about the institute - iilmcet.ac.in · and motivates students to become lifelong learners. about...
TRANSCRIPT
About the Institute
The ecologically balanced green campus, which is spread over 25 acres of land relentlessly its best in producing thousands of scholars, professionals, technocrats and entrepreneurs by imparting quality education, promoting innovation culture strengthened by dedicated and qualified faculty.
Vision
To emerge as a leader in value- based responsible and responsive Engineering & Management education coupled with entrepreneurship focused industrial research.
Mission
To develop responsible business leaders, technocrats, and entrepreneurs through an education based on ethical values resulting in knowledge and skills valued by employers leading to employability.
Application-oriented research relevant to engineering and management that flows into the learning process.
Inspirational and creative teaching which encourage students to assimilate, analyze and apply relevant knowledge.
A personalized mentoring process which admires individuality and motivates students to become lifelong learners.
About the Department
Department was established in the year 2002, with the aim to deliver quality education. Apart from making students acquainted with the course curriculum, it also gives an emphasis on their regular exposure to emerging technologies, application-based learning, futuristic technologies, workshops, seminars and conferences through industry-academia interaction programs, corporate visits, invited lecturers and talks. Well qualified faculty and state of the art computer labs continuously thrives to offer short term courses for the enhancement of placement chances. It is bestowed with “accreditation” by National Board of Accreditation.
Vision:
The department aims to produce competent professionals with strong technical, research and managerial skills in addition to ethical values.
Mission:
M1: Developing strong mathematical & computing fundamentals among students that form the baseline for building IT solutions.
M2: Provide quality education to produce the competent engineers with technical and managerial sktiving its ills to fulfill the present societal requirements.
M3: Involve in research based projects/activities in the emerging areas of computer science and information technology.
M4: Inculcating professional ethics to serve the interests of the society and nation.
Department of Computer Science and Engineering is working in the
field of education and is continuously organizing various events to
promote innovation and research. As an effort towards inculcating
research and innovation culture; 2-days National Conference on
“Research Aspects in Internet of Things” sponsored by Dr. A. P. J.
Abdul Kalam Technical University, Lucknow under VRPS scheme
was organized on July 21-22, 2017. Eminent speakers from industry
and academia graced the occasion and shared their valuable thoughts.
Good number of scholars presented their research findings. To
continue the trend, COMTECH 2019-2nd National Conference on
Recent Innovations in Computer Science and Information
Technology is being organized dated 2nd March, 2019 with the
vision to explore latest advances in the field of Computer Science and
Information Technology. Objective The main objective of the Conference is to promote research and
developmental activities in the field of computer science and
information technology by bringing eminent speakers form industry
and academia together. It also provides ideal platform for young
researchers to present their research findings and innovative ideas for
sustainable development. In addition, it motivates engineering
students to work towards new perspectives of contemporary
computing.
Outcome The Conference will significantly contributes and enriches the
knowledge in incorporating recent developments and trends in
interdisciplinary fields of computer science and information
technology and encourage researchers to inspire others to work
towards new perspective and provide scope for future alliance in
their career.
Theme
Big Data
Cloud Computing
Deep Learning
Aritificial Intelligence
Natural Langugae Processing
Parallel and Distributed computing
Energy System and Management
Internet of Thing
VLSI Design
Embeded System
Data Science
Patrons
Mr. Ajay Singh, Sr. Director, CET-IILM-AHL
Dr. Meenu Singh, Director, CET-IILM-AHL
Mr. Ashis Mukherjee, Dean, CET-IILM-AHL
Conference Chair
Dr. Hamlata J.Bhat
Professor & HoD, CSE
Convener
Dr. Anuradha Konidena
Associate Professor, Dept. of CSE
Co-convener
Dr. Manjula Shanbhog
Associate Professor, Dept. of CSE
Organizing Committee
Dr. Vaibhav Panwar
Associate Professor, Dept. of CSE
Dr. Amit Asthana
Associate Professor, Dept. of CSE
Ms. Neha Bhatia Arora
Assistant Professor, Dept. of CSE
Ms. Roopali Goel
Assistant Professor, Dept. of CSE
Mr. Vikas Singh
Assistant Professor, Dept. of CSE
Ms. Swati Singh
Assistant Professor, Dept. of CSE
Student Organizing Committee
Manasvi Srivastava
Sarthak Das Gupta
Himanshu Singh
Abhishek Rai
Tamal Krishna Sarna
Vasu Kapoor
Vidur Sharma
Shahbaz Ali
Sharad Shakya
Monika Mukul
Lisa Kushwaha
Aman Kumar Singh
Ashish Tripathi
Aryan Bharadwaj
Pranjal Khare
Noor Alam
Conference Advisory Committee
1. Mr. Vikas Lamba, CEO, Yash Parv Pvt. Ltd., Bengaluru. 2. Dr. Brijendra Singh, Professor & HoD CSE, Lucknow
University,Lucknow.
3. Dr. P. Shrivastava, Information Professionals, AIIMS, Delhi. 4. Dr. S. C. Raghavendra, Asso. Professor, E lectrical Engg.
Dept., Abu Dhabi.
5. Ms. Sangeeta Tagare, CEO, Apeiron Business Solutions, Bengaluru.
6. Dr. Aparna Bhale,Director,Panglossian Career Consultant, Pune. 7. Dr. Rajat Mittal, Asso Professor, Dept of CSE, IIT, Kanpur.
Conference Technical Committee
1. Dr. Rizwan Beg, Director, ZH Institute of Technology & Management,
Agra. 2. Dr. Rajeev Srivastav, Professor & HoD, Department of Data
Sciences, UPES, Dehradun.
3. Dr. Atul Agarwal, Professor, Dept. of Data Sciences, Ansal
University, Gurugram.
4. Dr. Ashish Dubey, Professor & HoD, Data Sciences, BITS Ranchi,
Ranchi.
5. Dr. Ramesh Manza, Associate Professor, Dept. of CS/IT, Dr. Babasaheb
Ambedkar Maratwada University, Aurangabad.
6. Dr. Ashok Gaikwad, Director, IMSIT, Vivekanand College of Arts,Commerce & Science, Aurangabad.
7. Dr. Parmanand Astya, Dean, SET, Sharda University, Greater Noida.
8. Mr. Umesh Kad , Head IT Infra, Wipro Technologies, New Delhi. 9. Mr. Adesh Katiyar, CTO, iDreamBiz, Noida. 10. Mr. Ayush Gupta, Technical lead, Bank of America, Gurugram. 11. Dr. Shivani Goel, Professor, Dept of CSE, Bennett University,
Greater Noida. 12. Prof. Ashok Harnal, Professor, Fore School of
Management, New Delhi. 13. Dr. K.Rama Krishna, Prof. & HoD, CSE, IIMT, Gr. Noida. 14. Dr.( Mrs.) Suraiya Jabin, Asso. Prof., Dept. of CSE, Jamia Millia
Islamia, New Delhi.
