Farming Assistance Web Service

Data mining, Networking, Parallel And Distributed System, Web Application
Name Farming Assistance Web Service Technology DotNET,MS SQL Category Web Application Description A Web project to help farmers ensure greater profitability through direct farmer to supplier and farmer to farmer communication. This service boosts business communication and brings transparency in the system. This innovative site allows for good farmer, retailer and supplier communication. It allows farmers to login and communicate to respective dealers. When dealers publish an advertisement or offer, the respective farmers get notified via Sms message. The farmers may also submit their greviences and complaints to respective dealers or authorities using their farmer login on a separate complaints page and authorities will get acess to that page regularly using their login id and passwords. IEEE Paper Yes IEEE Paper Year 2015
Read More

Video Surveillance Project

Image Processing, Multimedia, Parallel And Distributed System
Name Video Surveillance Project Technology DotNET,MS SQL Category Web Application Description This is an innovative approach to video surveillance software project. We normally find video camera’s in banks and other organization that continuously record and save the recorded video footage for days or months. This utilizes a lot of battery life and storage capacity to store these large video footage. Well this video surveillance software is an enhanced version of organization security that continuously monitors but only records unusual changes in the organization. These unusual changes may include theft detection or fire detection in offices. It may also include rodent detection in bakeries or restaurants after closing. As soon as the system catches any unusual activity it takes steps and informs the user by: 1. Sending an sms to the…
Read More

Graphical Password By Image Segmentation

Image Processing, Parallel And Distributed System, Security & Encryption, Web Application
Name Graphical Password By Image Segmentation Technology DotNET,MS SQL Category Web Application Description The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store…
Read More

Face Recognition Attendance System

Image Processing, Parallel And Distributed System, Web Application
Name Face Recognition Attendance System Technology DotNET,MS SQL Category Web Application Description The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning “you are xx minutes late! Do not repeat this.” Note: This system has around 40%-60% accuracy in scanning and recognizing faces. IEEE Paper Yes IEEE Paper Year 2015
Read More

Look Based Media Player

Image Processing, Multimedia, Parallel And Distributed System
Name Look Based Media Player Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description Usually when you are watching a video and someone calls you, you have to look somewhere else or go away from pc for some time so you miss some part of the video. Later you need to drag back the video from where you saw it. Well here is a solution to this problem. A look based media player that pauses itself when user is not looking at it. The player starts running again as soon as the user looks at it again. This is done using the camera or webcam on top of the computer. As long as the camera detects the users face looking at…
Read More

Artificial Intelligence Dietician

Data mining, Parallel And Distributed System, Web Application
Name Artificial Intelligence Dietician Technology DotNET,MS SQL Category Web Application Description The online artificial dietician is a bot with artificial intelligence about human diets. It acts as a diet consultant similar to a real dietician. Dieticians are educated with nutrient value of foods. A dietician consults a person based on his schedule, body type, height and weight. The system too asks all this data from the user and processes it. It asks about how many hour the user works, his height, weight, age etc. The system stores and processes this data and then calculates the nutrient value needed to fill up users needs. The system then shows an appropriate diet to the users and asks if user is ok with it, else it shows other alternate diets to fill up…
Read More

Camera Motion Sensing Project

Image Processing, Multimedia, Parallel And Distributed System
Name Camera Motion Sensing Project Technology DotNET,MS SQL Category Web Application Description A motion sensor project that detects motion and sounds an alarm accordingly. This software system is designed in C# that constantly monitors an environment using a camera and sounds an alarm and even records images of the motion taking place as soon as it takes place IEEE Paper Yes IEEE Paper Year 2015
Read More

Web Server to Client communication for web usage data analysis

Multimedia, Networking, Parallel And Distributed System, Web Application
Name Web Server to Client communication for web usage data analysis Technology DotNET,MS SQL Category Web Application Description We usually come across fields where web data proves very important for business as well as security analysis. Ecommerce as well as website usage data is of prime importance these days. Our proposed project puts for ward a system that allows a web server to record web data analytics of web usage patterns of various web links. The system is configured to record web page clicks, seo score computed as per a search engine ranking algorithm as well as other parameters associated with the each web page. The server has an inbuilt configuration logic required to scan live web pages similar to crawlers and then record/store that data for later processing. Since…
Read More

Customer Behaviour Prediction Using Web Usage Mining

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Customer Behaviour Prediction Using Web Usage Mining Technology DotNET,MS SQL Category Web Application Description Web usage mining involves first recording behavior and flow of customers on a website and then mining through this data for behavioural patterns. It is an important part of ecommerce world that allows websites to go through previously recorded web traffic data. Ecommerce sites analyse this data in order to provide better performance and also suggest better products and services to customers by identifying them next time. The system is tuned to record web shopping/buying patterns and track various analytics data that tend to provide future prediction statistics. The system scans for user budget tracking, tallying to previous years, user bounce rates- number of users returning from payment page and other site usage factors. Factors…
Read More

