List of Inhouse Projects
List of Inhouse Projects
Blockchain technology has emerged as a promising solution for secure and decentralized
data storage and replication. Smart contracts, self-executing programs that run on
blockchain networks, offer a novel approach to automate and manage data replication across
multiple nodes in a blockchain network. This abstract proposes a concept whereby smart
contracts are utilized to facilitate the replication of data across distributed nodes, ensuring
redundancy, fault tolerance, and data integrity.
The proposed concept leverages the unique features of blockchain, including its distributed
ledger, cryptographic hashing, and consensus mechanisms, to establish a trustless and
tamper-resistant environment for data replication. Smart contracts are deployed to automate
the replication process, defining rules and conditions for data transfer and storage. These
Leveraging Smart contracts execute predefined instructions based on specified triggers or events, such as the
Contracts for Data addition or modification of data.
1 Replication Across
Multiple Nodes in
By utilizing smart contracts for data replication, organizations can achieve several benefits,
Blockchain Networks
including enhanced security, transparency, and auditability. The immutable nature of
blockchain ensures that replicated data remains tamper-proof and auditable, providing
assurance of data integrity. Furthermore, the decentralized nature of blockchain networks
offers resilience against single points of failure, enhancing the reliability and availability of
replicated data.
In conclusion, the concept of using smart contracts for data replication in blockchain
networks presents a novel approach to address the challenges of traditional centralized
replication methods. By harnessing the power of blockchain and smart contracts,
organizations can establish a robust and efficient framework for securely replicating data
across distributed nodes, paving the way for decentralized and trustless data management
systems.
School of Computer Science in-house Projects
(Available for 2022, 2023 Intake Students)
Melanoma, the most deadly and lethal kind of skin cancer, begins on the skin's surface and
progresses deep into the skin's layers. It is one of the cancers that spreads most quickly in
humans. Early detection is essential since it raises the survival probability of melanoma
patients to while enabling them to get straight forward and affordable therapies. This
research provides a novel strategy that uses machine learning techniques for the skin
lesion identification and partitioning into benign or the malignant instances to address these
issues and assist dermatologists. The recommended strategy integrates image processing
methods such as unique contrast stretching of dermoscopic images based on mean values
and standard deviation, as well as image segmentation utilizing the OTSU thresholding
algorithm. Further more, the segmented pictures are used to extract pertinent
Enhancing Melanoma
5 characteristics as color identification features, histogram of oriented gradients (HOG)
Detection Using
features for object recognition, and Texture identification using (GLCM) Gray level Co-
Taxonomy And
occurrence Matrix characteristics. To reduce dimensionality, principal component analysis
Severance
(PCA) is used, and the class imbalance issue is handled with the Synthetic Minority
Oversampling Technique (SMOTE). When contrast stretching is used prior to segmentation,
excellent segmentation results are obtained. Additionally, when using the Random Forest
classifier in conjunction with wrapper-based feature selection, promising results are
obtained when compared to other prominent classifiers. This research contributes to the
advancement of melanoma detection, offering potential cost-effective and accurate solutions
to aid early diagnosis and support healthcare professionals in providing timely and informed
treatments for patients. This innovative approach empowers healthcare professionals to
administer timely and informed treatments, marking a pivotal step towards enhancing
patient outcomes.
One of the most challenging issues existing in our Public Distribution System (PDS) is
managing uncertainties in demand, customer behavior, and market trends. Such instability
and unpredictability resulted in numerous cases of excess stock when demand declined or a
shortage of commodities when demand for certain goods increased significantly.
Forecasting is critical in most firms for optimizing and enhancing organizational efficiency
Forecasting Rice
and enabling data-driven strategic planning. Predictions of commodity store and demand
Sales Demand in Fair
can be used for efficient inventory control, labor work schedules, and infrastructure
8 Price Shop of India
planning, and are a key technique for most aspects of supply chain enhancement. The main
using Machine
objective of this research is to forecast rice sales demand in a Fair Price Shop (FPS) of India
Learning Approach
by employing a Machine learning approach. This work shows how past demand data can be
used to estimate future demand and how these forecasts impact the PDS. The forecast
models generated from past data can be verified and validated in the real case application
using the Mean Squared Error (MSE) that helps to forecast the demand of inventory
required in FPS.
Objectives:
1. Developing an appropriate questionnaire for online test which will extract various
levels of MDD risk among the students
2. Pre-processing the data received after online test (i.e. Eliminating missingness and
uncertainties from the data)
3. Classifying the students into different groups based on their levels of MDD (i.e.
Level1, Level2, and Level3)
4. Predicting when the students will transform from Level1 to Level2, Level2 to Level3,
and Level3 to suicidal tendency
5. Suggest appropriate actions to be taken at each level (Post Processing)
The growth of electronic health records (EHRs) holding essential medical images has
Securing Medical
Images in Cognitive prompted a demand for strong data protection and quicker diagnostic procedures in the fast
IoT Networks with changing world of healthcare. In response, this research presents a unique, security-based
10 SCSOA based cognitive IoT network that uses a secure medical data management architecture driven by
SIMON Encryption Hyperledger blockchain (HB) technology. This ground-breaking paradigm integrates a
A realtime project in which students will develop the following modules - Leave application
14 JAIN UMS - HRM and approval module, attendance tracking and report generation, grievance management and
employee announcements, engagement and recognition
In today's world plant diseases are growing rapidly due to the global warming. The effect of
climatic changes have the significant impact on the health of both human's and plants. In
Drumstick leaf this project we mainly concentrate on the specific types of diseases that can spread over the
15 disease detection plants. Particularly the examination of disease in the leaf part of the drumstick plant is
using GAN throughly detected by using diverse of ML algorithms and the detection is improvised usind
GAN. Diverse ML models are evaluated to discover their performance with the highly
sophisticated GAN model.
Bone fractures are a common injury that requires accurate and timely diagnosis for effective
treatment. This project aims to develop a deep learning-based system for detecting bone
Deep Learning-Based fractures in X-ray images using a convolutional neural network (CNN). Utilizing the Bone
Bone Fracture Fracture Multi-Region X-ray dataset from Kaggle, the system will be trained to identify and
17
Detection on X-ray classify fractures across different regions of the body. The proposed model will enhance
Images diagnostic accuracy and speed, assisting radiologists in identifying fractures more
efficiently and reliably. By automating the detection process, the system aims to reduce
diagnostic errors and improve patient outcomes.
This project focuses on developing a smart home energy management system using machine
learning algorithms and IoT devices. By analyzing energy consumption patterns, user
Smart Home Energy preferences, and external factors such as weather conditions, the system will optimize energy
21 Management System usage, reduce utility costs, and promote energy efficiency in residential settings.
using ML
Problem: Prevention is always better than cure. And when it comes to fire, preventive
measure is an absolute necessity Fire is a destructive force that can quickly spread and
inflict unthinkable harm to property, health, and even lives. That is why we should install
fire safety components in the household and the work environment.
Smoke Detecting IoT Solution: Smoke Detecting IoT device is a smart fire detection system that can detect
Device Using Gas combustible gases and alert you to act immediately to control or stop the fire from breaking
22
Sensor – IoT Home out. With the help of Arduino, an MQ-2 Smoke detection sensor, a breadboard, some
Safety jumper wires, a resistor, two LEDs, and a buzzer, one can quickly build this fire detection
system using IoT.
:Many unknown health issues are being currently faced by different kinds of people. To
overcome from the death rate identification of diseases at current time is essential. All
medical data can efficiently compute and compare in supporting platform of Virtualization
in Big data.The stored data can be mined by fuzzy rule with expert system for
prediction of future health condition. The analysis and prediction of data can be carry out by
using neuro fuzzy algorithm with genetic algorithm. The neuro fuzzy algorithm which
optimize the weights needed for efficiently calculating trained input values in inference
Predetermined system.The EHR(Electronic Health Records) of patient status provided
24 malicious application to the doctor and user by means of automated with approval of expert system. The proper
using BDSA approach security mechanisms is needed for data protection.The hackers trace and may modify the
medical data also. Here the extraction of attack
features performed through graph based event correlation and map reduce parser based
identification method.Attack presence is determined by machine learning like belief
propogation and logistic regression.This two method can detect how many times hackers
tried to hack the data and the details of system trough the hackers
hacked all are saved in server. From the details prevention of future based hacking data can
also be possible
In order to analyse a variety of cat picture datasets, this study investigates deep learning
approaches. Convolutional neural network (CNN) architecture is trained after preprocessing
Comparative analysis
procedures verify data compatibility. Classification accuracy is improved using transfer
of the activation
learning from pre-trained models such as VGG16 or ResNet. Accuracy, precision, recall,
27 functions with CNN
and F1-score are among the evaluation measures; confusion matrices show how well the
for Cats Image
model performs across different cat breeds. The results show how well deep learning works
Dataset Analysis
for identifying cat photos, which has ramifications for a number of fields including
veterinary care and animal welfare.