SR. DIRECTOR’S MESSAGE
It is my pleasure and privilege to address an august gathering of computer science professionals, educators and students through the second National Conference - COMTECH 2019 on the theme of Recent Innovations in computer Science and Information Technology.
The cyber world of today is the backbone of everyday life. The computer science & engineering fraternity is responsible for transforming human life to a comfortable and productive
environment for the benefit of society at large. It is said that any innovation is not an end by itself, but mother of future innovations. The realm of computer science and engineering is all about being a steady breeding ground for innovation
The continuous developing complexity, precision and speed of the software are progressively making the hardware resource hungry each year. A new vocation of cyber security has emerged and shall continue to be in prominence. The science of biometric identification will be developed further to identify and differentiate human decision and action vis-à-vis decision or actions emerging from IOT devices and robots. Research on vein identification systems is in its conclusive phase.
Cloud computing, data mining, virtual imaging and navigation and programming for IOT devices is likely to feature as the key domain of the computer scientists of India for the next decade. Mobile Ad hoc Networks or Wireless Ad hoc Networks are going to revolutionize and simplify networking of devices, along with Wireless Sensor Network Technology (WSN). Autonomous self-driving vehicles are inevitable, and so is Vehicular Ad hoc Network (VANET) to provide a secure and safe transportation system for the future. The complexity of image and signal processing will continue to be demanding for the software engineers. Network Security and Cognitive Radio will be stabilized and pressed in to service widely during this decade.
I am sure Comtech 2019 will prove to be a transformational platform for our students to think differently and launch them on a quest for technological excellence for the future of mankind.
DEAN’S MESSAGE
In the recent past we have seen a revolution in Computer Science (CS) and Information Technology (IT). All indications are that the progress and use of IT will continue at a rapid pace. This, together with the declining cost of communications, doubling of processing power every 18 months is leading to innovations in IT that have a wide-ranging effect across society, social policy, economic activity, Intellectual Property (IP) rights, privacy protection, etc.
The choices we make today will have long-lasting consequences and thus attention must be paid to the social and economic impacts of our work at every stage. The infusion of Technology, especially Artificial Intelligence (AI) and Machine Learning (ML) into our daily lives has moved from Science Fiction to Reality. Our decisions, behaviour and actions are all affected by Technology today. In this scenario, it is imperative that as technical people we are abreast of the recent innovations in the field and thus can exploit technology to the fullest.
In this context, I commend the faculty of the Department of Computer Science and Engineering, IILM College of Engineering and Technology, greater Noida for organising COMTECH 2019 on Recent Innovations in Computer Science and Information Technology. The interaction with corporate leaders, academicians, scientistsand research scholars will undoubtedly lead to discussion, sharing and collaboration thus providing a great learning platform to the students and the future technologists. We are all looking forward to a scintillating set of discussions on the most recent innovations, trends, challenges and concerns as well as solutions in the fields of CS and IT.
I wish the Conference all Success!
DIRECTOR’S MESSAGE
On behalf of IILM College of Engineering and Technology, I am
honored to take this propitious opportunity to welcome our Chief
Guest, eminent speakers and delegates for COMTECH 2019.
Since technology and innovation are now the established rules of
industry and therefore, compelling many organizations to
reconfirm their role in providing ways for hybrid & flexible IT
strategies, more fluid processes and options for their continuous
re-evaluation. Another important thing to sustain and lead in long term is to drive in - all
the advance and excited developments like-Automation, artificial intelligence, machine
learning, block chain technology, internet of things, big-data analytics, portability etc to
leverage in terms of growth.
While experiencing the exponential growth and forecasting the future prospectus, this
new agile wave of technology demands the platforms like COMTECH 2019 for
researchers and think-tanks to join hands together to address the issues and concerns
related to the field, and come out with new possibilities.
The insights shared by the young scientists, academicians and industry personnel on the
forum of COMTECH 2019 will have substantial influence on societal well being.
Conference will also encourage our faculty members and students to work towards new
perspectives in the fields of Computer Science & Engineering and Information
Technology.
CONFERENCE CHAIR’S MESSAGE
It gives me immense pleasure in welcoming, on behalf of the entire team of Department of Computer Science and Engineering CET-IILM-AHL, the delegates and the participants to thisCOMTECH-2019, 2
nd National Conference on
Recent Innovations in Computer Science and Information Technology.
COMTECH-2019 is an opportunity for researchers, practitioners, educators and most importantly students, to be an enriching and learning experience through the knowledge sharing sessions with the acclaimed expects from academia and corporate.
Computer Science and Information Technology is a great Enabler for increasing Productivity, Effectiveness and Delivery. Through Technology, people have created a much better world and still there is tremendous research going on for further innovating technology to create value for mankind. In today‟s increasingly interconnected world, global population is able to exchange ideas and broaden their horizons. This is the most visible impact of rapid advancement in the area of Computer Science and Information Technology advancements.
We hope that this conference will provide numerous opportunities to participants to share practical innovative ideas and research for the betterment of the Universe. The success of the conference depends on many people who have worked with us in planning and organizing the various tasks. In particularly, the efforts put by Dr. Anuradha Konidena, convener and Dr. Manjula Shanbhog, co-convener of the conference is much appreciated. The creative thinking and brilliant new routes to academic excellence suggested by them has helped to carryout smooth functioning of conference. The effort of the entire Orgnising Committee Comprising of, Ms. Swati Singh, Ms. Neha Arora, Mr. Vikas Singh, Ms. Roopali Goyal, Dr. Amit Asthana and Dr.
Vaibhav Panwar are praiseworthy. We would also like to put on record the untiring efforts of Staff Members and Students Volunteers.
The Conference Advisory and Technical Committee Members, our Patrons Mr. Ajay Pratap Singh (Sr. Director-CET-IILM-AHL), Dr. Meenu Singh (Director CET-IILM-AHL), Mr. Ashis Mukerjee (Dean-Academics CET-IILM-AHL) and other functionaries have been support in enabling us to upgrade our benchmarks regarding the Conference. I take this opportunity to express my deep gratitude to all of them for their contributions in making this conference a huge success.
Dr. Hamlata J. Bhat
HoD, CSE CET-IILM-AHL
Convener’s Message
Computer Science Engineering and Information Technology affect the quality of life in various facets. Convergence of driving forces of IT like Cloud
computing, Data Sciences, ubiquitous computing is strengthening pathway for Innovation and fostering services endowed by Information technology. New technologies, transversal and pervasive, represent an inexhaustible potential for innovation and problem solving related to the interaction between man - machine in complex industrial work environments and provide a contribution in terms of efficiency and productivity. Strong knowledge of fundamentals is a prerequisite of innovation. Events like COMTECH 2019 wherein experts from academia and industry share their insights about recent innovations in Computer Science & Engineering and Information Technology will not only help in identifying various research areas, challenges and solution to some of them but also contribute to all three dimensions of sustainable development goals – economic, social and environment.
