International Conference on Innovation & Research in Engineering, Science & Technology (ICIREST-19)

Paper Type :: Research Paper
Title :: Fake Product Review Monitoring and Product Evaluation
Country :: India
Authors :: Mr.Rakesh D. Sawarkar || Mr.Anuj P. Patil || Miss.Bhavana C. Boldile || Miss.Manisha V. Shrirame || Miss.Tejaswini K. Meshram
Page No. :: 01-04

The project aims to develop a website for "Fake Product Review Monitoring and Product Evaluation". The reason behind developing this system is that people are now days heavily rarely on opinions before buying anything. The observation of many peoples to write fraud and useless opinions about other products or service. Hence, this paper conducts an exploratory study to understand the process by which fake reviews are written. The intention of this research is to distinguish the fake opinions posted about products and the genuine one to intentionally change the overall sentiment of the products. So, basically first the admin should login to the website, and the aim of detecting fake reviews.........

Keywords –Sentiment analysis,Grammerly,Fake review opinion

[1]. Cambria, E; Schuller, B; Xia, Y; Havasi, C (2013). "New avenues in opinion mining and sentiment analysis". IEEE Intelligent Systems. 28 (2): 15– 21. doi:10.1109/MIS.2013.30.
[2]. Jeneen Interlandi (February 8, 2010). "The fake-food detectives".
[3]. Newsweek. Archived from the original on October 21, 2010
[4]. Shashank Kumar Chauhan, Anupam Goel, Prafull Goel, Avishkar Chauhan and Mahendra K Gurve, "Research on product review analysis and spam review detection", 4th International Conference on Signal Processing and Integrated Networks(SPIN) 2017, ISBN (e):978-1-50902797-2, September-2017, pp. 1104-1109.
[5]. Sonu Liza Christopher and H A Rahulnath, "Review authenticity verification using supervised learning and reviewer personality traits", International Conference on Emerging Technological Trends (ICETT) 2016, ISBN (e): 978-1-5090-3752-0, pp. 1-7.

Paper Type :: Research Paper
Title :: Secure File Hosting System on Cloud using Cryptography" India
Country :: India
Authors :: Ashwini A. Bagde || Kajol V. Jaunjal || Trushali P. Pardhi || Chetan H. Hande || Prajakta P. Selokar || Gaurav P. Mahakalkar
Page No. :: 05-11

Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like ondemand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. There is the issue of legitimate responsibility for information (If a client stores some information in the cloud, can the cloud supplier benefit from it?). Numerous Terms of Service assentions are quiet on the topic of proprietorship. Physical control of the PC hardware (private cloud) is more secure than having the gear off site and under another person's control (open cloud). This conveys awesome motivation to open distributed computing administration suppliers to organize building and keeping up solid administration of secure administration. This paper addresses design of proposed system.

[1]. "Cloud Computing Security: From Single To Multi-Clouds" Mohammed A. Alzain , Eric Pardede , Ben Soh , James A. Thom 2012 45th Hawaii International Conference On System Sciences.
[2]. "Ensuring Data Integrity And Security In Cloud Storage" Olfa Nasraoui, Member, IEEE, Maha Soliman, Member, IEEE, Esin Saka, Member, IEEE, Antonio Badia, Member, IEEE, And Richard Germain IEEE TRANSACTIONS ON CLOUD AND DATA ENGINEERING, VOL. 20, No. 2, February 2013.
[3]. "Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage" Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, And Robert H. Deng, Senior Member, IEEE, IEEE Transactions On Parallel And Distributed Systems. Volume: 25, Issue: 2. Year: 2014.

