To grow beyond leaps and bounds as a department of par excellence in the arena of Computer Science and Engineering education in developing human resources meeting global standards.
To train students with strong theoretical foundation and practical knowledge, to imbibe professional ethics and managerial skills with commitment to the society.
ABOUT THE DEPARTMENT
The Department of computer science Engineering was established in the year 2004. The Department is committed to continuously improve the quality of education by enhancing the knowledge of Students & Staff. With increasing demand for computer science & Technology in the development of software industries, the department has met the requirements with the latest computing machines and software.
- Department is well equipped with more than 500 computers with latest configuration and with all necessary software.
- The department has a student’s association, “C- Force” which conducts competitive technical events under the guidance/ vigilance of faculty.
- The department has library with good number of books and magazine to help the students to upgrade their knowledge in various areas of computer science and Engineering applications. The department has well qualified & experienced staff members.
- Through the interaction with industries latest developments and trends, the department has created right ambiance for learning with an exposure to live projects & in-plant training.
PROGRAMME EDUCATIONAL OUTCOMES:
- To develop an ability to identify and analyze the requirements of Computer Science and Engineering in design and providing novel engineering solutions.
- To develop abilities to work in team on multidisciplinary projects with effective communication skills, ethical qualities and leadership roles.
- To develop abilities for successful Computer Science Engineer and achieve higher career goals.
PROGRAMME SPECIFIC OUTCOMES:
- To develop ability to model real world problems using appropriate data structure and suitable algorithm in the area of Data Processing, System Engineering, Networking for varying complexity.
- To develop an ability to use modern computer languages, environments and platforms in creating innovative career.
- Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals and an engineering specialization to the solution of complex engineering problems.
- Problem analysis: Identify, formulate, review research literature and analyses complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences and engineering sciences.
- Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety and the cultural, societal and environmental considerations.
- Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data and synthesis of the information to provide valid conclusions.
- Modern tool usage: Create, select, and apply appropriate techniques, resources and modern engineering and IT tools including prediction and modeling to complex engineering achieves with an understanding of the limitations.
- The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
- Environment and sustainability: Understand the impact of the professional engineering solution’s in societal and environmental contexts and demonstrate the knowledge of and need for sustainable development.
- Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
- Individual and team work: Function effectively as an individual and as a member or leader in diverse teams and in multidisciplinary settings.
- Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations and give and receive clear instructions.
- Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
- Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
|Mrs. Poornima Raikar
Qualification : M. Tech
Designation : HOD and Assistant Professor
|Mr. Nandakishor Sirdeshpande
Qualification : M. Tech, (Ph. D)
Designation : Associate Professor
Designation: Assistant Professor.
|Mrs. Yasmeen Shaik
Designation : Assistant Professor.
|Ms. Farzana.N. Nadaf
Designation: Assistant Professor.
|Mrs. Jayashree Shedbalkar
Designation: Assistant Professor.
|Mr. Saleem Hebbal
Qualification: M. Tech
|Mr. T. R. Naveenkumar
Qualification: M. Tech
Designation: Assistant Professor.
|Mr. Ravindra Patil
Qualification: M. Tech
Designation: Assistant Professor.
|Mr. Vijet Swadi
Designation: Assistant Professor.
|Mr. Sandeep Telkar R
Designation: Assistant Professor.
|Mrs. Swathi A. Shastry
Designation: Assistant Professor.
|Mr. Shivachalesh Guddodagi
Designation: Assistant Professor.
|Ms. Shruti Deshpande
|Mr. Pranesh Kulkarni
|1.||Mr. Vadiraj Udupi||Foreman|
|2.||Mr. Jagadeesh Bendigerimath||Asst. Instructor|
|3.||Mr. Tanaji P. Magawadkar||Asst. Instructor|
|4.||Miss. Mahalaxmi U. Tatti||Asst. Instructor|
|5.||Mr. Jagadeesh Koliwad||Attender|
|6.||Mr. Namdev N. Pagoji||Attender|
|7.||Mr. Sahadev B.Madar||Peon|
|8.||Mr. Vinayak G. Kulkarni||Peon|
C – force was the name coined to the association of the Computer Science Department’s people. C- Force was formed on 22/04/2007 to provide a platform for students to express their various curricular & Co- curricular activities. It also encourages the students to participate in state/ National level Technical events. C-force has organized various events.