Dr. Anuradha Konidena
Convener
Department of Computer
Science Engineering
CET-IILM-AHL
Co-Convener’s Message
The current world is techno - centric more than ever and technology is progressing at an accelerated pace. The technology of computer science and Information is invisibly embedded in the environment around us. This technology in future will transform the real world objects into intelligent virtual objects and aims to
unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In this era of globalization, the exchange of knowledge and skills has given a further fillip to the exponential growth in the field of technology. Such phenomenal advancements have revolutionized almost every sphere of human life today. The ultimate use of technology should be for understanding true reality of nature, minimization human sufferings and making human beings more happy by providing material comforts. With each new advancement it becomes increasingly more difficult to stay ahead of the latest theories, methods, and techniques. COMTECH 2019 „The 2nd National Conference on Recent Innovations in Computer Science & Information Technology‟ provides a platform to learn , explore and develop insights into the interdisciplinary approach by bringing together the academicians, researchers, scientists, engineers, technocrats, students and industry professionals from various institutions, universities, colleges and industries to share and discuss the ideas, technologies and research findings. The purpose of conference is to promote research and also to ignite young research oriented and innovative brains in the field of futuristic emerging technology.
Dr. Manjula Shanbhog
Co-Convener
Department of Computer
Science Engineering
CET-IILM-AHL
Our Eminent Speakers
Chief Guest
Mr. Vikas Lamba
CEO, YashParv Ltd.
Keynote Speaker
Dr. Suraiya Jabin
Associate Professor,
Department of CSE
Jamia Milia Islamia, New Delhi
Session Chair
Dr.Atul Agarwal
Professor.
Department of Data Science
Ansal Univer
COMTECH 2019
The 2nd
National Conference on Recent Innovations in
Computer Science and InformationTechnology
SATURDAY, 2nd
March 2019
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
CONFERENCE SCHEDULE
9:00 AM-10:00 AM Registration
10:00 AM-11:30 AM
Inaugural Session
Lighting of Ceremonial Lamp & Invocation of Goddess Saraswati
Welcome Address Mr. Ajay Pratap Singh, Sr. Director,CET-IILM-AHL
Formal Address Dr. Meenu Singh, Director, CET-IILM-AHL
Conference Address Dr. Hamlata J. Bhat, Prof. & HOD, Dept. of CSE
Address by Chief Guest Mr. Vikas Lamba, CEO, Yash Parv Pvt. Ltd., Bengaluru
Key Note Address Dr. (Mrs) Suraiya Jabin, Associate Prof., Dept of CSE, Jamia Millia Islamia, New Delhi
Release of Souvenir & Felicitation of Guests
11:30 AM-12:00 NOON Networking Tea Break
12:00 NOON-1:30 PM
Technical Session 1 - Recent Innovations in Computer Science
Keynote Address Session Chair- Dr. Atul Agarwal, Prof. & HOD., Dept. of Data Sciences, Ansal University, Gurugram
Paper Presentation Participants
1:30 PM-2:30 PM Networking Lunch Break
2:30 PM-3:30 PM Technical Session 2 - Recent Innovations in Information Technology
Paper & Poster Presentation Participants
3:30 PM-4:00 PM
Valedictory Session
Certificate Distribution, Feedback, Felicitation, Vote of Thanks
INDEX
Sno Title of paper Page no
1 A Study of Users Perception towards E-Wallet Security 1
2 Management Information System and Its Implications in Business 2
3 Impact of Last Mile Delivery in E-Commerce Industry: A
Indian Customers’ Perspective 3
4 Internet of Things based wearable health startups: A study
of demographic challenges to adoption 4
5 Big Data Analytics in Radiology: A Boom in Health-care Industry 5
6 Big Data, IOT and Manufacturing: Made For Each Other 6
7 Study of Wireless Network Protocol with special
Attention to MAC 7
8 Implementation and Validation of Boolean law by
Implementing a function using universal gate in Optical domain 8
9 Big Data with different NoSQL Paradigm 9
10 Comparative Investigation On different data
Mining on Internet of Things 10
11 AI in Health-care 11
12 Load Balancing Techniques of Cloud Computing 12
13 Study of Various Automatic Pet Feeder System 13
14 Investigation of development aspects of an Online
Medical Outlet App for C2B and B2B 14
15 Security Aspects of Cloud Computing 15
16 Leveraging Internet of Things in Defense 16
17 Attributes of Data Quality in Data Warehousing 17
18 Lifelong Learning with Dynamically Expandable Networks 18
19 Artificial Intelligence in Defense System 18
20 E-Bomb 19
21 Quantum Computers 20
22 Anti Aliasing Technology for Pixels between edges 21
23 Cloud computing 22
24 Fog Screen: Walk Through Magic 23
25 Blockchain 24
26 DNA Data Storage 25
27 Ethical Hacking 26
28 Quantum Computing 27
29 Artificial Intelligence In Medical Science 28
30 Android 29
31 Machine Learning 30
32 Data Mining 31
33 Deep Affordance- grounded Sensorimotor Object Recognition 32
34 Blockchain 33
35 Posters 34
A Study of Users Perception towards E-Walllet Security
Ms. Antara Anandita Mr. Swapnil Undale Dr. Ashish Kulkarni
Student Assistant Professor Assistant Professor
MIT School of Management MIT School of Management MIT School of Management
Pune Pune Pune
Abstract: The E-wallet is an online prepaid payment system where one can save and user
their stock money, and they can use that money when it is required. As it is a part of the pre-
loaded facility, customers can buy a wide range of products from bus tickets to airline tickets,
grocery, shopping and more without even using your cash in your hand and also without even
swiping your credit or debit card. The paper objective was to find out users perspective of e
wallets and its security. Quantitative research approach is used for this study. A structured
questionnaire was developed and survey was conducted from the respondents. It was found
that 87% of the respondents use e-wallets and 23.% of people were highly comfortable with e-
wallet transactions. The users have suggested different security measures that can be
implemented to ensure the security of e-wallet in which finger print detection can be the most
helpful measures amongst all others
Keywords: Cashless, E-Wallet, Security, Digitization
1
Management Information System and Its Implications in Business
Dr. Sharuti Choudhary
Asso. Prof.- IILM Graduate School of Management
Abstract:- The concept of the Management Information System (MIS) has evolved
over a period of time comprising many different facets of the organizational functions.
