LED display generator project

Multimedia, Networking, Web Application
Name LED display generator project Technology DotNET,MS SQL Category Web Application Description The project consists of a software based LED display system made from C# control that displays texts as well as symbols i the same way as if it was to be displayed in a real LED matrix screen. The system can be used to provide a demo to clients before making a real LED panel according to client needs. The system allows various changes and desired modifications such as speed, pixel length, text and color combinations and provides real time view of it using image processing functions. The project features are as follows: User may set the text to display. Next user is allowed to select the text moving directions. After that the user may also select the…
Read More

Farming Assistance Web Service

Data mining, Networking, Parallel And Distributed System, Web Application
Name Farming Assistance Web Service Technology DotNET,MS SQL Category Web Application Description A Web project to help farmers ensure greater profitability through direct farmer to supplier and farmer to farmer communication. This service boosts business communication and brings transparency in the system. This innovative site allows for good farmer, retailer and supplier communication. It allows farmers to login and communicate to respective dealers. When dealers publish an advertisement or offer, the respective farmers get notified via Sms message. The farmers may also submit their greviences and complaints to respective dealers or authorities using their farmer login on a separate complaints page and authorities will get acess to that page regularly using their login id and passwords. IEEE Paper Yes IEEE Paper Year 2015
Read More

Smart Health Consulting Project

Data mining, Networking, Web Application
Name Smart Health Consulting Project Technology DotNET,MS SQL Category Web Application Description This system aims at maintaining patient health records and even getting appointments from various doctors for related treatments. The system user must register as a member of this system and keep updating his medical history. Patients can then select from a list of specialized doctors for respective treatments such as (skin specialist, ENT specialist cardiologist etc) at particular locations. Patients may also select suitable appointment timings for their meeting. This Project contains 7 useful areas: i. General User area ii. Doctor’s area iii. Patient’s area iv. Transaction/Blling area v. Administrator area vi. Pharmacy area vii. Insurance area IEEE Paper Yes IEEE Paper Year 2015
Read More

Student Attendance System By Qr Scan

Mobile Computing, Networking, Web Application
Name Student Attendance System By Qr Scan Technology DotNET,MS SQL Category Web Application Description A system that takes down students attendance using Qr code. Every student is provided with a card containing a unique Qr code. Students just have to scan their cards in front of webcam and the system notes down their attendance as per dates. Each Qr code contains a unique id for students. System then stores all the students’ attendance records and generates defaulter list. It also generates an overall report in excel sheet for admin. Such type of application is very useful in school as well as in college for daily attendance. IEEE Paper Yes IEEE Paper Year 2015
Read More

Web Server to Client communication for web usage data analysis

Multimedia, Networking, Parallel And Distributed System, Web Application
Name Web Server to Client communication for web usage data analysis Technology DotNET,MS SQL Category Web Application Description We usually come across fields where web data proves very important for business as well as security analysis. Ecommerce as well as website usage data is of prime importance these days. Our proposed project puts for ward a system that allows a web server to record web data analytics of web usage patterns of various web links. The system is configured to record web page clicks, seo score computed as per a search engine ranking algorithm as well as other parameters associated with the each web page. The server has an inbuilt configuration logic required to scan live web pages similar to crawlers and then record/store that data for later processing. Since…
Read More

Customer Behaviour Prediction Using Web Usage Mining

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Customer Behaviour Prediction Using Web Usage Mining Technology DotNET,MS SQL Category Web Application Description Web usage mining involves first recording behavior and flow of customers on a website and then mining through this data for behavioural patterns. It is an important part of ecommerce world that allows websites to go through previously recorded web traffic data. Ecommerce sites analyse this data in order to provide better performance and also suggest better products and services to customers by identifying them next time. The system is tuned to record web shopping/buying patterns and track various analytics data that tend to provide future prediction statistics. The system scans for user budget tracking, tallying to previous years, user bounce rates- number of users returning from payment page and other site usage factors. Factors…
Read More

Internet Based Live Courier Tracking And Delivery System

Networking, Web Application
Name Internet Based Live Courier Tracking And Delivery System Technology DotNET,MS SQL Category Web Application Description Courier service providers usually have a very large network across countries. A courier goes through several places including distribution center, aeroplane, ship, road transport etc. At this time even customer is conscious about where has his package reached. The customer can track his courier through a login where he may enter this courier number and track the location status of his package. Here we propose a dedicated courier tracking system where customer may check the status and location of his courier. Here every distribution channel including centre, airport terminal, rail, road terminal has a system operated by authorized people of that particular point of distribution. Each point of distribution has its login access. On…
Read More

