about the institute - iilmcet.ac.in · and motivates students to become lifelong learners. about...

64

Upload: others

Post on 10-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

About the Institute

The ecologically balanced green campus, which is spread over 25 acres of land relentlessly its best in producing thousands of scholars, professionals, technocrats and entrepreneurs by imparting quality education, promoting innovation culture strengthened by dedicated and qualified faculty.

Vision

To emerge as a leader in value- based responsible and responsive Engineering & Management education coupled with entrepreneurship focused industrial research.

Mission

To develop responsible business leaders, technocrats, and entrepreneurs through an education based on ethical values resulting in knowledge and skills valued by employers leading to employability.

Application-oriented research relevant to engineering and management that flows into the learning process.

Inspirational and creative teaching which encourage students to assimilate, analyze and apply relevant knowledge.

A personalized mentoring process which admires individuality and motivates students to become lifelong learners.

About the Department

Department was established in the year 2002, with the aim to deliver quality education. Apart from making students acquainted with the course curriculum, it also gives an emphasis on their regular exposure to emerging technologies, application-based learning, futuristic technologies, workshops, seminars and conferences through industry-academia interaction programs, corporate visits, invited lecturers and talks. Well qualified faculty and state of the art computer labs continuously thrives to offer short term courses for the enhancement of placement chances. It is bestowed with “accreditation” by National Board of Accreditation.

Vision:

The department aims to produce competent professionals with strong technical, research and managerial skills in addition to ethical values.

Mission:

M1: Developing strong mathematical & computing fundamentals among students that form the baseline for building IT solutions.

M2: Provide quality education to produce the competent engineers with technical and managerial sktiving its ills to fulfill the present societal requirements.

M3: Involve in research based projects/activities in the emerging areas of computer science and information technology.

M4: Inculcating professional ethics to serve the interests of the society and nation.

COMTECH

2019

Department of Computer Science and Engineering is working in the

field of education and is continuously organizing various events to

promote innovation and research. As an effort towards inculcating

research and innovation culture; 2-days National Conference on

“Research Aspects in Internet of Things” sponsored by Dr. A. P. J.

Abdul Kalam Technical University, Lucknow under VRPS scheme

was organized on July 21-22, 2017. Eminent speakers from industry

and academia graced the occasion and shared their valuable thoughts.

Good number of scholars presented their research findings. To

continue the trend, COMTECH 2019-2nd National Conference on

Recent Innovations in Computer Science and Information

Technology is being organized dated 2nd March, 2019 with the

vision to explore latest advances in the field of Computer Science and

Information Technology. Objective The main objective of the Conference is to promote research and

developmental activities in the field of computer science and

information technology by bringing eminent speakers form industry

and academia together. It also provides ideal platform for young

researchers to present their research findings and innovative ideas for

sustainable development. In addition, it motivates engineering

students to work towards new perspectives of contemporary

computing.

Outcome The Conference will significantly contributes and enriches the

knowledge in incorporating recent developments and trends in

interdisciplinary fields of computer science and information

technology and encourage researchers to inspire others to work

towards new perspective and provide scope for future alliance in

their career.

Theme

Big Data

Cloud Computing

Deep Learning

Aritificial Intelligence

Natural Langugae Processing

Parallel and Distributed computing

Energy System and Management

Internet of Thing

VLSI Design

Embeded System

Data Science

Patrons

Mr. Ajay Singh, Sr. Director, CET-IILM-AHL

Dr. Meenu Singh, Director, CET-IILM-AHL

Mr. Ashis Mukherjee, Dean, CET-IILM-AHL

Conference Chair

Dr. Hamlata J.Bhat

Professor & HoD, CSE

Convener

Dr. Anuradha Konidena

Associate Professor, Dept. of CSE

Co-convener

Dr. Manjula Shanbhog

Associate Professor, Dept. of CSE

Organizing Committee

Dr. Vaibhav Panwar

Associate Professor, Dept. of CSE

Dr. Amit Asthana

Associate Professor, Dept. of CSE

Ms. Neha Bhatia Arora

Assistant Professor, Dept. of CSE

Ms. Roopali Goel

Assistant Professor, Dept. of CSE

Mr. Vikas Singh

Assistant Professor, Dept. of CSE

Ms. Swati Singh

Assistant Professor, Dept. of CSE

Student Organizing Committee

Manasvi Srivastava

Sarthak Das Gupta

Himanshu Singh

Abhishek Rai

Tamal Krishna Sarna

Vasu Kapoor

Vidur Sharma

Shahbaz Ali

Sharad Shakya

Monika Mukul

Lisa Kushwaha

Aman Kumar Singh

Ashish Tripathi

Aryan Bharadwaj

Pranjal Khare

Noor Alam

Conference Advisory Committee

1. Mr. Vikas Lamba, CEO, Yash Parv Pvt. Ltd., Bengaluru. 2. Dr. Brijendra Singh, Professor & HoD CSE, Lucknow

University,Lucknow.

3. Dr. P. Shrivastava, Information Professionals, AIIMS, Delhi. 4. Dr. S. C. Raghavendra, Asso. Professor, E lectrical Engg.

Dept., Abu Dhabi.

5. Ms. Sangeeta Tagare, CEO, Apeiron Business Solutions, Bengaluru.

6. Dr. Aparna Bhale,Director,Panglossian Career Consultant, Pune. 7. Dr. Rajat Mittal, Asso Professor, Dept of CSE, IIT, Kanpur.

Conference Technical Committee

1. Dr. Rizwan Beg, Director, ZH Institute of Technology & Management,

Agra. 2. Dr. Rajeev Srivastav, Professor & HoD, Department of Data

Sciences, UPES, Dehradun.

3. Dr. Atul Agarwal, Professor, Dept. of Data Sciences, Ansal

University, Gurugram.

4. Dr. Ashish Dubey, Professor & HoD, Data Sciences, BITS Ranchi,

Ranchi.

5. Dr. Ramesh Manza, Associate Professor, Dept. of CS/IT, Dr. Babasaheb

Ambedkar Maratwada University, Aurangabad.

6. Dr. Ashok Gaikwad, Director, IMSIT, Vivekanand College of Arts,Commerce & Science, Aurangabad.

7. Dr. Parmanand Astya, Dean, SET, Sharda University, Greater Noida.

8. Mr. Umesh Kad , Head IT Infra, Wipro Technologies, New Delhi. 9. Mr. Adesh Katiyar, CTO, iDreamBiz, Noida. 10. Mr. Ayush Gupta, Technical lead, Bank of America, Gurugram. 11. Dr. Shivani Goel, Professor, Dept of CSE, Bennett University,

Greater Noida. 12. Prof. Ashok Harnal, Professor, Fore School of

Management, New Delhi. 13. Dr. K.Rama Krishna, Prof. & HoD, CSE, IIMT, Gr. Noida. 14. Dr.( Mrs.) Suraiya Jabin, Asso. Prof., Dept. of CSE, Jamia Millia

Islamia, New Delhi.