MIS provides information for the managerial activities in an organization. MIS is the
key factor to facilitate and attain efficient decision making in an organization. It
provides accurate and timely information necessary for decision-making and enables
the organizations to plan, control and operate in an efficient way. It is a necessity of all
the organization. It is basically concerned with processing data into information and is
then communicated to the various departments in an organization for appropriate
decision-making. MIS is a subset of the overall planning and control activities covering
the application of humans, technologies, and procedures of the organization. The
information system is the mechanism to ensure that information is available to the
managers in the form they want it and when they need it. The MIS, therefore, is a
dynamic concept subject to change, time and again, with a change in the business
management process. It continuously interacts with the internal and the external
environment of the business and provides a corrective mechanism in the system so that
the change needs of information are with effectively. The present paper made an
attempt as a conceptual study to highlight about Management Information System and
its implications in Business.
Keywords:- Management Information Systems (MIS), Information Technology,
Decision Making
2
Impact of Last Mile Delivery in E-Commerce Industry: An Indian
Customers’ Perspective
Sunil Kr Vishwakarma Dr Smriti Asthana
Operations Executive CII School of Logistics
Gati-Kintetsu Express Private Limited Amity University, Noida
Abstract:-E-commerce as the fruit of internet and commerce is growing with a rapid
speed in India. It has not only contributed to the economy, but also has shaped people‘s
way of living, especially with the service of home delivery. Today a consumer enjoys
the various choices of products with reasonable prices and the convenience of receiving
the parcels with a single click of a mouse. Meanwhile, the problem of not-at-home and
repeated delivery have caused trouble for both consumers and logistics providers.
Therefore, it takes a lot of cooperation and innovations to build this convenience, which
we call ‗last mile delivery‘.
This research paper aims at identifying the bottlenecks and exploring the possible
solutions to these bottlenecks in the last mile delivery service in India, under the
background of growing popularity of e-commerce from the perspective of consumers.
Since consumer needs are in the center of e-commerce and last mile delivery for any
company in the world, thusthe researchers have made an attempt through this research
paper to bring to light the consumers‘ expectations and the factors that determine their
present satisfaction level from the last mile delivery, this will give an important
direction and implication for e-commerce retailers and the logistics service providers in
India.
Keywords:- Last Mile Delivery, E- Commerce, Logistics Service Provider, Third Party
Logistics
3
Internet of Things based wearable health startups: A study of
demographic challenges to adoption
Shweta Nanda Amrit Millick
Asst. Professor PG student
IILM Graduate School of Management IILM Graduate School of Management
Greater Noida Greater Noida
Abstract:- To make the present traditional health care model more sustainable focus of
healthcare needs to be envisioned to the integrated health care service model wherein
not only the technology behind the remote connected care (Internet of Things) but the
strategies to implementation plays a huge role to overcome the challenges of penetration
.
The Internet of Things (IoT) is a network of physical devices and other items, embedded
with electronics, software, sensors, and network connectivity, which enables these
objects to collect and exchange data. In addition to cost containment, IoT also allows to
keep up with constant innovation and shorter product lifecycles, gather real time data for
augmented intelligence, and create end-to-end communication from
wearable/implantable/ingestible diagnostic tools to treatment decisions to ICU
monitoring to post-discharge care.
This paper focuses on the challenges in the adoption of the IoT based remote healthcare
model by various health stakeholders. The shared learning from the domains of
industry/startups, physicians/hospitals, IOT policy framework and a study across vivid
health research papers, helps to map the physician‘s perspective and the key behavioral
concepts in the adoption of these devices by prospective customers.
Keywords:- Internet of Things, sensors, software.
4
Big Data Analytics in Radiology: A Boom In Healthcare Industry
Mr Abhinav Gyan Mr.Mohit Saini
Assistant professor Assistant professor
Doon Business School Doon Business School
Dehradun Dehradun
E-mail:[email protected]
E-mail: [email protected]
Abstract:- Data plays a very significant role in the field of Medical Science. Since
Medical field is demand of the Era hence it is very important to have a proper
methodology to check, analyze and process the data.
Form of data in Healthcare especially –Radiology is more of Structured but highly
scattered because of which it becomes really difficult to get a proper outcome for a
specific Patient.
In today‘s world, if we talk about developing nation like India amount of data
getting generated for every patient from Radiology has a steep rise of around 200
% in last decade. It is getting very difficult to keep the Historical as well as the
Current data without any relevant output. Additionally, radiologists will have more
access to data than ever before, making the ability to draw patterns and connections
between different sets of images possible. The more access to historical data you
have, the better you can predict future anatomical changes in a patient.
Medical imaging is vital and each year in the US about 600 million imaging
procedures are performed. Analyzing and storing manually these images is
expensive both in terms of time and money, as radiologists need to examine each
image individually, while hospitals need to store them for several years.
Hence Analytics plays a very important and crucial role in Radiology
Keywords: Big data, Analytics, Healthcare, Radiology
5
Big Data, IOT And Manufacturing : Made For Each Other
Senaritra Chowdhury Dr Sandhya Rai
IILM Graduate School of Management IILM Graduate School of Management
Greater Noida Greater Noida
Abstract:- Big Data is a buzzword that is used more often in nowadays. But the
most necessary thing is the understanding and implications of Big Data. Most of the
businesses today‘s world support its manufacturing process with large data sets,
commonly known as Big Data, as well as supporting the production and
manufacturing activities with advanced analytics of Big Data. Nowadays, most of
the companies are looking forward for a cost minimized, efficient and innovative
production process that will help to align the growth of the company with the long
term sustainability. On other side the size of data in an organization relating to the
manufacturing, i.e. the various source of inputs, raw material supplies, Production
per hour, overhead cost, supply chain etc., is also increasing. It‘s necessary for an
organization to analyze all these data, which ultimately helps to make decision in
operational, tactical and strategic level management. Aiming at it most of the
companies spends heavily on maintaining database of the organization in form of
Data Mart and Data Warehouse. It makes easier to store and retrieve data, whenever
necessary at any stage of production. Internet of things (IOT) has also made it easier
to analyze the big data to get required information.
The aim of the paper to understand the usage of UOT in manufacturing sector.
Keyword: Big data, manufacturing, IOT, data.
6
Study of Wireless Network Protocol with special attention to MAC
Mrs. Suman Pasrija Dr. Ajay Kumar
Research Student Research Guide
SavitribaiPhule Pune University, Pune SavitribaiPhule Pune University, Pune
Abstract:- A network of randomly deployed nodes which senses information from the
environment is called as a Wireless Sensor Network (WSN). All communications within
wireless sensor networks takes place between source and destination. The destination is
called as base station or sink. Resources of a network are limited. Therefore, factors like
congestion, delay affect the performance of the network. Improper utilization of the
communication channel or insufficient bandwidth for communication are a few reasons
for occurrence of congestion in a network. So, to reduce the bandwidth problem and
traffic congestion problem over the network, we have proposed the sectoring technique.
In the proposed sectoring technique sectors are formed according to the number of sector
heads. The sectoring technique reduces the bandwidth problem and traffic congestion
problem.
Keyword:- Wireless Sensor Network, Packet transmission, Sink node, Bandwidth,
Congestion, MAC Protocol, Quality of Services (QoS).