Remote Java 2 Dotnet Communication Application

Networking, Web Application
Name Remote Java 2 Dotnet Communication Application Technology DotNET,MS SQL Category Web Application Description Java and dot net are two different but very useful technology when it comes to information technology. Both of them have different development platforms. Well for a study and integration of two major technologies together we propose a client server based communication application made by integrating JAVA with dotnet technology. Here we propose a dedicated client server based architecture that allows for chat as well as authoritative commands by the server over client application. We integrate the two technology and have a working communication between these two technologies. We here propose to build the server application using JAVA and the client side application using Dotnet(C#) technology. Our system consists of the server as an authorities admin…
Read More

Secure Remote Communication Using DES Algorithm

Networking, Security and Encryption, Web Application
Name Secure Remote Communication Using DES Algorithm Technology DotNET,MS SQL Category Web Application Description The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here…
Read More

Criminal Investigation Tracker with Suspect Prediction

Data mining, Multimedia, Networking, Web Application
Name Criminal Investigation Tracker with Suspect Prediction Technology DotNET,MS SQL Category Web Application Description We here propose a criminal investigation tracker system that tracks the investigation status of criminal cases with logs and also predicts primary suspects. The system is proposed to help agencies like CBI, CID and other such bureau’s to sped up investigation process and track status of multiple cases at a time. The system keeps logs of a case which includes case summary, people involved, disputes, past criminal history of those involved, Items recovered on scene and other details. The system realizes the type of case, allows admin to update the status of investigation, upload more images of crime, items found on scene etc. This allows authorized officers to check case status and look into its status…
Read More

Automated Payroll With GPS Tracking And Image Capture

Mobile Computing, Networking, Web Application
Name Automated Payroll With GPS Tracking And Image Capture Technology DotNET,MS SQL Category Web Application Description This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again the…
Read More

Web Data Mining To Detect Online Spread Of Terrorism

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Web Data Mining To Detect Online Spread Of Terrorism Technology DotNET,MS SQL Category Web Application Description Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make…
Read More

Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining Technology DotNET,MS SQL Category Web Application Description As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company people itself in order to make in order to produce false positive product reviews. They give good reviews for many different products manufactured by their own firm. User will not be able to find out whether the review is genuine or fake. To find out fake review in the website this “Fake Product Review Monitoring and…
Read More

Monitoring Suspicious Discussions On Online Forums Using Data Mining

Data mining, Networking, Security and Encryption, Web Application
Name Monitoring Suspicious Discussions On Online Forums Using Data Mining Technology DotNET,MS SQL Category Web Application Description People now-a-days are very fond of using internet as a discussion medium. As internet technology had been increasing more and more, this technology led to many legal and illegal activities. It is found that much first-hand news has been discussed in Internet forums well before they are reported in traditional mass media. This communication channel provides an effective channel for illegal activities such as dissemination of copyrighted movies, threatening messages and online gambling etc. The law enforcement agencies are looking for solutions to monitor these discussion forums for possible criminal activities and download suspected postings as evidence for investigation. We propose a system which will tackle this problem effectively. In this project we…
Read More

Movie Success Prediction Using Data Mining

Data mining, Multimedia, Networking, Web Application
Name Movie Success Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description In this system we have developed a mathematical model for predicting the success class such as flop, hit, super hit of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, super hit label. Admin will add the film crew data. Admin will add movies data of a particular film crew. Admin will add new movie data along with film crew…
Read More

Opinion Mining For Comment Sentiment Analysis

Cloud Computing, Data mining, Networking, Web Application
Name Opinion Mining For Comment Sentiment Analysis Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Comment Sentiment Analysis system that detects hidden sentiments in comments and rates the post accordingly. The system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Comment Sentiment Analysis is a web application which gives review of the topic that is posted by the user. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Once the user logins to the system, user can view…
Read More

Opinion Mining For Restaurant Reviews

Data mining, Networking, Parallel And Distributed System, Web Application
Name Opinion Mining For Restaurant Reviews Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Restaurant Review system that detects hidden sentiments in feedback of the customer and rates the restaurant accordingly. The system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Restaurant Reviews is a web application which gives review of the feedback that is posted. The System takes feedback of various users, based on the opinion, system will specify whether the posted restaurant is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user feedback is ranked. Once the user login to the system he views the restaurant and gives…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security and Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Weather Forecasting Using Data Mining