Paper Type :: Research Paper
Title :: A Review Paper on Self-Healing Concrete
Country :: India
Authors :: Nishant Dahake || Vivek Lakshane || Avanti Koche || Rutuja Nanotkar || Nupur Kale
Page No. :: 12-17

Crack formation is very common phenomenon in concrete structure which allows the water and different type of chemical into the concrete through the cracks and decreases their durability, strength and which also affect the reinforcement when it comes in contact with water, CO2 and other chemicals. For repairing the cracks developed in the concrete, it requires regular maintenance and special type of treatment which will be very expansive. So, to overcome from this problem autonomous self-healing mechanism is introduced in the concrete which helps to repair the cracks by producing calcium carbonate crystals which block the micro cracks and pores in the concrete............

Keywords:Bacteria, Bacillus pasteurii, Concrete, Bacillus sphaericus

[1]. Potential application of Bacteria to improve the strength of cement concrete. C. C. Gavimath*, B. M. Mali1,V. R. Hooli2, J. D. Mallpur3, A. B. Patil4, D. P. Gaddi5, C.R.Ternikar6 and B.E.ravishankera7.
[2]. Aldea, C.-M.; Song, W.-J.; Popovics, J.S.; Shah, S.P. Extent of healing of cracked normal strength concrete. J. Mater. Civ. Eng. 2000, 12, 92–96.
[3]. Edvardsen, C. Water permeability and autogenous healing of cracks in concrete. ACI Mater. J. 1999, 96, 448–454.
[4]. Jacobsen, S.; Sellevold, E.J. Self-healing of high strength concrete after deterioration by freeze/thaw. Cem. Concr. Res. 1995, 26, 55–62.
[5]. Wiktor, V. and Jonkers, H.M., 'Quantification of crack-healing in novel bacteria-based self healingconcrete', Cement and Concrete Composites 33 (7) (2011) 763-770.

Paper Type :: Research Paper
Title :: A Survey on Applications of Pi-Code
Country :: India
Authors :: Miss. Vaishnavi Ruikar || Miss. Bhagyashri Chandekar || Prof. Ms. Manisha More
Page No. :: 18-23

Growing a business is not an easy task. One needs to apply some right marketing strategies to fuel the growth, churning a profit and staying afloat. One has to market the product using online as well as offline ways. 1D barcodes, 2D barcodes and QR codes have become extremely popular all over the world for carrying product related data for marketing purpose. .The advanced communication key of a picture could be integrated into a 2D barcode called as pi code. This technology is used for security of marketing or buying products, advertisement etc. In this survey paper, we discuss about various techniques of developing a pi-code using 2D barcode. Different implementations of pi code using different encoding and decoding processes give us the comparable results

Keyward: 2D barcode, QR code, pi code, encoding, decoding

[1]. ―Usage of QR Code in Tourism Industry‖ by Mehmet Emek, School of Tourism and Hospitality Management, Doğuş University, Turkey
[2]. Dr. Stephen Brokaw, ―The Expectations of Quick Response (QR) Codes in Print Media: An Empirical Data Research Anthology‖ UW-L Journal of Undergraduate Research XV (2012)
[3]. H. Kato and K. T. Tan, ―2D barcodes for mobile phones,‖ in Proc. 2nd Int. Conf. Mobile Technol., Appl., Syst., Nov. 2005, p. 8.
[5]. ―Implementation of PiCode Using Embedded 2D Barcode System for Ecom application‖ Nikita Katakwar

Paper Type :: Research Paper
Title :: Priyadarshini College of Engineering, Nagpur
Country :: India
Authors :: Amit Raut || Sachin Kadam || Roshan Pawade || Mayur Gawande || Harshal Ramdham || Dr. (Mrs.) N. M. Thakre
Page No. :: 24-27

The main goal of this paper is to describe the systems which automatically control the devices through mobile through Internet. The various implemented systems are used to control appliances in the house like fan, light, and water tank or tap by just turn ON or OFF the switch from mobile phone. Internet-of-Things (IoT) is elaborate by the internet services. IOT Applications and Uses of new technologies in IoT environment are increasing rapidly. It has been already developed in Industrial Wireless Sensor Network (WSN). A smart home is also one of the applications of IoT. Rapid growth in technologies and improvements in architecture comes out many problems that how to manage and control the whole system, Security at the server, security in smart homes, etc. This paper presents the architecture of Home Automation using IoT.........