Designing Machine Identify patterns in human behavior using Computational psychology. Computational
learning model psychology is a field that merges principles of psychology with computational techniques
29 assistant for (like machine learning techniques, artificial neural networks etc.) to model and understand
Diagnosing mental cognitive processes and behavior. It involves the use of mathematical models, simulations,
health conditions and computational methods to study the mind and behavior.
Credit card fraud detection using machine learning algorithms involves the systematic
identification of unauthorized transactions to prevent financial losses. This process includes
collecting and preprocessing transaction data, feature engineering, and labeling transactions
Credit card fraud as fraudulent or non-fraudulent. Supervised learning algorithms, such as logistic regression
detection using and neural networks, are employed alongside unsupervised techniques like anomaly
31
machine learning detection to distinguish between legitimate and fraudulent transactions. The models are
algorithms trained, validated, and deployed to monitor real-time transactions, flagging suspicious
activities for further investigation. Continuous learning from new data enhances the model's
accuracy and reduces false positives, thereby improving the effectiveness of fraud detection
and ensuring better security for financial transactions.
This topic presents Vision Assist, an innovative Android application designed to empower
visually impaired individuals by providing real-time text and product recognition
capabilities using a smartphone's camera. Vision Assist aims to bridge the accessibility gap
by leveraging cutting-edge technologies to enhance independence and facilitate efficient
Vision -Android App daily tasks for users with visual impairments. The application integrates Optical Character
Camera For Text And Recognition (OCR) and Object Recognition technologies, enabling users to identify and
32
Product Labelling For comprehend printed text and recognize various products or objects in their surroundings. By
Unsighted People harnessing OCR algorithms, Vision Assist swiftly converts captured text from images into
audible speech, assisting users in accessing information from books, signs, documents, and
more. Moreover, the object recognition feature employs machine learning models to identify
common items, enabling users to independently navigate their environment and identify
products while shopping or exploring unfamiliar surroundings.
In today's digital age, ensuring the confidentiality and integrity of sensitive information is
paramount. Text and image data, being ubiquitous in electronic communication, demand
Text and Image robust encryption techniques to safeguard against unauthorized access and tampering. This
Encryption paper presents a comprehensive approach to secure text and image encryption and
34
Decryption Using decryption utilizing the Advanced Encryption Standard (AES) algorithm. The Advanced
AES Algorithm Encryption Standard (AES) is a symmetric encryption algorithm widely adopted for its
robustness and efficiency. It operates on fixed-size blocks of data, making it suitable for
both text and image
India, with a rich heritage of floral diversity, is well-known for its medicinal plant wealth,
but their identification is one of the major burning issues in Ayurvedic Pharmaceutics.
Several crude drugs are being sold under the same name in the market leading to confusion
Identification of
and their misidentification. Even the collectors and traders are not completely aware of the
Different Medicinal
exact morphological appearance or differentiating attributes of the many drugs owing to
Plants/Raw materials
seasonal and geographical availability, and similar characteristics. Moreover, the extensive
35 through Image
consumption to meet demand-supply ratio exerts a heavy strain on the existing resources. It
Processing Using
further leads to the practice of adulteration, substitution, and disbelief in the curative
Machine Learning
capability of the system eventually. Thus, software capable of identifying different
Algorithms
medicinal plants/ raw materials through Image Processing Using Different Machine
Learning Algorithms will be of immense use. It will be helpful at every level viz.
wholesaler, distributor, etc. of the supply chain of raw material being utilized in the system.
In recent years, the integration of artificial intelligence (AI) into healthcare has
revolutionized the way medical information is managed and how patient care is delivered.
This project aims to develop an AI-based personal health assistant that can provide users
with personalized health recommendations, track their fitness goals, and offer insights into
their overall well-being. The assistant will leverage machine learning algorithms to analyze
AI-Based Personal data from wearable devices, health records, and user inputs to deliver real-time advice and
40
Health Assistant alerts. Key features include symptom checking, medication reminders, diet suggestions, and
virtual consultations with healthcare professionals. By utilizing natural language processing
(NLP), the assistant can interact with users in a conversational manner, making it accessible
and user-friendly. This project will not only enhance individual health management but also
contribute to preventive healthcare by encouraging healthier lifestyles through personalized
recommendations
There are multiple cloud vendors in the market across the globe. A software developer who
Parameter Ranking
need cloud services for their developmental activities has to choose one of the clouds.
Priority Level
Selection of cloud vendor is a challenging task. The algorithm designed here will provide
Weightage based
41 the developer to choose the best suited cloud service provider. As of now the algorithm can
Cloud selection
be used manually, calculate the average weightage and select the best suited CSP. The
algorithm
implementation of PRPLW algorithm and packaged to software can provide the selected
Implementaion.
CSP as output by taking the parameters for development as input.
In the remote medium, the jammer is able to do just attack the Multi-Hop Wireless network
system (MHWNs). The open-access methodology of MHWNS is the principal purpose
behind the attack of jammer. The principle downside of sticking is to stop the
correspondence by connecting with the validated nodes which have a similar remote
medium or channel. It is fundamental to recognize the jammer since it might give the
required data or message to initiate the instruments of hostile to sticking. Existing strategies
are delicate and offer significance to following and following items through the aggregate
design of the system. Despite the fact that this system gives an answer for the jammer
An Optimized attacks it was not successfully supported to stop the restriction inconvenience on the
Mechanism to grounds that the earnestness of the attack appeared during the season of system
Improve the transmission. To conquer this issue, the proposed framework presents a new calculation
Performance Packet called as Optimized Transmission Mechanism (OTM) which includes the degree of node
43
transmission in handover, picking of definite node to go in the system. Also, this proposed mechanism
Jammer Based on diverts the packets which are available in the jammer location to the following accessible
Multi-Hop Wireless area and make the packet transmission successfully. The motivation behind this exertion is
Network to maintain a strategic distance from the intrusion of the system in the event of sticking by
circumvent the jammer zone and distinguishing another course to beat the current issues.
The different ways are favored with the most astounding association quality to proceed with
the system Quality of Service (QoS) even consequent to sticking. This proposed work
clarifies the OTM calculation which gives the course dependent on the radio -transmitter
location way. This OTM calculation works dependent on the nature of the ideal connection.
The exhibition of the proposed method is evaluated by its packet conveyance value. Results
demonstrate that the exhibition of Extended Optimized Transmission Mechanism (EOTM)
Alzheimer's Disease is the most prevalent and pre-dominently found in various parts of USA
Recommendation and across the globe. The study of model that recommends, whether the patient is suffering
Model for Detection from any Memory related issues. If so, what is the stage of memory issue the patient is
47 and Prediction of facing. The Recommendation System is a study of various aspects that is causing the
early Stage patients in various phases of Alzheimer's Disease. These causes are addressed with Bio-
Alzheimer's Disease medical Imaging biomarkers. The Medical Imaging biomarkers include various images of
interest like PET, MRI, sMRI and fMRI images for detection and prediction of the same.
BrainBridge, the world’s first concept for a head transplant system, which integrates
advanced robotics and artificial intelligence to execute complete head and face
Brain Bridge
49 transplantation procedures. This state-of-the-art system offers new hope to patients suffering
Technology
from untreatable conditions such as stage-4 cancer, paralysis, and neurodegenerative
diseases like Alzheimer’s and Parkinson’s.
ENHANCING The fundamental aim of digital forensics is to discover, investigate and protect an evidence,
CLOUD increasing cybercrime enforces digital forensics team to have more accurate evidence
FORENSICS IN handling. This makes digital evidence as an important factor to link individual with criminal
MAINTAINING activity. In this procedure of forensics investigation, maintaining integrity of the evidence
SECURE plays an important role.Because of the distributed nature of cloud computing, the data of
52
EVIDENCE cloud may be stored and processed across jurisdictional borders. In such case, collecting
STORAGE BY digital evidence from cloud computing requires multiparty cooperation. This work proposed
APPLYING a process provenance, which provides proof of existence and privacy preservation for
BLOCKCHAIN process records by using technologies of blockchain and cryptography group signature. The
METHODOLOGY process provenance enhances the trustworthy of the chain of custody for cloud forensics.
A question answering system for university policies would be a natural language processing
University Policy (NLP) application designed to provide accurate and relevant answers to questions related to
53 question answering the various policies and regulations of a university. The system would aim to help students,
system faculty, and staff easily find information about topics such as academic policies, student
conduct, financial aid, housing rules, and more.
This project also investigates the integration of blockchain with existing network security
mechanisms, such as Public Key Infrastructure (PKI), to enhance authentication processes.