Cloud Computing, Data mining, Multimedia, Networking, Web Application
Name Weather Forecasting Using Data Mining Technology DotNET,MS SQL Category Web Application Description Weather forecasting is the application of science and technology to predict the state of the atmosphere for a given location. Ancient weather forecasting methods usually relied on observed patterns of events, also termed pattern recognition. For example, it might be observed that if the sunset was particularly red, the following day often brought fair weather. However, not all of these predictions prove reliable. Here this system will predict weather based on parameters such as temperature, humidity and wind. This system is a web application with effective graphical user interface. User will login to the system using his user ID and password. User will enter current temperature; humidity and wind, System will take this parameter and will predict…
Read More

E Commerce Product Rating Based On Customer Review Mining

Data mining, Networking, Parallel And Distributed System, Web Application
Name E Commerce Product Rating Based On Customer Review Mining Technology DotNET,MS SQL Category Web Application Description There are many users who purchase products through E-commerce websites. Through online shopping many E-commerce enterprises were unable to know whether the customers are satisfied by the services provided by the firm. This boosts us to develop a system where various customers give reviews about the product and online shopping services, which in turn help the E-commerce enterprises and manufacturers to get customer opinion to improve service and merchandise through mining customer reviews. An algorithm could be used to track and manage customer reviews, through mining topics and sentiment orientation from online customer reviews. In this system user will view various products and can purchase products online. Customer gives review about the merchandise…
Read More

Sentiment Analysis for Product Rating

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Sentiment Analysis for Product Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Sentiment Analysis for Product Rating system that detects hidden sentiments in comments and rates the product accordingly. The system uses sentiment analysis methodology in order to achieve desired functionality. This project is an E-Commerce web application where the registered user will view the product and product features and will comment about the product. System will analyze the comments of various users and will rank product. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Comment will be analyzed by comparing the comment with the keywords stored in database. The System takes comments…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Detecting E Banking Phishing Websites Using Associative Classification Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption…
Read More

Periodic Census With Graphical Representation

Cloud Computing, Mobile Computing, Networking, Web Application
Name Periodic Census With Graphical Representation Technology DotNET,MS SQL Category Web Application Description A census is the procedure of systematically acquiring and recording information about the members of a given population. It is a regularly occurring and official count of a particular population. The term is used mostly in connection with national population and housing censuses; other common censuses include agriculture, business, and traffic censuses. The United Nations defines the essential features of population and housing censuses as “individual enumeration, universality within a defined territory, simultaneity and defined periodicity”, and recommends that population censuses be taken at least every 10 years. United Nations recommendations also cover census topics to be collected, official definitions, classifications and other useful information to co-ordinate international practice. IEEE Paper Yes IEEE Paper Year 2015
Read More

Product Review Analysis For Genuine Rating

Data mining, Networking, Web Application
Name Product Review Analysis For Genuine Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Products Review analysis system which provides a platform to registered users to rate a particular or multiple products using this system. The system uses product review analysis in order to achieve desired functionality. Product review analysis is a web application which consist multiple products added by admin to review to rate and review them. The System takes reviews of various users, based on their personal opinion, system will specify whether the posted product is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user review is ranked. Once the user login…
Read More

Smart Health Prediction Using Data Mining

Data mining, Multimedia, Networking, Parallel And Distributed System, Web Application
Name Smart Health Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Health Prediction system is an end user support and online consultation project. Here we propose a system that allows users to get instant guidance on their health issues through an intelligent health care system online. The system is fed with various symptoms and the disease/illness associated with those systems. The system allows user to share their symptoms and issues. It then processes users symptoms to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that…
Read More

Student Grade Prediction Using C4.5 Decision Tree

Data mining, Multimedia, Networking, Web Application
Name Student Grade Prediction Using C4.5 Decision Tree Technology DotNET,MS SQL Category Web Application Description We here come up with a system where student final grade is predicted based on the marks he had scored during his previous course and years. In order to predict the grade of the student we need some data to analyze and to predict the grade. So we will input student basic information and their previous academic information into the system which will be used to predict the grade of the student. We here used an effective data mining algorithm to predict the result. We used C4.5 decision tree algorithm to predict the grade of the student.C4.5 is a program for inducing classification rules in the form of decision trees from a set of given…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure File Storage On Cloud Using Hybrid Cryptography Technology DotNET,MS SQL Category Web Application Description The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided…
Read More