Opinion Mining For Social Networking Site

Data mining, Parallel And Distributed System, Web Application
Name Opinion Mining For Social Networking Site Technology DotNET,MS SQL Category Web Application Description This system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application. Here the user will post his views related to some subject other users will view this post and will comment on this post. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. These changes can be viewed by various users. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is…
Read More

Web Data Mining To Detect Online Spread Of Terrorism

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Web Data Mining To Detect Online Spread Of Terrorism Technology DotNET,MS SQL Category Web Application Description Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make…
Read More

Opinion Mining For Restaurant Reviews

Data mining, Networking, Parallel And Distributed System, Web Application
Name Opinion Mining For Restaurant Reviews Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Restaurant Review system that detects hidden sentiments in feedback of the customer and rates the restaurant accordingly. The system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Restaurant Reviews is a web application which gives review of the feedback that is posted. The System takes feedback of various users, based on the opinion, system will specify whether the posted restaurant is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user feedback is ranked. Once the user login to the system he views the restaurant and gives…
Read More

E Commerce Product Rating Based On Customer Review Mining

Data mining, Networking, Parallel And Distributed System, Web Application
Name E Commerce Product Rating Based On Customer Review Mining Technology DotNET,MS SQL Category Web Application Description There are many users who purchase products through E-commerce websites. Through online shopping many E-commerce enterprises were unable to know whether the customers are satisfied by the services provided by the firm. This boosts us to develop a system where various customers give reviews about the product and online shopping services, which in turn help the E-commerce enterprises and manufacturers to get customer opinion to improve service and merchandise through mining customer reviews. An algorithm could be used to track and manage customer reviews, through mining topics and sentiment orientation from online customer reviews. In this system user will view various products and can purchase products online. Customer gives review about the merchandise…
Read More

Sentiment Analysis for Product Rating

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Sentiment Analysis for Product Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Sentiment Analysis for Product Rating system that detects hidden sentiments in comments and rates the product accordingly. The system uses sentiment analysis methodology in order to achieve desired functionality. This project is an E-Commerce web application where the registered user will view the product and product features and will comment about the product. System will analyze the comments of various users and will rank product. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Comment will be analyzed by comparing the comment with the keywords stored in database. The System takes comments…
Read More

Fingerprint Voting System Project

Multimedia, Parallel And Distributed System, Web Application
Name Fingerprint Voting System Project Technology DotNET,MS SQL Category Web Application Description Fingerprint Based Voting Project is a application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. Voter can vote the candidate only once, the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate name and candidate photo who are nominated for the election. Admin only has the right to add…
Read More

Image Steganography With 3 Way Encryption

Cloud Computing, Parallel And Distributed System, Security & Encryption, Web Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Content Summary Generation Using NLP

Data mining, Parallel And Distributed System, Web Application
Name Content Summary Generation Using NLP Technology DotNET,MS SQL Category Web Application Description To find prominent summarized points in a collection of documents. We here propose a system to detect summarized points from a huge or multiple paragraph. We use an efficient method to discover summarized points from the provided content using Natural language processing (NLP). The provided content is divided into two parts as Summarized Content and Summarized Point. One would expect particular words to appear in the content more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about…
Read More

Android Smart City Traveler

Mobile Computing, Parallel And Distributed System, Web Application
Name Android Smart City Traveler Technology DotNET,MS SQL Category Web Application Description The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes…
Read More

Smart Health Prediction Using Data Mining

Data mining, Multimedia, Networking, Parallel And Distributed System, Web Application
Name Smart Health Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Health Prediction system is an end user support and online consultation project. Here we propose a system that allows users to get instant guidance on their health issues through an intelligent health care system online. The system is fed with various symptoms and the disease/illness associated with those systems. The system allows user to share their symptoms and issues. It then processes users symptoms to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that…
Read More

Online user Behavior Analysis On Graphical Model

Data mining, Parallel And Distributed System, Web Application
Name Online user Behavior Analysis On Graphical Model Technology DotNET,MS SQL Category Web Application Description Online shopping is growing on large scale. People purchase their products via internet. They just have to choose their products and make the payment. Users get their products on doorstep. Online shopping had made people’s life easier and faster. As online shopping is increasing, large amount of data on people’s online activities have become available on web. Use of such data can benefit a lot of applications. User behavior, online customer classification can be extracted from these web data. We proposed a system where we can extract the user’s online shopping behavior. System will extract user’s online behavior pattern and will show in graphical format. This graphical format helps the admin during decision making process.…
Read More