Keywords : Internet of things (IOT), Node-MCU, Relay circuit , Sensors, Web services, Arduino

[1]. C. Chiu-Chiao, H. Ching Yuan, W. Shiau-Chin, and L. Cheng-Min, "Bluetooth-Based Android Interactive Applications for Smart Living," in Innovations in
[2]. Biro-inspired Computing and Applications (IBICA), 2011 Second International Conference on, 2011, pp. 309-312.
[3]. Carelin Felix, I. Jacob Raglend, "Home Automation Using GSM",Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011)
[4]. Sharon Panth, Mahesh Jivani "Home Automation System (HAS) using Android for Mobile Phone" International Journal of Electronics and Computer Science Engineering, ISSN- 2277-1956.
[5]. Kaushik Ghosh, Rushikesh Kalbhor, Disha Tejpal, Sayali Haral "Wireless home automation technology(WHAT) using internet of things (IOT).Volume 3, Issue 6 (November-December, 2015), PP. 161-164.
[6]. Dhakad Kunal, Dhake Tushar, Undegaonkar Pooja, Zope Vaibhav, Vinay Lodha, "Smart Home Automation using IOT" International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 201699

Paper Type :: Research Paper
Title :: A Survey on Energy Monitoring System using Internet-of-Things
Country :: India
Authors :: Prof. Jyotsana P. Gabhane || Samiksha K. Guru || Abhilasha A. Bhople || Archana Singh || Sneha A. Wadhai || Ritika R. Pande
Page No. :: 28-31

The energy audit may range from a simple walk-through survey at one extreme to one that may span several phases. These phases include a simple walk-through survey, followed by auditing of energy use in the industries, and then analysing usage of computer representation of industrial operations. The complexity of the audit is directly proportional to the stagesinvolved in the energy management program and the cost of the audit exercise. Remote monitoring and control refers to a field of automation that is entering a new age with the development of wireless sensing devices. Different industries sensors, machineries, energy or the power panels are the most demanding products and hence many organizations............

Keywords: Internet of Things(IoT), MODBUS, GPRS protocol, Automation, Energy Audit.

[1]. Wesley "Tyler" Hartman, Alexander Hansen, Erik Vasquez, Samy El-Tawab, Karim Altaii,"Energy Monitoring and Control Using Internet ofThings (IoT) System",IEEE 2018
[2]. Rouse, M. and Wigmore, I. (2018). What is Internet of Things (IoT)?[Online] IoT Agenda. Availableat:
[3]. Damminda Alahakoon, Member, IEEE, and Xinghuo Yu, Fellow, IEEE, "Smart Electricity Meter Data Intelligence forFuture Energy Systems: A Survey",IEEE transactions on industrial informatics, vol. 12, no. 1, February 2016.
[4]. Luigi Martirano, Luigi Borghi, Franco Bua, Loredana Cristaldi, Giacomo Grigis, Cristina Lavecchia, MicheleLiziero, Luca Mongiovì, Emanuele Nastri, Enrico Tironi,"Energy Management Information Systemsfor Energy Efficiency",IEEE, 2018.
[5]. Luigi Martirano, Luigi Borghi, Franco Bua, Loredana Cristaldi, Giacomo Grigis, Cristina Lavecchia, MicheleLiziero, Luca Mongiovì, Emanuele Nastri,"Architectural Criteria for a DistributedEnergy Monitoring System", IEEE 2017.

