2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745377
Santosh Babulal Gupta, M. Mhetre
{"title":"Remote Diagnostics and Monitoring of Sucker Rod Pump System (RDMSRP System)","authors":"Santosh Babulal Gupta, M. Mhetre","doi":"10.1109/PUNECON.2018.8745377","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745377","url":null,"abstract":"This paper introduces design and algorithm to monitor and diagnose the health status of Sucker Rod Pump(SRP) station and send notification to user with real time failure status via GSM. Most of the SRPs are stationed at remote locations where continuous manual monitoring is not at all possible and if SRP station goes down due to any of the failure reasons, it results in production loss. To overcome this issue, we have developed a monitoring and diagnostics device. This monitoring device consists of multiple sensors placed at various points on the sucker rod pump station, which acts as an input to the monitoring device. Monitoring device process all the input signals with the support of diagnostics algorithm running into device to detect multiple failure conditions occurred due to ageing, irregular maintenance, power fail condition, manhandling etc. and sends notification message of sucker rod pump station’s health status to the registered numbersusers.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123350193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745404
Ishaan Srivastava, Bhumika Saini, Shraddha P. Phansalkar, Sonali Patwe
{"title":"Secure and Transparent Election System for India using Block chain Technology","authors":"Ishaan Srivastava, Bhumika Saini, Shraddha P. Phansalkar, Sonali Patwe","doi":"10.1109/PUNECON.2018.8745404","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745404","url":null,"abstract":"Data security, data reliability and data availability are the challenges the world has always been solving. Election and Voter data are very crucial for a democratic nation. India, in this respect, brings its own challenges. A lot of financial resources are spent to conduct elections. At times, people are unable to cast their vote because they are unable to travel back to their constituency. Either way, the regular public lifestyle is affected for days in a row. Notwithstanding the best efforts, the whole process is susceptible to unauthorized access and unauthorized deeds. In this paper use of Blockchain Technology, powered by Ethereum to overcome the challenges in existing voting system.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745370
Seema B. Joshi
{"title":"Standards and Techniques to remove Data Remanence in Cloud Storage","authors":"Seema B. Joshi","doi":"10.1109/PUNECON.2018.8745370","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745370","url":null,"abstract":"Data security is one of the main concerns for organizations when organizations deploy cloud to store data. Particularly, data leakage is a critical issue in public clouds due to data remanence. The retentive property of storage media is observed as a major threat because it may include sensitive information such as user id, user passwords, secret keys, web URLs, etc. Healthcare records, financial records, defense records are some of the examples where data remanence has serious repercussions. Though consumers vacate cloud volumes, vendors do not securely recycle storage devices. Hence, cold boot attack, harvesting attacks, side-channel attacks are likely to occur in the cloud. It is required to ensure about data integrity and confidentiality of sensitive data within a cloud by organizations or users. It is observed that encryption and data persistence avoidance technology for different memory devices like Hard Disk Drive (HDD), Static and/or Dynamic Random-Access Memory (SDRAM) are widely used. In this paper, we discuss and provide various standards and techniques proposed in the literature to remove the data remanence in the cloud storage. Moreover, we present a comparison of parametric evaluation of overwriting standards to remove data remanence.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":" 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745422
Niti Naik, M. Mehta
{"title":"Comprehensive and Comparative Study of Cloud Simulators","authors":"Niti Naik, M. Mehta","doi":"10.1109/PUNECON.2018.8745422","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745422","url":null,"abstract":"Computing and storage capacity are increasingly growing in cloud computing and hence, developers and programmers are deploying their files and applications on cloud. However, it is complex and difficult to deploy a real cloud and is costly as well. Moreover, resource utilization is not much efficient in real cloud. Hence, cloud simulation is considered as a fruitful and effective alternative. In this paper, we provide a complete study and analysis on a variety of cloud simulation tools. Moreover, we present parametric evaluation of cloud simulation tools on the basis of our identified parameters. In addition, we provide challenges and issues encountered by implementers and users of cloud computing during simulation of cloud. Our survey gives thorough overview of various cloud simulation tools, helping researchers and developers in selecting the most appropriate cloud simulation tool. Furthermore, it can be used as a catalog of available cloud simulators to come up with new design.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745369