SR. DIRECTOR’S MESSAGE

It is my pleasure and privilege to address an august gathering of computer science professionals, educators and students through the second National Conference - COMTECH 2019 on the theme of Recent Innovations in computer Science and Information Technology.

The cyber world of today is the backbone of everyday life. The computer science & engineering fraternity is responsible for transforming human life to a comfortable and productive

environment for the benefit of society at large. It is said that any innovation is not an end by itself, but mother of future innovations. The realm of computer science and engineering is all about being a steady breeding ground for innovation

The continuous developing complexity, precision and speed of the software are progressively making the hardware resource hungry each year. A new vocation of cyber security has emerged and shall continue to be in prominence. The science of biometric identification will be developed further to identify and differentiate human decision and action vis-à-vis decision or actions emerging from IOT devices and robots. Research on vein identification systems is in its conclusive phase.

Cloud computing, data mining, virtual imaging and navigation and programming for IOT devices is likely to feature as the key domain of the computer scientists of India for the next decade. Mobile Ad hoc Networks or Wireless Ad hoc Networks are going to revolutionize and simplify networking of devices, along with Wireless Sensor Network Technology (WSN). Autonomous self-driving vehicles are inevitable, and so is Vehicular Ad hoc Network (VANET) to provide a secure and safe transportation system for the future. The complexity of image and signal processing will continue to be demanding for the software engineers. Network Security and Cognitive Radio will be stabilized and pressed in to service widely during this decade.

I am sure Comtech 2019 will prove to be a transformational platform for our students to think differently and launch them on a quest for technological excellence for the future of mankind.

DEAN’S MESSAGE

In the recent past we have seen a revolution in Computer Science (CS) and Information Technology (IT). All indications are that the progress and use of IT will continue at a rapid pace. This, together with the declining cost of communications, doubling of processing power every 18 months is leading to innovations in IT that have a wide-ranging effect across society, social policy, economic activity, Intellectual Property (IP) rights, privacy protection, etc.

The choices we make today will have long-lasting consequences and thus attention must be paid to the social and economic impacts of our work at every stage. The infusion of Technology, especially Artificial Intelligence (AI) and Machine Learning (ML) into our daily lives has moved from Science Fiction to Reality. Our decisions, behaviour and actions are all affected by Technology today. In this scenario, it is imperative that as technical people we are abreast of the recent innovations in the field and thus can exploit technology to the fullest.

In this context, I commend the faculty of the Department of Computer Science and Engineering, IILM College of Engineering and Technology, greater Noida for organising COMTECH 2019 on Recent Innovations in Computer Science and Information Technology. The interaction with corporate leaders, academicians, scientistsand research scholars will undoubtedly lead to discussion, sharing and collaboration thus providing a great learning platform to the students and the future technologists. We are all looking forward to a scintillating set of discussions on the most recent innovations, trends, challenges and concerns as well as solutions in the fields of CS and IT.

I wish the Conference all Success!

DIRECTOR’S MESSAGE

On behalf of IILM College of Engineering and Technology, I am

honored to take this propitious opportunity to welcome our Chief

Guest, eminent speakers and delegates for COMTECH 2019.

Since technology and innovation are now the established rules of

industry and therefore, compelling many organizations to

reconfirm their role in providing ways for hybrid & flexible IT

strategies, more fluid processes and options for their continuous

re-evaluation. Another important thing to sustain and lead in long term is to drive in - all

the advance and excited developments like-Automation, artificial intelligence, machine

learning, block chain technology, internet of things, big-data analytics, portability etc to

leverage in terms of growth.

While experiencing the exponential growth and forecasting the future prospectus, this

new agile wave of technology demands the platforms like COMTECH 2019 for

researchers and think-tanks to join hands together to address the issues and concerns

related to the field, and come out with new possibilities.

The insights shared by the young scientists, academicians and industry personnel on the

forum of COMTECH 2019 will have substantial influence on societal well being.

Conference will also encourage our faculty members and students to work towards new

perspectives in the fields of Computer Science & Engineering and Information

Technology.

CONFERENCE CHAIR’S MESSAGE

It gives me immense pleasure in welcoming, on behalf of the entire team of Department of Computer Science and Engineering CET-IILM-AHL, the delegates and the participants to thisCOMTECH-2019, 2

nd National Conference on

Recent Innovations in Computer Science and Information Technology.

COMTECH-2019 is an opportunity for researchers, practitioners, educators and most importantly students, to be an enriching and learning experience through the knowledge sharing sessions with the acclaimed expects from academia and corporate.

Computer Science and Information Technology is a great Enabler for increasing Productivity, Effectiveness and Delivery. Through Technology, people have created a much better world and still there is tremendous research going on for further innovating technology to create value for mankind. In today‟s increasingly interconnected world, global population is able to exchange ideas and broaden their horizons. This is the most visible impact of rapid advancement in the area of Computer Science and Information Technology advancements.

We hope that this conference will provide numerous opportunities to participants to share practical innovative ideas and research for the betterment of the Universe. The success of the conference depends on many people who have worked with us in planning and organizing the various tasks. In particularly, the efforts put by Dr. Anuradha Konidena, convener and Dr. Manjula Shanbhog, co-convener of the conference is much appreciated. The creative thinking and brilliant new routes to academic excellence suggested by them has helped to carryout smooth functioning of conference. The effort of the entire Orgnising Committee Comprising of, Ms. Swati Singh, Ms. Neha Arora, Mr. Vikas Singh, Ms. Roopali Goyal, Dr. Amit Asthana and Dr.

Vaibhav Panwar are praiseworthy. We would also like to put on record the untiring efforts of Staff Members and Students Volunteers.

The Conference Advisory and Technical Committee Members, our Patrons Mr. Ajay Pratap Singh (Sr. Director-CET-IILM-AHL), Dr. Meenu Singh (Director CET-IILM-AHL), Mr. Ashis Mukerjee (Dean-Academics CET-IILM-AHL) and other functionaries have been support in enabling us to upgrade our benchmarks regarding the Conference. I take this opportunity to express my deep gratitude to all of them for their contributions in making this conference a huge success.

Dr. Hamlata J. Bhat

HoD, CSE CET-IILM-AHL

Convener’s Message

Computer Science Engineering and Information Technology affect the quality of life in various facets. Convergence of driving forces of IT like Cloud

computing, Data Sciences, ubiquitous computing is strengthening pathway for Innovation and fostering services endowed by Information technology. New technologies, transversal and pervasive, represent an inexhaustible potential for innovation and problem solving related to the interaction between man - machine in complex industrial work environments and provide a contribution in terms of efficiency and productivity. Strong knowledge of fundamentals is a prerequisite of innovation. Events like COMTECH 2019 wherein experts from academia and industry share their insights about recent innovations in Computer Science & Engineering and Information Technology will not only help in identifying various research areas, challenges and solution to some of them but also contribute to all three dimensions of sustainable development goals – economic, social and environment.

