention and Success
Guide Name Prof. Deepali Patil
Group Members Shetty siddhi vijay, Rathod jyoti jairam, Pandey priya sunil, Shah mansi kamlesh
Abstract The challenges encountered by the existing system serve as a major drawback to the realization of efficiency and student satisfaction. The experience of ordering in most cafeterias is not pleasant for the students. . So what we propose is a online ordering system for the cafeteria of the college which will greatly simplify the ordering process between the students and the café. When the student visits the ordering application, they have to register and will be provided with login ID & password. They are then presented with an interactive and up-to-date menu, complete with all available options and dynamically adjusting prices based on the selected options. After making a selection, the item is then added to their order, which the student can review the details of at any time before checking out. This provides instant visual confirmation of what was selected and ensures that items in the order are, in fact, what was intended. This system also greatly lightens the load on the cafeteria’s end, as the entire process of taking orders is automated. Once an order is placed on the application, it is entered into the database and then retrieved, in pretty much real-time, by a desktop application on the restaurant’s end. Within this application, all items in the order are displayed along with the unique order no. provided to the student in a concise and easy to read manner. This allows cafeteria employees to quickly go through the orders as they are placed and produce the necessary items to the respected student with minimal delay and confusion.
Black Book Serial Number SLRTCE/IT/Blackbook-1/2016-17
Title :  Fantasy League Team Prediction using Predictive and Classification Analysis
Guide Name: Prof. Deepali A. Patil
Group Members: Soni Hemant Ashok, Jain Hitesh Sureshji, Gupta Asmitkumar Munnalal, Gupta Sanjay Manilal
Abstract :  To solve the problem of loss of interest in Fantasy Cricket over the season, a game-changing strategy was thought of which led to the creation of this idea. Powered by an exhaustive dataset of all cricketer’s statistics of different players of different countries, it seemed exciting to allow the use of Data Mining techniques to forecast future statistics. A points system based on the success of predictions, which in turn allow buying/auctioning better players adds a greater interactive feeling to the existing system.

The best team selection is always the requirement of management of the team for required results. The traditional team selection process is really lengthy and unclear due to manual process and personal judgments. These conflicting constraints and personal judgments can be translated into software for best results.

This paper presents a solution to this problem with the help of data mining algorithms to find the optimal solution for the problem of fantasy cricket team selection and formation. Our approach is the combination of the existing quantitative approaches with some new extensions such as attributes regarding personal performances, team performance of players against the opposition. Secondly our method is just not specific for cricket team but it is converted to generic model for other multiplayer games. We propose an adaptation of different algorithms to optimize the selection of multiplayer sports teams.

Black Book Serial Number : SLRTCE/IT/Blackbook-2/2016-17
Title : Online fake product review and monitoring
Guide Name: Prof. Deepali A. Patil
Group Members Sinha Mohit Manoj, Yadav Sandeep Chandrama, Kesari Dilip Vijay, Bhimani Zaid Sheralli
Abstract : Although the prevalence of fake online reviews for products and services is deemed to have become an epidemic, little is  known about the strategies used to  write such bogus entries. Hence, this paper conducts an exploratory study to understand the process by which fake reviews are written. Participants were invited to write fake reviews for hotels in a research setting. Thereafter, they were asked to answer a questionnaire which solicited qualitative responses about their strategies.  Results  indicate  that  the  process  of  writing  fake reviews commences with extensive information gathering via common review websites such as TripAdvisor as well as search engines such as Google. The gathered information is then used as cues to write short, catchy and succinct fake review titles, as well as informative and subjective fake review descriptions. Adequate efforts are generally invested to blur the lines between fake reviews and authentic entries.
Black Book Serial Number: SLRTCE/IT/Blackbook-3/2016-17
Title : Gear up your academic excellence
Guide Name: Prof. Saurabh Suman
Group Members Gaonkar Omkar Ramdas, Mishra Manisha Ranjit, Ghavali Shraddha Dattatray, Dalvi Pallavi Yashwant
Abstract : With an advancement of brain computer interface (BCI), human mind control devices are getting common. In this paper an attention level indicator was proposed in aid to monitor one’s attention level. Neurosky Mindwave Headset was used to acquire brainwave attention signals. Neurosky EEG Headset was used to record and store the brainwave signals into the computer. This paper is proposed to help the students improve their academic skills by guiding them the right way. Student’s library history database was maintained in order to keep a track of one’s referred books.  This maintained database from library was used as the second input command. The Students grades were also considered in order to check the academic strength of the student. This maintained database was used as the third input command. These three input commands were then sent through HADOOP for further processing. HADOOP provides a distributed file system (HDFS) that stores data on the compute nodes, providing very high aggregate bandwidth across the cluster. It also provide a Map/Reduce, it is a programming paradigm that was made popular by Google where in a task is divided into small portions and distributed to a large number of nodes for processing (map), and the results are then summarized in to the final answer (reduce). The last part of the project is to provide the student with the final answer as per how to improve the academics. HADOOP processing considers the three input commands and summarizes the subject of interest of the student. The aim of the project is to activate the external device and collect the extract the attention level signals of the students and consider his grades and library history records and give suggestions to the students in order to gear up his academics.
Black Book Serial Number: SLRTCE/IT/Blackbook-4/2016-17
Title : Smart Reminder using GSM
Guide Name: Prof. Saurabh Suman
Group Members Pandey Riddhi Padumnath, Desai Harshali Shivaji,  Maurya Rahul Awadhnarayan
Abstract : With recent technological advancement of modern science people are now expecting the information about the location of any object for tracking purposes. Presently, we want more location based services for being advanced and to save time and money also. GPS is a system which is already implemented and everyone can access it without any restriction. Having the facility of GPS to develop this system we need a GPS device to calculate the location from the information taken from GPS. Hence, we have chosen Android device to perform this calculations because Android mobile phone is cost effective and offers multidimensional purposes having some special built-in features like GPS service. Thus, this system is developed for location tracking of a friend or family member with a proximity alert.
Black Book Serial Number: SLRTCE/IT/Blackbook-5/2016-17
Title : Intelligent Notifier
Guide Name: Prof. Saurabh Suman
Group Members Singh Akshay Tejpratap, Mishra Prashant Pramod, Singh Kishan Om Prakash, Singh Kishan Om Prakash
Abstract : Android application that can remind us of any event/Task we mark on it. It can be like reminding us about a meeting, time to pay any bill etc. The app can take from the user the eventname, date and time of the event. Store the details to the database and alert the user 10 min before the event. Simple Application for Android phone. Application will be used as a“reminder” for a specific type of event. With the ability to save multiple events. Events are based on alternating calendar dates & frequency (user input). Notification/reminders will be sent via Text Message.
Black Book Serial Number: SLRTCE/IT/Blackbook-6/2016-17
Title : Stock Market ForeCasting
Guide Name: Prof. Madhuri N. Gedam
Group Members Boricha Priyesh Hitendra, Morjaria Shivansh Ajay, Mittal Kush Girish, Joshi Pooja Shailendra
Abstract : Stock Market is used by many peoples on daily basis. Many users invest on Stocks. BSE (Bombay Stock Exchange) and NSE (National Stock Exchange) are the main Stock Market on which people rely on. As an individual it becomes difficult to maintain the database and analyse a particular stock. This system is intended to overcome this drawback.

