LED display generator project

Multimedia, Networking, Web Application
Name LED display generator project Technology DotNET,MS SQL Category Web Application Description The project consists of a software based LED display system made from C# control that displays texts as well as symbols i the same way as if it was to be displayed in a real LED matrix screen. The system can be used to provide a demo to clients before making a real LED panel according to client needs. The system allows various changes and desired modifications such as speed, pixel length, text and color combinations and provides real time view of it using image processing functions. The project features are as follows: User may set the text to display. Next user is allowed to select the text moving directions. After that the user may also select the…
Read More

Media player Project

Multimedia, Web Application
Name Media player Project Technology DotNET,MS SQL Category Web Application Description The music player allows a user to play various media file formats. It can be used to play audio as well as video files. The music player is a software project supporting all known media files and has the ability to play them with ease. The project features are as follows: User may attach Folder to Play add various media files within it. User may see track lists and play desired ones accordingly. Supports various music formats including .mp3, WMA, WAV etc. Interactive GUI Consists of Pause/Play/Stop Features Consists of a Volume controller The system also consists of a sound Equalizer It Displays the media playing time with Track Bar so that user may drag the media play as…
Read More

Video Surveillance Project

Image Processing, Multimedia, Parallel And Distributed System
Name Video Surveillance Project Technology DotNET,MS SQL Category Web Application Description This is an innovative approach to video surveillance software project. We normally find video camera’s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the…
Read More

Look Based Media Player

Image Processing, Multimedia, Parallel And Distributed System
Name Look Based Media Player Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description Usually when you are watching a video and someone calls you, you have to look somewhere else or go away from pc for some time so you miss some part of the video. Later you need to drag back the video from where you saw it. Well here is a solution to this problem. A look based media player that pauses itself when user is not looking at it. The player starts running again as soon as the user looks at it again. This is done using the camera or webcam on top of the computer. As long as the camera detects the users face looking at…
Read More

Cursor Movement By Hand Gesture Project

Image Processing, Multimedia, Web Application
Name Cursor Movement By Hand Gesture Project Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description We all wonder it would have been so comfortable if we could control cursor through the use of hand gestures. Well our proposed project puts forward a hand gesture based system that allows user to control the pc mouse movements through the use of hand movements. Our system uses pc webcam in order to detect hand gesture movements. The system continuously scans the camera input for five finger hand like patterns. Once a hand is detected, the system then locks it as an objects. A flag is set on the object in order to mark it as an object. After the object has been flagged…
Read More

Camera Motion Sensing Project

Image Processing, Multimedia, Parallel And Distributed System
Name Camera Motion Sensing Project Technology DotNET,MS SQL Category Web Application Description A motion sensor project that detects motion and sounds an alarm accordingly. This software system is designed in C# that constantly monitors an environment using a camera and sounds an alarm and even records images of the motion taking place as soon as it takes place IEEE Paper Yes IEEE Paper Year 2015
Read More

Web Server to Client communication for web usage data analysis

Multimedia, Networking, Parallel And Distributed System, Web Application
Name Web Server to Client communication for web usage data analysis Technology DotNET,MS SQL Category Web Application Description We usually come across fields where web data proves very important for business as well as security analysis. Ecommerce as well as website usage data is of prime importance these days. Our proposed project puts for ward a system that allows a web server to record web data analytics of web usage patterns of various web links. The system is configured to record web page clicks, seo score computed as per a search engine ranking algorithm as well as other parameters associated with the each web page. The server has an inbuilt configuration logic required to scan live web pages similar to crawlers and then record/store that data for later processing. Since…
Read More

Automated College Timetable Generator

Multimedia, Web Application
Name Automated College Timetable Generator Technology DotNET,MS SQL Category Web Application Description Most colleges have a number of different courses and each course has a number of subjects. Now there are limited faculties, each faculty teaching more than one subjects. So now the time table needed to schedule the faculty at provided time slots in such a way that their timings do not overlap and the time table schedule makes best use of all faculty subject demands. We use a genetic algorithm for this purpose. In our Timetable Generation algorithm we propose to utilize a timetable object. This object comprises of Classroom objects and the timetable for every them likewise a fitness score for the timetable. Fitness score relates to the quantity of crashes the timetable has regarding alternate calendars…
Read More