Dr. Anuradha Konidena

Convener

Department of Computer

Science Engineering

CET-IILM-AHL

Co-Convener’s Message

The current world is techno - centric more than ever and technology is progressing at an accelerated pace. The technology of computer science and Information is invisibly embedded in the environment around us. This technology in future will transform the real world objects into intelligent virtual objects and aims to

unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed of the state of the things. In this era of globalization, the exchange of knowledge and skills has given a further fillip to the exponential growth in the field of technology. Such phenomenal advancements have revolutionized almost every sphere of human life today. The ultimate use of technology should be for understanding true reality of nature, minimization human sufferings and making human beings more happy by providing material comforts. With each new advancement it becomes increasingly more difficult to stay ahead of the latest theories, methods, and techniques. COMTECH 2019 „The 2nd National Conference on Recent Innovations in Computer Science & Information Technology‟ provides a platform to learn , explore and develop insights into the interdisciplinary approach by bringing together the academicians, researchers, scientists, engineers, technocrats, students and industry professionals from various institutions, universities, colleges and industries to share and discuss the ideas, technologies and research findings. The purpose of conference is to promote research and also to ignite young research oriented and innovative brains in the field of futuristic emerging technology.

Dr. Manjula Shanbhog

Co-Convener

Department of Computer

Science Engineering

CET-IILM-AHL

Our Eminent Speakers

Chief Guest

Mr. Vikas Lamba

CEO, YashParv Ltd.

Keynote Speaker

Dr. Suraiya Jabin

Associate Professor,

Department of CSE

Jamia Milia Islamia, New Delhi

Session Chair

Dr.Atul Agarwal

Professor.

Department of Data Science

Ansal Univer

COMTECH 2019

The 2nd

National Conference on Recent Innovations in

Computer Science and InformationTechnology

SATURDAY, 2nd

March 2019

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CONFERENCE SCHEDULE

9:00 AM-10:00 AM Registration

10:00 AM-11:30 AM

Inaugural Session

Lighting of Ceremonial Lamp & Invocation of Goddess Saraswati

Welcome Address Mr. Ajay Pratap Singh, Sr. Director,CET-IILM-AHL

Formal Address Dr. Meenu Singh, Director, CET-IILM-AHL

Conference Address Dr. Hamlata J. Bhat, Prof. & HOD, Dept. of CSE

Address by Chief Guest Mr. Vikas Lamba, CEO, Yash Parv Pvt. Ltd., Bengaluru

Key Note Address Dr. (Mrs) Suraiya Jabin, Associate Prof., Dept of CSE, Jamia Millia Islamia, New Delhi

Release of Souvenir & Felicitation of Guests

11:30 AM-12:00 NOON Networking Tea Break

12:00 NOON-1:30 PM

Technical Session 1 - Recent Innovations in Computer Science

Keynote Address Session Chair- Dr. Atul Agarwal, Prof. & HOD., Dept. of Data Sciences, Ansal University, Gurugram

Paper Presentation Participants

1:30 PM-2:30 PM Networking Lunch Break

2:30 PM-3:30 PM Technical Session 2 - Recent Innovations in Information Technology

Paper & Poster Presentation Participants

3:30 PM-4:00 PM

Valedictory Session

Certificate Distribution, Feedback, Felicitation, Vote of Thanks

INDEX

Sno Title of paper Page no

1 A Study of Users Perception towards E-Wallet Security 1

2 Management Information System and Its Implications in Business 2

3 Impact of Last Mile Delivery in E-Commerce Industry: A

Indian Customers’ Perspective 3

4 Internet of Things based wearable health startups: A study

of demographic challenges to adoption 4

5 Big Data Analytics in Radiology: A Boom in Health-care Industry 5

6 Big Data, IOT and Manufacturing: Made For Each Other 6

7 Study of Wireless Network Protocol with special

Attention to MAC 7

8 Implementation and Validation of Boolean law by

Implementing a function using universal gate in Optical domain 8

9 Big Data with different NoSQL Paradigm 9

10 Comparative Investigation On different data

Mining on Internet of Things 10

11 AI in Health-care 11

12 Load Balancing Techniques of Cloud Computing 12

13 Study of Various Automatic Pet Feeder System 13

14 Investigation of development aspects of an Online

Medical Outlet App for C2B and B2B 14

15 Security Aspects of Cloud Computing 15

16 Leveraging Internet of Things in Defense 16

17 Attributes of Data Quality in Data Warehousing 17

18 Lifelong Learning with Dynamically Expandable Networks 18

19 Artificial Intelligence in Defense System 18

20 E-Bomb 19

21 Quantum Computers 20

22 Anti Aliasing Technology for Pixels between edges 21

23 Cloud computing 22

24 Fog Screen: Walk Through Magic 23

25 Blockchain 24

26 DNA Data Storage 25

27 Ethical Hacking 26

28 Quantum Computing 27

29 Artificial Intelligence In Medical Science 28

30 Android 29

31 Machine Learning 30

32 Data Mining 31

33 Deep Affordance- grounded Sensorimotor Object Recognition 32

34 Blockchain 33

35 Posters 34

ABSTRACT

A Study of Users Perception towards E-Walllet Security

Ms. Antara Anandita Mr. Swapnil Undale Dr. Ashish Kulkarni

Student Assistant Professor Assistant Professor

MIT School of Management MIT School of Management MIT School of Management

Pune Pune Pune

Abstract: The E-wallet is an online prepaid payment system where one can save and user

their stock money, and they can use that money when it is required. As it is a part of the pre-

loaded facility, customers can buy a wide range of products from bus tickets to airline tickets,

grocery, shopping and more without even using your cash in your hand and also without even

swiping your credit or debit card. The paper objective was to find out users perspective of e

wallets and its security. Quantitative research approach is used for this study. A structured

questionnaire was developed and survey was conducted from the respondents. It was found

that 87% of the respondents use e-wallets and 23.% of people were highly comfortable with e-

wallet transactions. The users have suggested different security measures that can be

implemented to ensure the security of e-wallet in which finger print detection can be the most

helpful measures amongst all others

Keywords: Cashless, E-Wallet, Security, Digitization

1

Management Information System and Its Implications in Business

Dr. Sharuti Choudhary

Asso. Prof.- IILM Graduate School of Management

Abstract:- The concept of the Management Information System (MIS) has evolved

over a period of time comprising many different facets of the organizational functions.

MIS provides information for the managerial activities in an organization. MIS is the

key factor to facilitate and attain efficient decision making in an organization. It

provides accurate and timely information necessary for decision-making and enables

the organizations to plan, control and operate in an efficient way. It is a necessity of all

the organization. It is basically concerned with processing data into information and is

then communicated to the various departments in an organization for appropriate

decision-making. MIS is a subset of the overall planning and control activities covering

the application of humans, technologies, and procedures of the organization. The

information system is the mechanism to ensure that information is available to the

managers in the form they want it and when they need it. The MIS, therefore, is a

dynamic concept subject to change, time and again, with a change in the business

management process. It continuously interacts with the internal and the external

environment of the business and provides a corrective mechanism in the system so that

the change needs of information are with effectively. The present paper made an

attempt as a conceptual study to highlight about Management Information System and

its implications in Business.