Paper Type :: Research Paper
Title :: A Survey on Smart Self Issuing System
Country :: India
Authors :: Pranav Naigaonkar || Rohan Neware || Akshay Moon || Pundalik Borkar || Sachin Bagmare || Mrs. Jyotsna P. Gabhane
Page No. :: 32-35

Issuing is a tedious task involve sorting, lending, returning, tagging, eyeing of every item. In addition, users encounter problems for finding, borrowing, localizing, renewing the borrowing, queuing, and so forth. To overcome these obstacles, this paper proposes a smart self product issuing system based on an RFID technology. Using low-cost passive tags in libraries, stores to reduces the cost of modernization significantly. As such, integrating RFID into product management system makes both the users and admin's task easy, smart, convenient, and practice.

[1]. He He, Tao Liu, Ershen Wang,Intelligent Item Positioning System for Store Based on RFID ,2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA) ,p 723-726.
[2]. Ke Ping, Zhu Ming, Yan Na. Review of research on store management in foreign countries [J]. Journal of China store,2013,39 207 :83-96.
[3]. Han Liang, Lang Jun. Intelligent itemshelf design examples based on RFID Store[J] Modern intelligence 2013,33 11 :142-146.
[4]. Fujisaki K. Implementation of a RFID-based System for Store Management. Department of Advanced Information Technology[J].International Journal of Distributed Systems and Technologies ,2015, 6(3): 1-10.
[5]. Wang Hongmei. Mobile RFID reading and writing terminal design for logistics warehousing applications[J].Electronic device,2015,38 6 :1327-1331.

Paper Type :: Research Paper
Title :: A Theoretical model for Privacy-Preserving Multi-keyword over Encrypted Cloud Data
Country :: India
Authors :: Vikash Kolhe || Prahlad Kolhe || Bhagyasri Milmile Prof Rasika Kachore || Pranali Manapure
Page No. :: 36-40

The major aim of this paper is to give a theoretical approach model for the multi-keyword over encrypted cloud data that will be used in many areas like software applications used in multi-pal sectors like medical, banking, scientific research and many other private as well as government sectors and many more. The Internet has to provide rice to many privacy issues. But due to the emerging new technologies, the privacy is at risk from the perpetrators, thus preserving the privacy and security is more important. In present scenarios, the cloud has provided many security models of the cloud computing that provides the users to outsource the data onto the cloud, which is stored via encrypting the data before............

Keywords : Matrix coder, Privacy preserving data mining, multiple clouds, Multi-keyword over encrypted cloud data.

[1]. A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the clouds: A berkeley view of cloud computing," University of California, Berkeley, Tech. Rep, 2009.
[2]. Ling Qian, Zhiguo Luo, Yujian Du, and Leitao Guo, "Cloud Computing: An Overview", Springer-Verlag Berlin Heidelberg CloudCom, LNCS 5931, pp. 626631, 2009
[3]. M. D. Ryan, "Cloud Computing Privacy Concerns On Our Doorstep", Communications of the ACM (CACM), vol. 54, no. 1, pp. 36–38, 2011.
[4]. D. Chen and H. Zhao, "Data Security And Privacy Protection Issues In Cloud Computing", in Proceedings of the International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 647– 651.

Paper Type :: Research Paper
Title :: An Effective Data Disaster Recovery Services Using AWS Cloud
Country :: India
Authors :: Pradeep Fale || Punam Wadhi || Smita Chauhan || Chetana Ghonge || Ashwini Uikey || Diksha Lautre
Page No. :: 41-46

Nowadays cloud computing is most demanding technology. While dealing with the data in cloud we faces some problems like downtime, storage, security and privacy, vulnerabilities to attack, limited control and flexibility, Vendor lock- in, costs. AWS provides the facility to overcome this problem. Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform provided by Amazon. An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment. This paper describes to implementing a proven and cost-effective disaster recovery solution for file servers that can minimize data loss and provide fast, automatic recovery of file services running on the AWS cloud.

Keywords- Cloud computing, Data replication, AWS cloud, Disaster recovery.