Implementing Triple DES With OTP

Parallel And Distributed System, Security & Encryption, Web Application
Name Implementing Triple DES With OTP Technology DotNET,MS SQL Category Web Application Description Triple DES is advantageous because it has a significantly sized key length, which is longer than most key lengths affiliated with other encryption modes. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Triple DES encrypts input data three times. The three keys are referred to as k1, k2 and k3. Thus due to the use of 3 key ,triple DES is more secure and is sometimes preferred over the normal DES. The system combines…
Read More

Image Character Recognition Using Signal & Pattern Analysis

Multimedia, Parallel And Distributed System, Web Application
Name Image Character Recognition Using Signal & Pattern Analysis Technology DotNET,MS SQL Category Web Application Description Optical character recognition is conversion of images of typed, handwritten or printed text into machine-encoded text from image. Here we come up with system where pattern of the image is extracted and image text is recognized using Optical character recognition in matlab. System will recognize the pattern and will detect the characters in image. And will display those characters as output. Since image can be scanned photos or other images. We applied image preprocessing steps in order to extract only text from image. Image patterns will be stored in another directory. The query image is compared with image patterns stored in database. If image matches with the pattern stored in directory, system will apply…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure File Storage On Cloud Using Hybrid Cryptography Technology DotNET,MS SQL Category Web Application Description The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided…
Read More

Search Engine Using Web Annotation

Networking, Parallel And Distributed System, Web Application
Name Search Engine Using Web Annotation Technology DotNET,MS SQL Category Web Application Description When user enters some words in search engine, system fetches automatically those pages which contain those words this happens due to web annotation. Web annotation has become one of the ongoing research topics. Here in this project we will apply web annotation on pages or images. User must enter the image names he is searching for and system will fetch those images which contains same image annotation. Web annotation helps to create user friendliness. A web annotation which is associated with web resources such as web pages or images. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself. Web annotations are visible to the…
Read More

Card Payment Security Using RSA

Cloud Computing, Parallel And Distributed System, Security & Encryption, Web Application
Name Card Payment Security Using RSA Technology DotNET,MS SQL Category Web Application Description Due to increasing e-commerce activity nowadays, there is a need for some encryption technique to ensure security and a way to ensure that the user’s data are securely stored in the database. Thus the system introduces RSA for this purpose. The RSA algorithm is a kind of asymmetric encryption algorithm which appeared in 1978. The algorithm is public key encryption algorithm which is a widely accepted and implemented by public. The use of RSA in this the system makes the process more secure. Now the bank transactions can be done securely without worrying about attacker getting access to the database as the data will be in encrypted form. IEEE Paper Yes IEEE Paper Year 2015
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Cloud Computing, Multimedia, Parallel And Distributed System, Security & Encryption, Web Application
Name Preventing Phishing Attack On Voting System Using Visual Cryptography Technology DotNET,MS SQL Category Web Application Description Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his…
Read More

Detecting Phishing Websites Using Machine Learning

Cloud Computing, Data mining, Parallel And Distributed System, Security & Encryption, Web Application
Name Detecting Phishing Websites Using Machine Learning Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through various websites.There are multiple websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of websites is known as phishing website. In order to detect and predict phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate.…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Traffic Signal: Management & Control System

Multimedia, Parallel And Distributed System, Web Application
Name Traffic Signal: Management & Control System Technology MsSql, Dot NET Category Web Application Description This innovative software projects is an effective traffic signal management project that allows for managing 4 way traffic signal management system. The system consists of 4 signals corresponding to each road. We here propose a density based traffic signal scheduling algorithm. The system is designed to manage traffic signal timings based on the density of traffic on its corresponding road. The system represents the traffic strength of a road graphically using traffic judgments. By measuring the traffic lined up on a particular road the signal timings are adjusted to let that particular way clear out and then the next populated one. The entire system works according to an algorithm that allows for smooth and efficient…
Read More

Question paper generator system

Parallel And Distributed System, Web Application
Name Question paper generator system Technology MsSql, Dot NET Category Web Application Description In this system we present a smart question paper generating system. In our system we allow administrator to input a set of questions and respective answers for option ticking. We also allow admin to provide weight age and complexity for each of these questions. After this the questions are stored in database along with their weight age. Now on question paper generating time the admin just has to select the percentage of difficulty. On this selection the system selects questions randomly in a way that their weight age makes up for 100 marks and according to difficulty that admin chooses the questions are chosen based on their complexity level. After this q paper is converted to pdf…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Image Encryption For Secure Internet Transfer Technology MsSql, Dot NET Category Web Application Description Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure Data Transfer Over Internet Using Image Steganography Technology MsSql, Dot NET Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly,…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security & Encryption, Web Application
Name Sending a secure message over a network to a remote site Technology MsSql, Dot NET Category Web Application Description We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection.…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security & Encryption, Web Application
Name Improved Data Leakage Detection Technology MsSql, Dot NET Category Web Application Description Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security & Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology MsSql, Dot NET Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using…
Read More

