XETS 2017- Xavier Institute of Engineering

"XETS 2017 Conference Papers "


Artificial Intelligence[ ]


Artificial intelligence is based on disciplines such as Computer Science, Biology, Psychology, Linguistics, Mathematics, and Engineering. AI is the key to future. The purpose of AI is simply smoothen one’s life. The problems that we are facing in present and upcoming future could get solved through AI.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Exploiting & Ranking Vulnerabilities in Computer Network[ ]


A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing approaches to aggregating CVSS scores usually cause useful semantics of individual scores to be lost in the aggregated result. In this paper, we address this issues through novel security metrics. In this project we have defined some Attack graph and CVSS-based security metrics that can help us to prioritize vulnerabilities in the network by measuring the probability of exploiting them and also the amount of damage they will impose on the network. Proposed security metrics are defined by considering interaction between all vulnerabilities of the network. So our method can rank vulnerabilities based on the network they exist in. Results of applying these security metrics on one well-known network example are also demonstrates effectiveness of our approach.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Artificial Intelligence( Chat BoT’s)[ ]


Chat bots aren’t new technology – simple bots have been in use for years. Artificial intelligence involves two basic ideas. First, it involves studying the thought processes of human beings. Second, it deals with representing those processes via machines like in Our case it is using Chat Bot(which is Task Specific BoT )made using Microsoft Azure and BoT Framework with Integration of Chat fuel and Luis (Language Understanding Intelligent Service)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ONLINE SUBJECTIVE ANSWER CHECKER[ ]


We are pleased to present Online Subjective Answer Checker that will ease out the process of checking of answer papers with accuracy. The system will let students give exam online, calculate the results automatically as well as preduce a record for the administrator. The paper will focus on correcting on the basis of certain keywords that every answer will contain and give marks to the students according to the presence of the keywords in the answers. This system will help reduce all human errors thereby making the system more efficient.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BLOOD SOLUTIONS[ ]


The need for blood is important for various treatments in medical field. For every second someone needs blood to save their life. The task of blood bank is to receive blood from various donors, to monitor the blood groups in the database and to send the required blood during need to the hospital in case of emergencies. In developing countries, especially like India, the blood resource lacks in quantity which is a barrier to the life of someone who is in need of blood.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Artificial Intelligence for BEST Buses[ ]


The BEST is the sole provider of public transport of Mumbai, Maharashtra State.Although it has been into existence since many years, the problems that the passengers face are still numerous. Problems such as uncertain frequency of buses, uncertain delay of buses, problems caused due to rains, lack of knowledge to passengers, etc. The following system informs the passengers about the delay of the bus, position of bus, etc. The system is also featured to give knowledge about how long the bus will take to reach to particular bus stop, and the crowd density inside the bus. The Artificial Intelligence and Neural networks are the building blocks of the system that makes it robust and flexible. The primary intention of this project is to make the BEST system efficient enough to cater public demands and to correct unintentional delays caused by inefficient handling of bus schedule due to traffic. Based on all factors, the system suggests the future dynamic schedule for the buses.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Database Security using Intrusion Detection System[ ]


We propose a project named “Database Security Using IDS”.SQL injection attack is the most common attack in websites now-a-days. SQL Injection refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application's database server. In this project we propose database intrusion detection mechanism to enhance the security of database through a Website. We will make a system which will log all the activities of an Intruder using SQL Injection in a website. Some malicious codes gets injected to the database by unauthorized users and because of this attack, the actual database can be stolen or destroyed or modified by the hacker. Administrator will be shown the details of the user and can block him if needed. User details are secured using AES encryption algorithm which makes this system more secure.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
NotifyMe- An Android Based Application For Student Services Administration[ ]