7
Implementation and Validation of Boolean law by implementing a
function using universal gate in optical domain
Dr. Vanya Arun Kapil Bodha
Department of Electronics & Department of EIE
Communication Engineering Galgotia College of Engineering &Technology,
CET-IILM-AHL
Abstract— The opto-electronic conversions at the processing node of optical network put
restrictions on the advantages provided by the optical communication system. To
eliminate this conversion, processing should be done in optical domain. Moving in this
direction the proposed manuscript proves a Boolean law that any function can be
implemented using a universal gate, holds good in optical domain as well. In this paper
optical circuit of NOT, AND and XOR gate is designed using all optical universal gate
(NOR gate). A novel design of photonic NOR gate is proposed, cascading five of such
NOR gates in a particular sequence implements various photonic gates. The main
components in designing the basic NOR gate are Semiconductor optical amplifier (SOA)
and 2X2 optical coupler. The non linearities of SOA such as cross gain modulation
(XGM) and cross phase modulation (XPM) are exploited to get the desired output. Two
parameters, quality factor (QF) and extinction ration (ER) are analyzed to predict the
performance of the designed circuit. The performance parameters are recorded for
different NRZ input pulses like on-off, on-off exponential, on-off ramp and raised cosine
.
Keywords:— Cross Gain Modulation (XGM), Cross Phase Modulation (XFM), Extinction
Ration (ER), Quality Factor (Q), Semiconductor Optical Amplifier (SOA).
8
Big Data with different NoSQL Paradigm
Dr Amit Asthana, Dr.Manoj
Associate Professor Vankatesh University,
CET-IILM-AHL Gajrola, India
Abstract:— Digital world is advancing by leaps and bounds thus becoming complex in terms of volume, variety and velocity. This is called the Big Data i.e. a large chunk of combined structured, semi structured & unstructured data that cannot be steered by relational databases. A new trend referred to as web2.0 is now coming into picture due to massive growth in the Internet market and surfacing of the new web technologies[1]. In order to handle these challenges the concept of NoSQL technology has been evolved as an alternative to the traditional relational database systems. This paper targets at comprehending various aspects of NoSQL, its classifications, their characteristics and evaluation of each. It aims at providing answers of the problems of handling Big Data and their analysis.
Keywords:- NoSQL, ACID, BASE, CAP
9
Comaparative Investigation On different data mining on Internet of
Things
Swati Singh Ankur Sharma Md. Shanawaz
Assistant Professor CSE 3rd
Year CSE 3rd
Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- It‘s futile to link everything on earth together over internet, but Internet of
Things (IoT) will greatly change our life.The enormous data achieve by the Internet of
Things (IoT) are treated as highly useful, and data mining algorithms can be applied to
IoT to extract latent information from the data. This paper begins with a discussion of
IoT .Then, a brief review of the features ―data from IoT‖ and ―data mining for IoT‖ and
latest application cases are also surveyed. We reviewed the algorithms and discussed
challenges and open research issues. Finally this paper concludes the potential solution is
an effective way to protect the online users
.
Keywords: clustering, KDD, IoT
10
AI in Healthcare
Ms. Roopali Goel Itisha Sharma Krishna Saini
Assistant Professor CSE 1st Year
CET-IILM-AHL CET-IILM-AHL
Abstract:- The field of AI research was born at a workshop at Dartmouth College in
1956. Attendees Allen Newell (CMU), Herbert Simon (CMU), John
McCarthy (MIT), Marvin Minsky (MIT) and Arthur Samuel (IBM) became the founders
and leaders of AI research. They and their students produced programs that the press
described as "astonishing" computers were learning checkers strategies word problems
in algebra, proving logical theorems and speaking English. By the middle of the 1960s,
research in the U.S. was heavily funded by the Department of Defense and laboratories
had been established around the world. AI's founders were optimistic about the
future: Herbert Simon predicted, "Machines will be capable, within twenty years, of
doing any work a man can do". Marvin Minsky agreed, writing, "within a generation ...
the problem of creating 'artificial intelligence' will substantially be solved.
In the early 1980s, AI research was revived by the commercial success of expert
systems, a form of AI program that simulated the knowledge and analytical skills of
human experts. By 1985, the market for AI had reached over a billion dollars. At the
same time, Japan's fifth generation computer project inspired the U.S and British
governments to restore funding for academic research. However, beginning with the
collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a
second, longer-lasting hiatus began.
In the late 1990s and early 21st century, AI began to be used for logistics, data
mining, medical diagnosis and other areas. The success was due to increasing
computational power , greater emphasis on solving specific problems, new ties between
AI and other fields (such as statistics, economics and mathematics), and a commitment
by researchers to mathematical methods and scientific standards. Deep Blue became the
first computer chess-playing system to beat a reigning world chess champion, Garry
Kasparov, on 11 May 1997.
Keywords:- Healthcare, AI, Medical
11
Load Balancing Techniques of Cloud Computing
Kalpana Dr. Manjula Shanbhog
M. Tech CSE 3rd Sem Associate Professor
CET-IILM-AHL CET-IILM-AHL
Abstract::- The cloud computing is the architecture which is decentralized in nature due
to which various issues in the network get raised which reduce its efficiency. The virtual
machine migration is the major issue of cloud computing and it get raised when
uncertainty get happened in the network. Due to extensive use of the virtual machine
resources, machine gets overloaded which increase delay for the cloudlet execution. In
the base paper, the check pointing algorithm has been proposed which assign task to
most capable machine and hosts maintain check points on the virtual machines. At the
time the virtual machine get overloaded the cloudlet need to migrate to another virtual
machine. In the research work, weight based technique will be proposed which migrate
cloudlet from one virtual machine to another.
Keywords: Load balancing, Virtual machine migration, probability
12
Study of Various Automatic pet Feeder System
Gauri Bhale
ECE
Marathwada Mitramandal’s College of Engineering
Pune, Maharastra
Abstract:- Taking care of pet & its daily courses is a job of responsibility. Pets need to be
looked after with great concern. In today‘s fast life it has become a difficult task to monitor
activities of pet & feeding them time to time. Most of the time it happens that every
member of the house is out for some work & feeding cycle of pet gets disturbed. Advances
in technology have made it possible to care of pets from faraway places too. There is lot of
research work going on to develop various pet care systems which can help the pet owner
to fulfil the requirements of the pets while carrying out their own work. These pet feeder
systems are of great use as they not only feed the pets but also can keep record of the pet‘s
food habits, hygiene, timings & all other factor which ensures a healthy life of a pet. Thus
we can state that pet feeders are of huge benefit for both owners as well as pets.