This system helps user to perform analysis of stocks without creating and maintaining the database. It performs past analysis of stocks, comparison between two stocks and tracking of shares. It gives the information of whether to hold, buy or sell the stock with the help of Text Based Decision Tree Model. The ARIMA (Auto Regressive Integrated Moving Average) model helps to predict the future price of the stocks based on past and current values of stocks. This system also helps to take suggestion from an expert live from the Twitter. This as a whole makes this system a proper use for users, those who invest on stocks on daily basis. This system will help them to obtain information of shares with its correct value.

Black Book Serial Number: SLRTCE/IT/Blackbook-7/2016-17
Title : Detection of video piracy using digital watermarking
Guide Name: Prof. Madhuri N. Gedam
Group Members Singh Shivani Pravinkumar, Soni Jay Jitendra, Chawla Aakash Kumar Bharat Bhushan, Sidhu Sukhman Kaur Iqbal Singh Rajinder Kaur
Abstract : The most important attribute of digital information is the ease of production and distribution over numerous places. The threat that there are number of perfectly congruent copies of audio , video and image in the file requires counterattacking the need of hiding secret data within the original data. In day-to-day life, internet is an important channel for digital source, but many intruders are misusing by constructing illegal copies and leaking the information which creates a bad environment in the field of software field. The solution involves using digital watermarking. The work needs to be performed cautiously in order to maintain the availability of multimedia information but, till that time the industry must develop with ways to guard intellectual property of stakeholders of such data. Out of all possible methods, digital watermarking has earned most available attention in the software industry. In the field of information hiding steganography and watermarking work parallel as well as concurrently. Generally watermarks are used where authentication or ownership is required. It is a good way by which anyone can confirm the ownership of multimedia. This paper attempts to first introduce digital watermarking as well as some of its necessary notions.
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2016-17
Title : Expert system for Agriculture plant disease
Guide Name: Prof. Madhuri N. Gedam
Group Members Gore Ganesh Nanasaheb, Gupta Rakesh Ramharakh, Sawant Bhosle Mandar Fattesingh, Dodiya Aakash Pravin
Abstract : In the recent years, an excessive amount of computerized expert systems has been developed for various sectors of agriculture in India. The availability of low-cost computers, agricultural knowledge and information technology professionals are the principal reasons for the development of so many agricultural expert systems. Among all agricultural expert systems, the expert systems for crop protection need special mention. These expert systems are meant to be used by farmers and other persons without much experience of using computers. Hence, special care must be taken while developing them. The current paper develops a taxonomy for the expert systems for crop protection and briefly discusses four such expert systems for crop protection being used in India.
Black Book Serial Number: SLRTCE/IT/Blackbook-9/2016-17
Title : E-Voting System
Guide Name: Prof. Aarti R Puthran
Group Members Ansari Shabana Asalam, Poojary Suraj Sadanand, Poojary Sagar Sadanand, Soni Vinayak Vinod
Abstract : Voting is a system used to determine the decision of the masses. It is used to mark the individual decisions and decide who is the winner of the available candidates. Voters point system will take the picture of user face and generate its key point using KLT algorithm and store it in database in matrix form. Then at the time of voting user is again authenticated by taking the picture of face and comparing it with the previously generated key points. If the image is matched, then the user is provided the otp to provide security to the voting decision. The user vote is stored in database. This application will improve the voting percentage as users can vote just from their mobile phones. Also authentication by face will make sure that a user votes only once.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2016-17
Title : Smart Surveillance notification
Guide Name: Prof. Aarti R Puthran
Group Members Gupta Arun Kumar Achhe Lal, Gupta Rahul Mukesh, Kesarwani Rishab Rakesh, Kevin Sunil
Abstract : This paper presents architecture to improve surveillance applications based on the android smart phones, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the Background subtraction method. The Background subtraction will compare the current frame with the previous frame i.e. background image is subtracted from the foreground image. From that the moving object is derived. So the frame algorithm and the threshold value is calculated to find the moving image. Using threshold value the detected pixel is identified. Hence the movement of the object is identified accurately. Whenever motion detected that image is saved on the server and the server will notify the Google server. The Google server will send a GCM Alert to the android application user mobile who are all registered for that application
Black Book Serial Number: SLRTCE/IT/Blackbook-11/2016-17
Title : GPS Navigation
Guide Name: Prof. Anil Chaturvedi
Group Members Yadav Neetu Arvind, Yadav Nilesh Kumar Jagatnarayan, Parab Rohan Ravindra, Goswami Aman Vidyabhushan
Abstract : Recently, there is an increase interest in positioning techniques based on Global NavigationSatellite Systems (GNSS) such as Global Positioning System (GPS), cellular network infrastructure or on the integration of the two technologies for a wide spread of applications such as Automatic Vehicle Location (AVL), tracking systems, navigation, Pedestrian NavigationSystems (PNSs), intelligent transportation Systems, precise positioning and emergency callers.
Black Book Serial Number: SLRTCE/IT/Blackbook-12/2016-17
Title : Brand Bucket
Guide Name: Prof. Anil Chaturvedi
Group Members Mishra Aditya Devisevak, Buddhist Mayank Bhimprakash
Abstract : The business-to-consumer aspect of electronic commerce (e-commerce) is the most visible business use of the World Wide Web. The primary goal of an e-commerce site is to sell goods and services online. This project deals with developing an e-commerce website for Online Shopping. It provides the user with a catalogue of different products available for purchase in the store. In order to facilitate online purchase a shopping cart is provided to the user. The system is implemented using a 3-tier approach, with a backend database, a middle tier of Apache Tomcat and J2EE, and a web browser as the front end client. In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client side scripting techniques, implementation technologies. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart application and also to know about the technologies used to develop such an application. This document will discuss each of the underlying technologies to create and implement an e-commerce website.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2016-17
Title : Real Estate Price Prediction
Guide Name: Prof. Anil Chaturvedi
Group Members Patel Hastik Rameshbhai, Paradekar Nikhil Nandkumar, Mistry Dilip Jethalal, Khairalia Vikas Mangesh
Abstract : We have a huge amount of data related to real estate business available on the internet and gathering by meeting agent of real estate. The better classifier to predict price of the house in and around Mira Bhayander. We have considered the attributes house size, number of bedrooms and the status of the house. The dataset used is extracted from real estate websites and then analyzed using software called R tool. We have to use algorithms Arima model and predicating the price of real estate business.
Black Book Serial Number: SLRTCE/IT/Blackbook-14/2016-17
Title : Android based Attendence Management system
Guide Name: Prof. Sunil Yadav
Group Members Bhattacharjee Aishwarya Ramakanta, Surve Kshitija Sanjay, Salve Neha Vilas, Suthar Prerna Chananram
Abstract : The existing manual class attendance signing system needs students improperly sign the attendance sheet during class. The lecturer has to keep all attendance sheets and calculate the attendance report throughout the semester manually and come out with their own, not standardize students attendance report. The problem is the existing manual class attendance signing system for subject Project Formulation is inefficient and not systematic.  In the manual system, students can easily forge other’s signature purposely to fill in the class attendance.This project uses a web application as well as android application concept to facilitate the attendance system in educational institutes. It uses the most reliable way of uniquely identifying students through an android app. Such type of web application is very useful in school as well as in college for daily attendance. development in educational sector can be achieved through this project.All of these are possible through the effective development and use of android application in the educational institutions.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2016-17
Title : Crime Pattern Detection ,Analysis and Prdiction
Guide Name: Prof. Sunil Yadav
Group Members Timbadia Meet Nimesh, Yadav Ajit Deepchand, Vishwakarma Rohit Lalchand, Yadav Nikhilesh Musafir
Abstract : Crimes are a social irritation and cost our society deeply in several ways. Any research that can help in solving crimes quicker will pay for itself. About 10% of the criminals commit about 50% of the crimes [9]. The system is trained by feeding on previous years records of crimes taken from legitimate online portal of India describing various crimes such as murder, kidnapping and abduction, dacoits, robbery, burglary, rape and other such crimes. As per Indian statistics, with given data of various crimes for 14 years (2001-2014) a regression model is created and the crime rate for the following years in various states can be predicted [8]. We have used supervised, semi-supervised and unsupervised learning technique [4] for knowledge discovery from the crime records and to help in increasing the predictive accuracy of the crime. This work will be helpful for the local police stations in crime suppression.
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2016-17
Title : A profiling Tool Data Explorer
Guide Name: Prof. Sunil Yadav
Group Members Kanojia Priyanka Gyanendra, Singh Meenakshi Santosh
Abstract : Many business and IT managers face the same problem: the data that serves as the foundation for their business applications (including customer relationship management (CRM) programs, enterprise resource planning (ERP) tools, and data warehouses) is inconsistent, inaccurate, and unreliable. Data profiling is the solution to this problem and, as such, is a fundamental step that should begin every data-driven initiative. Data profiling is the process of examining the data available in an existing data source (e.g. a database or a file) and collecting statistics and information about that data. The project Data Explorer is developed to perform the data profiling activities
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2016-17
Title : Prediction of results of Football matches
Guide Name: Prof. Komal Champanerkar
Group Members Nair Sujit Govindan, Dave Milind Ganpat, Salian Varun Shashikant, Kadve Piyush Sadanand
Abstract : Football is the most popular game in the world. A huge amount of data related to football available on the internet. In any sport competition, there is a strong interest in knowing which team shall be the champion at the end of the championship. This data can be used to predict the outcome of the future matches. The project identifies desirable characteristics or features from the datasets to predict the outcome. Sports analytics is a fascinating problem area in which to apply statistical learning techniques. Classification algorithms like Naïve Bayesian and KNN algorithm can be used to predict the outcome of football matches using the important characteristics of the game that have a large impact on the result.  The project is an application to predict the result of football matches in the English Premier League to find out which techniques and approaches are the most viable for successful prediction and also find ways to increase the accuracy of the predicted result by improving upon the previous work.
Black Book Serial Number: SLRTCE/IT/Blackbook-18/2016-17
Title : Java virtual shell
Guide Name: Prof. Komal Champanerkar
Group Members Shelar Sumit Sadashiv, Balte Snehal Nitin, Nikam Sonal Jotiram, Jethava Vicky
Abstract : Virtual Java Shell is developed keeping in mind the problems faced by user in windows and Linux operating systems. Commands and utilities have been made in such a way that there is no need for user to learn commands of both the operating systems. The user can be able to type the commands as we do it in Dos. The User interface will be designed simple and in sync with all of the popular shells available such as Dos shell and bash (popular Linux shelly, The user issues a command to the shell. The shell verifies the command against the valid commands available and checks for their syntax. The kernel acts on the instructions issued by the shell and executes the code with the help of Java Virtual machine or JVM. JVM interprets the code and executes it on the resources of the system.
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2016-17
Title :  User Based Recommendation System based on Browsing History
Guide Name:  Prof. Deepali Patil 
Group Members: Dhruv Bindoria, Raj Mehta,Shankarlal Bhati,Ujwal Ahir
Abstract : Recommendation systems are used widely to provide personalized recommendations to users. Such systems are used by e-commerce and social networking websites to increase their business and user engagement. Day-to-day growth of customers and products pose a challenge for generating high quality recommendations. Moreover, they are even needed to perform many recommendations per second, for millions of customers and products. In such scenarios, implementing a recommendation algorithm sequentially has large performance issues. To address such issues, we propose a parallel algorithm to generate recommendations by using Hadoop map-reduce framework. In this implementation, we will focus on item-based collaborative filtering technique based on user’s browsing history, which is a well known technique to generate recommendations.