NotifyMe is an android application that can be used in various Engineering Institutions under Mumbai University. Today in colleges, student details are entered manually which is a tedious task. Referring to all these records, an updating is required. There is a chance for more manual errors. As mobile devices have become popular; there appears a new trend to release all kinds of campus information by intelligent mobile terminals. In which the college staff members, students and parents can access the information and will be familiar with the activities which are ongoing in the institutes. It will provide interactive environment for the staff, students and parents by getting knowledge of student attendance, remarks, exams performances, grades, timetables, notices etc. In the current system, the administrator is allowed to collect the information and then accordingly will provide the access rights according to the users. The main objective of this project is to add mobility and automation to the process of managing student information in an institute. The authentication process will add the security feature to the application.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SECURE DATA SHARING IN CLOUD[ ]


Cloud Computing is useful in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as user store sensitive information in cloud. This paper proposes a model to securely store information on cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that maintain data confidentiality ,integrity and availability. Our approach protects client sensitive information by storing data across cloud, using a secret sharing approach that uses Shamir’s secret sharing key algorithm.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PROJECT AUTOMATION SYSTEM[ ]


We propose a project named Automated Project Tracking System. This software system helps to manage various project management activities. It allows easy management and tracking of various projects running in the organization and also assigns people to the particular project. This project can also be modified to suit student’s project management system that includes various projects assigned to students and the students working on each project. This software system allows easy project management and allows tracking project activities. An administrator has the overall control of this system that allows him to create and remove projects as per the requirement. It specifies start and completion date of projects, allocates people and also tracks project progress. It is an effective software system which help to manage project management activities in a corporate or college environment.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Home Automation using Raspberry Pi, Motion Sensor and Android with Gesture based Controls[ ]


With the rapid growth of Smart Technology in the recent times, it has become imperative for us to explore different types of exciting automation systems concerning simple parts of life. One of these areas is Smart Home Automation that can control all the domestic appliances in one’s house smartly and securely using innovative technologies like PIR Motion sensor and Voice Control. Our system aims at tackling the problem of manual labour associated with existing smart home automation systems by performing pre-defined, automated functions using intelligent sensors that are managed by a highly cost-effective and efficient Raspberry Pi. This system brings scalability, security and most importantly, ease-of-access to the smart home automation process by adopting a user-friendly Android app.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
LIFI TECHNOLOGY: VISIBLE LIGHT COMMUNICATION AND ITS APPLICATIONS[ ]


German physicist Harald Hass had proposed Visible Light Communication (VLC) using a Li-Fi system which provides transmission of data through illumination by sending data through an LED light source. The intensity can be controlled and adjusted such that it appears as normal light to the naked human eye. Hence it is an application for a free, green and sustainable source which can be used for wireless communication at very fast data rates. This report focuses on the many such applications. Due to the low cost LED’s we could create numerous applications where the day-to-day light sources have their primary purpose of only emitting light.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PRINTING POOL[ ]


This paper proposes a project named Printing Pool (web application) that helps students in institutes or people in particular work places to get prints in efficient and easy way. Paperless homes and offices have been spoken about for many years.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Deep Web[ ]


Almost the entire world uses the internet these days and yet while browsing we come across short of information. This is due to the sole reason that the world wide web provides just a small portion of information. A lot more information is hidden in the so called Deep Web. The Deep Web has a lot of potential, such as it contains a lot of data useful for various activities. The Deep Web is as Bad as Good, allowing all illegal activities which should not be mentioned. Hence the Deep Web isn’t easily accessible. Our general search engines cannot access the data in Deep Web because these engines make use of the indexing technique which the Deep Web does not support. Therefore special search engines such as Tor, Infomine,, Deep web tech etc. All though browsing in Deep Web is risky but with a bit of skill and some knowledge, you can illuminate a lot of valuable information.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Preparation of Papers for International Journal of Scientific & Engineering Research[ ]


The illegal copying of software-usually known as" software piracy"-is a major concern to the software industry, who estimates their losses due to piracy at over $10 billion per year. We propose a project named Anti-Piracy Software System. Piracy is a mass Phenomenon on the internet these days. It is so common that one third of all installed software’s are pirated. Various file sharing platforms offer free access to unauthorised copies of copyrighted works such as media and software.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3D TOUCHLESS TRACKING[ ]