Garima Makkar
{"title":"Real-Time Disease Forecasting using Climatic Factors: Supervised Analytical Methodology","authors":"Garima Makkar","doi":"10.1109/PUNECON.2018.8745369","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745369","url":null,"abstract":"Weather being an uncontrollable factor, often has direct effects on human mortality rates, physical health, mental injury and other health outcomes. Extreme climate incidences and gradual changes in weather are making us more vulnerable to disease outbreaks. In general, there are three ways by which variation in climate affects such diseases: by affecting the virus, the vector or host and spread of a disease. According to 1996 World health organization (WHO) report, 30 new diseases have come into existence in the past 20 years. Additionally, there has been a re-emergence and redistribution of various arthropod-borne diseases such as dengue, malaria etc. on a global scale. Events like rainfall, humidity, temperature etc. have well-defined role in the transference cycle. Any changes in these events can lead to increase in incidence of these diseases.The worldwide pandemic about abroviral diseases demands the need for developing early warning system (EWS) for infectious diseases by considering climate change. Past studies incorporates only the historical weather statistics into account. However because of increasing uncertainty and climate variability, the traditional systems in this context are getting outstripped. In this paper, we’ll propose our methodology for predicting number of dengue cases that are likely to occur in real time on the basis of five-day weather forecast. Our analysis is applicable globally and enables comprehensive scenarios of daily disease outbreaks to be explored using real-time weather API, preparing society against any health related risks arising due to variability in climate.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"470 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745400
Harbir Kaur, Hirday Pal Singh Gill, D. Sarmah
{"title":"Multiphase and Multiple Encryption","authors":"Harbir Kaur, Hirday Pal Singh Gill, D. Sarmah","doi":"10.1109/PUNECON.2018.8745400","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745400","url":null,"abstract":"Cryptography and steganography are the two basic techniques which provide security and integrity of data. Numerous algorithms and ciphers have been developed contributing to the security of data. Even though these algorithms have contributed to data security, these are still vulnerable to attacks. The study was conducted to develop a multiphase and multiple encryption algorithm which will provide better security and safety of data. An android application is designed to implement and test the same to check its vulnerability. The algorithm will provide data encryption multiple times with each step being encrypted with a different algorithm along with randomization. Few strong and secure cryptography algorithms categorized into symmetric and asymmetric are incorporated in to the proposed work. The algorithms are referred to as Advanced Encryption Algorithm (AES-256 bits), RSA, Data Encryption Standard (DES), Blowfish, Caesar Cipher and ROT13. The validation of the proposed work is accomplished by comparing its results with the contemporary available algorithms based on the evaluation parameters such as time complexity, security and data size.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745376
Dweepna Garg, Parth Goel, Sharnil Pandya, Amit Ganatra, K. Kotecha
{"title":"A Deep Learning Approach for Face Detection using YOLO","authors":"Dweepna Garg, Parth Goel, Sharnil Pandya, Amit Ganatra, K. Kotecha","doi":"10.1109/PUNECON.2018.8745376","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745376","url":null,"abstract":"Deep learning is nowadays a buzzword and is considered a new era of machine learning which trains the computers in finding the pattern from a massive amount of data. It mainly describes the learning at multiple levels of representation which helps to make sense on the data consisting of text, sound and images. Many organizations are using a type of deep learning known as a convolutional neural network to deal with the objects in a video sequence. Deep Convolution Neural Networks (CNNs) have proved to be impressive in terms of performance for detecting the objects, classification of images and semantic segmentation. Object detection is