Keywords:- Management Information Systems (MIS), Information Technology,

Decision Making

2

Impact of Last Mile Delivery in E-Commerce Industry: An Indian

Customers’ Perspective

Sunil Kr Vishwakarma Dr Smriti Asthana

Operations Executive CII School of Logistics

Gati-Kintetsu Express Private Limited Amity University, Noida

Abstract:-E-commerce as the fruit of internet and commerce is growing with a rapid

speed in India. It has not only contributed to the economy, but also has shaped people‘s

way of living, especially with the service of home delivery. Today a consumer enjoys

the various choices of products with reasonable prices and the convenience of receiving

the parcels with a single click of a mouse. Meanwhile, the problem of not-at-home and

repeated delivery have caused trouble for both consumers and logistics providers.

Therefore, it takes a lot of cooperation and innovations to build this convenience, which

we call ‗last mile delivery‘.

This research paper aims at identifying the bottlenecks and exploring the possible

solutions to these bottlenecks in the last mile delivery service in India, under the

background of growing popularity of e-commerce from the perspective of consumers.

Since consumer needs are in the center of e-commerce and last mile delivery for any

company in the world, thusthe researchers have made an attempt through this research

paper to bring to light the consumers‘ expectations and the factors that determine their

present satisfaction level from the last mile delivery, this will give an important

direction and implication for e-commerce retailers and the logistics service providers in

India.

Keywords:- Last Mile Delivery, E- Commerce, Logistics Service Provider, Third Party

Logistics

3

Internet of Things based wearable health startups: A study of

demographic challenges to adoption

Shweta Nanda Amrit Millick

Asst. Professor PG student

IILM Graduate School of Management IILM Graduate School of Management

Greater Noida Greater Noida

Abstract:- To make the present traditional health care model more sustainable focus of

healthcare needs to be envisioned to the integrated health care service model wherein

not only the technology behind the remote connected care (Internet of Things) but the

strategies to implementation plays a huge role to overcome the challenges of penetration

.

The Internet of Things (IoT) is a network of physical devices and other items, embedded

with electronics, software, sensors, and network connectivity, which enables these

objects to collect and exchange data. In addition to cost containment, IoT also allows to

keep up with constant innovation and shorter product lifecycles, gather real time data for

augmented intelligence, and create end-to-end communication from

wearable/implantable/ingestible diagnostic tools to treatment decisions to ICU

monitoring to post-discharge care.

This paper focuses on the challenges in the adoption of the IoT based remote healthcare

model by various health stakeholders. The shared learning from the domains of

industry/startups, physicians/hospitals, IOT policy framework and a study across vivid

health research papers, helps to map the physician‘s perspective and the key behavioral

concepts in the adoption of these devices by prospective customers.

Keywords:- Internet of Things, sensors, software.

4

Big Data Analytics in Radiology: A Boom In Healthcare Industry

Mr Abhinav Gyan Mr.Mohit Saini

Assistant professor Assistant professor

Doon Business School Doon Business School

Dehradun Dehradun

E-mail:[email protected]

E-mail: [email protected]

Abstract:- Data plays a very significant role in the field of Medical Science. Since

Medical field is demand of the Era hence it is very important to have a proper

methodology to check, analyze and process the data.

Form of data in Healthcare especially –Radiology is more of Structured but highly

scattered because of which it becomes really difficult to get a proper outcome for a

specific Patient.

In today‘s world, if we talk about developing nation like India amount of data

getting generated for every patient from Radiology has a steep rise of around 200

% in last decade. It is getting very difficult to keep the Historical as well as the

Current data without any relevant output. Additionally, radiologists will have more

access to data than ever before, making the ability to draw patterns and connections

between different sets of images possible. The more access to historical data you

have, the better you can predict future anatomical changes in a patient.

Medical imaging is vital and each year in the US about 600 million imaging

procedures are performed. Analyzing and storing manually these images is

expensive both in terms of time and money, as radiologists need to examine each

image individually, while hospitals need to store them for several years.

Hence Analytics plays a very important and crucial role in Radiology

Keywords: Big data, Analytics, Healthcare, Radiology

5

Big Data, IOT And Manufacturing : Made For Each Other

Senaritra Chowdhury Dr Sandhya Rai

IILM Graduate School of Management IILM Graduate School of Management

Greater Noida Greater Noida

Abstract:- Big Data is a buzzword that is used more often in nowadays. But the

most necessary thing is the understanding and implications of Big Data. Most of the

businesses today‘s world support its manufacturing process with large data sets,

commonly known as Big Data, as well as supporting the production and

manufacturing activities with advanced analytics of Big Data. Nowadays, most of

the companies are looking forward for a cost minimized, efficient and innovative

production process that will help to align the growth of the company with the long

term sustainability. On other side the size of data in an organization relating to the

manufacturing, i.e. the various source of inputs, raw material supplies, Production

per hour, overhead cost, supply chain etc., is also increasing. It‘s necessary for an

organization to analyze all these data, which ultimately helps to make decision in

operational, tactical and strategic level management. Aiming at it most of the

companies spends heavily on maintaining database of the organization in form of

Data Mart and Data Warehouse. It makes easier to store and retrieve data, whenever

necessary at any stage of production. Internet of things (IOT) has also made it easier

to analyze the big data to get required information.

The aim of the paper to understand the usage of UOT in manufacturing sector.

Keyword: Big data, manufacturing, IOT, data.

6

Study of Wireless Network Protocol with special attention to MAC

Mrs. Suman Pasrija Dr. Ajay Kumar

Research Student Research Guide

SavitribaiPhule Pune University, Pune SavitribaiPhule Pune University, Pune

Abstract:- A network of randomly deployed nodes which senses information from the

environment is called as a Wireless Sensor Network (WSN). All communications within

wireless sensor networks takes place between source and destination. The destination is

called as base station or sink. Resources of a network are limited. Therefore, factors like

congestion, delay affect the performance of the network. Improper utilization of the

communication channel or insufficient bandwidth for communication are a few reasons

for occurrence of congestion in a network. So, to reduce the bandwidth problem and

traffic congestion problem over the network, we have proposed the sectoring technique.

In the proposed sectoring technique sectors are formed according to the number of sector

heads. The sectoring technique reduces the bandwidth problem and traffic congestion

problem.

Keyword:- Wireless Sensor Network, Packet transmission, Sink node, Bandwidth,

Congestion, MAC Protocol, Quality of Services (QoS).