This review paper focuses on the application of touch-less interaction between human and computer using capacitive sensing technique. A computer–based analysis for touch-less 3D controller using capacitive sensing method in [1] is developed. In this project, Arduino UNO is used as a microcontroller to bridge the interface connection between the sensor hardware and the computer. This method uses capacitive based sensor as the main component to sense the gesture movement near it. The capacitive based sensing depends on the duration to charge a capacitor (known as the time constant). By placing an object within the electric field of a capacitor, it will immediately affect the capacitance value and it will correspond to the time constant. Using the data obtained from the analysis, a touch-less control from the hardware will control the vehicle.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Scholar’s Companion – Android App[ ]


This project is aimed at developing an android application for finding information related to the availability of the scholarships for eligible candidates. This application mainly focuses on providing accurate information about the scholarship to the students. The candidate will be asked to register his details along with his grades or percentage within the application. The application will then match his details with the eligibility criteria of various trusts or organisations providing scholarships with the database and will return the list of eligible trusts that the candidate can apply for.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DMD-Diagnose My Disease using Android Technology[ ]


In the present, mobiles/tablets with the ANDROID as operating system are more used. It provides more application free on its android store. Now days there are many app on app store but there is no good app related to the DMD to provide better information regarding the precautions user has to take.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SPARSH - Transfer of data through Human Body[ ]


Human area network is a novel data transmission method that uses the human body as an electrical channel. The idea is driven by the vision of a cable-free secure data transmission system. The human body is characterized as a transmission medium for electrical currents by means of the dielectric properties. This paper describes a data transmission technology that enables communication by touching, a technology we call SPARSH. Short circuiting of wires has become a very critical problem hence more Wireless techniques are being developed. Here we use the property of a User Identifier and User Distinguisher. This approach imposes severe limits on the data rate, but the rate is sufficient to transfer limited data through the body.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Stream Analysis Using Online Aptitude Test[ ]


This paper proposes a project named Stream Analysis using Online Aptitude test to help students who are pursuing their educational degrees, to choose a stream best suited for them, according to their proficiency. Due to misguidance or peer pressure students generally seem to choose the course which their friends have chosen, and therefore we are often left with students who end up choosing an academic major which is incompatible with their interests and passion.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Designing of Unmanned Ground Vehicle[ ]


An unmanned ground vehicle (UGV) is mechanized equipment that moves across the any surface of the ground (terrain) without intervention of human. Being autonomous in nature, UGVs are capable of operating over a wide variety of terrain, operating condition. Hence robust and precise control of UGV is required. For developing a robust control strategy it is necessary to have an accurate mathematical model of UGV. In this paper, nonlinear mathematical model of UGV for straight and turning motion is presented and is implemented in MATLAB environment with various subsystems. Thereafter transfer function model of UGV is obtained by linearizing. Using this linearized transfer function model conventional proportional integral derivative (PID) controller are designed and applied to nonlinear model of UGV. Simulation results are generated for various transient conditions and disturbance levels.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Review of Intelligent Video Surveillance: System Concept[ ]


This paper highlights- the various distributed platforms that can be used in a Video Surveillance System and their influence on the performance of the Real-Time Video Service in comparison to other existing solutions. Video surveillance finds its uses in almost every aspect of daily routine of human life: both private and public. With its growing applications, its quality, scope and ease of use are the factors which continuously need upgradation. An interesting part of Intelligent Video Surveillance technology is that it can recognize object and identify human faces or track it also it helps in behaviour patterns. One of the key aspects in the development of Video Surveillance system is the use of quantum cryptography communication technology which takes the help of light source such as entangled photon pairs. The information is carried through photon pair used to keep the transmission of video information confidential which is passed through an optical fibre medium. Unprocessed video information contains a lot of redundant data. It was found that, H.264 video compression algorithm could eliminate redundant information of spatial-time and visual data which gives an advantage of no redundant data in the video information. An Intelligent Video Surveillance System based on quantum cryptographic communication technology is discussed, which not only improves the data transmission rate but also enhances data confidentiality. Remote monitoring is an area which is in need of such technologies but without the baggage of cables. Therefore, we intend to achieve this goal by integrating wireless communication technology with our surveillance system.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------