[1]. CLOUD COMPUTING SECURITY:AMAZON WEB SERVICE Saakshi Student Department of CSE & IT ITM University Gurgaon ,India
[2]. Exploring the Cloud from Passive Measurements: the Amazon AWS CaseIgnacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio Munaf` o DET, Politecnico di Borislav S. Ĉorÿeviü, Slobodan P. Jovanoviü and Valentina V. Timþenko, Member, IEEE Torino, Italy – {lastname}
[3]. Microsoft and Amazon A comparison of approaches to cloud security Golnoosh Tajadod School of Information Technology Deakin University Melbourne, Australia
[4]. Cloud Computing in Amazon and Microsoft Azure platforms: performance and service comparison Ibrahim Ejdayid A.Mansour Dept. of Computing & Informatics Bournemouth University Bournemouth, UK
[5]. Cloud Computing Services and Applications B.Sai.Karthik*M. Nalini Sri ECM&K L University, India

Paper Type :: Research Paper
Title :: An Overview of Sign Language Detection Using Wearable System
Country :: India
Authors :: Mohammed Atib Shahezad || Diganta Panda || Disha Kokas || Dhiraj Titarmare || Roshan Sinhe || Prof. P. U. Tembhare
Page No. :: 47-52

This paper presents a survey of sign language detection using a wearable system by using various techniques. This technology is used for deaf and dumb as they face many difficulties in their day to day life to communicate with the world. As many people who are not deaf and dumb unable to understand the sign language. To make this possible these gloves are made so that a deaf and dumb people can communicate with normal people. The parameter used are flex sensors, Hand gloves, Bluetooth Module, Voice synthesizer, Capacitive charge sensor, Microcontroller, Gyros, Lillypad. This device can store many unique gestures and translate them into text or speech. Thus the device will be a low-cost device and can be benefitted to many peoples. A lot of research work is done to improve efficiency and accuracy.

[1]. Hanine Elhayek, Jessica Nacouzi, Abdallah Kaseem, Mustafa Hamad, Sami El-Murr "Sign To Letter Translator System Using Hand Glove", International IEEE @2014
[2]. Dheeraj gupta, pankhuri Singh, Khushbu Pandey, Jaya Solankhi "Design And Development Of A Low Cost Electronic Hand Glove For Deaf And Blind", IEEE@2015
[3]. Lih-jen Kau, Wan-Lin Su, Pei-ju yu, Sin-Jhan Wei "Real Time Portable Sign Translation System "
[4]. Celestine Preetham, Girish Ramakrishnan, Sujan Kumar, Anish Tamse,Dr. Nagendra Krishnapura, "Hand Talk Implimentation Of A Gesture Regognizing Glove",IEEE@2013
[5]. Kalpattu S. Abhishek, Lee chumn Fai Qubely, Derek Ho , "Glove Based Hand Gesture Recognition Sign Language Translator Using Capacitive Touch Sensor "IEEE@2016

Paper Type :: Research Paper
Title :: Drone an Unmanned Aerial Vehicle
Country :: India
Authors :: Prof. SuchetaRaut || Lina Bajirao || Prajakta Ninave || Shruti Fale
Page No. :: 53-57

This paper presents usage of Unmanned Aerial Vehicle (UAV) as a valuable source for research and education purposes that could solve many aspects of inspection, surveillance, mapping, 3D modelling and various other data acquisition applications. An educational and technology transfer workshop was organized by Abu Dhabi Systems and Information Centre (ADSIC) and trained by ESRI to educate United Arab Emirates University geography students on using new software's and technology such as ArcGIS Pro, ArcGIS Online, ArcGIS Earth, tools such as Collector, Survey 123 and capturing drone imageries. The paper reports a typical photogrammetric workflow, 3D results like surface or terrain models, vector information, textured 3D models for United Arab Emirates University buildings..............