Keywords: Pet Feeder, Pet care, Pet System, Pet Food, Pet food habit, pet hygiene
13
Investigation of development aspects of an Online Medical Outlet
App for C2B and B2B
Rakesh Kumar Kumar Shubham
CSE 4th
year CSE 4th
year
CET-IILM-AHL CET-IILM-AHL
Naveen Jaiswal Dr. Hemlata J. Bhat
CSE 4th
year HOD of B.Tech CSE
CET-IILM-AHL CET-IILM-AHL
Abstract: - E-commerce has an extraordinary impact on present business world.
But, there are still few areas of e-commerce that are largely unproven and relatively
new, specially medical and health care industries. Due to continues changes that are
taking place in business process and practices , the medical and health care
industries are moving with great speed in the cyber world. Therefore at present, e-
commerce has become the backbone of the medical and health care industries in
India and worldwide for managing cost, providing services and information to
patients all over the world. The proposed ―Online Medical Outlet App for C2B and
B2B‖ is an E-commerce Business Model. The objective of this investigation is to
develop an online app (i.e. e- chemist) that helps patients to get information about
the availability of medicine and purchase it online at anytime and anywhere.
Another significance of this application is to provide the details of doctors and
hospitals that exist in nearby areas, especially Delhi-NCR.
At the front-end, the app comprises customer module and admin module and in
backend there are medicine database, doctors‘ database and hospitals database. In
‗customer module‘, customer has to register and registered customers can easily
avail the product and services of the outlet. The ‗Admin module‘ is accessed by
administrator and he/she has right to verify the prescription uploaded by customer
and also add, delete, and update any information about the products and services.
The software requirements for development of app are Netbeans, MYSQL, Advance
Java, HTML and Java script and it works on any latest mobile technology as well.
Keywords: E-commerce, e-chemist, C2B, B2C, Netbeans, Advance Jave
14
Security Aspects of Cloud Computing
Pranjal Khare Swati Singh
CSE 3rd
Year Assistant Professor
CET-IILM-AHL CET-IILM-AHL
Abstract:- Cloud computing has become a significant and well-known term
without a short period of time. Some parts of it might even be considered as
unclear including its vague definition. Cloud computing has rapidly and
successfully come to perform an essential role within information technology and
therefore in how organizations to deploy a cloud solution. Despite the flourishing
growth of cloud computing it still has its draw backs. One of its problems has
come to be acknowledged as security issues, which has resulted in many
companies deciding not to deploy a cloud solution and instead retain their
traditional system. This qualitative study will come to investigate the perspective
of organizations regarding security within cloud computing. The aim is to outline
the security aspects conferred by Swedish organizations as there already is
existing information concerning issues. The empirical study is based on the
gathered information from conducted semi-structured interviews. This study
resulted in the findings of seven security aspects outlined by organizations, with
the main reason concerning the uncertainty and towards the services of cloud
computing. These security aspects are essential as they are set by organizations
that have the potentiality to become cloud users, but for certain reason decide not
to. From the outlined security aspects, a close relationship can be identified to the
already known security problems. These problems have strengthened the meaning
of the security aspects, and that they are based on real concerns that can be
connected to real problems.
Keywords:- Security, Cloud Computing, vague
15
Leveraging Internet of Things In Defence
Vidur Sharma Dr. Anuradha Konidena
CSE 3rd
Year Assistant Profesor
CET-IILM-AHL CET-IILM-AHL
Abstract:- As we look back in time during the world war 1 period, the first airplane flew in
1911 and a few years later the world witnessed the first battle in skies. People were quick to
implement this new invention for military use. Now, a century later vast invovations have
been poured in developing aircraft with capabilities that our forefathers could not have
thought of at that time. Keeping in mind these turn of events a century ago, we know how
every invovation can be leveraged in one sector or the other. In this paper, a detailed study of
how the concept of Internet Of Things can be useful for military use.
Keywords:- Sensors, Situational Awareness, Insurgency, Improvised Explosive Devices,
Combact Readiness
16
Attributes of Data Quality in Data Warehousing
Lisa Kushwaha Jyoti Aneja Ms. Neha Arora
CSE 3rd
Year CSE 3rd
Year Assistant Professor
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- Data warehousing is becoming popular as organizations become awake of the
benefits. A data warehouse system is used for the reporting and the data analysis. It is
based on the extraction of data from the operational systems. So data quality plays an
important role in the data warehousing. As this data is used from the data warehouse for
the different operations, analysis, marketing and decision making. Data quality always
depends upon the usage. The same data can be good quality for the one use and poor
quality for some other use. There are different ways to define the Data quality . Good
data is most important valuable asset and the bad data can harm the operations of
organizations. In general data quality is the ability of a given data set to serve an
intended purpose. If poor data is not identified and corrected early then lead to poor
decision which can have adverse impact on the company‘s operation. Attributes which
affect the quality of data are accuracy, completeness, timeliness, Integrity and
consistency. Analyzing the issues is important so that organizations or companies can
work efficiently.
Keywords:- Data warehousing, Data quality, Poor data, Good data,
17
Lifelong Learning with Dynamically Expandable Networks
Sudhanshu Dr. Vaibhav Panwar Mr. Vikas Singh
CSE 3rd
Year Associate Professor Assistant Professor
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract: - It is a deep network architecture for lifelong learning which is known as
Dynamically Expandable Networks (DEN). It has ability to decide its capacity as it trains
on sequence of tasks, to learn a compact overlapping knowledge sharing structure among
tasks. It is efficiently trained in an online manner by performing selective retraining,
dynamically expands network capacity upon arrival of each task with only necessary
number of units and effectively prevents semantic drifts by splitting or duplicating and
time stamping them. It validates DEN on multiple datasets under lifelong scenario. This
will not significantly outperform existing lifelong learning as the batch counterparts with
substantially few numbers of parameters.
Keywords:- Dynamic, Network, DEN
Artificial Intelligence in Defence System
Ritesh Kumar Dr. Vaibhav Panwar
CSE 3rd
Year Associate Professor
CET-IILM-AHL CET-IILM-AHL
Abstract:- Artificial intelligence (AI for short) is widely acknowledged to be one of the
mostdramatic technological game changers of our age. It is already starting – and is
expectedto continue – to have a disruptive impact on most walks of private and public
life.Defense and security will be no exception. Throughout history intelligence – the computational part of the ability to achieve goals in
the world – has played a critical role in deciding who came out on top in various contests
of wills.
Keywords:- Darktrace, Jask, Harvest.ai
18
E-Bomb
Akash Yadav Vivek Kr. Gupta Minaam Ishfaq
CSE 3rd Year CSE 3rd Year CSE 3rd Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:-It is the electromagnetic pulse (EMP) effect.
The electromagnetic pulse is an electromagnetic shock wave.
This pulse of energy produces a powerful electromagnetic field sufficiently strong to
produce short lived transient voltages of thousand of volts on exposed electrical
conductors like wires, printed circuit boards etc.
This can cause damage to wide range of electrical equipments particularly computers
and radio or radar devices.
Technology used areFlux compression generators (FCG) and Virtual cathode oscillator
or Vircator.