Black Book Serial Number : SLRTCE/IT/Blackbook-1/2017-18


Title: Movie Success Rate using Data Mining and web mining
Guide Name: Prof. Deepali Patil 
Group Members: Naeem Deshmukh, Mubbashir Ansari, Amraiz Birwadkar, Atul Singh
Abstract: Sentiment analysis is an area of text classification that began around 2001 and has recently been receiving a lot of attention from researchers. Sentiment analysis involves analyzing textual datasets which contain opinions (e.g., social media, blogs, discussion groups, and internet forums) with the objective of classifying the opinions as positive, negative, or neutral. Classification of textual objects according to sentiment is considered a more difficult task than classification of textual objects according to content because opinions in natural language can be expressed in subtle and complex ways containing slang, ambiguity, sarcasm, irony, and idiom. Various measures, including Information gain, simple chi-square, feature relation network, log-likelihood ratio, and minimum frequency thresholds, have previously been used as feature selection methods in sentiment analysis and classification. In this report, we investigate the performance of categorical proportional difference, a novel feature selection method used for text classification. While categorical proportional difference has previously been shown by others to be useful in sentiment classification of text documents, here we apply sentiment on online reviews. Online reviews differ from typical text documents in that they contain few features (i.e., they are short documents). We apply weighting schemes, SentiWordNet scores, information gain and simple chi-square, to classify the reviews as either positive or negative. Experimental results show that given a dataset containing labeled movie reviews. The performance of Information gain and simple chi-square varied depending on the dataset.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-2/2017-18
Title: Website catergorization using Data Mining Algorithm
Guide Name: Prof. Aarti Puthran 
Group Members: Kaustabh Rasam, Harshal Solanki, Abhishek V.,  Tushar Shinde
Abstract: The number of websites as well as the categories of the websites has increased day by day. The content and category of information are overflowing the Internet channel. These problems arise because there is lots of website information generated. This problem is faced by the user to find out some information or buy some product through the online. Finding the right information from almost a billion of websites is considerably hard, but finding the perfect and appropriate one is even harder. The solution of the given problem is that “Website Categorisation“ technique.The simple yet powerful algorithm for website categorisation such as KNN, Naive Bayes algorithms etc. which can give a multi category result, distributed system supported, and does not even need to be trained because the algorithm uses word frequency in the content of each website to match with the categories in a pre-defined dictionary. Within the “Website Categorisation” technique, Classification will be used. This technique will provide the efficient result to the user. By using website categorisation, it will provide the efficient or accurate result to the user in small amount of time. “Website Categorisation” technique will be depend majorly upon two module Classification, data pre-processing technique.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-3/2017-18
Title: Online Disease Prediction and Health Monitor
Guide Name: Prof. Aarti Puthran
Group Members: Akshay Hartalkar, Dipesh Chorat, Nikhil Dange, Pooja Maurya
Abstract: In today’s world information is a crucial thing and must be saved or stored correctly for later use. When it comes to information related one’s medical records or his/her medical history, this information can come handy even after couple of years where we fail to safely store medical records as they are mostly a hard copy. A digital record of the same will not wear off with time and is also easy to store, maintain and retrieve. The goal of this project is to make a web application where users can store his medical records online and have a full-time access to it. Also, one can easily share his records with his trusted doctor’s simply by a unique user record view ID, with or without giving them the permission to edit those records. Having a secure and full time available record, these medical records of a user can be put to greater use by predicting disease that has a chance of affecting the user in future, based on his previous records. User can follow-up this predicted disease with his trusted doctor’s and prevent them from happening to them.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-4/2017-18
Title: Opinion Analysis using Machine Learning
Guide Name: Prof. Gayatri Dantal MTECH CS VJTI
Group Members: Sagar Agarwal, Afra Shaikh, Aishwarya Sharma, Neetu Yadav
Abstract: As there is an exponential growth of social network and due to large usage of social media, there is an increasing demand for data in the web for the users which leads to recent trends and ideas in the field of research. The users will be eagerly using these data for the future purpose and get information about the opinions of others thus there is a need of automatic summarization of opinion of the web users. Opinion Mining is a process of extracting and analyzing people’s Opinions regarding the given object and Sentiment Analysis explains about the hidden sentiments in the opinions. Sentimental Analysis is reference to the task of Natural Language Processing to determine whether a text contains subjective information and what information it expresses i.e., whether the attitude behind the text is positive, negative or neutral. This project focuses on the aspect based feature extraction of product review using document level sentimental analysis. In a document-level classification the main intention is to classify an opinion in the whole document as positive or negative. It speculates entire document as a single unit and it’s polarity is decided accordingly
Black Book Serial Numbar: SLRTCE/IT/Blackbook-5/2017-18
Title: Detection of Phising site using URL Features
Guide Name: Prof. Gayatri Dantal 
Group Members: Ria Sankhyan, Lubhdha Dhanopia, Ankit Shetty, Chetan Kaspale
Abstract: Damage caused by phishing attacks that target personal user information is increasing. Phishing involves sending an email to a user or inducing a phishing page to steal  a user’s personal information. This type of attack can be  detected by blacklist-based detection techniques; however,  these methods have some disadvantages and the numbers of  victims have therefore continued to increase. In this paper, we propose a heuristic-based phishing detection technique that  uses uniform resource locator (URL) features. We identified features that phishing site URLs contain. The proposed method employs those features for phishing detection. The technique  was evaluated with a dataset of 3,000 phishing site URLs and  3,000 legitimate site URLs. The results demonstrate that the  proposed technique can detect more than 98.23% of phishing  sites. 
Black Book Serial Numbar: SLRTCE/IT/Blackbook-6/2017-18
Title: Fingerprint Authentication System
Guide Name: Prof. Satish Ranbhise M.E Computer Engg
Group Members: Endresh Nayak, Chandan Maurya, Sarvesh Yadav, Ajit Yadav
Abstract: The current online shopping system for transaction and sign-up, we use the traditional approach which consists of Name, email-id, contact number and password. There are many possibilities that it can be exploited by the attacker to get access of the confidential information of the authenticated user. So to overcome this flaw as per the user point of view, we propose a secure online shopping system that gives the Internet users the confidence to use their online shopping cards or their credit cards without the need to worry about the hackers or the online shopping frauds. The proposed system uses a fingerprint verification technique to verify the customer (cardholder). Since fingerprint is one of the most unique personal identity, so it can be used for the security assurance of the authentication. By using this approach we will be able to get high level of confidentiality, integrity and reliability. The fingerprint which was taken at the time of the sign-up will be encrypted and at the time of the transaction the current fingerprint of the user should match with the stored fingerprint in the database for the further access.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-7/2017-18
Title: Intelligent Heart Disease Prediction System (IHDPS)
Guide Name: Prof. Rupali Pashte Mtech CSE
Group Members: Aniket Prajapati, Manish Singh, Pratik Chotaliya, Karan Valkunje
Abstract: Heart disease is a major cause of transience in modern society. Due to time and cost constraints, most of the people rely on health  care systems to obtain healthcare services. Healthcare organizations collect and produce large volumes of data on daily basis. Information technology allows automization of processes for extraction of data that help to get interesting knowledge and regularities. In this paper we are using the Data mining techniques like Naive Bayes and Apriori Algorithm for the elimination of manual tasks and easier extraction of data directly from electronic records, transferring onto secure electronic system of medical records which will save lives and decrease the cost of the healthcare services. Naive Bayes algorithm uses Bayes theorem and assumes all attributes to be independent given the value of the class variable.The WAC has been used to get the significant rule instead of flooded with insignificant relation and the Apriori algorithm is used to find out the frequent item set from the patient database
Black Book Serial Numbar: SLRTCE/IT/Blackbook-8/2017-18
Title: Iris-The Bargain Bot
Guide Name: Prof. Anil Chaturvedi
