Research - Dept. of Computer Engg.

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 16 of 16
  • Item
    Academic audit -Tool for quality enhancement in Teaching-Learning process in higher education institutes
    (K.K.Wagh Institute of engineering education & research, 2019-06-08) Khan, Tabrez; Magar, Rajendra; Ansari, Zakir; Shaikh, Afzal
    Academic audit is a methodical and scientific process of designing, implementing, monitoring and reviewing the quality in academic systems in higher education. The academic audit provides a strategic planning and its implementation for the teaching learning activity in the institute. In order to ensure quality and effective curriculum delivery, in teaching-learning, quality assurance system like Internal Academic Audit (IAA) system is very much essential. This paper aims to discuss the effective implementation of IAA in the technical campus situated in Panvel, Maharashtra. Academic Audit is done thrice during the term as Pre Term Audit- before the commencement of the term, Mid Term Audit- during the mid of the term and Post Term Audit- after the term end. Total thirty four numbers of input parameters are identified based on which academic audit is carried out. For every single parameter in the audit format, the course owner is evaluated for complete, partially complete and incomplete status of that parameter as per defined rubrics.The score of all the parameters is converted to a scale of 5 which would become the score of that course owner and would be used for appraising the concerned course owner.The reports of the Pre Term, Mid Term, and Post Term audit would be kept with the audit team and the necessary corrections would be conveyed to the respective course owners at the time of the audit. It was observed that after the introduction of the aforementioned process, the academic files of all the faculty members were found complete in all respects and quality of assignments, teaching learning and evaluation process was improved significantly.
  • Item
    Automated Attendance System Using Face Recognition
    (International Journal of Innovative Research in Computer and Communication Engineering, 2016-04) Khan, Suhel (11CO25); Khan, Shoeb (11CO24); Zakariya, Md. Hussian (12CO63); Pathan, Nazim (11CO21); Khan, Mubashir; Gopale, Apeksha
    The objective of this system is to present an automated system for human face recognition for an organization or institute to mark the attendance of their students or employees. This paper introduces face detection method using the Voila and Jones algorithm and recognition using correlation technique. The system will record the attendance of the students in class room environment. The above system is fully automated and easily deployable. User gets an authentication to upload the image containing file and also to view the attendance.
  • Item
    Analytic Hierarchy Process (AHP) to Find Most Probable Web Attack on an E-Commerce Site
    (ACM: Association For Computing Machinery, 2016-03-04) Lokhande, P. S.
    Attackers are using various techniques to attack on an E-Commerce site; they do have various options to initiate attack. On other hand web administrators finding it difficult to prioritize the defense mechanism against each web attack. The Analytic Hierarchy Process (AHP) is an effective method in dealing with the situations where we need to select one among available alternatives or prioritize them according to their severity. Here we try to focus on some major type of attacks which are most offensively happening on the web-services; like Cross-Site Scripting Attack, DoS Attack, SQL Injection Attack and Man-in-Middle Attack. These top online web attack methods were chosen to decide the most probable happening attack on a website. The prposed methods shows step by step approach to find the most probable alternative that hackers could first use to do the attack.On the basis of this model the administrator can take care of it at first place.
  • Item
    Digital forensics analysis for data theft
    (The International Journal of Forensic Computer Science, 2015-12-27) Lokhande, P. S.; Meshram, B.B.
    Cyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives behind the data theft are revenge on employer, higher pay offered by a competitor company, or selling valuable data, etc. This work gives step by step approach implemented to extract the digital evidence from the computing systems of employee by whom the data theft is made. The employee used the Windows operating systems and the data in MS word format and excel format was sent to the competitor company by email and the data was also copied from the computer to the pen drive of the employee and then it was deleted from the company’s computer. The extensive literature survey is made on Digital Forensic Analysis Process, Digital Forensic Model and various tools and hardware required for forensic set up. We have simulated the investigation process to get the evidence from the suspected employee’s computer.
  • Item
    Analysis and design of web personalization systems for E-Commerce
    (International Journal of Web Technology, 2015-12) Lokhande, P. S.; Meshram, B.B.
    Abstract- Web personalization facilitate customizing a web site as per users preferences by using the various data mining techniques, taking advantage of the knowledge acquired from the analysis of the user’s navigational usage data. The web personalization reduces the searching time of the user and serves the purchasing interest of the user. In this paper, we have proposed the Analysis and design of the E-Commerce Systems. On the basis of the proposed Software specification Requirements ,for analysis of the systems, we proposed the class diagram for Preprocessing Systems, Knowledge Discovery Systems and Recommendation Subsystems and then provided workflow of the systems by proposing the required functional model of the systems. In the design of the systems we proposed the data structure design and Dynamic Web Systems architecture and implemented the systems. Lastly we have shown the results of the navigational behavior of the user during particular transaction.
