EXTC Engineering - Project Reports

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 154
  • Item
    Missing report filing portal using django
    (AIKTC, 2022-05) Pathan, Siraj; Shaikh, Adil (19DET21); Sarang, Abbas (19DET17); Khan, Anas (19DET11); Khan, Abuzaid (19DET12)
    Nowadays, much of the missing reports were unreported to the authorities. Given this fact, The study present the development of a “Missing Report Filing Portal” through online and even offline and at the same time the active participation of the citizens. The idea draws its motivation from the inconvenience of going to the police and personal belief of the weak investigative capabilities of the authorities to resolve petty case. Keywords: Missing Report Filing Portal would really help the complainant and the authority to look matter privately and easily with regards to the reported issue. In addition, It would be easier for the complainant to report a witnessed. A generic platform for keeping human records from birth till death.
  • Item
    Efficient authentication for mobile and prevasive computing
    (AIKTC, 2022-05) Tamboli, Mujib; Sayyed, Mohammed Novman Irfan (19DET18); Shaikh, Adnan Farook (19DET19); Shaikh, Asif Ahsan (19DET20)
    Message authentication is typically achieved by using message authentication codes (MACs) authenticated encryption or digital signatures. The message authentication code, also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted betenthem. It is based on using a cryptographic hash or symmetric encryption algorithm. The authentication key is only shared by at least two parties or two communicating devices but it will fail in the existence of a third party since the algorithm will no longer be effective in detecting forgeries. In addition, the key must also be randomly generated to avoid its recovery through brute force searches and related key attacks designed to identify it from the messages transiting the medium. Securing the user message by providing authentication and security if the authenticated message must also be encrypted. With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
  • Item
    Raspberry Pi based face recognition door unlocking system
    (AIKTC, 2022-05) Pathan, Siraj; Thakur, Mashaal Yunus (19DET14); Patni, Mohd Arafaat (19DET16); Vasudev, Mandavkar (17DET48); Shaikh, Saad Shahid (19DET23)
    Today we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. If it matches with the authorized user then the system will unlock the door by an electromagnetic lock. The need for facial recognition system that is fast and accurate that continuously increasing which can detect intruders and restricts all unauthorized users from highly secured areas and aids in minimizing human error. Face recognition is one of the most Secured System than biometric pattern recognition technique which is used in a large spectrum of application. Nowadays, computers and smart phones have significantly contributed our daily life where numerous computations and adjustments are being accomplished by such technologies. Securing homes has become one of the concerning issues that facing many people. With the expanded duration of leaving the home, homes are being more vulnerable for several threats especially being burgled. Apart from the threats, there are different cases where securing or monitoring the house is very critical such as the existence of elderly individuals or kids with baby sitter. For this manner, home security system or so-called Home OS has been proposed in order to provide more secure arrangements. Such concept aims to turn the home into a smart in which different tasks especially monitoring can be performed remotely. Monitoring and controlling some tasks inside the house would have the ability to provide maximum safety. Recently, electronic door lock systems are one of the most popular security systems that is being installed for many residents and business places. The key characteristic behind such systems lies on the reliability in which the authorized individuals can gain the permission to access the doors throughout a secure system that has an interactive interface. Such analysis takes different forms such as analysing facial image or video stream. The main goal is to develop a prototype that has the ability to simulate the wireless tasks including monitoring and controlling digital door lock. Such system would have the capability to provide secure monitoring of houses.
  • Item
    Hardware cryptocurrency wallet
    (AIKTC, 2022-05) Khan, Azim; Ansari, Mohd. Yasar Mohd. Ishaque (19DET04); Khopatkar, Mohammed Adeen Rizvan (19DET15); Khan, Mohd. Azam Ahmedali (19DET13)
    A cryptocurrency is a digital or virtual currency. Many cryptocurrencies are decentralized networks based on blockchain technology. A cryptocurrency wallet allows users to store and retrieve their digital assets. Crypto wallets technically do not store your cryptocurrency, your holdings live on the blockchain but can only be accessed using your private key. The private key proves your ownership of you digital assets and allow you to make transactions. A hardware wallet is a cryptocurrency wallet which stores the users private key in a secure hardware device. It provides isolation between private keys and easy-to-hack computer or smartphone.