Search Engine Using Web Annotation

Networking, Parallel And Distributed System, Web Application
Name Search Engine Using Web Annotation Technology DotNET,MS SQL Category Web Application Description When user enters some words in search engine, system fetches automatically those pages which contain those words this happens due to web annotation. Web annotation has become one of the ongoing research topics. Here in this project we will apply web annotation on pages or images. User must enter the image names he is searching for and system will fetch those images which contains same image annotation. Web annotation helps to create user friendliness. A web annotation which is associated with web resources such as web pages or images. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself. Web annotations are visible to the…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Image Encryption For Secure Internet Transfer Technology MsSql, Dot NET Category Web Application Description Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Data Transfer Over Internet Using Image Steganography Technology MsSql, Dot NET Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly,…
Read More

Sentiment Based Movie Rating System

Data mining, Networking, Web Application
Name Sentiment Based Movie Rating System Technology MsSql, Dot NET Category Web Application Description We usually come across movie rating websites where users are allowed to rate ad comment on movies online. These ratings are provided as input to the website rating system. The admin then checks reviews, critic’s ratings and displays an online rating for every movie. Here we propose an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system now analyzes this data to check for user sentiments associated with each comment. Our system consists of a sentiment library designed for English as well as hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology MsSql, Dot NET Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using…
Read More

Cooperative Housing Society Manager Project

Mobile Computing, Networking, Web Application
Name Cooperative Housing Society Manager Project Technology MsSql, Dot NET Category Web Application Description The Housing Society Management System allows members to login with their own account and get updated with society happenings. This system is the web portal to reduce conflicts among society members. The system has automated functionality for calculating monthly maintenance bill as well as members can view their bill status using their account. The system provides a unique interface to every user to interact with the system. System accepts queries from users and evaluates the need of the query and fires it over the database and results are displayed to the user. This system of maintaining a society is made in such a manner, so that the most common problem faced in residential societies are solved.…
Read More

Smart Cab System Using Barcode Scan

Networking, Web Application
Name Smart Cab System Using Barcode Scan Technology MsSql, Dot NET Category Web Application Description Smart Cab Barcode is a system that provides better service for Cab Drivers as well as Passengers. By using smart cab barcode, you can travel and pay using your travel card and all the payment will be done using this card. Here, we have an Admin who can register Drivers to this system by feeding details and his image into the system. Admin will also register users using his details and image into the system he will get a unique code and traveler’s card with this unique code, using which he can pay in future. Admin also has rights so add balance into the users account and he can view all details of User and…
Read More

Topic Detection Using Keyword Clustering

Data mining, Networking, Parallel And Distributed System, Web Application
Name Topic Detection Using Keyword Clustering Technology MsSql, Dot NET Category Web Application Description To find prominent topic in a collection of documents. We here propose a system to detect topic from a collection of document. We use an efficient method to discover topic in a collection of documents known as topic model. A topic model is a type of statistical model for discovering topics from collection of documents. One would expect particular words to appear in the document more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web Application
Name A New Hybrid Technique For Data Encryption Technology MsSql, Dot NET Category Web Application Description Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web Application
Name High Security Encryption Using AES & Visual Cryptography Technology MsSql, Dot NET Category Web Application Description A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half…
Read More

Online Pizza Ordering System

Networking, Web Application
Name Online Pizza Ordering System Technology MsSql, Dot NET Category Web Application Description You must have ordered your pizzas on phone for home delivery. The process seems easy to use but at times there is miscommunication. As there is no visual menu shown during a phone call, the employees have to repeat a lot of things again and again to the customers. It’s a time consuming process which at times irritates customers. Also it takes a lot of time of the pizzeria staff. It would be much more comfortable for the customers to have an online pizza ordering system. It would be hassle free for users as they can select the pizzas they want and make payment for it. Also it will reduce the purchasing time for customers. Let us…
Read More

Detecting Fraud Apps Using Sentiment Analysis

Data mining, Networking, Web Application
Name Detecting Fraud Apps Using Sentiment Analysis Technology MsSql, Dot NET Category Web Application Description Most of us use android and IOS Mobiles these days and also uses the play store or app store capability normally. Both the stores provide great number of application but unluckily few of those applications are fraud. Such applications dose damage to phone and also may be data thefts. Hence, such applications must be marked, so that they will be identifiable for store users. So we are proposing a web application which will process the information, comments and the review of the application. So it will be easier to decide which application is fraud or not. Multiple application can be processed at a time with the web application. Also User cannot always get correct or…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web Application
Name Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Technology Dot net, MS SQL Category Cloud Computing,Security,Networking Description Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to…
Read More