Criminal Investigation Tracker with Suspect Prediction

Data mining, Multimedia, Networking, Web Application
Name Criminal Investigation Tracker with Suspect Prediction Technology DotNET,MS SQL Category Web Application Description We here propose a criminal investigation tracker system that tracks the investigation status of criminal cases with logs and also predicts primary suspects. The system is proposed to help agencies like CBI, CID and other such bureau’s to sped up investigation process and track status of multiple cases at a time. The system keeps logs of a case which includes case summary, people involved, disputes, past criminal history of those involved, Items recovered on scene and other details. The system realizes the type of case, allows admin to update the status of investigation, upload more images of crime, items found on scene etc. This allows authorized officers to check case status and look into its status…
Read More

Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining

Data mining, Multimedia, Networking, Security & Encryption, Web Application
Name Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining Technology DotNET,MS SQL Category Web Application Description As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company people itself in order to make in order to produce false positive product reviews. They give good reviews for many different products manufactured by their own firm. User will not be able to find out whether the review is genuine or fake. To find out fake review in the website this “Fake Product Review Monitoring and…
Read More

Movie Success Prediction Using Data Mining

Data mining, Multimedia, Networking, Web Application
Name Movie Success Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description In this system we have developed a mathematical model for predicting the success class such as flop, hit, super hit of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, super hit label. Admin will add the film crew data. Admin will add movies data of a particular film crew. Admin will add new movie data along with film crew…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security & Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Weather Forecasting Using Data Mining

Cloud Computing, Data mining, Multimedia, Networking, Web Application
Name Weather Forecasting Using Data Mining Technology DotNET,MS SQL Category Web Application Description Weather forecasting is the application of science and technology to predict the state of the atmosphere for a given location. Ancient weather forecasting methods usually relied on observed patterns of events, also termed pattern recognition. For example, it might be observed that if the sunset was particularly red, the following day often brought fair weather. However, not all of these predictions prove reliable. Here this system will predict weather based on parameters such as temperature, humidity and wind. This system is a web application with effective graphical user interface. User will login to the system using his user ID and password. User will enter current temperature; humidity and wind, System will take this parameter and will predict…
Read More

Fingerprint Based ATM System

Multimedia, Web Application
Name Fingerprint Based ATM System Technology DotNET,MS SQL Category Web Application Description Fingerprint Based ATM is a desktop application where fingerprint of the user is used as a authentication. The finger print minutiae features are different for each human being so the user can be identified uniquely. Instead of using ATM card Fingerprint based ATM is safer and secure. There is no worry of losing ATM card and no need to carry ATM card in your wallet. You just have to use your fingerprint in order to do any banking transaction. The user has to login using his fingerprint and he has to enter the pin code in order to do further transaction. The user can withdraw money from his account. User can transfer money to various accounts by mentioning…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Multimedia, Networking, Security & Encryption, Web Application
Name Detecting E Banking Phishing Websites Using Associative Classification Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption…
Read More

Fingerprint Voting System Project

Multimedia, Parallel And Distributed System, Web Application
Name Fingerprint Voting System Project Technology DotNET,MS SQL Category Web Application Description Fingerprint Based Voting Project is a application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. Voter can vote the candidate only once, the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate name and candidate photo who are nominated for the election. Admin only has the right to add…
Read More

Smart Health Prediction Using Data Mining

Data mining, Multimedia, Networking, Parallel And Distributed System, Web Application
Name Smart Health Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Health Prediction system is an end user support and online consultation project. Here we propose a system that allows users to get instant guidance on their health issues through an intelligent health care system online. The system is fed with various symptoms and the disease/illness associated with those systems. The system allows user to share their symptoms and issues. It then processes users symptoms to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that…
Read More

Graphical Password To Avoid Shoulder Surfing

Multimedia, Security & Encryption, Web Application
Name Graphical Password To Avoid Shoulder Surfing Technology DotNET,MS SQL Category Web Application Description Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in…
Read More

Student Grade Prediction Using C4.5 Decision Tree

Data mining, Multimedia, Networking, Web Application
Name Student Grade Prediction Using C4.5 Decision Tree Technology DotNET,MS SQL Category Web Application Description We here come up with a system where student final grade is predicted based on the marks he had scored during his previous course and years. In order to predict the grade of the student we need some data to analyze and to predict the grade. So we will input student basic information and their previous academic information into the system which will be used to predict the grade of the student. We here used an effective data mining algorithm to predict the result. We used C4.5 decision tree algorithm to predict the grade of the student.C4.5 is a program for inducing classification rules in the form of decision trees from a set of given…
Read More