  • Item
    DTMF controlled robot vehicle
    (AIKTC, 2022-05) Kotiyal, Bandanawaz; Ansari, Mohammed Saif (19DET03); Gavande, Fahad Yasin (19DET08); Gowari, Abhijeet Mahesh (19DET09); Hodekar, Siddique (19DET10)
    The DTMF based robot is controlled by a mobile phone that makes a call to another mobile phone attached to the robot. In the course of a call, if any button pressed, a tone corresponding to the button pressed is heard at the other end of the call. This tone is called “Dual Tone Multiple Frequency” (DTMF) tone. The received tone is pressed by the microcontroller with the help of a decoder IC. The DTMF board transmits the signal to the Raspberry-Pi (3+) board to operate the motors and camera directions. Since this robot is controlled by dialing a call so we can also call it as “DTMF Controlled Robotic Car”. Hence we can introduced newly upgradable technology of Raspberry Pi (B+). The mobile phone on robot is connected to the Raspberry Pi (B+) controller and the output is connected to the relay’s. which helps the robot to make wireless. As we are using internet the robot can be operated from any part of the world so, we need to see where the robot is moving, for which we are using the windows App “MobaXterm & Advanced IP Scanner” for monitoring through camera mounted or built on robot. Hence also we have introduced 4 wheel drive, automatic calling attending technology for the particular number and camera IP address security technology so, In this robot more secure and safely one. The hazardous situation such as conflagration makes the humans’ life most inconvenient and risky. It is an unavoidable situation and it is very difficult for humans to face such situations. But mechanical devices can handle such situations without Human intervention. Sometimes it is also difficult to reach fire place at remote location. A robot can easily handle such situations and can efficiently work in hazardous units. The robot can easily reach the places where man cannot reach. In the present paper a fire extinguisher robot is developed to detect fire and the robot smidgens water on flames. The robot is operated and controlled with mobile phone. Dual Tone Multi Frequency tones are produced to control the movement of the robot. In the present work an Arduino UNO microcontroller is interfaced with fire sensors and generates sequence of steps to control robot movements, direction, and pumping of water. The robot movement and other operations are controlled from remote location. Conventional wireless controlled robots make use of RF circuits and have some limitations such as minimum working range and frequency range. These drawbacks are overcome using mobile phones, which posses the advantages of robust control, the working range is large as the coverage area of the service provider, interference is also less. DTMF mobile robot is nothing but a machine which can be controlled using a mobile. When a call is made on the mobile, if any of the button in the mobile is pressed , a tone that corresponds to the button pressed is heard at the other end of the call and this tone is called Dual tone Multi Frequency(DTMF). In this paper, we can control the Robot using Dual Tone Multi Frequency (DTMF) technology. DTMF technology is most useful technique at present days. It is worked on to methods digital signal processing (DSP). Wireless-control of robots uses RF circuit that has the drawbacks of limited working range and limited control. This DTMF is gives advantage over the RF; it increases the range of working and also gives good results in case of motion and direction of robot using mobile phone through micro controller. This type of wireless communication gives the remote handling operation of Robot using DTMF We can control the Robot using Dual Tone Multi Frequency (DTMF) technology. DTMF technology is most useful technique at present days. It is worked on to methods digital signal processing (DSP). Wireless control of robots uses RF circuit that has the drawbacks of limited working range and limited control. This DTMF is gives advantage over the RF; it increases the range of working and also gives good results in case of motion and direction of robot using mobile phone through micro controller. This type of wireless communication gives the remote handling operation of Robot using DTMF.