Group Members: Dhairya Gandhi, SiddhartKumar Avaiya, Keyur Kalsaria
Abstract: E-commerce websites have become the recent trend in online shopping, people consisting of different age group, different communities and different localities are using e-commerce websites or apps for online shopping. Still one of the biggest drawback of e-commerce websites is that we can neither bargain nor negotiate as we can do in traditional markets, this has proved to be a concerning factor for the sellers, who in turn are open to negotiation or bargaining. Thus, an efficient system for bargaining can significantly increase the overall market sales. So we have proposed an intelligent bargain bot which will help the consumers to bargain for their desired product. IRIS will not only ease the trade but will also provide a reliable and user friendly search tool, it will have an interactive interface which will be achieved by using artificial intelligence and the bargaining skills can be applied with the help of various machine learning algorithms mainly support vector, decision tree and neural networks. We shall first conduct the tests on small datasets for the machine to learn and adapt and then move to larger datasets
Black Book Serial Numbar: SLRTCE/IT/Blackbook-9/2017-18
Title: Gesture Control AI Implemented Game
Guide Name: Prof. Anil Chaturvedi
Group Members: Syed Rayyan Ahmed, Mishra Sajjan Shreeram, Vinay Nair
Abstract: Gesture is a natural part of human communication and becomes more and more important in VR application. Here in this paper we are focusing on designing a gesture controlled combat game using Leap Motion which can detect palm and fingers movement. For game designing we will be using Unity game engine version 5.3.1f1. We will be working on three modules here gesture control module, game design and Artificial Intelligence module. The AI player should detect the position of the human player and react as per that, to implement this functionality we will be using A* algorithm and “Navmesh Grid” path-finding algorithm in Unity 3D.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-10/2017-18
Title: Intelligent Voting System
Guide Name: Prof. Saurabh Suman
Group Members: Mohd Samee Balsari, Sufian Khot, Zeeshan Kazi, Amit Jalan
Abstract: The current system of election is very orthodox and not secured because it is based on only voter card which can be easily duplicated, and even bogus voter card can be provided to a person through which he/she can illegally cast a vote , now a days it is also possible that a person can cast votes multiple times, because in the current system , to verify if a voter has casted a vote or not it is checked if the person has an ink mark on index finger which is unreliable. Thus our proposed model suggests to simply connect the voter card of a person to his/her Aadhar card, the Aadhar and the voting card both will have the fingerprint data of their owner stored in their database, and this linkage is used for 2 step verification in our suggested system. The proposed model has a greater security in the sense that voter’s biometric attribute (in this model it is fingerprint) is confirmed and two step verification is done before the vote is accepted in the main database of Election Commission of India. Our system also solves the problem multiple time voting of a given voter by setting flag or a digital mark in the voter card database record of voter who has cast his/her vote and this mark will be nullified once the election process is completed. Thus the advantages of our proposed system are as follows: ● High security because of two level biometric authentication. ● No bogus voter cards for people not on the voters list. ● No voter cards for non citizens. ● No multiple Voting – Digital mark in the voter card database record of voter who has cast his/her vote .
Black Book Serial Numbar: SLRTCE/IT/Blackbook-11/2017-18
Title: Speed Medical Services
Guide Name: Prof. Saurabh Suman
Group Members: Mansi Rajput, Paras Patel , Saurabh Pandey
Abstract: In today’s traffic world, ambulance plays a major role when accident occurs on the road network and need arises to save valuable human life. Transportation of a patient to hospital seems quite simple but in actual it is quite difficult and gets more difficult during peak hours. Metropolitan city due to rapid increase in the number of vehicles, traffic jams, lack of footpaths and unsafe roads for people to walk or to cross.As population increases so does the importance of emergency services. The need of emergency services is increasing day by day. One such service is ambulance. Today there are a hundred ambulance services running yet unknown to people. Every hospital has its own contact number for the ambulance. Every private and government Service has its own contact number for ambulance. It becomes really hectic for a person to call all these numbers and ask for an ambulance. So we took this opportunity and thought of bringing these Ambulances under one roof. The application we are going to bring forth will bring all ambulance available in the city under one roof. On a click of a button the patient will get the nearest ambulance to his service. Even a person in distress can call an ambulance without anyone’s help. As android is one of the most booming platform, we are building our application on that.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-12/2017-18
Title: Criminal Detection Using Machine Learning
Guide Name: Prof. Sunil Yadav 
Group Members: Aditya Sawant, Mohit Sharma, Yash Sharma, Varun Acharya
Abstract: Important fields where the application of data mining techniques can produce important results. Crime analysis, a part of criminology, is a task that includes exploring and detecting crimes and their relationships with criminals.The high volume of crime datasets and also the complexity of relationships between these kinds of data have made criminology an appropriate field for applying data mining techniques. Identifying crime characteristics is the first step for developing further analysis. The knowledge that is gained from data mining approaches is a very useful tool which can help and support police forces. According to Nath (2007), solving crimes is a complex task that requires human intelligence and experience and data mining is a technique that can assist them with crime detection problems. The idea here is to try to capture years of human experience into computer models via data mining. The criminals are becoming technologically sophisticated in committing crimes. Therefore, police needs such a crime analysis tool to catch criminals and to remain ahead in the eternal race between the criminals and the law enforcement. The police should use the current technologies to give themselves the much-needed edge. Availability of relevant and timely information is of utmost necessity in conducting of daily business and activities by the police, particularly in crime investigation and detection of criminals. Police organizations everywhere have been handling a large amount of such information and huge volume of records. An crime analysis should be able to identify crime patterns quickly and in an efficient manner for future crime pattern detection and action. crime information that has to be stored and analyzed, Problem of identifying techniques that can accurately analyze this growing volumes of crime data, Different structures used for recording crime data
Black Book Serial Numbar: SLRTCE/IT/Blackbook-13/2017-18
Title: Augmented Situation awareness and intelligence using Data mining
Guide Name: Prof. Sunil Yadav 
Group Members: Swapnil Chowkekar, Gurang Divyashwar, Rohit Dubey, Aakash Mishra
Abstract: There are a large number of publicly available datasets that enable academics and practitioners to identify and map different types of land use (e.g. residential, commercial, industrial, leisure and Public services) different types of neighborhood (e.g. Disadvantaged inner cities, affluent suburbs, Student areas), together with street networks and major transport routes. Information such as this, referred to as ‘Geospatial data’, can potentially be very useful in understanding crime patterns and in explaining why crime hotspots occur in particular places. However, the extent to which beneficiaries are aware that such data exists is largely unknown and the added value that such data might bring is largely unexplored.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-14/2017-18
Title: Home Automation Using Bluetooth
Guide Name: Prof. Reena Kothari   
Group Members: Krunal Rane, Mayuri Save, Jayashree Yadav
Abstract: Security of one-time password (OTP) is crucial as a result of these days most of the        E-commerce transactions are performed with the assistance of this mechanism. Replay attack or eavesdropping is one type of attacks on network-connected computing environment or isolated computing setting. For achieving 112 bits of security level, Rivest Shamir and Adleman (RSA) formula desires key size of 2048 bits, whereas Elliptic Curve Cryptography (ECC) desires key size of 224-255 bits. Another issue with most of the present implementation of security models is storage of secret keys. Crypto graphical keys are usually unbroken in en-secured manner that may either be guessed/social-engineered or obtained through brute force attacks. This becomes a weak link and leads integrity problems with sensitive information in a very security model. To beat this drawback, biometrics is combined with cryptography for developing sturdy security model. This project suggests an increased security model of OTP system using ECC with fingerprint biometric. This model also provides higher security with lesser key size than different public key crypto-model. The crypto graphical keys are not needed to memorize or keep anyplace; these keys are generated as and once required.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-15/2017-18