7

Implementation and Validation of Boolean law by implementing a

function using universal gate in optical domain

Dr. Vanya Arun Kapil Bodha

Department of Electronics & Department of EIE

Communication Engineering Galgotia College of Engineering &Technology,

CET-IILM-AHL

Abstract— The opto-electronic conversions at the processing node of optical network put

restrictions on the advantages provided by the optical communication system. To

eliminate this conversion, processing should be done in optical domain. Moving in this

direction the proposed manuscript proves a Boolean law that any function can be

implemented using a universal gate, holds good in optical domain as well. In this paper

optical circuit of NOT, AND and XOR gate is designed using all optical universal gate

(NOR gate). A novel design of photonic NOR gate is proposed, cascading five of such

NOR gates in a particular sequence implements various photonic gates. The main

components in designing the basic NOR gate are Semiconductor optical amplifier (SOA)

and 2X2 optical coupler. The non linearities of SOA such as cross gain modulation

(XGM) and cross phase modulation (XPM) are exploited to get the desired output. Two

parameters, quality factor (QF) and extinction ration (ER) are analyzed to predict the

performance of the designed circuit. The performance parameters are recorded for

different NRZ input pulses like on-off, on-off exponential, on-off ramp and raised cosine

.

Keywords:— Cross Gain Modulation (XGM), Cross Phase Modulation (XFM), Extinction

Ration (ER), Quality Factor (Q), Semiconductor Optical Amplifier (SOA).

8

Big Data with different NoSQL Paradigm

Dr Amit Asthana, Dr.Manoj

Associate Professor Vankatesh University,

CET-IILM-AHL Gajrola, India

Abstract:— Digital world is advancing by leaps and bounds thus becoming complex in terms of volume, variety and velocity. This is called the Big Data i.e. a large chunk of combined structured, semi structured & unstructured data that cannot be steered by relational databases. A new trend referred to as web2.0 is now coming into picture due to massive growth in the Internet market and surfacing of the new web technologies[1]. In order to handle these challenges the concept of NoSQL technology has been evolved as an alternative to the traditional relational database systems. This paper targets at comprehending various aspects of NoSQL, its classifications, their characteristics and evaluation of each. It aims at providing answers of the problems of handling Big Data and their analysis.

Keywords:- NoSQL, ACID, BASE, CAP

9

Comaparative Investigation On different data mining on Internet of

Things

Swati Singh Ankur Sharma Md. Shanawaz

Assistant Professor CSE 3rd

Year CSE 3rd

Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- It‘s futile to link everything on earth together over internet, but Internet of

Things (IoT) will greatly change our life.The enormous data achieve by the Internet of

Things (IoT) are treated as highly useful, and data mining algorithms can be applied to

IoT to extract latent information from the data. This paper begins with a discussion of

IoT .Then, a brief review of the features ―data from IoT‖ and ―data mining for IoT‖ and

latest application cases are also surveyed. We reviewed the algorithms and discussed

challenges and open research issues. Finally this paper concludes the potential solution is

an effective way to protect the online users

.

Keywords: clustering, KDD, IoT

10

AI in Healthcare

Ms. Roopali Goel Itisha Sharma Krishna Saini

Assistant Professor CSE 1st Year

CET-IILM-AHL CET-IILM-AHL

Abstract:- The field of AI research was born at a workshop at Dartmouth College in

1956. Attendees Allen Newell (CMU), Herbert Simon (CMU), John

McCarthy (MIT), Marvin Minsky (MIT) and Arthur Samuel (IBM) became the founders

and leaders of AI research. They and their students produced programs that the press

described as "astonishing" computers were learning checkers strategies word problems

in algebra, proving logical theorems and speaking English. By the middle of the 1960s,

research in the U.S. was heavily funded by the Department of Defense and laboratories

had been established around the world. AI's founders were optimistic about the

future: Herbert Simon predicted, "Machines will be capable, within twenty years, of

doing any work a man can do". Marvin Minsky agreed, writing, "within a generation ...

the problem of creating 'artificial intelligence' will substantially be solved.

In the early 1980s, AI research was revived by the commercial success of expert

systems, a form of AI program that simulated the knowledge and analytical skills of

human experts. By 1985, the market for AI had reached over a billion dollars. At the

same time, Japan's fifth generation computer project inspired the U.S and British

governments to restore funding for academic research. However, beginning with the

collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a

second, longer-lasting hiatus began.

In the late 1990s and early 21st century, AI began to be used for logistics, data

mining, medical diagnosis and other areas. The success was due to increasing

computational power , greater emphasis on solving specific problems, new ties between

AI and other fields (such as statistics, economics and mathematics), and a commitment

by researchers to mathematical methods and scientific standards. Deep Blue became the

first computer chess-playing system to beat a reigning world chess champion, Garry

Kasparov, on 11 May 1997.

Keywords:- Healthcare, AI, Medical

11

Load Balancing Techniques of Cloud Computing

Kalpana Dr. Manjula Shanbhog

M. Tech CSE 3rd Sem Associate Professor

CET-IILM-AHL CET-IILM-AHL

Abstract::- The cloud computing is the architecture which is decentralized in nature due

to which various issues in the network get raised which reduce its efficiency. The virtual

machine migration is the major issue of cloud computing and it get raised when

uncertainty get happened in the network. Due to extensive use of the virtual machine

resources, machine gets overloaded which increase delay for the cloudlet execution. In

the base paper, the check pointing algorithm has been proposed which assign task to

most capable machine and hosts maintain check points on the virtual machines. At the

time the virtual machine get overloaded the cloudlet need to migrate to another virtual

machine. In the research work, weight based technique will be proposed which migrate

cloudlet from one virtual machine to another.

Keywords: Load balancing, Virtual machine migration, probability

12

Study of Various Automatic pet Feeder System

Gauri Bhale

ECE

Marathwada Mitramandal’s College of Engineering

Pune, Maharastra

Abstract:- Taking care of pet & its daily courses is a job of responsibility. Pets need to be

looked after with great concern. In today‘s fast life it has become a difficult task to monitor

activities of pet & feeding them time to time. Most of the time it happens that every

member of the house is out for some work & feeding cycle of pet gets disturbed. Advances

in technology have made it possible to care of pets from faraway places too. There is lot of

research work going on to develop various pet care systems which can help the pet owner

to fulfil the requirements of the pets while carrying out their own work. These pet feeder

systems are of great use as they not only feed the pets but also can keep record of the pet‘s

food habits, hygiene, timings & all other factor which ensures a healthy life of a pet. Thus

we can state that pet feeders are of huge benefit for both owners as well as pets.

Keywords: Pet Feeder, Pet care, Pet System, Pet Food, Pet food habit, pet hygiene

13

Investigation of development aspects of an Online Medical Outlet

App for C2B and B2B

Rakesh Kumar Kumar Shubham

CSE 4th

year CSE 4th

year

CET-IILM-AHL CET-IILM-AHL

Naveen Jaiswal Dr. Hemlata J. Bhat

CSE 4th

year HOD of B.Tech CSE

CET-IILM-AHL CET-IILM-AHL

Abstract: - E-commerce has an extraordinary impact on present business world.