The Association activities for the year 2018 – 19
C – force conducted VD Idea Thon – 18 , 24 hours hackathon
The Association activities for the year 2017 – 18
C – force conducted Aarohana ‘ 17, a freshers party.
Crash Courses for Diploma, PU and BCA colleges
Computer Training Courses for Government Officers
The Association activities for the year 2016 – 17
C – force conducted Aarohana ‘ 16, a freshers party.
C -force organized Swachha Bharat Pakwada, a fifteen day campaign to keep surroundings clean. Read More..
C- force organized a talk by Shri. Prashant Sawkar. Read More..
C- force organized a Farewell for the MCA Student.
C- force organized Edusat Program. Read More…
The Association activities for the year 2015 – 16
C – force conducted Aarohana ‘ 15, a freshers party.
C – force conducted Vigama-16,a farewell party.
The Association activities for the year 2014 – 15
C – force conducted Aarohana ‘ 14, a freshers party on 27th August 2014.
C – force has organized HTML training session on 11/09/2014 and on 12/09/2014
C – force has organized an event called as night-out coding on 29th and 30th 2014.
C – force has organized Kick Off,a Football Match on Febraury 27th and 28th 2015.
C – force conducted Vigama-15,a farewell party on May 16th 2015.
The Association activities for the year 2013 – 14
The first activity conducted for this academic year was Aarohana’ 13, a freshers party. It was held on 16th August 2013. Dr. G. R. Udupi, Principal, KLS’s VDRIT, Haliyal, addressed the function as chief guest. Shri. Ravindra Moodithaya Associate Professor and Head of Computer Science & Engg. was the president of the function.
The department has organized Ghodke cup-14(an intra college cricket tournament) in the month of march 2014, Mechanical engineering Dept was the winners of the tournament and Electronics and communication Dept was runners-up
The department has participated actively in Aavishkaar-14 and has organized following events l) NFS 2 (gaming event) 2) Online Aptitude test.
Then, C- force organized Vidaya 14, a farewell party for final year students on 15th may2014. Dr V.V.Katti principal KLS VDRIT Haliyal addressed the function as chief guest, Prof. Anand Mishrikoti addressed the function as guest of honor. Shri. Abhay Inchal Assistant Professor and Head of Computer Science & Engineering presided as the president of the function.
The Association activities for the year 2012 – 13.
The first activity conducted for this academic year was Aarohana’ 12, a freshers party. It was held on 29th August 2012. Dr. G. R. Udupi, Principal, KLS’s VDRIT, Haliyal, addressed the function as chief guest. Mrs. Poornima Raikar, Assistant Professor, Computer Science & Engg. was the president of the function.
The Association activities for the year 2011 – 12 were as follows.
C – force conducted Aarohan ‘ 11, a freshers party on 19th August 2011. Dr. G. R. Udupi, Principal, KLS’s VDRIT, Haliyal, addressed the function as chief guest. Mr. A. V. Kolaki, HOD, Computer Science & Engg. was the president of the function.
C-force had organised Techno – force ‘ 11, a inter-departmental Technical Fest on 21st & 22nd Sept 2011. Dr. G. R. Udupi, Principal, KLS’s VDRIT, Haliyal, was the chief guest of the inauguration function while Mr. R. G. Hunshimath, Sub- divisional Engineer, BSNL Haliyal, was chief guest for valedictory function, and Mr. A. V. Kolaki, HOD, Computer Science & Engg., KLS’s VDRIT, Haliyal, was the president for both.
The Fest involved events like: Aptitude, Gaming, Quiz, Group Discussion, Blind Coding, Demonstration of Laws, Ice Breaker and One Minute Drawing.
About 500 participants competed in various events.
C – force organised Sports ‘ 12 on 6th and 7th March 2012.