Title: Hotel Recommentation System
Guide Name: Prof. Reena Kothari   
Group Members: Sanika Nar, Ashwini Chaubey, Imran Khan, Ahuja Riya, Abhijit Agrawal
Abstract: Online hotel searching is a daunting task due to the wealth of online information. Reviews written by other travelers replace the word of- mouth, yet turn the search into a time consuming task. Users do not rate enough hotels to enable a collaborative filtering based recommendation.Thus, a cold start recommender system is needed.In this work we design a cold start hotel recommender system,which uses the text of the reviews as its main data. We define context groups based on reviews extracted from TripAdvisor.com and Venere.com. We introduce a novel weighted algorithm for text mining.Our algorithm imitates a user that favors reviews written with the same trip intent and from people of similar background (nationality) and with similar preferences for hotel aspects, which are our defined context groups. Our approach combines numerous elements, including unsupervised clustering to build a vocabulary for hotel aspects, semantic analysis to understand sentiment towards hotel features, and the profiling of intent and nationality groups.We implemented our system which was used by the public to conduct 150 trip planning experiments. We compare our solutionto the top suggestions of the mentioned web services and show that users were, on average, 20% more satisfied with our hotel recommendations.We outperform these web services even more in cities where hotel prices are high.Categories and Subject Descriptors: H.3.3 [Information Search and Retrieval]: Information Search and Retrieval – Information filtering
Black Book Serial Numbar: SLRTCE/IT/Blackbook-16/2017-18
Title: Intelliegent Agriculture System
Guide Name: Prof. Satish Ranbhise
Group Members: Aditya Ladhe, Rishab Gupta, Sajjan Mishra, Arpit Mishra
Abstract: Agriculture has a vital role to play in the economic development of India. Agricultural crop production depends on various factors such as biology, climate, economy and geography. The common problem existing among the Indian farmers are that they don’t choose the right crop based on environmental variables and biotic attributes which ultimately results in less production. The main objective of this project is to select appropriate meteorological and fiscal parameters in this project that provides intelligence to choose optimum cultivation date for selected agriculture crop in the district of Vidharbha. The objective is considered with a view to achieve higher margin at the time of cropping of that crop. GUI of this application helps the farmer community to take decision with ease.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-17/2017-18
Title: Trusted third party for data integrity using cloud computing
Guide Name: Prof. Rupali Pashte 
Group Members: Madhuri Kushwah, Prachi Shah, Jagruti Takkekar, Vaibhavi Sawant
Abstract: Cloud computing is the novel trend in all over the world. Cloud Computing provides the ability to utilize resources through Internet. As a lot of service providers of the cloud are available in the competitive computer world. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. In this we will discuss how to provide security for the data from the unauthorized users and provide integrity to the users. It requires a very high degree of privacy and authentication. To protect the data in cloud database server, cryptography is one of the important methods. Cryptography provides various symmetric and asymmetric algorithms to secure the data. This paper presents the symmetric cryptographic algorithm named as AES (Advanced Encryption Standard). It is based on several substitutions, permutation and transformation.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-18/2017-18
Title : Food Recognition Recommendation App
Guide Name:  Prof. Deepali Patil 
Group Members: Prathamesh Godse ,Rohan Kanwar , Pravin Lohare, Chandan Kesarwani
Abstract : Health and nutrition has always been a very important aspect of a person’s life. It is one of the emergent concerns in today’s world. Technology has its crucial part in enhancing and promoting the wellness and health of its users. With the rise in mobile technology it has become convenient in keeping track of one’s health due to its mobility and availability. Many applications have been intro-duced to help its user record the amount of calories and nutrition they will be gaining after consuming a certain food product.