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Networking
Name Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation Technology NS2 Category Networking Description Evaluation of Wireless Sensor Networks (WSN) for performance evaluation is a popular research area and a wealth of literature exists in this area. Denial-of-Service (DoS) attacks are recognized as one of the most serious threats due to the resources constrained property in WSN. The Zigbee model provided in OPNET 16 is suitable for modelling WSNs. This paper presents an evaluation of the impact of DoS attacks on the performances of Wireless Sensor Networks by using the OPNET modeller. Numerical results, discussions and comparisons are provided for various simulation scenarios. The results can be of great help for optimisation studies in WSN environments under DoS attacks as well as understanding the severity and critical nodes…
Read More

Network Traffic Monitoring Using Intrusion Detection System

Networking
Name Network Traffic Monitoring Using Intrusion Detection System Technology NS2 Category Networking Description Security is a big issue for all networks in today’s enterprise environment. Many methods have been developed to secure the network infrastructure and communication over the Internet, among them the use of firewalls, encryption, and virtual private networks. Intrusion detection is a relatively new addition to such techniques. IDS protect a system from attack, misuse, and compromise. It can also monitor network activity. Network traffic monitoring and measurement is increasingly regarded as an essential function for understanding and improving the performance and security of our cyber infrastructure. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Analyzing Network Traffic To Detect Self-Decrypting Exploit Code

Networking
Name Analyzing Network Traffic To Detect Self-Decrypting Exploit Code Technology NS2 Category Networking Description ABSTRACT Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are also evolving. Recent techniques for evasion of exploit detection include polymorphism (code encryption) and metamorphism (code obfuscation). This paper addresses the problem of detecting in network traffic polymorphic remote exploits that are encrypted, and that self-decrypt before launching the intrusion. Such exploits pose a great challenge to existing malware detection techniques, partly due to the non-obvious starting location of the exploit code in the network payload. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Genetic algorithm for energy efficient QoS Multicast Routing

Networking
Name Genetic algorithm for energy efficient QoS Multicast Routing Technology NS2 Category Networking Description The consideration of energy consumption in wireless ad hoc networks prevents the problem of the network exhausting batteries, thus partitioning the entire network. Power-aware multicasting is proposed to reduce the power consumption. This letter presents an energy-efficient genetic algorithm mechanism to resolve quality of service (QoS) multicast routing problem, which is NP-complete. The proposed genetic algorithm depends on bounded end-to-end delay and minimum energy cost of the multicast tree. Simulation results show that the proposed algorithm is effective and efficient. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Lightweight Sybil Attack Detection in MANETs

Networking
Name Lightweight Sybil Attack Detection in MANETs Technology tcl (NS2) Category Networking Description Fully self-organized mobile ad hoc networks (MANETs) represent complex distributed systems that may also be part of a huge complex system, such as a complex system-of-systems used for crisis management operations. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need to develop lightweight security solutions. Since MANETs require a unique, distinct, and persistent identity per node in order for their security protocols to be viable, Sybil attacks pose a serious threat to such networks. A Sybil attacker can either create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the…
Read More

View-invariant action recognition based on Artificial Neural Networks.

Networking
Name View-invariant action recognition based on Artificial Neural Networks. Technology Dot Net Category Networking Description In this paper, a novel view invariant action recognition method based on neural network representation and recognition is proposed. The project has employed the technique mentioned and excellent results were obtained for a number of widely used font types. The technical approach followed in processing input images, detecting graphic symbols, analyzing and mapping the symbols and training the network for a set of desired Unicode characters corresponding to the input images are discussed in the subsequent sections. Even though the implementation might have some limitations in terms of functionality and robustness, the researcher is confident that it fully serves the purpose of addressing the desired objectives. The novel representation of action images is based on…
Read More

A New Cell Counting Based Attack Against Tor.

Networking
Name A New Cell Counting Based Attack Against Tor. Technology Dot Net Category Networking Description Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive experiments on Tor, we found that the size of IP packets in the Tor network can be very dynamic because a cell is an application concept and the IP layer may repack cells. Based on this finding, we investigate a new cell-counting-based attack against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by marginally varying the number of cells in the target traffic at the…
Read More

Load Balancing Multipath Switching System with Flow Slice.