By storing cryptographic keys and digital certificates on the blockchain, the framework
provides a more secure and resilient method of managing digital identities.
The process of image description is one of the growing research problem . The model using
different combination
55 Image captioning using Of the neural network along with long short term memory to get better results, finding the
deep learning best combination is challenging based on accuracy, this project work focus on the
algorithms mentioned challenges and developing a better algorithm solve the problem.
Application of
Creating an Intrusion Detection System (IDS) using machine learning algorithms is an
machine learning
exciting and impactful project. Developing an IDS using machine learning involves a
algorithms to improve
56 combination of data science, cybersecurity, and software engineering skills. The project not
the accuracy of
only provides practical experience with machine learning techniques but also contributes to
intrusion detection
the crucial field of network security.
systems (IDS)
rain tumor diagnosis using MRI scans poses significant challenges due to the complex
nature of tumor appearances and variations. Traditional methods often require extensive
manual intervention and are prone to human error, leading to misdiagnosis and delayed
treatment. Current approaches primarily include manual examination by radiologists and
Refinement of neural conventional machine learning techniques. These methods rely heavily on feature extraction
network algorithms and classification algorithms, which may not capture the intricate patterns present in brain
63 for accurate brain MRI images. Conventional techniques often suffer from limited accuracy and
tumor classification generalizability, mainly due to the high variability in tumor appearance and the subjective
using MRI images nature of manual interpretation. Additionally, traditional machine learning models may
struggle with the high-dimensional data inherent in MRI images. To address these
limitations, our research introduces a deep learning-based model utilizing convolutional
neural networks (CNNs).Our model employs a sequential CNN architecture with multiple
convolutional, max-pooling, and dropout layers, followed by dense layers for classification.
We can collect the details about the daily activities of the user through various wearables
65 Diet plan prediction
and suggest suitable food based on the target set.
Furthermore, the project will explore the impact of different features on student
performance, providing actionable insights for educators and policymakers to improve
teaching strategies and student support systems. By the end of the project, students will gain
hands-on experience in data preprocessing, model building, and evaluation, along with a
deeper understanding of how data science can be applied to real-world educational
challenges.
The project will start by setting up a network of IoT sensors and devices to collect data on
energy usage, environmental conditions (temperature, humidity, etc.), and appliance status
within a home. This data will be transmitted to a central server or cloud platform for storage
and analysis.
Smart Home Energy Machine learning models, including regression algorithms and time series forecasting
Management System methods, will be developed to predict future energy consumption patterns. These models
67
Using IoT and will be trained on the collected data to provide accurate and reliable predictions.
Machine Learning Additionally, optimization algorithms will be used to develop strategies for reducing energy
consumption during peak hours and improving overall energy efficiency.
The SHEMS will also feature a user-friendly interface that provides real-time monitoring
and control of home appliances, allowing users to make informed decisions about their
energy usage. Alerts and recommendations will be generated to help users minimize their
energy footprint.
By the end of this project, students will gain hands-on experience with IoT device
integration, data collection and preprocessing, machine learning model development, and
system optimization. They will also understand the practical applications of combining IoT
and machine learning to promote energy efficiency and sustainability in smart homes.
The project will start with the collection of a comprehensive dataset that includes nutritional
information of various foods, diabetic patients’ dietary preferences, medical history, and
health metrics such as blood glucose levels, HbA1c, and physical activity. Data
preprocessing steps will involve cleaning the data, handling missing values, encoding
categorical variables, and normalizing numerical features.
Machine learning algorithms, such as collaborative filtering and content-based filtering, will
Diabetic Diet be implemented to develop personalized diet recommendation models. These models will be
Recommendation and trained to suggest meal plans and food items that align with the patients’ dietary needs and
68 Health Tracking preferences, aiming to maintain stable blood glucose levels.
System Using Data
Science The health tracking component will include data collection from wearable devices or
manual input by patients, tracking metrics such as blood glucose levels, physical activity,
and medication adherence. Time series analysis and predictive modeling techniques will be
employed to analyze trends and predict potential fluctuations in blood glucose levels.
The system will feature a user-friendly mobile or web application where patients can input
their health metrics, receive dietary recommendations, and track their progress over time.
The application will provide real-time feedback and alerts to help patients manage their
diabetes effectively.
By the end of this project, students will gain hands-on experience in data preprocessing,
machine learning model development for recommendation systems, time series analysis, and
creating user-centric applications. They will also learn how data science can be applied to
This project focuses on developing a system for automated detection and classification of
Crop Disease
diseases in crops using machine learning and image processing techniques. By analyzing
70 Detection and
images of diseased plants, the model will identify the type of disease and recommend
Classification
appropriate treatments, aiding farmers in crop management and yield optimization.
Abstract:
Water scarcity is a significant challenge for agriculture, impacting crop yields and food
security. This project aims to address this challenge by developing a data-driven water
management system for sustainable agriculture. The system will integrate data from various
Water Management
sources, including soil moisture sensors, weather stations, crop models, and water
System for
availability databases.
71 Sustainable
Agriculture: A Data-
The collected data will be analyzed using data analytics and machine learning techniques to
Driven Approach
optimize irrigation scheduling. By considering factors such as soil type, crop type, weather
conditions, and water availability, the system will recommend precise irrigation schedules to
farmers. This will help reduce water wastage, improve crop yields, and conserve water
resources.
Furthermore, the project will develop a user-friendly interface for farmers to access
irrigation recommendations and monitor water usage. This will empower farmers to make
informed decisions about water management, ultimately promoting sustainable agriculture
practices. Overall, this project not only enhances the students' data science skills but also
contributes to addressing water scarcity and ensuring food security.
The main purpose is to develop machine learning algorithms for predicting the percentage
of Student Placement Prediction using machine learning based on the data related to the
Student Placement
university’s academic reputation, opportunities of the city where the university is located,
72 Prediction using AI |
facilities, and cultural opportunities of the university. It analyzes the previous year’s
Machine Learning
historical data and predicts placement of current students and aids to increase the placement
percentage of the institutions
Internet of Things (IoT) is not only a promising research topic but also a blooming industrial
trend. Although the basic idea is to bring things or objects into the Internet, there are various
approaches, because an IoT system is highly application oriented. This paper presents a
wireless sensor network(WSN)-based IoT platform for wide area and heterogeneous sensing
Design of a Wireless
applications. The platform, consisting of one or multiple WSNs, gateways, a Web server,
Sensor Network-
and a database, provides a reliable connection between sensors at fields and the database on
Based IoT Platform
76 the Internet. The WSN is built based on the IEEE 802.15.4e time slotted channel hopping
for Wide Area and
protocol, because it has the benefits such as multi-hop transmission, collision-free
Heterogeneous
transmission, and high energy efficiency. In addition to the design of a customized hardware
Applications
for range extension, a new synchronization scheme and a burst transmission feature are also
presented to boost the network capacity and reduce the energy waste. As a result, the
proposed platform can fulfill the high throughput requirement for high-rate applications and
the requirement of long battery life for low-rate applications at the same time.
Enhancing E- With the increasing reliance on e-learning platforms, ensuring these systems are accessible
Learning to all users, including those with disabilities, is essential. This project aims to develop an e-
77 Accessibility through learning platform that leverages Artificial Intelligence (AI) and inclusive design principles
AI and Inclusive to enhance accessibility, providing a seamless and equitable learning experience for all
Design students.
Intelligent The goal of this initiative is to leverage IoT technologies to transform transportation
Transportation networks. Sensor-equipped connected cars may talk to infrastructure and other connected
Systems and cars to improve safety and traffic flow. Data analytics is used by intelligent transportation
79
Connected Vehicles systems to control traffic, increasing both overall efficiency and safety. Furthermore,
in the Transportation sensors are used by smart parking systems to expedite parking availability and shorten
Industry search times.
The main idea of this AI based Project is to create an automated defense and tackle system
consists of Automated Ranged gun, self activating landmines, landmine detecting and
AI Defence and
80 mapping system. This will help our army to gain a better command of defense in hostile
Tackle System
areas and borders and will help in reducing of lives. The Landmines has been a major issue
faced by both the army and civilians in some areas .
Collection of data of multiple modalities (understanding why to use the modality from
Student performance
literature survey) that aid in drawing feedback on the performance of students by studying
analysis using
81 the correlation of primary and derived features extracted to validate few hypotheses and
multimodal data
applying a learning methodology (ML, DL, or RL) for training and testing. This can help in
analysis
obtaining a feedback doesn't rely merely on the score obtained by the student.
The voting system proposed here is a complete rewrite of the traditional EVM model which
Blockchain Based uses fingerprint authentication and face recognition for verifying the user for credentials.