In this project we attempt to develop an Android based application that will let users take a photo of the food and recognize it using deep learning and tell user the nutritional value of it and  using classification it will tell whether it is healthy for particular group of people (like diabetic patients). We believe this will be an effective way to recognize the food category and efficiently analyze the nutritional value of it. It will be convenient for the users as well as promote healthy lifestyle and better nutrition.

Black Book Serial Number : SLRTCE/IT/Blackbook-1/2018-19


Title: Smart emotion based music player using facial recognition
Guide Name: Prof. Deepali Patil 
Group Members: Himanshu Barai , Deepak Tiwari, Gopal Ghelot, Mohit Yadav
Abstract: Facial expression provides current mind set of a person.The most natural way to express emotions is using facial expression. Human often use non verbal cues such as hand gestures faical expressions and tone of the voice to express feelings in interpersonal communication. It is very time consuming and difficult to manage large playlists and to select songs from the playlist.Thus, it would be very useful if the music player itself selects the song according to the current mood of the user.Thus , an application can be developed to minimize thses efforts of managing playlists. In this project we will built an application that will automatically detect the mood of the user and present him a playlist of the songs, that is suitable to it’s current mood.The face is captured using webcam and the image is passed under the different stages to detect the mood or emotion of the user.athe application is thus developed in such a way that it can manage the content accessed by the user, analyze the image properties and determine the mood of the user

Black Book Serial Numbar:



Title: Cognitive Estimation and Prediction of Neurological Disease using Machine Learning
Guide Name: Prof. Gayatri Dantal
Group Members: Smit Supeda , Abhishal Yadav, Ganesh Mishra, Kaushal Yadav
Abstract: According to the UN World Health Organization, nearly one in every six of the world’s population is affected by a neurological disorder. Neurological disorders which involves both CNS and PNS are being visualized through patient CT or MRI scans; however, this study focused on the shared SNPs in different neurological disorders generated from pre-existing data. Mining discriminative patterns from graph data has attracted great interest in recent years. It has a wide variety of applications in disease diagnosis, neuroimaging, etc. Children with Global development delay (GDD) can also have Gradable Tumors and Neurological disease symptoms. Clinical patients who are diagnosed for EEG can have different neurological disease and also children with Different Development Rate gets affected by this neurological disease. Prediction of Survival rate in Neurological disease such as Glioblastoma using various prediction algorithms such as Linear regression, Non-Linear Regression, etc. We classified three classes and also conducted classification of neurological disorders for different combination.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-3/2018-19
Guide Name: Prof. Gayatri Dantal
Group Members: Ananya Padey ,Shweta Pandey,Deepak Sharma,Pranav Ravindran
Abstract: The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into cipher text. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this , an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-4/2018-19
Title: Itinerary Planner
Guide Name: Prof. Aarti Puthran
Group Members: Saish Narvekar , Pranit Rale, Sanat Mistry, Robinsali Maredia
Abstract : With increase in user’s demand and new emerging points of attraction, tourism has becoming more popular as days pass by. However, offline booking of trips provides us with limited set of places to visit. Moreover, not all the itineraries match the user’s expectation. As a solution to this, this system will provide the users with multiple itineraries of a single location which are effectively mined from quantities of attractive places. This approach uses association mining to find the frequent places in set that attract users. The different itineraries  provided will be segregated into number of days required for the trip. This approach is user friendly and performs much better than offline trip planning.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-5/2018-19
Title: Profile based agriculture system
Guide Name: Prof. Aarti Puthran
Group Members: Tanmyee Nimbalkar ,Mehazabin Sayed,Navneet Pandey,Nitesh Pawar
Abstract : Agriculture is the most basic function to accomplish food demand all over the globe; it contributes nearly sixteen percent to total GDP(Gross Domestic Product) of India and ten percent of the total exports which helps in increasing foreign exchange. Agriculture is a backbone particularly in the developing countries like India. The population of India is continuously increasing and to meet the food necessities of this growing population, agricultural yield should be boosted. The application of Data mining techniques in agriculture especially on soils can improve cultivation yields in a better way as well as knowledge discovered from raw data is useful for many purposes. Data mining techniques are better choices for the same the analysis of soils plays an indispensable role for resolution making on several issues related to agriculture field.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-6/2018-19
Title: IOT based smart garbage collector under Swachchta Abhiyan
Guide Name: Prof. Madhuri N. Gedam
Group Members: Dhrumil Ajudiya,Vishal Kortla,Nitesh Khamble,Govinda Gupta
Abstract: In today’s busy world time is a vital issue which can’t be managed by noticing each and every phenomenon with our tight schedule. So now a day’s Automatic systems are being preferred over manual system to make life simpler and easier in all aspects. To make it a grand success Internet of Things is the latest internet technology developed. The number of users of internet has grown so rapidly that it has become a necessary part of our daily life. Our matter of concern in this project is development of Internet of Things based Garbage Monitoring System. Waste management from its inception to its disposal is one of the important challenges for the municipal corporations in all over the world. Dust bins placed across cities set at open places are flooding because of increment in the waste each day and making unhygienic condition for the citizens, to maintain a strategic distance from such a circumstance we have proposed wireless solid waste management system for smart cities which allows municipal corporations to monitor status of dustbins remotely over web server and keep cities clean very efficiently by optimizing cost and time required for it. As soon as dustbin has reached its maximum level, waste management department gets alert via SMS via gsm module placed at dustbin so department can send waste collector vehicle to respective location to collect garbage. In this paper, proposed IoT technologies with management of waste and trip management in cities is done, so that cost and time are reduced with optimized path for waste collection. The objective of the project is to enhance practicality of IoT based solid waste collection and management system for smart city.
Black Book Serial Numbar: SLRTCE/IT/Blackbook-7/2018-19
Title : IOT based gas detection system
Guide Name: Prof. Madhuri N. Gedam,SLRTCE,Mira Road,M.Tech
Group Members  