19
Quantum Computers
Siddhanto Utkarsh Sandeep Sharma CSE 3
rd Year CSE 3
rd Year CSE 3
rd Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- Quantum Computing is a computing technique in which computers known as
quantum computers use the laws of quantum mechanics for processing information.
Quantum Computers are different from digital electronic computers in the sense that
these computers use quantum bits known as qubits for processing. A lot of experiments
are being conducted to build a powerful quantum computer. Once developed, these
computers will be able to solve complex computational problems which cannot be
solved by classical computers. Quantum is the current and the latest topic for research
and thesis in computer science.
Quantum Computers work on quantum algorithms like Simon‘s algorithm to solve
problems. Quantum Computing finds its application in the following areas:
Medicines Logistics Finance Artificial Intelligence
The list is incomplete as there are a number of topics to choose from. But these are the
trending fields these days. Whether you have any presentation, thesis project or a
seminar you can choose any topic from these and prepare a good report.
Keywords:- Quantum, Logistics, Artificial intelligence
20
Anti Aliasing Technology for Pixels between edges
Monika Mukul Tamana Reshi Rohan Choudhary
CSE 3rd
Year CSE 3rd
Year CSE 3rd
Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
E-mail:- [email protected],
E-mail:- [email protected]
E-mail:- [email protected]
Abstract: - Anti-Aliasing is a term used to describe the software process of
making the edges of graphics, objects or fonts smoother. Accomplished by
adding additional pixels in between the edges of an object and its
background.
It makes curved or slanting lines smooth again by adding a slight
discoloration to the edges of the line or object, causing the jazzed edges to
blur and melt together. If the image is zoomed out a bit, the human eye can
no longer notice the slight discoloration.
Keywords: - Anti-aliasing, Pixel, Fake Resolution, Jaggy
21
Cloud computing
Uday Krishan Kol Dr. Anuradha Konidena CSE 3
rd Year Assistant Professor
CET-IILM-AHL CET-IILM-AHL
Abstract:- Cloud computing can be defined as a model for enabling ubiquitous, convenient and on-
demand network access to a shared pool of configurable computing resources that can be rapidly
provisioned and released with minimal management effort from the user side and minimal service
provider interaction. Cloud computing is considered the evolution of a variety of technologies that have
come together to change an organizations‘ approach for building their IT infrastructure.
Characteristics of the Cloud computing:
1 On-demand self-service.
2 Broad network access.
3 Resource pooling.
4 Rapid elasticity.
5 Measured Service.
Cloud services model
1 SAAS
2 PAAS
3 IAAS
1 SAAS:is basically a term that refers to software in the cloud. It represents the capability provided to
the consumer to use the provider‘s applications running on a cloud infrastructure. The applications are
accessible from various client devices through an interface such as a web browser (e.g. web-based
email like Gmail is a form of SaaS provided by Google).
2 PAAS: The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-
created or acquired applications created using programming languages and tools supported by the
provider.
3IAAS: The capability provided to the consumer is to make use of processing, storage, networks, and
other fundamental computing resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems and applications.
22
Fog Screen: Walk Through Magic
Shubhangi Saxena Anjali Kearwani Shivam Kumar
CSE 2nd
Year CSE 2nd
Year CSE 2nd
Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- There are a number of different large-screen display technologies
existing side by side with one anothery . Each kind of set has its own unique list of
benefits and trade-offs. Fog screen is one of the morden display technology trending
now a days.
Fog Screen is breakthrough technology that allows projection of high quality
images in the air. It is currently the only walk-through projection screen. We can
literally use the air as our user interface by touching only the air with our bare
hands. The screen is created by using a suspended fog generating device with no
frame around, and works with video projectors.The fog they use is dry, so it doesnt
make us wet even if we stay under the Fog Screen device for a long time. With two
projectors, we can project different images on both sides of the screen. It is a
display device which is the application of computer graphics.
In this , we'll talk about how fog screen has given wings to booming display skills
in world of technology and sciences . Because of this technology advertising in
marts have become easier . While there are endless ways to utilize the FogScreen,
we really believe that advertisers will greatly benefit from these devices. Capturing
audience attention has long been the "holy grail" of advertisers and marketers. It
provide a fully interactive solution to help increase brand awareness for those using
this technology.
Keywords: fog screen, display technology, computer graphics, water vapour,
advertsing companies, projectors.
23
Blockchain
Rishabh Srivastav Dhananjay Singh Dr. Manjula Shanbhog
CSE 2nd
year CSE 2nd
year Associate Professor
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
E-mail: [email protected]
E-mail: [email protected]
Abstract: Block chain is the type of technology where the digital transaction is a chain of
block that contains super safe information which is almost impossible to tamper. It is linked
using cryptography.
It serves as the public transaction ledger of crypto currency bitcoin. The reason behind the
block chain is that it provides security, anonymity and data integrity without any third party.
Governments have an interest in all three aspects of blockchain technology.
Basically, this paper highlights about the advantages and disadvantages of block chain
technology.
Keywords: Bit coin, Cryptography, Digital Transaction, Anonymity, Crypto currency.
24
DNA Data Storage
Noor Alam Rishu Ranjan Shivani Baliyan
CSE 2nd
year CSE 2nd
year CSE 2nd
year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Abstract—We are living in an age of digitalization where each and every second
tones and tones of data is generating from various sources, such as from research
labs to high power data analysis machines, from IT devices to space explorations
and many more. This increasing rate of data generation needs a huge amount of data
storage system. Nowadays we are using hard drives, flash drives etc which will not
be enough to store data with that immense speed very soon.
This is a review paper based on DNA data storage. The DNA storage is a kind of
system which is been used by nature for the millions of years. This review paper
explains how we can use the natural data storing capacity of DNA molecules to
store the artificial data that is archival information. This concept gives us a high
storage data capacity of high compatibility, high resilience ability with a half life of
approximately 500 years. It can hold up to 5.5 petabytes of data per millimeter
square area. This technology of storage is still in the development phase. Some
challenges are need to be taken care, for various fluctuations of data while storing
and retrieving it. This data storage technique could boom the way of storing data in
near future.
Keywords – nucleotides, pools, sequencing, recovery, PCR, DNA
25
Ethical Hacking
Aman Kr. Sringh Manasvi Srivastava Ashish Tripathi
CSE 2nd
year CSE 2nd
year CSE 2nd
year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
E-mail: [email protected]
E-mail: [email protected]
E-mail: [email protected]
Abstract:- In today‘s world, there is a expeditious growth in the economy and other
sectors with the advancement in the latest technologies which are now accessible to every
person. These technology has played a indispensable part which changing the lifestyle of
doing business.
Everyone needs these technologies for each and every work such as e-commerce, online
shopping, cloud computing, IT sourcing and virtualization. All these technologies are
dependent on the internet. These technologies are highly demanded, but they all are not
safe. With every technologies there is a highly risk of getting hacked. These technologies
having holes through which these hackers have entered in a person's data, company
resources, banking security and even national security issues.