But, there are still few areas of e-commerce that are largely unproven and relatively

new, specially medical and health care industries. Due to continues changes that are

taking place in business process and practices , the medical and health care

industries are moving with great speed in the cyber world. Therefore at present, e-

commerce has become the backbone of the medical and health care industries in

India and worldwide for managing cost, providing services and information to

patients all over the world. The proposed ―Online Medical Outlet App for C2B and

B2B‖ is an E-commerce Business Model. The objective of this investigation is to

develop an online app (i.e. e- chemist) that helps patients to get information about

the availability of medicine and purchase it online at anytime and anywhere.

Another significance of this application is to provide the details of doctors and

hospitals that exist in nearby areas, especially Delhi-NCR.

At the front-end, the app comprises customer module and admin module and in

backend there are medicine database, doctors‘ database and hospitals database. In

‗customer module‘, customer has to register and registered customers can easily

avail the product and services of the outlet. The ‗Admin module‘ is accessed by

administrator and he/she has right to verify the prescription uploaded by customer

and also add, delete, and update any information about the products and services.

The software requirements for development of app are Netbeans, MYSQL, Advance

Java, HTML and Java script and it works on any latest mobile technology as well.

Keywords: E-commerce, e-chemist, C2B, B2C, Netbeans, Advance Jave

14

Security Aspects of Cloud Computing

Pranjal Khare Swati Singh

CSE 3rd

Year Assistant Professor

CET-IILM-AHL CET-IILM-AHL

Abstract:- Cloud computing has become a significant and well-known term

without a short period of time. Some parts of it might even be considered as

unclear including its vague definition. Cloud computing has rapidly and

successfully come to perform an essential role within information technology and

therefore in how organizations to deploy a cloud solution. Despite the flourishing

growth of cloud computing it still has its draw backs. One of its problems has

come to be acknowledged as security issues, which has resulted in many

companies deciding not to deploy a cloud solution and instead retain their

traditional system. This qualitative study will come to investigate the perspective

of organizations regarding security within cloud computing. The aim is to outline

the security aspects conferred by Swedish organizations as there already is

existing information concerning issues. The empirical study is based on the

gathered information from conducted semi-structured interviews. This study

resulted in the findings of seven security aspects outlined by organizations, with

the main reason concerning the uncertainty and towards the services of cloud

computing. These security aspects are essential as they are set by organizations

that have the potentiality to become cloud users, but for certain reason decide not

to. From the outlined security aspects, a close relationship can be identified to the

already known security problems. These problems have strengthened the meaning

of the security aspects, and that they are based on real concerns that can be

connected to real problems.

Keywords:- Security, Cloud Computing, vague

15

Leveraging Internet of Things In Defence

Vidur Sharma Dr. Anuradha Konidena

CSE 3rd

Year Assistant Profesor

CET-IILM-AHL CET-IILM-AHL

Abstract:- As we look back in time during the world war 1 period, the first airplane flew in

1911 and a few years later the world witnessed the first battle in skies. People were quick to

implement this new invention for military use. Now, a century later vast invovations have

been poured in developing aircraft with capabilities that our forefathers could not have

thought of at that time. Keeping in mind these turn of events a century ago, we know how

every invovation can be leveraged in one sector or the other. In this paper, a detailed study of

how the concept of Internet Of Things can be useful for military use.

Keywords:- Sensors, Situational Awareness, Insurgency, Improvised Explosive Devices,

Combact Readiness

16

Attributes of Data Quality in Data Warehousing

Lisa Kushwaha Jyoti Aneja Ms. Neha Arora

CSE 3rd

Year CSE 3rd

Year Assistant Professor

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- Data warehousing is becoming popular as organizations become awake of the

benefits. A data warehouse system is used for the reporting and the data analysis. It is

based on the extraction of data from the operational systems. So data quality plays an

important role in the data warehousing. As this data is used from the data warehouse for

the different operations, analysis, marketing and decision making. Data quality always

depends upon the usage. The same data can be good quality for the one use and poor

quality for some other use. There are different ways to define the Data quality . Good

data is most important valuable asset and the bad data can harm the operations of

organizations. In general data quality is the ability of a given data set to serve an

intended purpose. If poor data is not identified and corrected early then lead to poor

decision which can have adverse impact on the company‘s operation. Attributes which

affect the quality of data are accuracy, completeness, timeliness, Integrity and

consistency. Analyzing the issues is important so that organizations or companies can

work efficiently.

Keywords:- Data warehousing, Data quality, Poor data, Good data,

17

Lifelong Learning with Dynamically Expandable Networks

Sudhanshu Dr. Vaibhav Panwar Mr. Vikas Singh

CSE 3rd

Year Associate Professor Assistant Professor

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract: - It is a deep network architecture for lifelong learning which is known as

Dynamically Expandable Networks (DEN). It has ability to decide its capacity as it trains

on sequence of tasks, to learn a compact overlapping knowledge sharing structure among

tasks. It is efficiently trained in an online manner by performing selective retraining,

dynamically expands network capacity upon arrival of each task with only necessary

number of units and effectively prevents semantic drifts by splitting or duplicating and

time stamping them. It validates DEN on multiple datasets under lifelong scenario. This

will not significantly outperform existing lifelong learning as the batch counterparts with

substantially few numbers of parameters.

Keywords:- Dynamic, Network, DEN

Artificial Intelligence in Defence System

Ritesh Kumar Dr. Vaibhav Panwar

CSE 3rd

Year Associate Professor

CET-IILM-AHL CET-IILM-AHL

Abstract:- Artificial intelligence (AI for short) is widely acknowledged to be one of the

mostdramatic technological game changers of our age. It is already starting – and is

expectedto continue – to have a disruptive impact on most walks of private and public

life.Defense and security will be no exception. Throughout history intelligence – the computational part of the ability to achieve goals in

the world – has played a critical role in deciding who came out on top in various contests

of wills.

Keywords:- Darktrace, Jask, Harvest.ai

18

E-Bomb

Akash Yadav Vivek Kr. Gupta Minaam Ishfaq

CSE 3rd Year CSE 3rd Year CSE 3rd Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:-It is the electromagnetic pulse (EMP) effect.

The electromagnetic pulse is an electromagnetic shock wave.

This pulse of energy produces a powerful electromagnetic field sufficiently strong to

produce short lived transient voltages of thousand of volts on exposed electrical

conductors like wires, printed circuit boards etc.

This can cause damage to wide range of electrical equipments particularly computers

and radio or radar devices.

Technology used areFlux compression generators (FCG) and Virtual cathode oscillator

or Vircator.

19

Quantum Computers

Siddhanto Utkarsh Sandeep Sharma CSE 3

rd Year CSE 3

rd Year CSE 3

rd Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- Quantum Computing is a computing technique in which computers known as

quantum computers use the laws of quantum mechanics for processing information.