Aniket Tiwari ,Shivam Tharthare,Vikashkumar Singh ,Shubhansh Rai


Abstract : Nowadays gas leakage and gas detection is a major problem in our daily lives. Also gas wastage is a major issue that needs to be countered. GAS  is highly flammable and can inflict damage to life and property. To avoid such situations, a considerable amount of effort has been devoted to the development of reliable techniques for detecting gas leakage. As knowing about the existence of a leak is not always enough to launch a corrective action, some of the leak detection techniques were designed to allow the possibility of locating the leak. Our aim is to reduce the risks In gas pipe using Internet of Things. The main aim is to propose the design and construction of an SMS based Gas Leakage Alert System. Gas sensor are used to detect gas leakages in a pipe. With the help of an infrared sensor the issue of gas wastage is also monitored. An alarm goes off whenever the sensor doesn’t detect any vessel over the burner beyond a particular time period
Black Book Serial Number: SLRTCE/IT/Blackbook-8/2018-19
Guide Name: Prof. Anil Chaturvedi ,SLRTCE,Mira Road,M.Tech
Group Members Gulamwarsi Warsi ,Nuruddin Warsi,Komal Bhatnagar,Hetansh Shah


Abstract : The research on Augmented Reality and Virtual Reality technology is one of the most important directions in current information technology field, these two technologies have been applied in various fields, such as education, medical treatment, construction, military affairs, entertainment, and the research on technical level is improving at the same time, while the research on evaluation of these two technologies and putting forward

optimization program based on the user experience is quite unwonted. This paper choose the real estate exhibition as entry point, through comparative experiments of AR and AI technology in real estate display field, finally construct a user experience evaluation model of AR and AI technology.

Black Book Serial Number: SLRTCE/IT/Blackbook-9/2018-19
Title : Efficient method of preserving medical documents using cloud computing
Guide Name: Prof. Saurabh Suman, SLRTCE, Mira Road,ME
Group Members Vrushali Yadav ,Ajay Singh,Shraddha Singh,Sagar Sen
Abstract : Medical healthcare is an area where technology in certain sections is not entirely evolved.  There persist certain issues like hoist medical documents, requisite information, indespensable services & medical extremity. In this paper we make use of IOT & cloud computing to tackle and block these challenges and move from paper to electronic world. There is use of RFID to fetch the patient’s data which can be directly accessible to doctor for further assessment, providing them with verified data which focuses on eliminating the need of carrying the medical documents and also the doctor is provided with the history of the patient’s health which helps the doctor to treat patients based on his past health and treatment .In case of an emergency(accident) nearby access of ambulance/hospitals will be easily  available to patient which results in time efficiency. The paper also emphasis on amplifying the use of cloud for storage & security of medical data. The application encapsulates a number of medical services which is required in case of an emergency which also includes secure access of medical information and available insurance data of patient enabling a renewed focus on patient-centered care which makes it time as well as money efficient.
Black Book Serial Number: SLRTCE/IT/Blackbook-10/2018-19
Guide Name: Prof. Sunil Yadav, SLRTCE, Mira Road,ME
Group Members Divya Tiwari ,Kantilal Vishwakarma,Vranda Khetan,Kunal Ruhela
Abstract :

Brain tumor is an abnormal intracranial growth caused by cells reproducing themselves in an uncontrolled manner. Most researches in the developed countries shows that main cause of death of people having brain tumor is incorrect detection of brain tumor. It is one of the most dangerous diseases and therefore it should be detected quickly and accurately. Generally, MRI or CT scan that is directed into the intracranial cavity produces the complete image of the brain tumor. Magnetic Resonance Imaging (MRI), a highly developed technique of medical imaging is used to visualize internal structure of human body without any surgery. For the accurate detection of brain tumor segmentation of MRI image is important. Classification of brain tumor through segmented MR images, is a difficult task due to complexity and alteration in tumor tissue characteristics like its location, size, gray level intensities and shape. Nowadays due to increasing tumor cases it is difficult to examine all the reports manually also it sometimes becomes hazardous for a patient due to delay in the detection of the tumor or the right time required for its surgery. In order to eradicate this problem an intelligent  System is required for the detection and classification of brain tumor automatically. Intelligence can be generally  described as the ability to perceive information and retain it as knowledge to be applied towards adaptive behaviors within an environment or context. We propose a method which can automatically consider the MR images as an input and further analyse and process the input image and classify according to its presence and absence along with the type of tumor detected. This can be done using two machine learning based techniques like neural networks and deep learning which can be used to solve many real-world problems.

Black Book Serial Number: SLRTCE/IT/Blackbook-11/2018-19
Title : SpyD: An Automated Security Tool
Guide Name: Prof. Reena Kothari ,SLRTCE,Mira Road,M.Tech
Group Members Sumit Awinash ,Harshwardhan Dubey,Abhishek Pandey,Pratik Verma
Abstract :

As people are realizing the importance of cyber security, the price for hacking tool such as Pineapple is increasing rapidly. One Pineapple device can cost up to Rs. 21000+Tax+Shipping charges. Due to high cost people do not prefer buying such a product which hamper their security as an organization. By building SpyD we can provide a similarly effective product at a very considerably lower price which will help the organization to manage the security. SpyD is an automated network penetration device/bot which will be able to perform all major operations through the means of an automated script with built in failsafe which can be performed be any professional ethical hacker. This will ensure that the routine jobs are performed more precisely as compared to a hired professional, thus, eliminating the threat of any man-made errors.

Additionally, SpyD will automate the work of softwares like Nmap, Aircrack-NG, Karma, Tcpdump etc.