College Enquiry Chat Bot

Data mining, Multimedia, Parallel And Distributed System, Web Application
Name College Enquiry Chat Bot Technology MsSql, Dot NET Category Web Application Description The College bot project is built using artificial algorithms that analyses user’s queries and understand user’s message. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chating. Students can chat using any format there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate what the user queries. The User can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The System analyses the question and than answers to the user. The system…
Read More

Topic Detection Using Keyword Clustering

Data mining, Networking, Parallel And Distributed System, Web Application
Name Topic Detection Using Keyword Clustering Technology MsSql, Dot NET Category Web Application Description To find prominent topic in a collection of documents. We here propose a system to detect topic from a collection of document. We use an efficient method to discover topic in a collection of documents known as topic model. A topic model is a type of statistical model for discovering topics from collection of documents. One would expect particular words to appear in the document more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security & Encryption, Web Application
Name Data Duplication Removal Using File Checksum Technology MsSql, Dot NET Category Web Application Description Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security & Encryption, Web Application
With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose…
Read More

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in

Parallel And Distributed System
Name BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Technology Dot Net Category Parallel And Distributed System Description Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be…
Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Parallel And Distributed System
Name Privacy-Preserving Updates to Anonymous and Confidential Databases Technology Dotnet Category Parallel And Distributed System Description Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and…
Read More

The Geometric Efficient Matching Algorithm for Firewalls

Parallel And Distributed System
Name The Geometric Efficient Matching Algorithm for Firewalls Technology Dot Net Category Parallel And Distributed System Description The firewall is one of the central technologies allowing high-level access control to organization networks. Packet matching in firewalls involves matching on many fields from the TCP and IP packet header. At least five fields (protocol number, source and destination IP addresses, and ports) are involved in the decision which rule applies to a given packet. With available bandwidth increasing rapidly, very efficient matching algorithms need to be deployed in modern firewalls to ensure that the firewall does not become a bottleneck Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Thus, algorithms from computational…
Read More

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

Parallel And Distributed System
Name In Cloud, Can Scientific Communities Benefit from the Economies of Scale? Technology Dotnet Category Parallel And Distributed System Description The basic idea behind Cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of Cloud computing: in Cloud, can small or medium-scale scientific computing communities benefit from the economies of scale? Our research contributions are three fold: first, we propose an enhanced scientific public cloud model (ESP) that encourages small or medium scale research organizations rent elastic resources from a public cloud provider; second, on a basis of the ESP model, we design and implement the Dawning Cloud system that can consolidate heterogeneous scientific workloads on a Cloud site; third, we propose an innovative…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System
Name A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Technology Dot Net Category Parallel And Distributed System Description Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only…
Read More

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

Parallel And Distributed System
Name Balancing the Tradeoffs between Query Delay and Data Availability in MANETs. Technology Dotnet Category Parallel And Distributed System Description In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. Existing data replication solutions in either wired or wireless networks aim at either reducing the query delay or improving the data availability, but not both. As both metrics are important for mobile nodes, we propose schemes to balance the tradeoffs between data availability and query delay under different system…
Read More

Resource-Aware Application State Monitoring.

Parallel And Distributed System
Name Resource-Aware Application State Monitoring. Technology Dot Net Category Parallel And Distributed System Description The increasing popularity of large-scale distributed applications in datacenters has led to the growing demand of distributed application state monitoring. These application state monitoring tasks often involve collecting values of various status attributes from a large number of nodes. One challenge in such large-scale application state monitoring is to organize nodes into a monitoring overlay that achieves monitoring scalability and cost-effectiveness at the same time. In this paper, we present REMO, a REsource-aware application state MOnitoring system, to address the challenge of monitoring overlay construction. REMO distinguishes itself from existing works in several key aspects. First, it jointly considers inter-task costsharing opportunities and node-level resource constraints. Furthermore, it explicitly models the per-message processing overhead which can…
Read More

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge

Parallel And Distributed System
Name SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge Technology Dot Net Category Parallel And Distributed System Description With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and…
Read More

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.

Parallel And Distributed System
Name Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Technology Dot Net Category Parallel And Distributed System Description Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in…
Read More