Networking
Name Load Balancing Multipath Switching System with Flow Slice. Technology Dot Net Category Networking Description Multipath Switching systems are intensely used in state-of-the-art core routers to provide terabit or even petabit switching capacity. One of the most intractable issues in designing MPS is how to load balance traffic across its multiple paths while not disturbing the interflow packet orders. Previous packet-based solutions either suffer from delay penalties or lead to hardware complexity, hence do not scale. Flow-based hashing algorithms also perform badly due to the heavy-tailed flow-size distribution. In this paper, we develop a novel scheme, namely, Flow Slice that cuts off each flow into flow slices at every interflow interval larger than a slicing threshold and balances the load on a finer granularity. Based on the studies of tens…
Read More

Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms.

Networking
Name Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms. Technology Dot Net Category Networking Description Cooperative networking is known to have significant potential in increasing network capacity and transmission reliability. Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works are limited to the basic three-node relay scheme and single-antenna systems. These two limitations are interconnected and both are due to a limited theoretical understanding of the optimal power allocation structure in MIMO cooperative networks (MIMO-CN). In this paper, we study the structural properties of the optimal power allocation in MIMOCN with per-node power constraints. More specifically, we show that the optimal power allocations at the source and each relay follow a matching structure in MIMO-CN. This result generalizes the…
Read More

Assessing the Veracity of Identity Assertions via OSNs.

Networking
Name Assessing the Veracity of Identity Assertions via OSNs. Technology Dot Net Category Networking Description Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the veracity of assertions that online users make about their identity attributes, such as age or profession. We propose FaceTrust, a system that uses online social networks to provide lightweight identity credentials while preserving a user’s anonymity. Face-Trust employs a game with a purpose” design to elicit the opinions of the friends of a user about the user’s self-claimed identity attributes, and uses attack-resistant trust inference to assign veracity scores to identity attribute assertions. FaceTrust provides credentials, which a user can use to corroborate his assertions. We…
Read More

Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing

Networking
Name Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing Technology Java Category Networking Description It has been observed that transient failures are fairly common in IP backbone networks and there have been several proposals based on local rerouting to provide high network availability despite failures. While most of these proposals are effective in handling single failures, they either cause loops or drop packets in the case of multiple independent failures. To ensure forwarding continuity even with multiple failures, we propose Localized On-demand Link State (LOLS) routing. Under LOLS, each packet carries a blacklist, which is a minimal set of failed links encountered along its path, and the next hop is determined by excluding the blacklisted links. We show that the blacklist can be reset when the…
Read More

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Networking
Name FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks Technology Java Category Networking Description Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. In this paper, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of FireCol using extensive simulations and a…
Read More

Participatory Privacy: Enabling Privacy in Participatory Sensing

Networking
Name Participatory Privacy: Enabling Privacy in Participatory Sensing Technology Java Category Networking Description Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed…
Read More

A Fast Re-Route Method

Networking
Name A Fast Re-Route Method Technology Java Category Networking Description We present a method to find an alternate path, after a link failure, from a source node to a destination node, before the Interior Gateway Protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of nodes) regional access subnetwork of a service provider’s network, which is a typical access scale encountered in practice. We illustrate the method and prove that it will find a path if one exists. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks

Networking
Name Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks Technology Java Category Networking Description The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. We identify the challenges in the development of a centralized topology control scheme, named Cooperative Bridges, which reduces transmission power of nodes as well as increases network connectivity. Prior research on topology control with CC only focuses on maintaining the network connectivity, minimizing the transmission power of each node, whereas ignores the energy efficiency of paths in constructed topologies. This may cause inefficient routes and hurt the overall network…
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Name Detecting and Resolving Firewall Policy Anomalies Technology Java Category Networking Description Abstract-As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7…
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Name Detecting and Resolving Firewall Policy Anomalies Technology Java Networking Description Abstract-As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71"…
Read More

Denial of Service Defense through Web Referral

Networking
Name Denial of Service Defense through Web Referral Technology Java Dot Net Category Networking Description The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a website, using a new web referral architecture for privileged service (?WRAPS?). WRAPS allows a legitimate client to obtain a privilegeURL through a click on a referral hypherlink, from a website trusted by the target website. Using that URL, the client can get privileged access to the target website in a manner that is far less vulnerable to a DDoS flooding attack. WRAPS does not require changes to web client software and is extremely lightweight for referrer websites, which eases its deployment. The massive scale of the…
Read More

Efficiency of content distribution via network coding

Networking
Name Efficiency of content distribution via network coding Technology .net Category Networking & Security Description Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject “bogus” data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence, the traditional “hash-and-sign” methods are no longer applicable. Recently, a new on-the-fly verification technique has been proposed by Krohn et al. (IEEE S&P ’04), which employs a classical homomorphic hash function.…
Read More