Black Book Serial Number: SLRTCE/IT/Blackbook-12/2018-19
Title : Voice controlled intelligent personal Assistant using Raspberry pi
Guide Name: Prof. Komal Champanerkar, SLRTCE,Mira Road, M.Tech
Group Members Hannan Patel ,Shivam Gupta,Rishabh Singh
Abstract : The purpose of this project to illustrate the implementation of a Voice Command System as an Intelligent Personal Assistant (IPA) that can perform numerous tasks or services for an individual. These tasks or services are based on user input, location awareness, and the ability to access information from a variety of online sources (such as weather or traffic conditions, news, stock prices, user schedules, retail prices, telling time, local traffic, travel assistant, events, plus one can ask questions to the system, invoke its machine learning otherwise get it from Wikipedia). Using Raspberry Pi as a main hardware to implement this model which works on the primary input of a user’s voice. Using voice as an input to convert into text using a speech to text engine. The text hence produced was used for query processing and fetching relevant information. When the information was fetched, it then be converted to speech using text to speech conversion and the relevant output to the user was given.
Black Book Serial Number: SLRTCE/IT/Blackbook-13/2018-19
Title : Emergency response application
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Sankalp Mukadam ,Lallan Pandit,Samant Sahani,Rishabh Pathak
Abstract : As now a day’s the population in India is increasing drastically also with the advance features and opportunities in technology. Also, due to rise in various fields, it gives rise to number of problems and also provides us with the opportunity to overcome them. But, it is necessary to make proper use of the available resources. In today’s world everyone has a super-minicomputer (smartphone) in his/her pocket which is easily available to everyone. Instead of such a great technology it is not used up to its fullest efficiency. This project introduces us with solution to this problems with the help of geolocation and web application. For example, if there is an accident in a particular area where the help is not available easily, with the help of this application you can get help with just one click and rest is done by the application. It grabs information about the nearest hospitals and other help and takes the required actions. Thus this project discusses the various issues and also gives an idea of the proposed system, its working details and its benefits in other application too.

Keywords- GPS, Android, Latitude, Longitude, Smartphone

Black Book Serial Number: SLRTCE/IT/Blackbook-14/2018-19
Title : No Parking  Alert System
Guide Name: Prof. Rupali Pashte , SLRTCE,Mira Road,M.Tech
Group Members Nihal Singh ,Dayashankar Das,Jyotish Dubey,Shah Maitry
Abstract : Radio Frequency Identification (RFID) technology is a very useful technology in automation.RFID along with Arduino can be used to monitor illegal parking of vehicles at specific places in city which is one of the most challenging issues in big cities. This paper proses a system that will monitor illegal parking of vehicle and alert the owner via email that will consist of fine amount and the due date of fine payment. The RFID tag on vehicle will act as transmitter and the Arduino along with RFID reader module will act as a receiver.
Black Book Serial Number: SLRTCE/IT/Blackbook-15/2018-19
Title : Severity Estimation and Food Recommendation for Diabetic Patient using Data Mining
Guide Name: Prof. Satish Ranbhise ,SLRTCE,Mira Road,M.Tech
Group Members Abhishek Gupta ,Nilesh Dubey,Rohan Kadam,Deepak Rai
Abstract : Data mining plays an efficient role in prediction of diseases in health care industry. Diabetes is a metabolic disease where the improper management of blood glucose levels led to risk of generating abnormalities in functioning of critical organs like heart, kidney, eye etc. So the patients need to visit their specialist for observing sugar level related risks and sit tight for a day or more to get their conclusion report, they need to squander their cash futile as well. The proposed system calculates severity by using ID3 algorithm, Machine Learning approach based on the input given and at the same time it will recommend what food should be consumed by the patient to avoid health hazards.
Black Book Serial Number: SLRTCE/IT/Blackbook-16/2018-19
Title : safety app
Guide Name: Prof. Anil Chaturvedi,SLRTCE,Mira Road,M.E
Group Members Ashish Yadav ,Nilesh Yadav,Vikas Yadav,Anish Wishwarkarma
Abstract : In today’s world, people using smart phones have increased rapidly and hence, a smart phone can be used efficiently for personal security or various other protection purposes. The heinous incident that outraged the entire nation have waken us to go for the safety issues and so a host of new apps have been developed to provide security systems to women via their phones. This paper presents Abhaya, an Android Application for the Safety of Women and this app can be activated this app by a single click, whenever need arises. A single gesture on this app send  the location of place through GPS and sends a message comprising this location URL to the registered contacts and also call on the first registered contact to help the one in dangerous situations. The unique feature of this application is to send the message to the registered contacts continuously for every five minutes until the “stop” button in the application is clicked. Continuous location tracking information via SMS helps to find the location of the victim quickly and can be rescued safely.
Black Book Serial Number: SLRTCE/IT/Blackbook-17/2018-19
Title : Management of College Information System
Guide Name: Prof. Sunil Yadav,SLRTCE,Mira Road,M.E
Group Members Kumar Gandharva Singh ,Rohit Yadav
Abstract : The college has upgraded everything from teaching methods to issuing books from library but, it still uses traditional method for taking attendance. This causes wasting of paper and poor management. Our motive is to manage attendance in a digitalized way which will result in faster processing. Our app will take attendance with the help of teacher and will update the data automatically on the computers. It will also have the function of taking feedback from students in an appropriate way. It will have the feature of sharing attendance records with different third-party apps.

• This app is also capable of auto-generating Implementation Report.

• It will also have the option for sending meeting notification.

• It will be used to provide any kind of notifications to students and college staff.

Black Book Serial Number: SLRTCE/IT/Blackbook-18/2018-19
Title : Image Security Using Visual Cryptography
Guide Name: Prof. Reena Kothari,SLRTCE,Mira Road,M.E
Group Members Prashant Rai ,Pradhuman Tiwari,Priyanka Bhaskar,Rahul Jethva
Abstract : The visual cryptography is a type of cryptography  that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand the distorted image and thus the data communication become secured. It exploits the human visual system to read the secret message from some overlapped shares. This technique overcomes the disadvantage of complex computations required in traditional cryptography. Visual cryptography can also be applied to color images by converting them into black and white binary images. In this research work, visual cryptographic technique is proposed and encryption and decryption are done using Blowfish algorithm. The proposed technique is implemented with Matlab coding.
Black Book Serial Number: SLRTCE/IT/Blackbook-19/2018-19
Title : KAS Encryption for Group data sharing via cloud computing
Guide Name: Prof. Saurabh Suman ,SLRTCE,Mira Road,M.E
Group Members Shivam Mishra ,Aashukumar Kandu,Ashish Pandey,Raghavendra  Jha


Abstract : The Key-Aggregate Searchable Encryption (KASE) is a public key encryption scheme which is adapted from key-aggregate cryptosystem scheme and multi-key searchable encryption scheme. KASE is a type of tree structure which will explain the type of cipher-text which can be decrypted by using the key. Key-aggregate searchable encryption is a framework scheme which is described as where a data owner only needs to generate and distribute a single aggregate key to a data user for sharing a large number of documents and on the other side only needs to submit a single aggregate trapdoor to the cloud server, so that he/she can query over the shared documents by the help of generated single aggregate trapdoor. KAS Encryption framework scheme is perfectly more secure, flexible and practically efficient. In this group of selected documents need to be shared with any group of different user’s desire by right different encryption keys to be used for different documents. However need of producing complex number of keys for both process i.e. encryption and search, and distributing to different users and those users will have to safely store the keys and put forward complex number of keywords trapdoors to the clouds in order to search for data.


Keywords: Searchable encryption, data sharing, aggregate key, data owner, trapdoor. Cloud Storage, Data Privacy, Cryptosystem, Authentication.


Black Book Serial Number: SLRTCE/IT/Blackbook-20/2018-19
Title :  
Guide Name: Prof.Komal Champanerkar, SLRTCE,Mira Road, M.E
Group Members Priyan Sharma ,Sujit Jawal
Abstract :  
Black Book Serial Number: SLRTCE/IT/Blackbook-21/2018-19