Secured Voting With cloud-based blockchain, an immutable storage system for transaction information,
System Using Face many cloud based applications which prioritize privacy and authenticity are shifting from
82
Recognition and traditional databases to blockchain implementations. The use of blockchain for storage of
Fingerprint polling results and the usage of fingerprint and face maps for authentication are the key
Authentication features of this implementation furthermore this project only acts as a proof of concept for
implementing a voting system using biometrics for authentication.
AI-based Math tool This research work will produce effective teaching strategies and tools for autistic children.
83
for autistic children It needs the process to refine the tool based on observations and feedback. We can have all
teaching methods manually. To help the teachers or tutors an interactive Mathematics
learning tool is very supportive as well as for autistic children.
Web scraping is a beautiful and helpful technique to extract raw data from a website. The
data analyst can use this extracted information to store in various formats and analyze for
Web Scraping Using
84 decision-making purposes. Beautiful Soup is a Python package for parsing HTML and XML
Beautiful Soup
documents and extracting data from them. It works as a favorite parser to yield idiomatic
searching, navigating, and modifying the parse tree.
Continual learning, the ability of a model to learn continuously from a stream of data
without forgetting previous knowledge, remains a challenging task in machine learning. A
key obstacle is the efficient management of training data, particularly when the availability
of diverse samples is limited. Our aim for this work is to introduce a novel approach for
Sample generation for
sample generation aimed at enhancing continual learning by creating multiple new samples
86 efficient continual
from a single original sample, each incorporating features from multiple other samples. By
learning
leveraging advanced image blending techniques, we will synthesize diverse training samples
that retain the intrinsic properties of the original data while introducing variations that
reflect the characteristics of the entire dataset. This method not only augments the training
set but also improves the robustness and generalization capabilities of the learning model.
In industrial settings, unplanned equipment failures can lead to significant downtime and
financial losses. This project aims to develop a predictive maintenance system using
machine learning techniques to forecast equipment failures before they occur. By analyzing
historical sensor data and maintenance records, the model will identify patterns and
Predictive
anomalies that precede equipment malfunctions. Techniques such as time series analysis,
Maintenance for
classification, and regression will be employed to create predictive algorithms. The project
88 Industrial Equipment
will also include the development of a user-friendly dashboard to visualize predictions and
Using Machine
provide actionable insights for maintenance scheduling. This system aims to improve
Learning
operational efficiency, reduce maintenance costs, and enhance the reliability of industrial
equipment.
INNOVATIVE
METHODOLGIES Improving the attention span of students can have a significant impact on their learning
89 FOR IMPROVISE outcomes. In this project we are planning to find and implement out several innovative
ATTENTION SPAN methodologies to increase the attention span of students in the class rooms.
OF STUDENTS
At the moment, medical professionals use manual analysis of the patient's MR images to
pinpoint the location and size of the brain tumor. This is thought to be exceedingly time-
consuming and leads to an incorrect tumor detection. A tumor is an uncontrollably growing
brain tumor detection
clump of tissue. For the purpose of detecting brain tumors, we can employ the Deep
91 using deep learning
Learning architectures of VGG 16 (visual geometry group) transfer learning and CNN
techniques
(convolution neural network), sometimes referred to as NN (Neural Network). The model's
performance is to forecast whether a tumor will be seen in an image or not. Returns yes if
the tumor is present and no otherwise.
Today there are no certain methods by using which we can predict whether there will be
rainfall today or not. Even the meteorological department’s prediction fails sometimes. In
Rainfall Prediction this article, we will learn how to build a machine-learning model which can predict whether
94 using Machine there will be rainfall today or not based on some atmospheric factors. This problem is
Learning related to Rainfall Prediction using Machine Learning because machine learning models
tend to perform better on the previously known task which needed highly skilled individuals
to do so.
The integration of Internet of Things (IoT) technology and machine learning (ML)
algorithms has brought about significant transformations across numerous industries, with
"HarvestGuard:
agriculture being a notable beneficiary. Precision agriculture, geared towards enhancing
Optimizing Crop
95 crop yield, resource efficiency, and farm productivity, has emerged as a fertile ground for
Yield through IoT and
this collaborative endeavor. This review meticulously examines the latest progressions,
ML"
hurdles, and prospects in harnessing IoT devices and ML techniques within the realm of
agriculture.
Managing a dairy cattle farm involves several intricate tasks, including monitoring the
CLOUD
health of the animals, tracking milk production, managing breeding schedules, and
APPLICATION FOR
optimizing feeding regimens. A cloud-based application, Cattle Hub, can streamline these
96 DAIRY CATTLE
processes, enhance data accessibility, and improve overall efficiency. This document
MANAGEMENT
outlines the key features and benefits of Cattle Hub, a comprehensive dairy cattle
CATTLE HUB
management solution.
Abstract :This project focuses on implementing an IoT-based solution for smart agriculture,
IoT-Based Smart integrating RFID technology for animal tracking. RFID tags will be attached to livestock,
Agriculture with enabling farmers to monitor their location, health, and behavior in real-time. Additionally,
97
RFID Animal environmental sensors will collect data on factors such as temperature, humidity, and soil
Tracking: moisture, providing insights for optimized farm management practices and improved animal
welfare.
Data is transformed into a hash code or cipher through the process of encryption in order to
prevent adversaries' illegal access. Secure keys and validation procedures would grant
Text Encryption
access to the content to the authorized user. You can begin with a text encryption cyber
99 Using Cryptographic
security project as a novice. You might learn how to dissect the architecture of algorithms
Algorithms
such as Caesar Cipher, Vigenere Cipher, Railfence Cipher, Autokey Cipher, Playfair
Cipher, Beaufort Cipher, etc.
Large-scale commercial, industrial and financial operations are becoming ever more
interdependent, and ever more dependent on IT. At the same time, the rapidly growing
interconnectivity of IT systems, and the convergence of their technology towards industry-
standard hardware and software components and sub-systems, renders these IT systems
increasingly vulnerable to malicious attack. This paper is aimed particularly at readers
concerned with major systems employed in medium to large commercial or industrial
Securing IT Systems
enterprises. It examines the nature and significance of the various potential attacks, and
100 from Cyber Crime in
surveys the defence options available. It concludes that IT owners need to think of the
IT Organization
threat in more global terms, and to give a new focus and priority to their defence. Prompt
action can ensure a major improvement in IT resilience at a modest marginal cost, both in
terms of finance and in terms of normal IT operation.
The platform leverages interactive courses, tutorials, and assessments to provide users with
an engaging and effective learning experience. Key features include personalized learning
paths, real-time progress tracking, and gamification elements to enhance user motivation
and retention. Additionally, the platform incorporates a social learning component, allowing
users to interact, collaborate, and share knowledge with peers and experts.
E-Learning Platform
101
for Skill Development
Utilizing modern technologies such as cloud computing, artificial intelligence, and
responsive design, the platform ensures scalability, accessibility, and a seamless user
experience across various devices. The application supports a wide range of skills, from
technical domains like programming and data science to soft skills such as communication
and leadership.
This project aims to bridge the gap between traditional education and the evolving needs of
the workforce by providing a flexible, user-centric solution for skill acquisition and
development. The "E-Learning Platform for Skill Development" not only empowers
individuals to achieve their career goals but also contributes to the broader objective of
creating a skilled and adaptable workforce in an ever-changing global economy.
Even if you are not a Botany student, you will have fun realizing how the leaves are
because their volume, prevalence, and unique characteristics can serve as an effective
measure to identify plant species. Explore the source code link to learn about this project's
Plant species
implementation from scratch. You will enjoy getting to know about the methods that include
105 identification n
image-based features. And, as you may have guessed already, this would be a machine
prediction using ML
learning classification project so you will be introduced to the implementation of
classification machine learning algorithms in great depth. You will also learn to benchmark
the significance of different classifiers in image classification problems.
This project focuses on using machine learning to detect phishing emails and enhance email
security. By analysing large datasets of emails, the system learns to identify patterns and
AI-Driven Phishing
characteristics typical of phishing attempts. Features such as email content, sender
Detection for
106 information, and link destinations are examined. The machine learning model, once trained,
Enhanced Email
can automatically flag and filter out suspicious emails before they reach the user's inbox.
Security
This approach helps in reducing the risk of phishing attacks, protecting sensitive
information, and improving overall cyber security.
In conclusion, blockchain technology presents a robust solution for protecting replicated data
from unauthorized access, tampering, and data loss. By leveraging its decentralized,
immutable, and transparent features, organizations can establish a secure and resilient
framework for data replication, ensuring the confidentiality, integrity, and availability of their
It is quite difficult to manage the objectives of PCL being interdisciplinary involving students
ERP for the
and mentors from multiple disciplines. There will be the issues of ego clashes as well as
110 management of
maintaining a central evaluation platform. Though the PCL is a great idea, still management
PCL
of the components of PCL is a challenging task involving diversity in its nature.