Image Character Recognition Using Signal & Pattern Analysis

Multimedia, Parallel And Distributed System, Web Application
Name Image Character Recognition Using Signal & Pattern Analysis Technology DotNET,MS SQL Category Web Application Description Optical character recognition is conversion of images of typed, handwritten or printed text into machine-encoded text from image. Here we come up with system where pattern of the image is extracted and image text is recognized using Optical character recognition in matlab. System will recognize the pattern and will detect the characters in image. And will display those characters as output. Since image can be scanned photos or other images. We applied image preprocessing steps in order to extract only text from image. Image patterns will be stored in another directory. The query image is compared with image patterns stored in database. If image matches with the pattern stored in directory, system will apply…
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Cloud Computing, Multimedia, Parallel And Distributed System, Security & Encryption, Web Application
Name Preventing Phishing Attack On Voting System Using Visual Cryptography Technology DotNET,MS SQL Category Web Application Description Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his…
Read More

Traffic Signal: Management & Control System

Multimedia, Parallel And Distributed System, Web Application
Name Traffic Signal: Management & Control System Technology MsSql, Dot NET Category Web Application Description This innovative software projects is an effective traffic signal management project that allows for managing 4 way traffic signal management system. The system consists of 4 signals corresponding to each road. We here propose a density based traffic signal scheduling algorithm. The system is designed to manage traffic signal timings based on the density of traffic on its corresponding road. The system represents the traffic strength of a road graphically using traffic judgments. By measuring the traffic lined up on a particular road the signal timings are adjusted to let that particular way clear out and then the next populated one. The entire system works according to an algorithm that allows for smooth and efficient…
Read More

College Enquiry Chat Bot

Data mining, Multimedia, Parallel And Distributed System, Web Application
Name College Enquiry Chat Bot Technology MsSql, Dot NET Category Web Application Description The College bot project is built using artificial algorithms that analyses user’s queries and understand user’s message. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chating. Students can chat using any format there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate what the user queries. The User can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The System analyses the question and than answers to the user. The system…
Read More

Unique User Identification Across Multiple Social Networks

Multimedia, Security & Encryption, Web Application
Name Unique User Identification Across Multiple Social Networks Technology MsSql, Dot NET Category Web Application Description There are number of social network sites that connect a large amount of people around the world. All social networking sites differ from each other based on various components such as Graphical User Interface, functionality, features etc. Many users have virtual identities on various social network sites. It is common that people are users of more than one social network and also their friends may be registered on multiple social network sites. User may login to different social networking sites at different timing, so user may not find his friends online when he logins to the particular social networking website. To overcome this issue our proposed system will bring together our online friends on…
Read More

Heart Disease Prediction Project

Data mining, Multimedia, Web Application
Name Heart Disease Prediction Project Technology MsSql, Dot NET Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Heart Disease Prediction application is an end user support and online consultation project. Here, we propose a web application that allows users to get instant guidance on their heart disease through an intelligent system online. The application is fed with various details and the heart disease associated with those details. The application allows user to share their heart related issues. It then processes user specific details to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security & Encryption, Web Application
Name High Security Encryption Using AES & Visual Cryptography Technology MsSql, Dot NET Category Web Application Description A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security & Encryption, Web Application
Name Data Duplication Removal Using File Checksum Technology MsSql, Dot NET Category Web Application Description Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security & Encryption, Web Application
Name Encryption & Decryption Using Deffie Hellman Algorithm Technology MsSql, Dot NET Category Web Application Description The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio…
Read More

Learn to Personalized Image Search from the Photo Sharing Websites

Multimedia
Name Learn to Personalized Image Search from the Photo Sharing Websites Technology Dot Net Category Multimedia Description Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since…
Read More

Trust modeling in social tagging of multimedia content.

Multimedia
Name Trust modeling in social tagging of multimedia content. Technology Multimedia Category Place Category Here Description Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content. However, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in tagging and irrelevant tags and content may be maliciously added for advertisement or self-promotion. This article surveys recent advances in techniques for combatting such noise and spam in social tagging. We classify the state-of-the-art approaches into a few categories and study representative examples in each. We also qualitatively compare and contrast them and outline open issues for future research. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica

Multimedia
Name Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica Technology Dot Net Category Multimedia Description This project presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication systems is to support users in selecting passwords of higher security, in the sense of being from an expanded effective security space. We use persuasion to influence user choice in click-based graphical passwords, encouraging users to select more random, and hence more difficult to guess, click-points. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More