  • Item
    College alumni portal
    (IJSRD - International Journal for Scientific Research & Development, 2015) Lokhande, P. S.; Shaikh, Asiya; Shaikh, Tuba; Siddiqui, Maryam; Momin, Alimuddin
    Abstract— Alumni portals is providing common platform for every institute. Owing to the need to have all the Alumni (already passed out students) must be connected to the Institute, resulted in sharing their experiences, views, ideas, guidance motivations and strategies. The objective of Alumni portal application is to allow old and new students of the college to have communication. This allows students to know about each other and their current activities. This portal highlights the feature of communication, which will enable the current students to have interaction with the alumni of the college for getting various updates on current industry trends, Internship opportunity, sponsored projects and various referrals opening in the corporate world. This portal will serve the cause of integrating all the stakeholders of Institute such as , Alumni, College students , Faculties to avail the guidance and knowledge sharing on various domains. In this project we proposed the Dynamic Architectural design of the Alumni portal, which enable the two way communication between all stakeholders.
  • Item
    Efficient way of web development using python and flask
    (International Journal of Advanced Research in Computer Science, 2015-03) Lokhande, P. S.; Aslam, Fankar; Hawa, Nabeel; Munir, Jumal; Gulamgaus, Murade
    Web is the most frequently used networking aid which satisfies the requirements of all types of users; it provides a solution for any type of problem definition. While developing a web portal the appearance of web portal makes a development more critical. The good appearance of a web can easily attract more number of visitors which is a success of web portal. For designing and developing such well structured and with the good appearance of web we have to choose a proper technology. The technological needs of satisfying a good web portal can be fulfilled by "python" and "flask".
  • Item
    Collecting digital evidence: Internet banking fraud - Case study
    (International Research Journal of Engineering and Technology (IRJET), 2015-05) Lokhande, P. S.
    Net banking frauds are now a day’s became common, criminals use the various available technologies to con the unaware citizens. Use of Phishing mails, key loggers and mobile phone SIM card cloning is the techniques commonly used. Highest number of Cyber Crimes made the job of police department tough. Tracing the non history shitter criminals, is an another challenge. Various online resource such as anonymizers equip criminals with loads of facility
  • Item
    Building dynamic e-business systems architecture
    (International Journal for Scientific Research & Development, 2015-09) Lokhande, P. S.
    Web personalization is the process of customizing a web site as per user‘s preferences by using the data mining, taking advantage of the knowledge acquired from the analysis of the user‘s navigational behavior. With personalization, when a particular person visits a Website, the recommendation can be designed specifically for that person. The Dynamic E-Business website can be designed using web personalization. The proposed E-Business Web personalization model consists of preprocessing, Knowledge Discovery using data mining and recommendation engine. The proposed preprocessing algorithm consists of three subroutines, namely Cleaning non-required server log, Identification of User from IP address and Log, Creating session for every user and preparing Transaction file. The knowledge discover module consists of Aprori Algorithm for TRP association rule, Sequence Pattern Algorithm for Mining log and Access Log and ID3 Algorithm for Classification of the registered Users of the website. Depending on the Sequence pattern, association rule and user class the recommendation module recommends the desired web page link to the user
  • Item
    Performance and Security Measure of Highly Performed Enterprise Content Management System
    (International Journal of Computer Applications, 2012-05) Lokhande, P. S.
    “ENTERPRISE CONTENT MANAGEMENT SYSTEM” (ECMS) is an extension to CONTENT MANAGEMENT SYSTEM (CMS). In this paper we will see the performance measure and security measure of website that is developed and hosted using three different platform, One website we have made in LIFERAY(open source enterprise content management system) and MYSQL as database, Second we have made using JSP and MYSQL as database run on the free web space, third we have made again using JSP and MYSQL as database but we have bought web space from provider .We will compare all three websites to see which one has the better efficiency or which can handle the better stress using the webstress tool developed by us, for the performance measure of all three websites. We have evaluated the performance by considering following parameter 1)Performance Test 2) Stress Test 3) Ramp Test and security measure by considering following parameters 1) SQL INJECTION 2) CROSS-SITE SCRIPTING on the above three websites
  • Item
    Botnet: Understanding Behavior, Life Cycle Events & Actions
    (International Journal of Advanced Research in Computer Science and Software Engineering, 2014-03) Lokhande, P. S.
    This paper examines botnet behavior and provides the basis for the development of an application tool used to investigate the properties of botnets in large-scale networks. Botnets are breaching security and data safety and are used by hackers for initiating various cyber-attacks. Botnet causes various problems such as information search and theft, denial of service attack, sending SPAM e-mail, and so on. The purpose of this paper is to study basic details of security threats that users of Internet are facing from malicious botnets. There is a need to develop effective mechanism for detecting and mitigating the malicious behavior of botnets. This study helps: (i) To understand behavior of bots and Botmaster. (ii) To study botnet topologies, behavior, lifecycle events and actions; and (iii) to study preventive steps to stop the botnet attacks. Keywords— Botnet, Bot, Botnet Maker, Botmaster, Botnet Detector, Zombie, IRC, DDoS, Spam, Internet Security, Bot Hunter, WebSecurity
  • Item
    E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures
    (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-02) Lokhande, P. S.