In today's digital world, mobile phones have become a constant source of distraction for
students, often hindering their focus and academic performance. To tackle this issue, we
present an innovative solution that combines real-time distraction detection with personalized
intervention strategies. Our system's core component is an advanced app usage tracking tool
that keepstabs on how pupils use their smartphones. Our technology gathers important
Real Time Mobile insights into individual digital behaviour patterns by evaluating data such as the frequency
Distraction and length of app usage, and classifying apps into different categories (e.g., educational,
Detection and social media, entertainment). Leveraging advanced machine learning algorithms, our system
112
Personalized processes this data to identify potential distraction patterns during study sessions. Through
Intervention for continuous analysis, the system can accurately predict the likelihood of a student becoming
Student distracted, enabling proactive intervention measures. Our system's capacity to offer
individualized interventions based on each student's particular learning preferences and style
is what makes it truly innovative. Our technology adjusts its intervention tactics according to
the needs and behavioral tendencies of each individual, unlike traditional one-size-fits-all
approaches.
Identification, traceability, and real-time tracking of commodities in the Supply Chain (SC)
have long been hampered by the heterogeneity of platforms and technologies employed. To
assure the continuous supply of commodities to the Fair Price Shops (FPS), proficient supply
chain management is essential. In this regard, decision-makers must organize a number of
tasks related to the acquisition and transportation of material resources, product delivery, and
Employing
the delivery of commodities at the proper FPS and at a suitable time. The main objective of
Machine Learning
this research is to employ Machine learning (ML) techniques, including a combination of
for Successful
deep analytics, IoT and real-time monitoring that can be used to improve visibility of Public
Automation in the
Distribution System (PDS) SC, thus helping customer experience and achieve faster delivery
114 Public
commitments. ML models and workflows do this by analyzing historical data from varied
Distribution
sources followed by discovering interconnections between the processes along the supply
System's Supply
value chain. Historical data can precisely predict the lead times and reduce any errors. ML
Chain and
algorithms are used to optimize transport routes and schedules, track goods during transit and
Operations
also to analyze real-time traffic data to determine the most efficient delivery routes. This
approach aids in identifying the most efficient and fastest driver’s stop sequence while
minimizing driving time, distance and reducing delays. Such features also help to monitor and
predict traffic patterns impacting delivery times, such as peak hours at logistics hubs. By
employing ML in the SC, the PDS can anticipate and proactively mitigate challenges.
Early diagnosis and treatment of thyroid problems, ranging from hyperthyroidism to thyroid
IoT-Powered
BGCNet: Thyroid cancer, depend heavily on the identification of thyroid illness. Utilising an actual dataset from
Disease Detection the University of California, Irvine (UCI), this work offers a thorough method for identifying
116 Enhancement in thyroid disease (TD). Preparing the data is essential to guaranteeing the dataset's quality. The
Healthcare with dataset is improved to make it more appropriate for deep learning (DL) applications by
IBESA based managing outliers, and normalizing data. The Improved Bald Eagle Search Algorithm
Feature Selection (IBESA), a cutting-edge optimization method inspired by bald eagle hunting behaviour, is
used in the feature selection phase.
QR codes is simple and efficient tool used in smartphones to obtain accurate indoor user
location. As an increasing number of geo-location services are exploiting the capabilities of
smartphones, most of which incorporate GPS location. The smartphones compasses to direct
Navigation for the user to the destination. With the help of accelerometers, it will be possible to estimate the
Indoor Location walking distances as an auxiliary information. An, idea in order to calculate the user position
118 Based On QR inside a building by using QR codes and Google maps. Navigation is the process or activity
Codes and Google of accurately ascertaining one’s position, planning and following the route to goal location.
Maps Mobile phones are devices merely used to communicate. Based on new techniques like GPS
and sensors, compass and accelerometers that can determine the
orientation of devices, location based applications coupled with augmented reality views are
possible.
to other major agro-commodity oils. Due to certain global factors in 2021, CPO prices in
India have increased more than twice. The purpose of the given study is to investigate the
Impact of Crude
daily price movements of Crude Palm oil prices in India based on the degree of movements of
Oil prices and
external macroeconomic factors such as Brent crude oil price and dollar-based daily
currency
exchange rates. The co- relationship between the above variables is studied from the
exchange rate
119 multivariate GARCH(CCC(Constant conditional correlation) and DCC(Dynamic Conditional
fluctuations on
correlational) GARCH) approach. The results indicate no instantaneous causing effects and
palm oil prices in
hence any dependency of CPO price on the currency exchange rate. However, there exists
India: Dynamic
some direct impact of global crude oil prices on the Indian CPO price fluctuations. Also, the
GARCH approach
degree of covariance is quite significant among the three currencies. This study would help
industry stakeholders and practitioners hedge against imminent market risks arising from
unanticipated changes in India's palm oil prices.
JAIN UMS - TD- A realtime project in which students will develop a TD-PCL tracker with student group
120
PCL tracker formation, allocation of supervisor, project journal management etc.
Over the past two decades one of the most leading disease in today's era is the lung cancer. It
is very crucial in the medical field to understand the through genomics of this cancer and
provide the computer based solutions to the doctors for further well diagnosis of the patients
Early detection of suffering from this type of cancer. The significant role of AI engineers comes into picture to
121 lung cancer using early detect the type of lung cancer the patent is about to suffer and insist the medical
GAN supervisors how to proceed further. In this investigation, the AI engineers will use various
ML models and GAN for early detection of the type of lung cancer. The research in this
project will investigate the performance of basic and advanced models employed for the lung
cancer early detection.
Leveraging machine learning techniques, this project focuses on developing a system for
Automated
automated diagnosis of diseases such as cancer, pneumonia, or diabetic retinopathy by
Diagnosis of
127 analyzing medical images. The model aims to provide accurate and timely diagnoses,
Diseases using
assisting healthcare professionals in early detection and treatment planning.
Medical Imaging
Many cities and village areas have to install street lights. The amount of money spent is
enormous. Traditional sodium vapor lamps are very energy-consuming. The extra money can
come in handy for national development.
Solution: These IoT devices offer Automatic streetlight switching, lowering the cost of
IoT-Based Smart
maintenance, CO2 emission reduction, light pollution reduction, communication via wireless
128 Street Light
means, and power consumption. You, too, can build a prototype using only a few easily
System
accessible pieces of equipment.
NLP stands for Natural Language Processing which is used to convert human language into
machine-understandable language. The inputs that we give to machines could be text, audio,
Natural Language
video, etc. For example, Siri which is used by Apple applications had a greater impact on the
processing for text
iPhone community. NLP is a combination of a large number of human visual systems, like the
classification by
133 phenomena including the human brain processing external information. AI is most important
using
for intelligent machines and Natural Language Processing is the fundamental tool. Intelligent
Convolutional
machines play a crucial role in performing various activities by reducing human efforts and
Neural Networks
error rates. Based on the research, this paper briefly discusses the concepts of deep learning
and NLP, various methods used for text generation models, etc.
Natural Language NLP stands for Natural Language Processing which is used to convert human language into
processing for text machine-understandable language. The inputs that we give to machines could be text, audio,
classification by video, etc. For example, Siri which is used by Apple applications had a greater impact on the
134
using iPhone community. NLP is a combination of a large number of human visual systems, like the
Convolutional phenomena including the human brain processing external information. AI is most important
Neural Networks for intelligent machines and Natural Language Processing is the fundamental tool.
SDNs decouple the control plane from the data plane, allowing centralized and programmable
network management, which presents unique opportunities for optimization. Performance
Performance
optimization of Software Defined Networks (SDNs) involves various strategies and
optimization of
135 techniques to enhance the efficiency, reliability, and scalability of network operations. AI and
Software Defined
machine learning algorithms can be utilized for predictive analysis, anomaly detection, traffic
Networks
prediction, and adaptive resource allocation, meeting the demands of modern network
environments.
Cancer prediction using machine learning algorithms involves the analysis of medical data to
identify patterns indicative of cancerous conditions, aiming to enhance early detection and
improve patient outcomes. This process starts with collecting and preprocessing data from
various sources, such as medical records, genetic information, and imaging data. Feature
Cancer prediction
extraction and selection are crucial to highlight relevant indicators of cancer. Supervised
using machine
137 learning algorithms, including support vector machines, neural networks, and ensemble
learning
methods, are trained on labeled datasets to recognize cancerous patterns. These models are
algorithms
validated for accuracy and generalization before being deployed to predict cancer in new
patient data. Continuous refinement and integration of new data improve the model's
predictive capabilities, aiding healthcare professionals in making informed diagnostic
decisions and tailoring personalized treatment plans.