As the result of this problem, thus came forward the name of ethical hackers for safe
resources. Ethical Hacking are also known as penetration test or white-hat hackers.
This paper describe ethical hackers, their skills there frame of mind and how they go
about helping their customers along with many of the challenges and opportunities in the
field of ethical hacking.
Keywords: Ethical Hacking, Vulnerability Analysis, Enslavement, Information gathering,
Information security. `
26
Quantum Computing
Vikas Yadav Suhel Bansal Shahbaz Ali Ms. Neha Arora
CSE 2nd year CSE 2nd year CSE 2nd year Assistant Professor
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract: Quantum computing is a quickly growing research field which started from a
simple question - “Can we simulate physics on a computer?”.
Traditional computers works on bits that exist as either 0 or 1. Quantum computers aren‘t
limited to two states; they encode information as quantum bits or qubits which can exist in
superposition. This superposition causes a phenomenon called quantum parallelism, and is
the motivating force behind the research being carried out in quantum computing. This
paper gives a brief review of what is happening in the field of quantum computing. At the
moment quantum computing still resides within a largely theoretical or speculative realm.
The potential is staggering, involving a computational power many times the order of all the
world‘s existing classical computers combined. But realising that potential is a fiendishly
difficult task.
Thereby, progress in this area could be catalyst for breakthrough in a range of important
areas, principle example being in the development of new drugs that can fight diseases that
still cast dark clouds on our existence. It does also offers a new paradigm for how might
problems can be solved with more precision.
Keywords: Quantum computing, qubits, superposition, quantum parallelism, entanglement.
27
Artificial Intelligence In Medical Science
Vishnu Sharma Abhishek Rai Sharad Shakya
CSE 2nd
Year CSE 2nd
Year CSE 2nd
Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstrct:-Artificial intelligence (AI) is the ability of computer or machine or system to sense,
comprehend, act, and learn .AI is being used in many fields; it can also be applicable in the field
of medical science. In many countries, due to lack of specialist doctors, expensive medicines and
incurable diseases patients are suffering.
In this paper we will discuss about how artificial intelligence can assist the doctors in their
treatment of various diseases and how it can minimize the cost of the medicinal equipments by
providing improved environment for the latest researches in organisations.
We will also discuss about the use of artificial intelligence in surgery and diagnose the disease by
image processing and how AI will help in predicting diseases by analysing the large data of
patients.
Keywords: Artificial Intelligence, Mortality, Diagnose, Comprehend, Predicting, Image
processing
28
Android
Akash Rajput Paras Mahajan Mr. Vikas Singh
CSE 2nd
Year CSE 2nd
Year Assistant Professor
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- Android is a software stack for mobile devices that includes
an operating system, middleware and key applications. Android is a
software platform and operating system for mobile devices based on the
Linux operating system and developed by Google and the Open Handset
Alliance. It allows developers to write managed code in a Java-like
language that utilizes Google-developed Java libraries, but does not
support programs developed in native code.The unveiling of the Android
platform on 5 November 2007 was announced with the founding of the
Open Handset Alliance, a consortium of 34 hardware, software and
telecom companies devoted to advancing open standards for mobile
devices. When released in 2008, most of the Android platform will be
made available under the Apache free-software and open-source license.
Keywords:- Android, Linux, Java
29
30
Machine Learning
Rishabh Srivastava Dr. Manjula Shanbhog
CSE 2nd
Year Associate Professor
CET-IILM-AHL CET-IILM-AHL
Abstract:- Data is the most crucial element of Modern Computing and a considerable
extent of data is available Everywhere. As a result it is very essential to analyze this data in
order to excerpt some appropriate information and to build an algorithm that is made
entirely upon this analysis. It can be accomplished through machine learning and data
mining. Machine learning is a subdivision of artificial intelligence that is
used to develop algorithm based on data and its relationship between data. It is used in
many fields such as malware detection, game playing, marketing , information retrieval the
most used application of machine learning is in business analysis through computational
statistics that is related to machine learning.
Keywords : - Supervised learning , Unsupervised learning, detection, clustering, neural
network
Data Mining
Ayush Yadav Amit Singh Abhishek Sinha CSE 2
nd Year CSE 2
nd Year CSE 2
nd Year
CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL
Abstract:- Data mining is the process of representing the way in huge data set including
methods at the joining of machine learning, statistics and database systems. Data mining is
an field of computer science to extract the information in the form of data sets then
transform the information in co messed form for further use. It is used by companies to turn
raw data into useful information. By using software for pattern in large batches of data,
businesses can learn more about their customers to develop more effective marketing
strategies, increase sale and decrease cost.
Keywords:- Data Mining, Machine Learning
30
Deep Affordance- grounded Sensorimotor Object Recognition
Manish Kumar
CSE 1st Year
CET-IILM-AHL
Abstract:- It is well-established by cognitive neuroscience that human perception of objects
constitutes a complex process, where object appearance information is combined with
evidence about the so-called object ―affordances‖, namely the types of actions that humans
typically perform when interacting with them. This fact has recently motivated the
―sensorimotor‖ approach to the challenging task of automatic object recognition, where both
information sources are fused to improve robustness. In this work, the aforementioned
paradigm is adopted, surpassing current limitations of sensorimotor object recognition
research. Specifically, the deep learning paradigm is introduced to the problem for the first
time, developing a number of novel neuro-biologically and neuro-physiologically inspired
architectures that utilize state-of-the-art neural networks for fusing the available information
sources in multiple ways. The proposed methods are evaluated using a large RGB-Dcorpus,
which is specifically collected for the task of sensorimotor object recognition and is made
publicly available. Experimental results demonstrate the utility of affordance information to
object recognition, achieving an up to 29% relative error reduction by its inclusion.
Keywords:- Deep Affordance, Sensorimotor
31
Blockchain
Aman Kumar Ms. Roopali Goyal
CSE 1st Year Assistant Professor
CET-IILM-AHL CET-IILM-AHL
Abstract:- A blockchain is a public ledger to which everyone has access but without a
central authority having control. It is an enabling technology for individuals and
companies to collaborate with trust and transparency. One of the best known applications
of blockchains is the cryptographic currencies such as Bitcoin and others, but many other
applications are possible. Blockchain technology is considered to be the driving force of
the next fundamental revolution in information technology. Many implementations of
blockchain technology are widely available today, each having its particular strength for a
specific application domain. The main hypothesis is that the blockchain establishes a
system of creating a distributed consensus in the digital online world. This allows
participating entities to know for certain that a digital event happened by creating an
irrefutable record in a public ledger. It opens the door for developing a democratic open
and scalable digital economy from a centralized one. There are tremendous opportunities
in this disruptive technology and revolution in this space has just begun.
Keywords:- Blockchain, bitcoin, authority, cryptographic
32