defined as a combination of classification and localization. Face detection is one of the most challenging problems of pattern recognition. Various face related applications like face verification, facial recognition, clustering of face etc. are a part of face detection. Effective training needs to be carried out for detection and recognition. The accuracy in face detection using the traditional approach did not yield a good result. This paper focuses on improving the accuracy of detecting the face using the model of deep learning. YOLO (You only look once), a popular deep learning library is used to implement the proposed work. The paper compares the accuracy of detecting the face in an efficient manner with respect to the traditional approach. The proposed model uses the convolutional neural network as an approach of deep learning for detecting faces from videos. The FDDB dataset is used for training and testing of our model. A model is fine-tuned on various performance parameters and the best suitable values are taken into consideration. It is also compared the execution of training time and the performance of the model on two different GPUs.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745380
Kiran Bhowmick, M. Narvekar, Aqsa Bhimdiwala, Chandrasekhar Raman
{"title":"CDACI: Concept Drift Detection and Adaptation to Classify Imbalanced Data streams","authors":"Kiran Bhowmick, M. Narvekar, Aqsa Bhimdiwala, Chandrasekhar Raman","doi":"10.1109/PUNECON.2018.8745380","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745380","url":null,"abstract":"Non-stationary data streams usually are affected by the phenomenon of concept drift. A drift undetected leads to the drastic drop in the classifier’s accuracy. Detecting this drift and adapting to it becomes a challenging task while classifying data streams. The problem further increases in imbalanced data streams. This paper proposes a model CDACI: Concept Drift Detection and Adaptation to Classify Imbalanced Data streams to classify imbalanced data streams in the presence of concept drift. CDACI uses a cosine similarity function to detect concept drift between subsequent windows. The classifier learns the new concept and forgets the earlier concepts when the drift is detected otherwise the classifier continues to train on the incoming data while remembering previous concept, this behaviour of the classifier is determined by the optimized threshold value. The results show that CDACI is successfully able to adapt to new concepts and classify imbalanced data streams.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
2018 IEEE PuneconPub Date : 2018-11-01DOI: 10.1109/PUNECON.2018.8745378
Mahendra Patil, M. Meena, Nikita Patil
{"title":"The Effect of ICT (Information and Communications Technology)in Evaluation of learners in Engineering Education","authors":"Mahendra Patil, M. Meena, Nikita Patil","doi":"10.1109/PUNECON.2018.8745378","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745378","url":null,"abstract":"To enhance the analytical thinking, problem solving skills and programming skills of undergraduate engineering students by using ICT (Information and Communications Technology) and evaluation of students through spoken tutorial is done. The effect of activity enhances the employability of students. This paper addresses this challenge using spoken-tutorials as a collaborative learning tool to develop programming efficiency and evaluation of the learners. To overcome the problem faced by learners in teaching learning we have conducted some workshops and seminars from industries and FOSSEE. The overall results proves that there is drastic change in programming ability of learners.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Analysis Between Popular Symmetric Encryption Algorithms","authors":"Shiraz Saptarshi Ghosh, Harshwardhan Parmar, Prasham Shah, Krishna Samdani","doi":"10.1109/PUNECON.2018.8745324","DOIUrl":"https://doi.org/10.1109/PUNECON.2018.8745324","url":null,"abstract":"In today’s world, data is termed as the new gold. The need for providing security to the data stored on local storage or at a remote location is a must. Various methods and algorithms are used for securing data one of which is using symmetric key cryptography. It is an encryption technique which uses a single key for the encryption and decryption process. This paper provides an extensive literature survey and puts forth a comparative analysis of the existing symmetric cryptography algorithms (Caesar, Vigenère, Data Encryption Standard, Triple Data Encryption Standard, Extended Data Encryption Standard, Rijndael, Twofish, Blowfish, Modified Blowfish) based on their architecture, flexibility, reliability, security and also states the limitations for each that are essential for secure communication through a wired or wireless medium.","PeriodicalId":166677,"journal":{"name":"2018 IEEE Punecon","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}