The events conducted were: Carrom for Girls (Single & Doubles), Soccer for Boys.
Then, C- force organised Vigama ‘ 12, a farewell party for final year students on 16th may 2012. This function was addressed by Mr. Gandigwad, DGM, BSNL, Hubli, as a chief guest. This function was completed successfully.
List of projects being carried out
|Title||3D retrival using Query by Sketch|
|Guide||Prof. Poornima Raikar|
|Name of Student||Pooja B, Priya, Sangeeta, Roopa|
|Project Abstract||Content predicated image retrieval (CBIR) provides an efficacious way to probe the images from the databases. The feature extraction and homogeneous attribute measures are the two key parameters for retrieval performance. A homogeneous attribute measure plays a paramount role in image retrieval. The different distance metrics such as Euclidean, Manhattan, Correlation, city block and spearman distances to find the best kindred attribute measure for image retrieval. Utilizing pyramid structured wavele decomposition, energy levels are calculated. These energy levels are compared by calculating distance between query image and database images utilizing above mentioned seven different kindred attribute metrics.
In today’s world, technology is enhancing day by day, the most enhanced research area in digital image processing is image retrieval system .The techniques used for retrieving image on the basis sketches that can be describe the image. So the system is referred to as Sketch Based Image Retrieval System (SBIR). Here we made the comparison of efficiency of different methods like Manhattan, Euclidean, Correlation, Spearman and city block distances and we find which is the best method based on the efficiency
|Title||Efficient key Agreement for Large and Dynamic Multicast Groups|
|Guide||Prof. Ravindra Patil|
|Name of Student||Nikhita A P, Suraj S, Philomena F, Rashmi .K|
|Project Abstract||The Efficient key Agreement for Large and Dynamic Multicast Groups is used as the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc.
The main challenges for secure multicast are scalability, efficiency and authenticity. In this project, we propose a scalable, efficient, authenticated group key agreement scheme for large and dynamic multicast systems. The proposed key agreement scheme is identity-based which uses the bilinear map over the elliptic curves.
Compared with the existing system, the proposed system provides group member authenticity without imposing extra mechanism. Furthermore, we give a scalability solution based on the subgroups, which has advantages over the existing schemes. Security analysis shows that our scheme satisfies both forward secrecy and backward secrecy.
|Title||Criminal Face Identification System|
|Guide||Prof. Sandeep Telkar|
|Name of Student||Malvika N, Meghana G, Megha S D, Pooja P.Y|
|Project Abstract||Criminal record generally contains personal information about particular person along with photograph. To identify any criminal we need some identification regarding the person, which are given by eyewitnesses. In most cases the quality and resolution of the recorded image-segments is poor and hard to identify a face. To overcome this sort of problem we are developing a software. Identification can be done in many ways like fingerprint, eyes, DNA etc. One of the applications is Face identification. The face is our primary focus of attention in social intercourse playing a major role in conveying identity and emotion. Although the ability to infer intelligence or character from facial appearance is susceptible, the human ability to recognize faces is remarkable.
The operator first logs into the system by entering username and password. Then depending on the work allotted he has to select the screens from main menu screen. There are mainly three important function which he can do they are adding details, clipping image and finally construction of the face by using the eyewitness. The face that is finally formed is the one who has committed the crime.