  • Item
    User-friendly online E-commerce website
    (AIKTC, 2022-05) Tamboli, Mujib; Shaikh, Mohd Ajmal (18ET42); Salman, Khan (18ET32); Sayed, Anas (18ET35); kanojiya, Rohit (18ET18)
    This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web site over the course of a semester based on the company, products and/or services, content, and graphic images they choose. The case is divided into three assignments. The first assignment is a basic e-commerce Web site that emphasizes site layout, navigation, text formatting, inserting graphics, and the content necessary to market products and services online. Additional complexity is added in the second assignment, an enhanced e-commerce Web site. In this assignment students will create their own graphics images, menus, and image maps, use JavaScript to create image rollovers and image swaps, dynamically generate Web pages based on the contents of a database, and use a form to send data to an email address. The third assignment is a full-fledged transaction processing e-commerce Web site with a virtual shopping cart and checkout processing procedures. The case can to be used in a course where the students have little or no prior programming or relational database experience. The case was written so that the creation of the student's e-commerce Web site is not dependent upon the student's e-commerce development software, graphics tool set, Web server, Web programming environment, or relational database management system. Teaching notes containing suggested instructions, possible development environments, Web server configurations hints, individual assignment objectives, and a sample solution to the final assignment are provided.
  • Item
    House price prediction
    (AIKTC, 2022-05) Athavani, Shahin; Shaikh, Meraj Muzammil(18ET40); Shaikh, Rahmat Ali(16ET25); Ansari, Raisuddin(19DET05); Khan, Adil(17ET21)
    Machine learning plays a major role from past years in image detection, spam reorganization, normal speech command, product recommendation and medical diagnosis. Present machine learning algorithm helps us in enhancing security alerts, ensuring public safety and improve medical enhancements. Machine learning system also provides better customer service and safer automobile systems. We create a housing cost prediction model in view of machine learning algorithm models for example, XGBoost, Linear regression and neural system on look at their order precision execution. We in that point recommend a housing cost prediction model to support a house vender or a real estate agent for better information based on the valuation of house. Those examinations exhibit that Linear regression algorithm, in view of accuracy, reliably outperforms alternate models in the execution of housing cost prediction.
  • Item
    IOT based smart poultry farm
    (AIKTC, 2022-05) Khan, Azim; Sarfraj, Ahmad (18ET33); Shah, Abdul Haseeb (18ET37); Shaikh, Mohd Khalid (18ET41); Juwale, Junaid Rizwan (18ET17)
    Automated poultry farms have a great impact on increasing the productivity of chickens by monitoring and controlling all ecological parameters and also controls the food valve which feeds the birds in time Poultry farming production is in demand now a days because of the increasing population around the world. Monitoring of a chicken farm could be very helpful to produce a great number of chicken meat and to meet the demand of the people. However, there are different environmental factors that are affecting the growth of a chicken that also affects the production of chicken meat for food consumption. This study aimed to determine the different sensors and materials that can be included in the system architecture for smart chicken farming which focus on the monitoring of the environmental parameters.
  • Item
    Minutiae extraction and enhancement for fingerprint detection
    (AIKTC, 2022-05) Kotiyal, Bandanawaz; Mohd Ahteshamuddin, Md Alauddin (18ET29); Mirde, Aamer (19DET01); Sayyad, Sajjad Sadik Husain (11ET49)
    Automatic Personal Identification (API) represents a challenge for tremendous life applications such as in passports, cellular telephones, automatic teller machines, and driver licenses. It is important to achieve a high degree of confidence when handling such types of application. Biometrics is being more and more adopted in such cases. In the past years, the development of fingerprint identification systems has received a great deal of attention. The goal of this paper is to represent a complete identification process for fingerprint recognition throughout the extracting of matching minutiae. The performance of the proposed system is tested on a database with fingerprints from different people and experimental results are presented.