The security of RSA public key cryptosystem is based on the assumption that factoring of a
Hybrid large number (modulus) is difficult. In RSA if one can factor modulus into its prime numbers
Cryptography then the private key is also detected and hence the security of the cryptosystem is broken. The
Algorithm Based Rabin cryptosystem is an asymmetric cryptographic technique, whose security, like that of
138
on Modified RSA, is related to the difficulty of factorization. So in this topic a Rabin over RSA public key
Subset Sum cryptosystem called Hybrid cryptography Algorithm based on Modifieid subsetsum algorithm
Algorithm (HCAMSSA) is presented. This topic also presents comparison among Rabin, RSA and
HCAMSSA cryptosystems in respect of security and performance.
Telegram Online Chatbots have been used in many fields ranging from education to
healthcare and are also used in e-commerce settings. This research aims at developing a web-
Deploying a
based chatbot for the Covenant Online General Store. The chatbot is developed using Python
Telegram E-
140 and React.js as the programming languages and MySQL (Structured Query Language) server
commerce website
as the database to give a structure to the e-commerce datasets and Admin Portal process. The
in cloud
e-commerce chatbot application for Covenant Online General Store seeks to provide an easy,
smart, and comfortable shopping experience for the Online Community.
Urban landscape and the physical challenges restrict the erection of small-scale wind
turbines. Large-scale turbines fared well compared to small-scale wind turbine models. Other
general challenges are as under: (1) Highly controlled energy sector (2) lack of awareness and
Development of
information (3) restricted access to technology (4) lack of competition (5) high transaction
141 Small Scale Wind
costs (6) poor market infrastructure (7) High investment requirements Expected Output: Eco-
energy device
friendly energy alternative, Unlike energy produced by fossil fuels while wind energy is
completely clean and eco-friendly. Not only is wind power free to harness, but its also 100%
renewable.
The integrity and security of voting systems are critical to ensuring fair and transparent
elections. Traditional voting systems are often vulnerable to fraud, manipulation, and cyber-
attacks. This project proposes the development of a blockchain-based secure voting system
designed to enhance the transparency, security, and trustworthiness of the electoral process.
By leveraging the decentralized and immutable nature of blockchain technology, the
Blockchain-Based proposed system ensures that votes are recorded accurately and cannot be tampered with.
146 Secure Voting Each vote is encrypted and added to the blockchain, creating a verifiable and auditable trail
System that can be independently checked by any party. The project will include a user-friendly
interface for voters, secure authentication mechanisms, and a robust backend infrastructure to
handle large-scale voting. The system will be tested in a simulated environment to
demonstrate its effectiveness and reliability. This innovative approach aims to address the
challenges associated with traditional voting systems and pave the way for more secure and
transparent elections
Software
Requirement
For any software development activities, there will be SRS document serves as source
Specification
document. This SRS document contains the requirements of a software to be developed. The
Document
business analyst will be discussing with the customer and understand the requirements to
Analysis and
prepare the SRS document. Once the SRS document is finalized, then it will be transferred to
147 Identification of
development team. If the developmental activities are taking place through cloud, the
important
development team has to identify the important parameters, resources and services required
parameters for
for the developmental activities. Automating the identification of important parameters
development
through machine learning algorithms is a challenging task.
through Machine
Learning
The expected outcome is a robust ML system that improves the accuracy, efficiency, and
reliability of cervical cancer detection, ultimately contributing to better patient outcomes by
enabling early diagnosis and timely treatment. The system's performance will be evaluated
based on detection accuracy, image quality standardization, feature relevance, data utilization
efficiency, and interpretability, ensuring a comprehensive assessment of its clinical utility.
This research aims to revolutionize cervical cancer screening programs, reducing the
diagnostic burden on healthcare professionals and enhancing patient care through advanced
AI-driven solutions.
Transformer The study involves design and development of Deep Learning model for transforming the
Attention Model attention based gated inputs to gated outputs. This model involves various gates at different
153 for Identification levels and the same shall be used for representation of Machine understanding model. These
of a Person from Machine understanding model includes architecture that drives users from input images or
GAIT videos received for detection of classification of objects into different classes of objects
An effective ship torpedo defense system relies on 3D data about incoming torpedoes. To
fulfill this requirement, a Torpedo Detection and Location (TDL) sonar system was created.
This system features a transmitting transducer, two receiving arrays, and advanced signal
Under water
155 processing with 3D tracking capabilities. To evaluate the system's effectiveness, a test setup
Target Detection
for detecting and tracking torpedo-like objects in the air has been established. The hardware
used in this system is comparable to that of an acoustic tracking system used for surveying
pipelines on the seabed.
Smart EV
156 Smart EV Highways.
highways
157 NA NA
Reverse engineering plays a crucial role in various industries by enabling the analysis of
Securing Reverse
software, hardware, and systems to enhance understanding, improve security, and foster
Engineering
innovation. However, this practice often raises significant concerns about intellectual
Practices through
property (IP) theft and unauthorized replication. This project explores the integration of
Blockchain
blockchain technology to address these challenges, aiming to create a secure, transparent, and
Technology: A
158 tamper-proof system for managing reverse engineering activities.this project aims to provide
Decentralized
a robust solution for safeguarding intellectual property in reverse engineering, fostering a
Approach to
more secure and trustworthy environment for innovation and collaboration across industries.
Intellectual
By combining the strengths of reverse engineering and blockchain technology, the proposed
Property
framework promises to revolutionize how sensitive information is protected and managed in
Protection
the digital age.
An online answer correction system based on keywords would be an application that can
Online answer automatically identify and correct mistakes in answers or responses provided by users. The
159
script evaluation core functionality relies on natural language processing techniques and predefined sets of
keywords mapped to expected correct answers.
The primary aim of this study is to develop and evaluate encryption methodologies that
ensure robust data protection while maintaining performance and usability. Key components
of the research include symmetric and asymmetric encryption algorithms, encryption key
management practices, and the integration of encryption with cloud services.
Data Encryption
For data at rest, the project examines the implementation of advanced encryption standards
Strategies for
160 (AES) and other symmetric encryption techniques to protect stored data. Emphasis is placed
Securing Cloud-
on seamless encryption and decryption processes to ensure data integrity and confidentiality
Based Networks
without significantly impacting system performance.
For data in transit, the study investigates the use of Transport Layer Security (TLS) and
Secure Sockets Layer (SSL) protocols to secure data transmitted between clients and cloud
servers. This includes analyzing the effectiveness of various cryptographic algorithms and
protocols in preventing eavesdropping, man-in-the-middle attacks, and data tampering.
A critical aspect of the project is the management of encryption keys, which are fundamental
to the security of encrypted data. The study explores key management solutions, such as
hardware security modules (HSMs), key management services (KMS) provided by cloud
vendors, and best practices for key generation, distribution, rotation, and revocation.
Comprehensive In the digital age, social media platforms like Twitter have become critical channels for
Security communication, information dissemination, and social interaction.This project proposes the
162
Framework for development of a Comprehensive Security Framework for Twitter Data (CSFTD), designed
Twitter Data to enhance the security and integrity of user data on Twitter.
Deepfake models may not effectively simulate natural blinking or eye movement. Analysing
these aspects can help identify manipulated videos. Use lip synchronization analysis to detect
discrepancies between audio and lip movements. Deepfake videos might have challenges in
accurately syncing generated faces with the audio track.Examine the video metadata for signs
of manipulation, such as inconsistencies in timestamps, editing software used, or other
anomalies . Analyse individual frames for artifacts, anomalies, or inconsistencies that may
indicate manipulation. Deepfake videos might exhibit unnatural artifacts, especially in high-
Deep Fake Video
motion sequences.Deepfake videos may exhibit variations in image quality, lighting, or
Detection using
164 resolution. Look for unnatural transitions between frames or inconsistencies in these aspects.
Deep Neural
Train deep learning models specifically for deepfake detection. Use pre-trained models or
Networks
create a custom model to classify videos as real or manipulated based on learned
features.Implement neural network architectures designed for deepfake detection, such as
using pre-trained models like OpenFace, DeepFace, or other deep neural networks.Train
models on diverse datasets that include both real and deepfake videos. This helps the model
generalize better to different manipulation techniques.Analyse the overall behavior and
movement patterns of individuals in the video. Deepfake models may struggle to accurately
simulate natural human behavior.
Lung cancer is known as a malignant tumor that originates in the cells of the lungs, is often
associated with smoking, and is characterized by uncontrolled cell growth. Early detection of
LUNGCANARY-
PIONEERING lung cancer using clinical procedures is a very difficult undertaking that requires intrusive
EARLY LUNG techniques. Data on lung cancer might be gathered, and computational methods could be
CANCER utilized, improving lung cancer prediction and enabling early detection and prevention. In this
169 DETECTION study, we present the LungCanary approach, a pioneering method for addressing the global
USING health challenge of lung cancer through advanced machine-learning strategies. Our
MACHINE methodology involves a novel approach that effectively learns intricate patterns associated
LEARNING with early-stage lung cancer. Utilizing transfer learning principles, our novel model extracts
ALGORITHMS meaningful features from medical imaging data. To enhance diagnostic precision, Multiple
decision-making components are employed, each capturing different aspects of the data
patterns.