|Title||Information Technology Service Management|
|Guide||Prof. Shruti Deshpande|
|Name of Student||Akshata N, Medha R, Ayusha U, Laxmi B|
|Project Abstract||The ITSM (Information Technology Service Management) uses Cloud Computing for solving the problems of client.This provide certain set of best practices.It provide guidance to organizations.It is helpful for all categories of companies.It is useful for keeping all track of problems.Depending upon the complaint type, unique id is generated.Later, it is possible to check solution and status online.|
|Title||Feed Back Management System Customized For KLS VDRIT Haliyal.|
|Name of Student||Anusha J H, Akshata R, Raksha Patil, Shilpa L|
|Project Abstract||This project aims to develop an automatic Feedback management system customized for Vishwanathrao Deshpande Rural Institute of Technology Haliyal. Annually feedback is collected five times from 1800 students studying in five different undergraduate courses, namely Computer Science Engineering, Mechanical Engineering, Electronics and communication Engineering, Electrical and Electronics Engineering, Civil Engineering, in order to improve the teaching and learning process. In the survey it was found that nearly 10,000 A4 sheet papers are used for this purpose annually and significant amount of man power is also used for diverse and cumbersome calculations. The process was very time consuming because calculations were made manually. Considering all these facts and as a part of “GO GREEN” initiative. An automated computerized feedback management system shall address and overcome all the above mentioned problems.|
|Title||Remote Access For Android Phone|
|Name of Student||Sushmita M, AishwaryaK, Shivaleela P, Afshan C|
|Project Abstract||This project is based on the Android in which we can upload, backup, and delete data such as contacts, logs, images and sms.
Database is a structured format. So if we store in the database, we can retrieve that particular information by giving a command directly. There is no process for installing database for mobile-phone applications. Whenever the database is needed, then only the database is created through coding. In this project there is a feasibility to change and delete the data which is not required.
Here we introduce an app which ensures the user can upload, backup, and delete data in case the user’s phone is lost or is in a remote location.
|Title||Library Management Using Cloud Computing|
|Name of Student||Shruti P, Ashwini A, Priynaka D, Sachinkumar|
|Project Abstract||“Cloud Computing” is a buzz word. It’s very common to hear the virtue and applications of cloud in almost every domain like business, industries, corporate sectors etc. Through cloud computing even a non expert user can access hardware and software promptly through internet. Many of the big companies like Amazon, Microsoft, IBM, etc have started to take the advantages on this emerging technology to get involved as a cloud service solution provider. Many Indian companies like TCS, WIPRO, Infosys etc are working in this field. Institute like IIT Delhi have developed its own cloud “Badal” to provide various kinds of services. Although the concept has transformed resources management, data storage and many services of corporate sector, but its application in the libraries and information centres is relatively new. Libraries and Information centres are also searching the possibilities to use it improving its services, managing its resources and to find new avenues for growth.|
|Title||Non Blind Digital Watermarking Scheme For Colour Images|
|Name of Student||Kartik Bhat, Sharatkumar H, Naqeeb Patel, Anand Patil|
|Project Abstract||Now days due to advancement of technology it is difficult to protect creative content and intellectual property. It is very easy to copy and modify digital media resulting in great loss in business. So the viable solution for this problem is digital watermarking. Digital watermarking is the technique to embed an image on another image, which may indicate ownership rights of an image or it may hide the info put on it. Digital watermarking technique is adopted to fuse two images to get a watermarked image. In this proposal two images are wavelet transformed then they are fused by using α-blending technique, where α is the non-zero value, at the end we got watermarked image. Some information, which is in the form of an image, was hidden in this watermarked image. Watermarked image can be decoded in the presence of α-value itself and the info present in that can be extracted. The word Non-Blind indicates we are using cover image for the watermark extraction purpose also.|
|Title||Routing Of Traffic Sensors In Intelligent Transportation System|
|Guide||Prof. Swati Shastry|
|Name of Student||Preetika S, Sushma R, Savita H, Priyanka K|
|Project Abstract||As country develops, the application of technology in each and every field increases to fulfill the demand of people. The application of technology in transportation system is called Intelligent Transportation System (ITS) which has more demand in today’s world for traffic management. Vehicular Ad hoc Network (VANET) is one of the technology used in Intelligent Transportation System. In Vehicular Ad hoc Network temporary network is formed within the vehicles or vehicle to traffic infrastructure which has sensors within it for communication. The temporary network establishes and ends after exchanging the required information.
Numerous technologies have been deployed to assist and manage transportation. But recent concerted efforts in academia and industry point to a paradigm shift in intelligent transportation systems. Vehicles will carry computing and communication platforms, and will have enhanced sensing capabilities. They will enable new versatile systems that enhance transportation safety and efficiency and will provide infotainment. In our project we are simulating the communication between vehicles to avoid accidents by identifying it’s distance between the vehicles, number of vehicle in the specified range.
|Title||Complexity Based Question Paper Generation System
|Guide||Prof. Damodar Hotkar|
|Name of Student||Sharan N, Girish C, Akash A, Ananth S|
|Project Abstract|| Examination process is an important activity for educational institutions to assess student performance. Thus the nature of the exam questions would determine the quality of the students produced by the institutions.
Preparing the exam questions is very challenging, tedious and time consuming for the instructors. This project provides the solution in the form of Complexity Based Automatic Question Paper Generator System (QB-QGS). This system includes several modules like user administration, subject selection, difficulty level specification, question entry, question management, paper generation, and paper management. The design process performs the scrutiny and composes the examination paper using an efficient algorithm with a high rate of success. With this algorithm, the user needs to specify the subject, the question type and the difficulty level. From the entered input, the examination paper will be generated automatically.
The editing of questions is performed using Word processor and the final paper may be stored as “.doc” files. The system shows characteristics like simple operation, a great interface, good usability, immense security, and high stability along with reliability.
|Title||Goal oriented requirement engineering to Mitigating Performance Degradation in Congested Sensor Networks|
|Name of Student||kalyankumar P, Sandeep J, Naveen R, Suresh C|
|Project Abstract||CAR and MCAR mainly released for Military Purposes to provide more importance to the high priority data by degrading the performance of low priority data. SENSOR network deployments may include hundreds or thousands of nodes. Since deploying such large-scale networks has a high cost, it is increasingly likely that sensors will be shared by multiple applications and gather various types of data: temperature, the presence of lethal chemical gases, audio and/or video feeds, etc.|
|Title||Student IA Analyser|
|Name of Student||Mayuri M, Shaheen, Shruti H, Soundarya N|
|Project Abstract||This project “Student IA Performance Analyser” is a php based project. The goal of this project is to create a system that will capture IA marks, calculate student Attendance, calculate final marks and send the notification from faculty to student and report. A faculty typically keeps records of marks of each internal exam so that it will be easy to manage with the help of the system. As manual work will be reduced. This project also includes the facility to store the internal exam marks as well as details of each and every faculty in the database of the system and whenever it is needed it can be retrieved.|
|Title||Forecasting the Milk Production Using Data Mining|
|Name of Student||Megha M R, Soumya S, Anita B, Vidyashree P|
|Project Abstract||Data mining is an interdisciplinary subfield of computer science. It is computational process of discovering patterns in large data set involving methods at intersection of artificial intelligence, machine learning, statistics and database systems. The overall goal of data mining process is to extract information from a data set and transform it into an understandable structure for future use. Aside from the raw analysis step, it involves database and data management aspects, data pre-processing, model and interface considerations, interestingness matrix, complexity considerations host-processing of discovered structures, visualizations and online updating. Data mining is the analysis step of “Knowledge Discovery in Databases” processes, or KDD.
The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown, interesting patterns such as group of data records, unusual records and dependencies.
Prediction has attracted considerable attention given the potential implications of successful forecasting in a business context. There are two major types of predictions: one can either try to predict some unavailable data values or pending trends, or predict a class label for some data. The latter is tied to classification. Once a classification model is built based on a training set, the class label of an object can be foreseen based on the attribute values of the object and the attribute values of the classes. Prediction is however more often referred to the forecast of missing numerical values, or increase/ decrease trends in time related data. The major idea is to use a large number of past values to consider probable future values.
The main aim of our project deals with forecasting the milk production using data mining techniques and related algorithms. Forecasting is done at Milk federation and predicting the future milk production of dairies under it based on present data collected and the past data already stored. Our project not only deals with forecasting but also deals with data collection through web portals and generating reports based on particular day, year, month, breed, annual report of particular dairy at federation level and particular member at dairy level and so on.
|Title||3D Shape Retrieval Query by Model|
|Guide||Prof. Poornima Raikar|
|Name of Student||Farhat A, Namrata N, Shweta, Shifa|
|Project Abstract||Content-based image retrieval (CBIR), is the application of computer vision to the image retrieval problem, that is, the problem of searching for digital images in large databases.”Content-based” means that the search will analyze the actual contents of the image. The term ‘content’ in this context might refer any information that can be derived form the image itself|
|Title||Mining single Dimensional Boolean Association rules from Transactional databases|
|Guide||Prof. Saleem Hebbal|
|Name of Student||Soumya G, Surabhi B|
|Project Abstract||The system contains two modules:
Initially a transaction database is considered.The Database is scanned for count of each candidate. Candidate support count is compared with minimum support count in order to generate L1.Candidate set C2 is generated from L1.Again database is scanned for count of each candidate and compared candidate support count with minimum support count and this procedure is repeated until NULL candidate set is obtained.
Then association rules are generated considering the minimum confidence threshold and minimum support.
The generated rules are represented in user interface by plotting the graph.The facility of selecting minimum confidence threshold and minimum support is provided for the user.
Project Sponsored by KSCST:
Title:GSM Based wireless Distributed Energy Building System
Guide:Prof. Poornima Raikar
Name of student: Vaibhav Padaki,Nikhil S Virupakshi
Title: Crop Development and Protection using E-Agriculture
Guide: Prof.Ravindra Patil
Name of the Student: Anup G Govekar,Santosh Acharya,Shruthi SK,Govind Gowda
Title: Analyzing Power Consumption in Desktop Computer Systems to Design Optimized Power Consumption Techniques
Guide:Prof. Damodar Hotkar
Name of the student: Ashwini Chikmath,Arun Kumar,Soumya R,Shwetha Joshi.
Title: Voice based email for blinds
Guide: Prof. Farajana Nadaf
Name of Student: Yajwin Telsang
4th Semester Time Table Click Here
6th Semester Time Table Click Here
6th Parallel Time Table Click Here
8th Semester Time Table Click Here
List of seminars being carried out by faculty.
|Staff Name||Prof. Poornimar Raikar|
|Abstract||Bloom’s taxonomy has been used for years to promote higher level learning in the academic learning environment. Bloom’s taxonomy is a set of three hierarchical models used to classify educational learning objectives into levels of complexity and specificity. The three lists cover the learning objectives in cognitive, affective and sensory domains. The cognitive domain list has been the primary focus of most traditional education and is frequently used to structure curriculum learning objectives, assessments and activities. This presentation will present practical application of Bloom’s Taxonomy, using specific examples of a subject. The application will allow students to move from basic memorization of introductory accounting concepts to using their critical thinking skills to evaluate and synthesize accounting concepts. Students will realize the learning objectives of the course as they progress through the levels of learning|
|Title||Remote monitoring of maize crop through mutlispectral imagery|
|Staff Name||Prof. Saleem Hebbal|
|Abstract||This work is aimed at monitoring a Maize crop remotely. The study area has been identified by using appropriate latitudes and longitudes using Earth Explorer site for this work. Three sets of data (7 Dec 2013, 8 Jan 2014, 9 Feb 2014) have been acquired from Landsat 8 OLI/TIRS satellite periodically by providing appropriate path and row in order to assess the growing stages of crop. The acquired images are in the form of a set of bands. Appropriate bands are combined to form a multispectral RGB image. This Image is processed in the MATLAB(2011a) Tool. A spectral line graph is plotted by using reflectance data of the specified area of crop. We find that there is high reflectance in green bands during growing stage and this value gets decreased during the near harvesting stage. Also NDVI value has been calculated at each stage. The status of the maize crop has been concluded by experimental analysis at Lab and by using NDVI values and it is found healthy|
|Staff Name||Prof. Yasmeen Shaikh|
|Abstract||In recent years recommendation systems have changed the way of communication between both websites and users. Recommendation system sorts through massive amounts of data to identify interest of users and makes the information search easier. For that purpose many methods have been used. Collaborative Filtering (CF) is a method of making automatic predictions about the interests of customers by collecting information from number of other customers, for that purpose many collaborative base algorithms are used. CHARM algorithm is one of the frequent patterns finding algorithm which is capable to handle huge dataset, unlike all previous association mining algorithms which do not support huge dataset. This presentation covers different techniques which are used in recommendation system and also proposes a new system for efficient web page recommendation based on hybrid collaborative filtering i.e. using collaborative filtering technique and CHARM algorithm which are coupled with the pattern discovery algorithms such as clustering and association rule mining.|
|Staff Name||Prof. Farajana Nadaf|
|Abstract||Numpy is the core library for scientific computing in Python. It provides a high-performance multidimensional array object, and tools for working with these arrays.
Arrays:A numpy array is a grid of values, all of the same type, and is indexed by a tuple of nonnegative integers. The number of dimensions is the rank of the array; the shape of an array is a tuple of integers giving the size of the array along each dimension
|Title||A study of Fuzzy based Stable Routing Algorithm for MANET|
|Staff Name||Prof. Jayashree S|
|Abstract||A mobile ad hoc network (MANET) is a group of autonomous mobile nodes that wirelessly communicate with each other to form a wireless dynamic topology network. It works without requiring any centralized pre-existing administration units (infrastructure less network). There are many studies that focus on improving source-destination route stability and lifetime by modifying the existing MANET routing protocols. In this paper, a fuzzy-based approach is proposed to enhance the ad hoc on-demand distance vector (AODV) reactive routing protocol’s performance by selecting the most trusted nodes to construct the route between the source and destination nodes. In this scheme, the nodes’ parameters, such as residual energy, node mobility, and number of hop counts, are fed through a fuzzy inference system to compute the value of the node trust level, which can be used as a metric to construct an optimal path from source to destination. The results of the simulation show that the proposed approach performs better than the traditional AODV routing protocol and minimum battery cost routing protocol in terms of average control overhead, packet delivery ratio, network throughput, and average end-to-end delay.|
|Title||Mitigating performance degradation in congested sensors networks|
|Staff Name||Prof. T. R. Naveenkumar|
|Abstract||Data’s generated in Wireless Sensor Networks may not all alike, some Data’s are more important than other Data’s and they may have Different Delivery Requirements. If Congestion occurs in the Wireless Network. Some or More Important data’s may be dropped. But in our Project we handle this problem by addressing Differentiated Delivery Requirements. We propose a class of algorithms that enforce differentiated routing based on the congested areas of a network and data priority.The basic protocol, called Congestion-Aware Routing (CAR), discovers the congested zone of the network that exists between high-priority data sources and the data sink and, using simple forwarding rules, dedicates this portion of the network to forwarding primarily high-priority traffic. Since CAR requires some overhead for establishing the high-priority routing zone, it is unsuitable for highly mobile data sources. To accommodate these, we define MAC-Enhanced CAR (MCAR), which includes MAC-layer enhancements and a protocol for forming high-priority paths on the fly for each burst of data. MCAR effectively handles the mobility of high-priority data sources, at the expense of degrading the performance of low-priority traffic.|
|Staff Name||Prof. Abhay Inchal|
|Title||Educational data mining to analyse the student performance|
|Staff Name||Prof. Sulochana|
|Abstract||The main objective of higher education institutions is to provide quality education to its students. One way to achieve highest level of quality in higher education system is by discovering knowledge for prediction regarding enrolment of students in a particular course, alienation of traditional classroom teaching model, detection of unfair means used in online examination, detection of abnormal values in the result sheets of the students, prediction about students’ performance and so on. The knowledge is hidden among the educational data set and it is extractable through data mining techniques. Present paper is designed to justify the capabilities of data mining techniques in context of higher education by offering a data mining model for higher education system in the university. In this research, the classification task is used to evaluate student’s performance and as there are many approaches that are used for data classification, the decision tree method is used here. By this task we extract knowledge that describes students’ performance in end semester examination. It helps earlier in identifying the dropouts and students who need special attention and allow the teacher to provide appropriate advising/counseling.|
|Title||Data mining and its application|
|Staff Name||Prof. Vijet Swadi|
|Abstract||Data Mining is an emerging field in computer science. It is a part of knowledge discovery process. It deals with extracting the useful patterns from huge amount of data. Data is generated in day to day transaction carried out in shops, offices and various organizations. Data mining uses various tools like classification, association analysis, cluster analysis etc. Every tool has its own algorithm. This algorithm can be implemented in programming languages like C, C++, and Java etc. Data mining can be implemented in fields like science , medicine, agriculture. It is inter disciplinary tool.|
|Title||A Technical Presentation on “Deepweb”|
|Staff Name||Prof. Damodar Hotkar|
|Abstract||The term “Deepweb” is used to denote a class of content on the Internet which, for different technical reasons, is not indexed by search engines. Among the different strategies in place to bypass search engine crawlers, the most efficient for malicious actors are so-called “darknets.” Darknets refer to a class of networks that aim to guarantee anonymous and untraceable access to Web content and anonymity for a site.Deepweb has often been uniquely associated with The Onion Router (TOR). This technical presentation explores the ToR network that guarantees anonymous and untraceable access the most renowned darknets|
|Title||Misbehaviour Detection and trust providance in delay tolrent networks|
|Staff Name||Prof. Shruti Deshpande|
|Abstract||Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerent networks, so designing a misbehavior detection scheme in DTNs is very difficult. The probabilistic misbehavior detection scheme that is iTrust, for secure routing in DTN. The basic idea of iTrust is introducing a Trusted Authority (TA) to judge the node’s behavior based on the collected routing evidences. ITrust model as the Inspection Game and using the game theory of analysis the TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, this allows a dynamic detection probability by correlating detection probability with a node’s reputation for efficient trust establishment with user. The extensive analysis and simulation results show that the proposed scheme is efficient for establishing trust with user.|
|Title||Study of cooling of electronics equipment using heat sinks|
|Staff Name||Prof. Swathi Shastry|
|Abstract||Natural convection heat transfer can be enhanced by using heat sink. Experiments were carried out to investigate the heat transfer in vertical heat sinks in natural convection with considering geometrical similarity approach with constant S/H ratio of fins and even a correlation is obtained between Nusselt number and Rayliegh number. Using this correlation, size of heat sink can be obtained for variuos heat loads by interpolation|
|Title||Plant disease Identification using SVM|
|Staff Name||Prof. Pranseh Kulkarni|
|Abstract||A new method of recognizing diseases in plants based on computer image processing and Support Vector Machine (SVM) is studied to improve recognition accuracy and efficiency. At first, vector median filter was applied to remove noise of the acquired color images of diseased leaf. Then a method of statistic pattern recognition and mathematics morphology was introduced to segment images of diseased leaf. At last texture, shape and color features of color image of disease spot on leaf were extracted, and classification method of SVM for recognition of disease was used. Experimental results indicate that the classification performance by SVM is better than that of neural networks. Recognition correct rate of plants disease based on SVM of shape and texture feature is better than that of only using the shape feature. Plant disease is recognized more correct and faster based on color feature|
|Title||Dynamic resource allocation in cloud computing|
|Staff Name||Prof. Shivchalesh Guddodagi|
|Abstract||Cloud computing permits business clients to scale up and down their asset utilization in view of necessities. By means of virtualization it is possible to scale up the requirement of the business customer. To fulfill the customer’s requirement load balancing in cloud computing is very essential. From the cloud service provider’s point of view, green computing is much important to save energy to save overall cost. Keeping all these in mind, in this paper, we proposed a load balanced energy efficiency framework to provide benefits to both the service provider as well as the cloud clients. We have presented the idea of sleep and wake up scheme based on the cloud server’s state. Based on the server overall load, a dynamic state level is presented. The cloud states we have categorized as cool, warm and hot state. The dynamic load balancing in energy efficient cloud computing results in benefit with great extends. We have partitions the overall cloud into collection of clusters. Each partition consists of several servers to provide specific kind of services. Partitioning the cloud into several clusters helps for resource management. Experimental results shows that the overall performance of the cloud increases to a great extends and satisfies the cloud customers as well as the service providers.|