Keyword: Unmanned Aerial Vehicle (UAV), ArcGIS Pro, ArcGIS Online, ArcGIS Earth, United Arab Emirates University, Photogrammetric workflow,

[1]. Bills, C., Yosinski, J. (2010). MAV stabilization using machine learning and onboard sensors.Technical Report CS6780, Cornell University.
[2]. Bills, C., Chen, J., Saxena, A. (2011). Autonomous MAV flight in indoor environments using single image perspective cues. In: IEEE Int. Conf. on Robotics and Automation.
[3]. Chen Xialing. Study on the organization innovation path of Entrepreneurial University [M]. Beijing: Beijing Institute of Technology press.2015:157

Paper Type :: Research Paper
Title :: Android application for Patient Diagnosis Report
Country :: India
Authors :: Sanket Gadewar || Yash Bhomle || Chaitanya Jibkate || Akash Raut
Page No. :: 58-60

The application developed an automated system that is used to handle patient information and its administration. Our idea is to eliminate the problem of inappropriate data keeping, inaccurate reports, time waste in storing, processing and retrieving information encountered by the traditional hospital system in order to improve the overall efficiency of the organization. The database record contains the patient personal information, department lies-in, treatment and lab results and the reports of updated treatment. Since the patient enters............

Keywords: Android Studio, Xampp Database,Monitoring.

[1]. .A. C. Isitman, B. Oguz, M. Bayrak and P. Yazgan, "Mobilized patient record management systems," 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012), Jeju, 2012, pp. 235-238.
[2]. S. Y. Fiawoo and R. A. Sowah, "Design and development of an Android application to process and display summarised corporate data," 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), Kumasi, 2012, pp. 86-91. doi: 10.1109/ICASTech.2012.6381072
[3]. S. Samaiya and M. Agarwal, "Real time database management system," 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 903-908. doi: 10.1109/ICISC.2018.8398931

Paper Type :: Research Paper
Title :: Application on Securing System Ports
Country :: India
Authors :: Ankita lohkare || Ruchika bangade || Vaishnavi rokde || Aditya khnate || Abhishek shukla
Page No. :: 61-62

Gathering, an attacker uses to create a profile of the target organization.Our application will determine what host are available on the network, the services that are enabled.Devices get hacked in the network, if they have open ports.Basically, majority of attacks performed on system is performed by scanning ports.So, It is good to make an application which will scan for ports and tell user that which port is open Network scanning refers to a set of procedures for identifying host, ports and services on a device in a network.



Paper Type :: Research Paper
Title :: Automatic Vehicle Accident Detection and Prevention System
Country :: India
Authors :: Prof. Lakshmikant M. Bopche || Sahil A. Tirpude || Nikhil S. Parekar || Omkar S. Thakre || Harshal R.Kumbhare
Page No. :: 63-66

Nowadays due to increase in traffic many people are died on the road due to the accidents. The main reason is "delay in rescue". This problem is very big in developing countries, so we designed this project for saving the human lives. The alert message is sent to the rescue team in a short time, which will help in saving the valuable lives. This design is system that sends the location of the site of incident, In the project GPS module is used to detect the exact current location of vehicle. At the time of accident accelerometer detects heavy shock and ARDUINO sends the location link of the vehicle to the relatives or friends, we can send the alert to multiple mobile numbers provided in program. Similarly the biggest cause.........

[1]. N.Watthanawisuth,T.LomasandA.Tuantranont, "Wireless Black Box Using MEMS Accelerometer & GPS Tracking for Accidental Monitoring of Vehicles", Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI 2012) Hong Kong and Shenzhen, China, 2-7 Jan 2012.
[2]. Saurabh c, V.R. kapur, Y.A.Suryawanshi, "ARM Hardware Platform for Vehicular Monitoring and tracking", International Conference on Communication Systems and Network Technologies 2013
[3]. "Automatic Vehicle Accident Detection and Messaging System Using GSM and GPS Modem" C.Prabha , R.Sunitha , R.Anitha, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering,ISSN ONLINE (2278-8875) PRINT (2320-3765)
[4]. GPS: Theory and Practice, B. Hofmann-Wellenhof et al., Springer Verlag, 1992, ISBN 3-211-82364-6