The core of the project involves training a deep learning model on a large dataset of authentic
and counterfeit logos, using convolutional neural networks (CNNs) to learn and differentiate
subtle variations in design that may indicate a fake. The system will integrate advanced
System to detect
170 algorithms for image analysis, ensuring high accuracy and the ability to operate in real-time
fake logos online
across diverse digital environments, including social media, e-commerce sites, and digital
advertisements.
This abstract would highlight the methodological approach, including data collection, model
training, and testing phases. It would also discuss the system's performance metrics, such as
accuracy, precision, and recall, demonstrating its effectiveness in detecting counterfeit logos.
Finally, the potential applications of this technology for brand protection agencies, legal
authorities, and businesses seeking to safeguard their intellectual property online would be
outlined, emphasizing its contribution to more secure digital commerce and brand integrity.
171 Green IoT Energy conservation in core IoT networks using reinforcement learning of the system.
The project will begin by collecting a dataset containing historical energy consumption data
along with relevant features such as weather conditions, time of day, and occupancy levels.
The data will undergo preprocessing steps including cleaning, normalization, and feature
engineering. Various regression models, such as linear regression, decision trees, random
forests, and gradient boosting, will be employed to predict future energy consumption.
Energy
Consumption
To enhance prediction accuracy, the project will also explore time series forecasting methods
Prediction and
172 such as ARIMA, Prophet, and LSTM neural networks. Additionally, optimization algorithms
Optimization
will be implemented to suggest actionable strategies for reducing energy consumption while
Using Machine
maintaining operational efficiency.
Learning
The performance of the predictive models will be evaluated using metrics like Mean Absolute
Error (MAE), Mean Squared Error (MSE), and R-squared. Visualization techniques will be
used to present the predictions and optimization recommendations in an easily interpretable
format.
By the end of the project, students will gain hands-on experience in data preprocessing,
regression analysis, time series forecasting, and optimization techniques. They will also
develop an understanding of how data science can contribute to energy efficiency and
sustainability efforts in real-world applications.
The project will begin by installing IoT sensors on various pieces of industrial equipment to
collect real-time data on operational parameters such as temperature, vibration, pressure, and
usage hours. This data will be continuously transmitted to a central server or cloud platform
for storage and analysis.
Predictive
Machine learning models, including classification algorithms and anomaly detection
Maintenance for
techniques, will be employed to analyze the collected data. These models will be trained to
Industrial
173 identify patterns and indicators of potential equipment failures. Techniques such as Random
Equipment Using
Forest, Support Vector Machines, and neural networks will be explored to develop robust and
IoT and Machine
accurate predictive models.
Learning
The predictive maintenance system will also include a dashboard for real-time monitoring of
equipment health, alerting maintenance personnel to potential issues before they lead to
equipment failure. Recommendations for maintenance actions will be provided based on the
predictions generated by the machine learning models.
By the end of this project, students will gain practical experience in integrating IoT devices
with industrial systems, data collection and preprocessing, machine learning model
development, and implementing predictive maintenance strategies. They will also learn how
data science and IoT can be applied to enhance operational efficiency and reduce costs in
industrial settings.
By implementing these models in real-time traffic management systems, the project aims to
reduce congestion, shorten travel times, and improve overall traffic efficiency. Additionally,
the project will contribute to reducing carbon emissions and improving the quality of urban
life by promoting sustainable transportation practices.
Energy This project aims to develop a machine learning-based system for forecasting energy
Consumption consumption in smart grids. By analyzing historical energy usage data, weather patterns, and
176
Forecasting for other relevant factors, the model will predict future energy demand, facilitating efficient
Smart Grids resource allocation, and grid management.
The collected data will be analyzed using data analytics and machine learning algorithms to
provide farmers with actionable insights. These insights can include optimized irrigation
schedules, early detection of crop diseases, and targeted pest management strategies. By
leveraging drone technology and data-driven analytics, this project aims to enhance
agricultural productivity, reduce resource wastage, and promote sustainable farming practices.
Precision agriculture, enabled by advanced technologies like drones and unmanned aerial
Precision
vehicles (UAVs), has revolutionized farming practices by offering detailed insights into crop
Agriculture
health, soil conditions, and environmental factors. This project aims to develop a
Monitoring Using
177 comprehensive precision agriculture monitoring system that leverages drones and UAVs to
Drones and
collect high-resolution data for analysis.
UAVs: A Data-
Driven Approach
The drones will be equipped with a range of sensors, including multispectral cameras,
thermal imaging sensors, and GPS modules, to capture data such as crop health indicators
(NDVI), soil moisture levels, and temperature gradients. This data will be transmitted in real-
time to a central database for analysis.
Data analytics and machine learning algorithms will be applied to analyze the collected data
and generate actionable insights for farmers. These insights may include optimized irrigation
schedules based on soil moisture levels, early detection of crop diseases through analysis of
spectral signatures, and identification of pest infestations through thermal imaging.
By providing farmers with precise and timely information, this project aims to enhance
decision-making processes, increase crop yields, and reduce resource wastage. Furthermore,
The advances in machines and technologies used in smart farming using machine learning,
useful and accurate information about different matters plays a significant role in it. It focuses
Smart Farming
on predicting the appropriate crop based on the climatic situations and the yield of the crop
178 using Machine
based on the historic data by using supervised machine learning algorithms. The only remedy
Learning
to the crisis is to do all that is possible to make agriculture a profitable enterprise and attract
the farmers to continue the crop production activities.
Wireless sensor networks, due to their nature, are more prone to security threats than other
networks. Developments in WSNs have led to the introduction of many protocols specially
Secure developed for security purposes. Most of these protocols are not efficient in terms of putting
Knowledge and an excessive computational and energy consumption burden on small nodes in WSNs. This
Cluster-Based paper proposes a knowledge-based context-aware approach for handling the intrusions
Intrusion generated by malicious nodes. The system operates on a knowledge base, located at the base
182
Detection station, which is used to store the events generated by the nodes inside the network. The
Mechanism for events are categorized and the cluster heads (CHs) are acknowledged to block maliciously
Smart Wireless repeated activities generated. The CHs can also get informational records about the
Sensor Networks maliciousness of intruder nodes by using their inference engines. The mechanism of events
logging and analysis by the base station greatly affects the performance of nodes in the
network by reducing the extra security-related load on them.
AI-Enhanced E-
Learning Platform Education is a fundamental right, but traditional e-learning platforms often fail to meet the
183 for Visually and needs of visually and cognitively impaired individuals. This project aims to develop an AI-
Cognitively enhanced e-learning platform designed specifically for users with visual and cognitive
Impaired Users impairments, ensuring an inclusive and effective learning experience.
IoT for The objective of this proposal is to enhance guest experiences and operational efficiency in
hospitality: the hospitality sector by incorporating IoT technologies. Using their cellphones, guests can
Improving adjust the hotel's settings with smart room controls. Asset monitoring systems monitor hotel
185
Operational assets with the use of sensors, which improves supply chain visibility and lowers theft. In
Efficiency and order to provide tailored recommendations and raise the standard of service, guest analytics
Guest Experience systems gather information on visitor behavior.
Facial The attendance system these days has become havoc and not done correctly. For this problem
Recognition we used CNN to locate where the student has come to the class or not is the main criteria. By
186
Attendance Based doing this we can solve the issue as well as save a lot of time for the faculty who will be
System having extra time to take. This can be used in various domains as well.
Gen AI based assessments are the future. Evaluation of such assessments are truly not figured
Formulation of and remains as a challenge. Figuring out the various techniques of assessments based on
Gen AI based formulated hypotheses using a collection of multimodal data can help generate assessment
187
assessment ideas that can be used in the future. This will require data collection, analysing the collected
techniques data, figuring out correlations, generation of hypotheses, validation of hypotheses, training
and testing using the obtained parameters.
Smart farming is a device built to detect the soil's temperature, moisture, and humidity. This
Smart Farming device will help the farmer to know the conditions of the soil. We need an Arduino Nano
188 Using IoT IDE, temperature and moisture sensors, and some jumper wires to build this device. This
Technologies device will have a direct content with the soil, and the measurement is shown on the monitor
screen.
This application is helpful for both patient and doctor book and schedule appointments. The
doctors can enable empty slots available, and the patient can book their slots accordingly.
Patient and
Also, this system can help to store the medical history of the patient. So, whenever patients
190 Doctor Handling
login into the system, they can look into the prescription suggested by the doctors. Also, the
System
doctor can see those reports to understand the improvements in the patient body from
previous tests and reports. It is easily manageable, and patients don’t need to wait for doctor
appointments.
The rapid growth of data in digital environments has heightened the need for efficient and
accurate recommendation systems. Graph Neural Networks (GNNs) have emerged as a
Multi-Level powerful tool for leveraging the rich relational structures inherent in user-item interactions.
Graph Neural This paper explores the application of hierarchical GNN-based approaches for
192 Networks for recommendation systems, aiming to enhance their accuracy and scalability. By organizing
Personalized users and items into hierarchical structures, our method captures multi-level relationships and
Recommendations dependencies that traditional GNNs might overlook. The hierarchical framework enables the
model to aggregate information at different levels of granularity, providing a more
comprehensive understanding of user preferences and item characteristics.
Abstract:
Urban traffic congestion is a significant problem affecting millions of commuters daily. This
project focuses on developing a real-time traffic prediction and congestion management
Real-Time Traffic
system using big data analytics and machine learning. The system will collect and process
Prediction and
data from various sources, including traffic cameras, GPS devices, social media, and weather
Congestion
194 reports. Advanced machine learning models, such as neural networks and ensemble methods,
Management
will be used to predict traffic flow and identify potential congestion hotspots. The project will
Using Big Data
also explore the use of reinforcement learning to optimize traffic signal timings dynamically.
Analytics
The outcome will be a comprehensive traffic management system capable of providing real-
time traffic forecasts and actionable insights to reduce congestion and improve urban
mobility.
As everyone likes to enjoy watch TV during rainy time. But because of rain , the signals will
Rain Proof TV
195 lost by dish antenna and TV cant show any channels . To overcome this an innovative has to
streaming
be found and formulated in this project .
Lung cancer death rates have been rising in recent years, making it imperative to determine if
a tumor has progressed to cancer or not. Many lives can be saved if an accurate diagnosis is
made early on, and it can also assist medical professionals in initiating treatment. By
determining the tumor's location, size, and other characteristics, computed tomography is
LUNG CANCER
essential in ensuring that tumor conditions are met. This early cancer detection helps save
PREDICTION
many lives that might otherwise be lost. The pre-processed image goes through a
197 USING
segmentation step before being sent on to feature extraction. The extracted features are then
MACHINE
trained using machine learning classification methods such as Random Forest, SVM (Support
LEARNING
Vector Machines), and ANN (Artificial Neural Network). A diagnosis of benign or malignant
tumor is determined based on the categorization findings received. To find out which
algorithm has the best prediction accuracy, several characteristics are measured, such
accuracy, recall, and precision.
Artificial intelligence (AI) technology holds both great promise to transform mental
Artificial
Intelligence for healthcare and potential pitfalls. This article provides an overview of AI and current
198 Mental Health and applications in healthcare, a review of recent original research on AI specific to mental
School of Computer Science and Engineering
97 of page 98
Faculty of Engineering & Technology, 45th km, NH - 209, Jakkasandra Post
Bangalore - Kanakapura Main Road, Ramanagara District - 562 112
www.set.jainuniversity.ac.in | www.jainuniversity.ac.in
Mental Illnesses: health, and a discussion of how AI can supplement clinical practice while considering its
A Case Study current limitations, areas needing additional research, and ethical implications regarding AI
technology.
It uses machine learning algorithms to correctly identify 99 plant species through the binary
leaf images and evaluated features. These features include shape, margin, and texture. We
Plant Species
find how the leaves are because their volume, prevalence, and unique characteristics can
200 Identification
serve as an effective measure to identify plant species. We use implementation of
using Machine
classification machine learning algorithms and also learn to benchmark the significance of
different classifiers in image classification problems.
This project proposes the development of an innovative Tablet Monitoring System (TMS)
leveraging Internet of Things (IoT) technology. The TMS aims to provide real-time
"IoT-based Tablet
monitoring and control functionalities for various applications, including healthcare,
Monitoring
education, and industrial processes. By integrating IoT sensors and communication protocols,
201 System for
the system enables remote monitoring of tablet devices, ensuring optimal performance,
Enhanced Control
security, and user experience. This project presents the design, implementation, and
and Efficiency"
evaluation of the IoT-based TMS, highlighting its potential benefits and applications across
different sectors.
CROP YIELD
Indian agriculture, a backbone of the country's economy, faces challenges such as climate
PREDICTION
variability, soil degradation, and resource constraints. Accurate crop yield prediction can
BASED ON
202 significantly enhance decision-making for farmers, policymakers, and stakeholders.
INDIAN
Leveraging Artificial Intelligence (AI) and Machine Learning (ML) for crop yield prediction
AGRICULTURE
provides precise and actionable insights, aiding in sustainable agricultural practices.
USING AIML
Abstract:
The rapid proliferation of Internet of Things (IoT) devices in various sectors has sparked a
surge in demand for efficient and reliable communication technologies. As the fifth-
generation (5G) cellular network emerges as a key enabler for IoT applications, the design
Design and and implementation of antennas tailored for such applications have become crucial. This
implementation of paper presents an overview of the design considerations, challenges, and recent advancements
203
Antennas for 5G in antennas for 5G IoT applications. It discusses key factors such as antenna size, bandwidth,
IOT Applications. efficiency, and radiation patterns, along with techniques to enhance antenna performance in
diverse IoT scenarios. Furthermore, it explores innovative antenna designs, such as compact,
multiband, and reconfigurable antennas, optimized to meet the stringent requirements of 5G
IoT deployments. Through a comprehensive analysis of existing literature and case studies,
this paper aims to provide insights into the evolving landscape of antennas for 5G IoT
applications and pave the way for future research endeavors in this domain.
The most important thing when it comes to cyber security is having a strong password. To
determine how strong your passwords are, you can create a cyber security project that follows
the OWASP (Open Web Application Security Project) guidelines. The algorithms used in
machine learning are used to train the application. The system is given datasets containing
Password Strength
205 weak passwords, passwords from previous breaches, etc. Train your system with a dataset
Tester
such that the current user enters a password that seems similar, and the system alerts them.
The program should establish fundamental guidelines such as a minimum password length,
complexity, and exclusion of username or other publicly accessible information, as well as
the usage of special characters and numbers.
The project aims to develop a mobile application that provides users with a comprehensive
overview of all installed applications on their device and empowers them to manage internet
access permissions on an individual basis. In an era where privacy and data security are
paramount concerns, this application serves as a crucial tool for users to exercise greater
control over their digital footprint.
206 APPWARDEN
The application will offer a user-friendly interface displaying a list of installed applications,
along with pertinent information such as data usage statistics and network access
permissions. Users will have the ability to selectively enable or disable internet access for
each application, thereby enhancing privacy and security while optimizing data usage.
The URL Shortener application leverages a simple and efficient algorithm to generate unique,
shortened URLs that map to the original long URLs. Key features include a user-friendly
interface for URL input and shortening, a database for storing URL mappings, and robust
redirection functionality. Additionally, the application incorporates features for tracking the
207 URL Shortener number of clicks on shortened URLs and providing users with analytics on their usage.
The backend of the application is built using a modern web framework, ensuring scalability
and performance, while the frontend offers a clean and intuitive user experience. Security
measures, such as rate limiting and validation, are implemented to prevent abuse and ensure
the reliability of the service.
This project aims to enhance the convenience of sharing URLs by providing a reliable and
efficient URL shortening service. By doing so, it addresses the need for simplicity and
accessibility in URL management, making it easier for users to share links across various
platforms without the limitations imposed by long URLs.
NEURO-
EVOLUTION: A
TREASURE FOR
208 DATA MINING
USING
EVOLUTIONAR
Y MUTATIONS.
The stimulus to carry out this research was to identify and propose a secure framework for
the Internet of Things (IoT). Due to the massive accessibility and interconnection of IoT
devices, systems are at risk of being exploited by hackers. Therefore, there is a need to find
Recruiters from companies and HR need help reviewing many resumes whenever a job opens.
In cases of high demand for job roles, many job applications come flowing in. Sometimes,
when skimming through resumes, there is a possibility that an ideal candidate’s resume does
211 Resume Parser not receive the necessary attention, or maybe it is missed due to the enormous pile of
applications. That makes things difficult for the job applicants and the company where they
would have been more suited to work. It is a good application for machine learning, as it can
help people browse through resumes.
This project aims to develop an intrusion detection system (IDS) that leverages machine
learning to identify and prevent unauthorised access to networks. The system analyses
Intrusion network traffic data to detect anomalies that may indicate malicious activities. By training on
Detection System both normal and malicious traffic patterns, the model learns to differentiate between
212
Using Machine legitimate and suspicious behaviour. The IDS can then alert administrators or automatically
Learning block potential threats in real-time. This machine learning-based approach enhances the
accuracy and responsiveness of traditional intrusion detection systems, providing better
protection for network security.