Quantum Computers are different from digital electronic computers in the sense that

these computers use quantum bits known as qubits for processing. A lot of experiments

are being conducted to build a powerful quantum computer. Once developed, these

computers will be able to solve complex computational problems which cannot be

solved by classical computers. Quantum is the current and the latest topic for research

and thesis in computer science.

Quantum Computers work on quantum algorithms like Simon‘s algorithm to solve

problems. Quantum Computing finds its application in the following areas:

Medicines Logistics Finance Artificial Intelligence

The list is incomplete as there are a number of topics to choose from. But these are the

trending fields these days. Whether you have any presentation, thesis project or a

seminar you can choose any topic from these and prepare a good report.

Keywords:- Quantum, Logistics, Artificial intelligence

20

Anti Aliasing Technology for Pixels between edges

Monika Mukul Tamana Reshi Rohan Choudhary

CSE 3rd

Year CSE 3rd

Year CSE 3rd

Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

E-mail:- [email protected],

E-mail:- [email protected]

E-mail:- [email protected]

Abstract: - Anti-Aliasing is a term used to describe the software process of

making the edges of graphics, objects or fonts smoother. Accomplished by

adding additional pixels in between the edges of an object and its

background.

It makes curved or slanting lines smooth again by adding a slight

discoloration to the edges of the line or object, causing the jazzed edges to

blur and melt together. If the image is zoomed out a bit, the human eye can

no longer notice the slight discoloration.

Keywords: - Anti-aliasing, Pixel, Fake Resolution, Jaggy

21

Cloud computing

Uday Krishan Kol Dr. Anuradha Konidena CSE 3

rd Year Assistant Professor

CET-IILM-AHL CET-IILM-AHL

Abstract:- Cloud computing can be defined as a model for enabling ubiquitous, convenient and on-

demand network access to a shared pool of configurable computing resources that can be rapidly

provisioned and released with minimal management effort from the user side and minimal service

provider interaction. Cloud computing is considered the evolution of a variety of technologies that have

come together to change an organizations‘ approach for building their IT infrastructure.

Characteristics of the Cloud computing:

1 On-demand self-service.

2 Broad network access.

3 Resource pooling.

4 Rapid elasticity.

5 Measured Service.

Cloud services model

1 SAAS

2 PAAS

3 IAAS

1 SAAS:is basically a term that refers to software in the cloud. It represents the capability provided to

the consumer to use the provider‘s applications running on a cloud infrastructure. The applications are

accessible from various client devices through an interface such as a web browser (e.g. web-based

email like Gmail is a form of SaaS provided by Google).

2 PAAS: The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-

created or acquired applications created using programming languages and tools supported by the

provider.

3IAAS: The capability provided to the consumer is to make use of processing, storage, networks, and

other fundamental computing resources where the consumer is able to deploy and run arbitrary

software, which can include operating systems and applications.

22

Fog Screen: Walk Through Magic

Shubhangi Saxena Anjali Kearwani Shivam Kumar

CSE 2nd

Year CSE 2nd

Year CSE 2nd

Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- There are a number of different large-screen display technologies

existing side by side with one anothery . Each kind of set has its own unique list of

benefits and trade-offs. Fog screen is one of the morden display technology trending

now a days.

Fog Screen is breakthrough technology that allows projection of high quality

images in the air. It is currently the only walk-through projection screen. We can

literally use the air as our user interface by touching only the air with our bare

hands. The screen is created by using a suspended fog generating device with no

frame around, and works with video projectors.The fog they use is dry, so it doesnt

make us wet even if we stay under the Fog Screen device for a long time. With two

projectors, we can project different images on both sides of the screen. It is a

display device which is the application of computer graphics.

In this , we'll talk about how fog screen has given wings to booming display skills

in world of technology and sciences . Because of this technology advertising in

marts have become easier . While there are endless ways to utilize the FogScreen,

we really believe that advertisers will greatly benefit from these devices. Capturing

audience attention has long been the "holy grail" of advertisers and marketers. It

provide a fully interactive solution to help increase brand awareness for those using

this technology.

Keywords: fog screen, display technology, computer graphics, water vapour,

advertsing companies, projectors.

23

Blockchain

Rishabh Srivastav Dhananjay Singh Dr. Manjula Shanbhog

CSE 2nd

year CSE 2nd

year Associate Professor

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

E-mail: [email protected]

E-mail: [email protected]

Abstract: Block chain is the type of technology where the digital transaction is a chain of

block that contains super safe information which is almost impossible to tamper. It is linked

using cryptography.

It serves as the public transaction ledger of crypto currency bitcoin. The reason behind the

block chain is that it provides security, anonymity and data integrity without any third party.

Governments have an interest in all three aspects of blockchain technology.

Basically, this paper highlights about the advantages and disadvantages of block chain

technology.

Keywords: Bit coin, Cryptography, Digital Transaction, Anonymity, Crypto currency.

24

DNA Data Storage

Noor Alam Rishu Ranjan Shivani Baliyan

CSE 2nd

year CSE 2nd

year CSE 2nd

year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

E-mail: [email protected]

E-mail: [email protected]

E-mail: [email protected]

Abstract—We are living in an age of digitalization where each and every second

tones and tones of data is generating from various sources, such as from research

labs to high power data analysis machines, from IT devices to space explorations

and many more. This increasing rate of data generation needs a huge amount of data

storage system. Nowadays we are using hard drives, flash drives etc which will not

be enough to store data with that immense speed very soon.

This is a review paper based on DNA data storage. The DNA storage is a kind of

system which is been used by nature for the millions of years. This review paper

explains how we can use the natural data storing capacity of DNA molecules to

store the artificial data that is archival information. This concept gives us a high

storage data capacity of high compatibility, high resilience ability with a half life of

approximately 500 years. It can hold up to 5.5 petabytes of data per millimeter

square area. This technology of storage is still in the development phase. Some

challenges are need to be taken care, for various fluctuations of data while storing

and retrieving it. This data storage technique could boom the way of storing data in

near future.

Keywords – nucleotides, pools, sequencing, recovery, PCR, DNA

25

Ethical Hacking

Aman Kr. Sringh Manasvi Srivastava Ashish Tripathi

CSE 2nd

year CSE 2nd

year CSE 2nd

year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

E-mail: [email protected]

E-mail: [email protected]

E-mail: [email protected]

Abstract:- In today‘s world, there is a expeditious growth in the economy and other

sectors with the advancement in the latest technologies which are now accessible to every

person. These technology has played a indispensable part which changing the lifestyle of

doing business.

Everyone needs these technologies for each and every work such as e-commerce, online

shopping, cloud computing, IT sourcing and virtualization. All these technologies are

dependent on the internet. These technologies are highly demanded, but they all are not

safe. With every technologies there is a highly risk of getting hacked. These technologies

having holes through which these hackers have entered in a person's data, company

resources, banking security and even national security issues.