    The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the adverse effect of decreasing the consumer faith on online transactions, which happens in e-commerce. Prevention is better than cure, good knowledge and understanding of the online threats can be used as a tool to avoid online attacks. Keywords: E-Commerce, Security breach, Online frauds, Vulnerabilities, Fraud, Attack on E-commerce.
  • Item
    Learning from the Past Intrusion Attacks: Digital Evidence Collection to Make e-Commerce Systems More Secure
    (Conference ICL2009, 2009-09) Lokhande, P. S.
    Use of computers, data communication and data storage devices has become so ubiquitous that most of the crimes or civil disputes have involvement in some way. There will be a large demand for computer forensics in the coming days. Computer forensic has four phases: Collection, Presentation, Filtering and presentation. Computer Forensic: It is an art and science of applying computer science to aid the legal process. Computer involvement in crime such as fraud, child pornography and threatening emails. Another situation where computers commonly assist in a crime is intellectual property theft in the corporate environment. Computers were the targets of the crime such as during a Denial of Service (DoS) attack against an E-Commerce site. It is often less obvious than previous cases. Computer contains information that is incidental to the crime such as a database containing the payment and receipts list of gamblers, drug traffickers, and scammers. Pay and receipts (owe) are the documents made in spreadsheets to keep track of their customers and suppliers. In the same cases other innocent bystanders computers, WiFi networks may have hacked to send threatening mail for example mails sent by terrorist group before the bomb Blast in various cities of India.
  • Item
    Survey on Contribution of Agent Technology for Implementing an Application for Mobile devices
    (International Journal of Advanced Research in Computer Science and Software Engineering, 2013-11) Lokhande, P. S.
    Internet technology is spread widely in a short time span. With the growth of internet electronic data exchange is also increasing; which is responsible for the invention of e-business. The use of e-commerce is also suddenly increases with the upcoming technologies invented in the field of e-business. The traditional e-commerce system requires the human interaction for selling to buying process, but with the invention of intelligent agent technology the task become simpler. In a wide range of internet application new breed of software is used which is nothing but an intelligent agent. Intelligent agents are used as a supplement of human interaction, managing electronic mail and intelligent user interfaces. In the next phase of e-commerce trading mobile agent technology is introduced. Mobile agents are intelligent, pro-active and independent representatives of businesses. As we know stationary agents supports to automate trading capabilities and intelligent negotiation models; and mobile agents can easily connect with mobile devices such as PDAs and mobile phones. This paper investigates how mobile agents can be more beneficial in e-commerce society and their contribution in e-trading. Keywords — E- commerce, intelligent agent, mobile agent, RPC, PDA,
  • Item
    Implementation of Mobile Agent Architecture for E- Commerce Application for Mobile Devices
    (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-12) Lokhande, P. S.
    “Mobility” is a term which newly acclaimed with the increased used on mobile devices. To support business application on remote places this proposed architecture helped by a mobile intelligent agent. By using mobile devices, buyers or sellers can create a mobile intelligent agent; the ability of mobile migration (mobility) on internet agents can do the business on behalf of buyers & seller. Mobile agents are beneficial to do the business anytime and anywhere. Searching for appropriate trader and negotiating with the trader is handled by mobile agent which reduce the time consuming task of the user. As we know that mobile devices owns the limited bandwidth connections with greater expenses. The proposed system architecture can address the problem of expensive connection with limited bandwidth. After launching mobile intelligent agent through network, seller/buyer can disconnect from mobile devices and later on can reconnect to devices for the results. For moving across the network; FIPA standardization provides flexibility & increase interoperability among other agent systems and scalability is provided by proposing system architecture. As per market survey; with compared to other mobile operating system, Android captured 80% market share worldwide for that reason the proposed system is designed for Android mobile devices. For delegating of human users (Buyers / Sellers) on the distributed system environment agents are created and by the migration process on the internet the agents can handle the shopping job on behalf of them and generate the results. The proposed system is demonstrated by C# (Server side) and Android application development tool (Client side). The proposed article helps to understand the proposed system architecture and operation of mobile agents in the system.
  • Item
    Cloud Computing: An Architecture, its Security Issues & Attacks
    (International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2013-03) Lokhande, P. S.
    Every day new things are added in old and those things should have to be preserve for managing the future, new things are always come with the major question that where should keep the things safely? This concept is applicable for both the regular household things as well as the computer data. Day by day storage requirements are increasing but storage space is the same for preserving the data securely. For storing extra data the computer users may invest extra cost on separate storage devices or choose the newly added feature in IT environment is ‘Cloud Computing’. Cloud computing has extended feature of the distributed computing; it is a way to increase the capacity or add capabilities without investing in new infrastructure, training new personal or licensing new software. This paper mainly focused on the architecture of cloud computing; survey of the different security issues that has emanate due to the nature of the service delivery module of cloud computing system and type of attacks in cloud computing environment. Keywords — Cloud computing, cloud security, cloud providers, cloud standards, cloud attacks, software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS)