Kamble, Dhwaniket
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Attendance management system using face recognition Jadhav, Ashish; Kamble, Dhwaniket; Rathod, Santosh B.; Kumar, Sumita; Kadam, Pratima; Dalwai, Mohammad
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp673-679

Abstract

Traditional attendance systems consist of registers marked by teachers, leading to human error and a lot of maintenance. Time consumption is a key point in this system. We wanted to revolutionize the digital tools available in today's time i.e., facial recognition. This project has revolutionized to overcome the problems of the traditional system. Face recognition and marking the present is our project. A database of all students in the class is kept in single folder, and attendance is marked if each student's face matches with one of the stored faces. Otherwise, the face is ignored and not marked for attendance. In our project, face detection (machine learning) is used.
Enhancements in the world of digital forensics Vaddi, Krishna Sanjay; Kamble, Dhwaniket; Vaingankar, Raj; Khatri, Tushar; Bhalerao, Pranil
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v13.i1.pp680-686

Abstract

Currently, the rapid advancement of computer systems and mobile phones has resulted in their utilization in unlawful acts. Ensuring adequate and effective security measures poses a difficult task due to the intricate nature of these devices, thereby exacerbating the challenges associated with investigating crimes involving them. Digital forensics, which involves investigating cyber crimes, plays a crucial role in this realm. Extensive research has been conducted in this field to aid forensic investigations in addressing contemporary obstacles. This paper aims to explore the progress made in the applications of digital forensics and security, encompassing various aspects, and provide insights into the evolution of digital forensics over the past five years.
Collecting and analyzing network-based evidence K. Singh, Ashwini; Kamble, Dhwaniket; Bains, Abhishek; Tiwari, Naman; R. Deshmukh, Tejas; Pandey, Sanidhya; Kumar, Hemant; M. Bhalerao, Diksha
Computer Science and Information Technologies Vol 5, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i1.p1-6

Abstract

Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context.