  • Item
    Weapon detection and classification using CNN
    (AIKTC, 2022-05) Athavani, Shahin; Chaudhary, Mohammed Abid (18ET28); Sayed, Abu Sufiyan (18ET34); Shaikh, Mohd Danish (18ET43)
    Gun violence in a lot of areas remains stubbornly high. Therefore, limiting gun violence has been a priority in recent years. In this presentation, we will be implementing the use of Deep learning algorithms to detect any firearms / weapons in real time, to improve response times and reduce potential harm. The increase of video surveillance in public spaces, and the proliferation of body cameras for police can potentially be leveraged for gun detection systems. Video systems could alert police and surveillance personnel when a gun is detected in real time, resulting in prompter action. The proposed system in this presentation is a weapon detection system that makes use of TensorFlow object detection API. The project will involve the use of various resources for implementation, such as: Python, TensorFlow object detection API, OpenCV, Google Collab, NumPy etc.
  • Item
    IoT based pulse oximeter
    (AIKTC, 2022-05) Kotiyal, Bandanawaz; Mulla, Huzaif Mujeeb (18ET15); Ghori, Jaied Ali Juned (18ET14); Mustafa, Afzaan Imtiyaz (18ET11); Khan, Mohammed Aamir (18ET20)
    A pulse oximeter is a medical instrument that indirectly measures the saturation oxygen level of a patient's blood, i.e., what proportion of the oxygen-carrying molecules in the blood (called hemoglobin) are actually carrying oxygen. This is known as oxygen saturation or SpO2. It also measures the heart rate in beats per minute (BPM). This saturation point oxygen level is very important to monitor while a patient is at risk for further process of medication. In this project, we proposed to develop a pulse oximeter to measure the saturation point oxygen level and heart rate and the same could be viewed in the app, and also it will be available live to the patient’s family, as well as, in charge doctor. The output of this analog circuit will be fed into a Node microcontroller, which computes the pulse and oxygen level from these numbers, and sends it to the server. Using this technology, the goal of our project is to develop an alert system that keeps the patient risk-free and helps the doctors to take appropriate medication action for the patient. With IoT, multiple monitoring devices can be connected thus enabling real-time monitoring of patients. Along with this, these devices can transmit signals from home also thus, reducing the time needed for patient care in the hospitals. This can reduce the need for a doctor's attention and can improve the level of care provided at the same time. Key-Words - IoT, Pulse Oximeter, Medical, Node MCU, Ubidots, Alert System.
  • Item
    Movie recommendation system
    (AIKTC, 2022-05) Tamboli, Mujib; Biradar, Mahesh (18ET12); Jetham, Raihan (18ET16); Mansuri, Aftab Alam (18ET26); Saibole, Nauman Muazzam (18ET31)
    Recommendation systems are an integral part of information filtering system in data science, that are widely used in order to identify the pattern a user would likely choose on the basis of the previous choices of the user as well as from studying the pattern in which others have chosen. For a fact, the recommendation can never be a cent percent correct at providing recommendations to the user but can be close enough to please them to a certain extent. Thus, the same is widely used in the industries these days to get higher profit and have a good hold in the market. In the spread of information, how to quickly find one’s favorite movie in a large number of movies collection become a very important issue. A movie recommendation system can play an important role especially when the user has no clear target movie. This System would benefit those users who have to use search engines to locate relevant content. They have to scroll through pages of results to find relevant content. Rather than searching for a similar movie, the users of this system would be directly taken to relevant movies matching their interests and preferences. In this project we will work on Content-Based Movie Recommendation Systems It uses attributes such as genre, director, description, actors, etc. for movies, to make suggestions for the users. The intuition behind this sort of recommendation system is that if a user liked a particular movie or show, he/she might like a movie or a show similar to it.