As the result of this problem, thus came forward the name of ethical hackers for safe

resources. Ethical Hacking are also known as penetration test or white-hat hackers.

This paper describe ethical hackers, their skills there frame of mind and how they go

about helping their customers along with many of the challenges and opportunities in the

field of ethical hacking.

Keywords: Ethical Hacking, Vulnerability Analysis, Enslavement, Information gathering,

Information security. `

26

Quantum Computing

Vikas Yadav Suhel Bansal Shahbaz Ali Ms. Neha Arora

CSE 2nd year CSE 2nd year CSE 2nd year Assistant Professor

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract: Quantum computing is a quickly growing research field which started from a

simple question - “Can we simulate physics on a computer?”.

Traditional computers works on bits that exist as either 0 or 1. Quantum computers aren‘t

limited to two states; they encode information as quantum bits or qubits which can exist in

superposition. This superposition causes a phenomenon called quantum parallelism, and is

the motivating force behind the research being carried out in quantum computing. This

paper gives a brief review of what is happening in the field of quantum computing. At the

moment quantum computing still resides within a largely theoretical or speculative realm.

The potential is staggering, involving a computational power many times the order of all the

world‘s existing classical computers combined. But realising that potential is a fiendishly

difficult task.

Thereby, progress in this area could be catalyst for breakthrough in a range of important

areas, principle example being in the development of new drugs that can fight diseases that

still cast dark clouds on our existence. It does also offers a new paradigm for how might

problems can be solved with more precision.

Keywords: Quantum computing, qubits, superposition, quantum parallelism, entanglement.

27

Artificial Intelligence In Medical Science

Vishnu Sharma Abhishek Rai Sharad Shakya

CSE 2nd

Year CSE 2nd

Year CSE 2nd

Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstrct:-Artificial intelligence (AI) is the ability of computer or machine or system to sense,

comprehend, act, and learn .AI is being used in many fields; it can also be applicable in the field

of medical science. In many countries, due to lack of specialist doctors, expensive medicines and

incurable diseases patients are suffering.

In this paper we will discuss about how artificial intelligence can assist the doctors in their

treatment of various diseases and how it can minimize the cost of the medicinal equipments by

providing improved environment for the latest researches in organisations.

We will also discuss about the use of artificial intelligence in surgery and diagnose the disease by

image processing and how AI will help in predicting diseases by analysing the large data of

patients.

Keywords: Artificial Intelligence, Mortality, Diagnose, Comprehend, Predicting, Image

processing

28

Android

Akash Rajput Paras Mahajan Mr. Vikas Singh

CSE 2nd

Year CSE 2nd

Year Assistant Professor

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- Android is a software stack for mobile devices that includes

an operating system, middleware and key applications. Android is a

software platform and operating system for mobile devices based on the

Linux operating system and developed by Google and the Open Handset

Alliance. It allows developers to write managed code in a Java-like

language that utilizes Google-developed Java libraries, but does not

support programs developed in native code.The unveiling of the Android

platform on 5 November 2007 was announced with the founding of the

Open Handset Alliance, a consortium of 34 hardware, software and

telecom companies devoted to advancing open standards for mobile

devices. When released in 2008, most of the Android platform will be

made available under the Apache free-software and open-source license.

Keywords:- Android, Linux, Java

29

30

Machine Learning

Rishabh Srivastava Dr. Manjula Shanbhog

CSE 2nd

Year Associate Professor

CET-IILM-AHL CET-IILM-AHL

Abstract:- Data is the most crucial element of Modern Computing and a considerable

extent of data is available Everywhere. As a result it is very essential to analyze this data in

order to excerpt some appropriate information and to build an algorithm that is made

entirely upon this analysis. It can be accomplished through machine learning and data

mining. Machine learning is a subdivision of artificial intelligence that is

used to develop algorithm based on data and its relationship between data. It is used in

many fields such as malware detection, game playing, marketing , information retrieval the

most used application of machine learning is in business analysis through computational

statistics that is related to machine learning.

Keywords : - Supervised learning , Unsupervised learning, detection, clustering, neural

network

Data Mining

Ayush Yadav Amit Singh Abhishek Sinha CSE 2

nd Year CSE 2

nd Year CSE 2

nd Year

CET-IILM-AHL CET-IILM-AHL CET-IILM-AHL

Abstract:- Data mining is the process of representing the way in huge data set including

methods at the joining of machine learning, statistics and database systems. Data mining is

an field of computer science to extract the information in the form of data sets then

transform the information in co messed form for further use. It is used by companies to turn

raw data into useful information. By using software for pattern in large batches of data,

businesses can learn more about their customers to develop more effective marketing

strategies, increase sale and decrease cost.

Keywords:- Data Mining, Machine Learning

30

Deep Affordance- grounded Sensorimotor Object Recognition

Manish Kumar

CSE 1st Year

CET-IILM-AHL

Abstract:- It is well-established by cognitive neuroscience that human perception of objects

constitutes a complex process, where object appearance information is combined with

evidence about the so-called object ―affordances‖, namely the types of actions that humans

typically perform when interacting with them. This fact has recently motivated the

―sensorimotor‖ approach to the challenging task of automatic object recognition, where both

information sources are fused to improve robustness. In this work, the aforementioned

paradigm is adopted, surpassing current limitations of sensorimotor object recognition

research. Specifically, the deep learning paradigm is introduced to the problem for the first

time, developing a number of novel neuro-biologically and neuro-physiologically inspired

architectures that utilize state-of-the-art neural networks for fusing the available information

sources in multiple ways. The proposed methods are evaluated using a large RGB-Dcorpus,

which is specifically collected for the task of sensorimotor object recognition and is made

publicly available. Experimental results demonstrate the utility of affordance information to

object recognition, achieving an up to 29% relative error reduction by its inclusion.

Keywords:- Deep Affordance, Sensorimotor

31

Blockchain

Aman Kumar Ms. Roopali Goyal

CSE 1st Year Assistant Professor

CET-IILM-AHL CET-IILM-AHL

Abstract:- A blockchain is a public ledger to which everyone has access but without a

central authority having control. It is an enabling technology for individuals and

companies to collaborate with trust and transparency. One of the best known applications

of blockchains is the cryptographic currencies such as Bitcoin and others, but many other

applications are possible. Blockchain technology is considered to be the driving force of

the next fundamental revolution in information technology. Many implementations of

blockchain technology are widely available today, each having its particular strength for a

specific application domain. The main hypothesis is that the blockchain establishes a

system of creating a distributed consensus in the digital online world. This allows

participating entities to know for certain that a digital event happened by creating an

irrefutable record in a public ledger. It opens the door for developing a democratic open

and scalable digital economy from a centralized one. There are tremendous opportunities

in this disruptive technology and revolution in this space has just begun.

Keywords:- Blockchain, bitcoin, authority, cryptographic

32

Posters

33

34