  • Item
    Animal detection and classification
    (AIKTC, 2022-05) Athavani, Shahin; Khan, Amaan Ahmad (18ET09); Shaikh, Afridi Anwar Ali (18ET39); Shaikh, Saif Hisamuddin (18ET45)
    According to UN report on biodiversity which says that there are 1 million species are at risk of extinction. In this project , we will be implementing the use of Deep learning algorithms to detect animal and take necessary actions to save them. The proposed system in this project is a image based animal detection system based on Faster R-CNN. The project will involve the use of various resources for implementation , such as : Python , CNN , OpenCV , YOLOv3 , Google Colab , Numpy , Pandas
  • Item
    Developing an user-friendly online shopping web-site
    (AIKTC, 2022-05) Athavani, Shahin; Alvi, Azeem Rais (18ET08); Molawade, Rohit (18ET30); Choudhry, Darshan (19DET06); Shirsat, Aniket (18ET10)
    This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web site over the course of a semester based on the company, products and/or services, content, and graphic images they choose. The case is divided into three assignments. The first assignment is a basic e-commerce Web site that emphasizes site layout, navigation, text formatting, inserting graphics, and the content necessary to market products and services online. Additional complexity is added in the second assignment, an enhanced e-commerce Web site. In this assignment students will create their own graphics images, menus, and image maps, use JavaScript to create image rollovers and image swaps, dynamically generate Web pages based on the contents of a database, and use a form to send data to an email address. The third assignment is a full-fledged transaction processing e-commerce Web site with a virtual shopping cart and checkout processing procedures. The case can to be used in a course where the students have little or no prior programming or relational database experience. The case was written so that the creation of the student's e-commerce Web site is not dependent upon the student's e-commerce development software, graphics tool set, Web server, Web programming environment, or relational database management system. Teaching notes containing suggested instructions, possible development environments, Web server configurations hints, individual assignment objectives, and a sample solution to the final assignment are provided.
  • Item
    Mopping autonomous machine
    (AIKTC, 2022-05) Kotiyal, Bandanawaz; Chohan, Adeeb Ahmed (18ET07); Chohan, Ausaf Ahmed (19DET07); Shaikh, Mohammad Sajad (18ET27); Ansari, Abrar Arhum (19DET02)
    Mopping Autonomous Machine floor is a compact robotics system which provides floor cleaning service in room and big offices reducing human labour. Basically, as a robot it eliminates human error and provide cleaning activity with much more efficiency. If we clean the floor manually then there is a possibility that the operator will leave some portion of the floor. Also due to manual labour involved this is time consuming and irritating to clean the floor. Also, in big offices floor area is very huge and the people involved there for cleaning purpose cannot clean it much more efficiently. This is where the robot comes as an advantage. Also, the robot is small and compact in size. So, we can carry it and place it wherever we can on the house. Also, in industries the robot is very cost effective as compared to manual labour involved. The flexibility, time saving and efficiency make the robot a clean choice for cleaning the floor. Keywords: Arduino UNO, L298N Motor Driver, Ultrasonic Sensor, DC Motor.
  • Item
    Hotel management system web based
    (AIKTC, 2022-05) Tamboli, Mujib; Shaikh, Afrin Sabir (18ET05); Khan, Mohd Sajid (18ET21); Khan, Rahil (18ET23); Khan, Shahnawaz (18ET24)
    Hotel Management System is a project that keeps record of hotel application and has facilities for booking, making registrations and generating of payment receipt and entering room hotel rates, meal type, bedding type etc. Manual systems have limitations, like space to store data and low working speed. Tasks like updating and deleting of the records, make registers paper consuming, untidy. Searching of person’s data in the manual register is very slow and. Therefore, Hotel Management System has been developed to overcome the limitations of manual system. This Project uses hypertext markup language as front-end tool and phpMyAdmin database as backend and for styling CSS and bootstrap have been used. This project is influential in computerizing the work related to hotel. This project provides information about the services provided, including room, customer and charges details. Only authorized person can access the admin panel, with proper details.
  • Item
    E-healthcare system using ML and IOT
    (AIKTC, 2022-05) Athavani, Shahin; Kotian, Tanushree Prabhakar (18ET02); Mhatre, Manasi Mahendra (18ET03); Sayed, Salahuddin (18ET36)
    Health definitely has been a measure criterion during the last two year particularly due to pandemic. An idea of immediate assistance is like boon for one and all. Smart health monitoring system is one way of early analysis of your current health state to prevent it for further complications. It checks basic concepts like pulse acquisition module, body temperature acquisition module, heart rate acquisition module, and blood pressure acquisition module, etc. It not only reduces the health care cost but also make efficient use of the time period by reduce visit to physician office, hospitalizations, and diagnostic testing procedure. Health monitoring systems have rapidly evolved during the past two decades and have the potential to change the way health care is currently delivered. Although smart health monitoring systems automate patient monitoring tasks and, thereby improve the patient workflow management, their efficiency in clinical settings is still debatable. This project presents a review of smart health monitoring systems and an overview of their design and modelling.
  • Item
    Online resume builder website using JS
    (AIKTC, 2022-05) Pathan, Siraj; Shaikh, Abbas (17ET41); Mukadam, Inzamam (18DET20); Malik, Fatima (17ET05); Momin, Ataf (17ET28)
    Aresumeisadocumentusedbyindividualstopresent their backgroundandskillsets.Itisadocumentthathasabriefsummary orlistingaboutrelevanteducationandexperience.Theresumeisthe firstitemthatauserencountersforseekingthejob.So,theresume builderwebsitewillmakeiteasyfortheemployeestocreateagood resumewithminimumeffortsjustbyfillingtheform.Theaimisto automateitsexistingmanualsystembythehelpofcomputerized equipmentsandfull-fledgedcomputersoftware,fulfillingtheir requirements,sothattheirvaluabledata/informationcanbestored foralongerperiodwitheasyaccessingandmanipulationofthesame. Basically,theprojectdescibeshowtomanageforgoodperformance andbetterservicesfortheclients
  • Item
    Web deployment over cloud using CI CD pipelined architecture
    (AIKTC, 2022-05) Khadase, Rahul; Shaikh, Nadeem Kursheed Alam (17ET32); Mohammad, Hasan Qadri (17ET36); Yusuf, Addewale (18DET); Shaikh, Arbaz Yusuf (18DET)
    Any business's initial requirement is web development. It doesn't matter if you operate a little or large business; it's been discovered that putting your business online is too complicated. Why? Because a strong "web deployment" is required for "web development." Because end users will not be using code directly, but rather a service that has been delivered. The service that might be employed must be tied to automation, and DevOps approaches are the best on the market. The phrase DevOps is a major breakthrough in the software industry. Another DevOps service that is all-encompassing is "cloud." People can create their own websites with WordPress and comparable software, but the tedious part comes when it comes to maintenance.
  • Item
    Health care prediction
    (AIKTC, 2022-05) Kotiyal, Bandanawaz; Undre, Mohd Kaif (17ET29); Shaheed Anwar, (16ET12); Shaikh, Afsha (18ET06); Patel, Manal (18ET04)
    The digital technology era demands the world to provide an excellent health system, in order to ensure the citizen and community to be alive and healthy. This study proposes the application of data mining algorithm for health prediction that can eventually shape a suitable health prediction system for patients. Although, health care is available to everyone in the world, there are still no healthcare system that is completely reliable and accurate to carefully diagnose patient on their current health issues. Even though, some hospitals are well equipped to provide the best healthcare services to its citizens, some of the hospitals are still lack in certain qualities. Consequently, patients are doubtful and uncertain when it comes to picking which hospital suits them. Numerous issues are faced by patients pertinent to hospitals such as, being unable to provide medical services, insufficient number of qualified medical staffs, poor communication between doctors and patients, and unorganized health records and data. Eventually, these issues impede the opportunity for hospitals to handle both their management and their duties steadily in order to maintain the health of every citizen and community. Patients are in need of treatment and diagnosis that are accurate and precise in order for them to be able to recover back for their proper health and medical staffs are required to be well-equipped in their clinical knowledge and communication skills to carefully assess their patients to ensure good health. Therefore, application of data mining in health prediction is considered in this paper as the best practice to facilitate better healthcare system.