Your Personal Nutritionist Using FatSecret API

Android Mobile development, Web | Desktop Application
Your Personal Nutritionist Using FatSecret API Personal Nutritionist as the name, the system can act as your personal nutritionist while this system can be used also by nutritionist gaining a lot of information and help in many ways. FatSecret API helps the System to get the information in many ways. The user can get details about a number of nutrients, vitamins etc of a fruit or vegetable. The user can add his recipes or get recopies using the API. The System basically helps the user in what to eat and which is good, what will help him and etc, the system will help him filter things easily. The System also allows the user to make a diet plan and remind him his food timings.
Read More

Question paper generator system

Parallel And Distributed System, Web | Desktop Application
Question paper generator system In this system we present a smart question paper generating system. In our system we allow administrator to input a set of questions and respective answers for option ticking. We also allow admin to provide weight age and complexity for each of these questions. After this the questions are stored in database along with their weight age. Now on question paper generating time the admin just has to select the percentage of difficulty. On this selection the system selects questions randomly in a way that their weight age makes up for 100 marks and according to difficulty that admin chooses the questions are chosen based on their complexity level. After this q paper is converted to pdf file and emailed to colleges on button click.
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Image Encryption For Secure Internet Transfer Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the intended user from among the list of users having…
Read More

Heart Disease Prediction Project

Data mining, Multimedia, Web | Desktop Application
Heart Disease Prediction Project It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Heart Disease Prediction application is an end user support and online consultation project. Here, we propose a web application that allows users to get instant guidance on their heart disease through an intelligent system online. The application is fed with various details and the heart disease associated with those details. The application allows user to share their heart related issues. It then processes user specific details to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that could be associated with patient’s details. Based on…
Read More

Warehouse Management System

Web | Desktop Application
Warehouse Management System The Warehouse Management System is a real-time warehouse database capable of handling large inventories of an organization. This can be used to track the inventory of a single store, or to manage the distribution of stock between several stores of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. The main goal of Warehouse Management System is to ensure consistent availability of supplies for consumers. Thus, Warehouse Management System is directed toward owners of small to large stores and stock managers who are responsible of maintaining sufficient goods on hand in a retail or manufacturing…
Read More

Exam Cell Automation System

Web | Desktop Application
Exam Cell Automation System Currently Exam cell activity mostly includes a lot of manual calculations and is mostly paper based. The project aims to bring in a centralized system that will ensure the activities in the context of an examination that can be effectively managed. This system allows students to enroll themselves into the system by registering their names or by sharing details to admin. This is done by providing their personal and all the necessary details like Name, email, examination, semester, etc. The provided details are then entered by admin into the system to create their hall tickets and also creates login id and password for them. After creating the hall ticket, the system mails the link of soft copy to every student who have registered. Students containing link…
Read More

Cooperative Housing Society Manager Project

Android Mobile development, Networking, Web | Desktop Application
Cooperative Housing Society Manager Project The Housing Society Management System allows members to login with their own account and get updated with society happenings. This system is the web portal to reduce conflicts among society members. The system has automated functionality for calculating monthly maintenance bill as well as members can view their bill status using their account. The system provides a unique interface to every user to interact with the system. System accepts queries from users and evaluates the need of the query and fires it over the database and results are displayed to the user. This system of maintaining a society is made in such a manner, so that the most common problem faced in residential societies are solved. In many societies, bills and receipts are being generated…
Read More

Smart Cab System Using Barcode Scan

Networking, Web | Desktop Application
Smart Cab System Using Barcode Scan Smart Cab Barcode is a system that provides better service for Cab Drivers as well as Passengers. By using smart cab barcode, you can travel and pay using your travel card and all the payment will be done using this card. Here, we have an Admin who can register Drivers to this system by feeding details and his image into the system. Admin will also register users using his details and image into the system he will get a unique code and traveler’s card with this unique code, using which he can pay in future. Admin also has rights so add balance into the users account and he can view all details of User and Driver. Here, driver’s role is to just scan the…
Read More

Topic Detection Using Keyword Clustering

Data mining, Networking, Parallel And Distributed System, Web | Desktop Application
Topic Detection Using Keyword Clustering To find prominent topic in a collection of documents. We here propose a system to detect topic from a collection of document. We use an efficient method to discover topic in a collection of documents known as topic model. A topic model is a type of statistical model for discovering topics from collection of documents. One would expect particular words to appear in the document more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats and 90% about dogs, there would probably be about…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web | Desktop Application
A New Hybrid Technique For Data Encryption Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to different parts of the same message along with two…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web | Desktop Application
High Security Encryption Using AES & Visual Cryptography A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Data Transfer Over Internet Using Image Steganography Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Data Duplication Removal Using File Checksum Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in database. If the file already exists, then it will…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Sending a secure message over a network to a remote site We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection. The receiving system sends out a notification acknowledgement to…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Improved Data Leakage Detection Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable alterations. These alterations allow our system to trace back…
Read More

Sentiment Based Movie Rating System

Data mining, Networking, Web | Desktop Application
Sentiment Based Movie Rating System We usually come across movie rating websites where users are allowed to rate ad comment on movies online. These ratings are provided as input to the website rating system. The admin then checks reviews, critic’s ratings and displays an online rating for every movie. Here we propose an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system now analyzes this data to check for user sentiments associated with each comment. Our system consists of a sentiment library designed for English as well as hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found it associates the comment with…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using a single portable card. In this way the user…
Read More

Bikers Portal

Web | Desktop Application
Bikers Portal This is an online Bike and bike parts store that has listings of various bike along with their features. It also consists of Bike service Registration. This system allows user to buy bike, bike parts and inventory online. System allow user to check various articles submitted by user and even comment on them. Credit card payment facility is available. This system also consists of ‘Rent a Bike’ feature where user can ask admin for bike on rent. The visitor who visits the system must register himself by filling up personal details. After registration user can login to the system with his username and password in order to access the system. User can check various bike listing and can view each bikes feature. User can also check features of…
Read More

College Enquiry Chat Bot

Data mining, Multimedia, Parallel And Distributed System, Web | Desktop Application
College Enquiry Chat Bot The College bot project is built using artificial algorithms that analyses user’s queries and understand user’s message. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chating. Students can chat using any format there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate what the user queries. The User can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The System analyses the question and than answers to the user. The system answers to the query as if it is answered…
Read More

Unique User Identification Across Multiple Social Networks

Multimedia, Security and Encryption, Web | Desktop Application
Unique User Identification Across Multiple Social Networks There are number of social network sites that connect a large amount of people around the world. All social networking sites differ from each other based on various components such as Graphical User Interface, functionality, features etc. Many users have virtual identities on various social network sites. It is common that people are users of more than one social network and also their friends may be registered on multiple social network sites. User may login to different social networking sites at different timing, so user may not find his friends online when he logins to the particular social networking website. To overcome this issue our proposed system will bring together our online friends on different social networking sites into a single integrated environment.…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web | Desktop Application
Encryption & Decryption Using Deffie Hellman Algorithm The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio with C# .Net as programming language. There is only…
Read More

Detecting Fraud Apps Using Sentiment Analysis

Data mining, Networking, Web | Desktop Application
Detecting Fraud Apps Using Sentiment Analysis Most of us use android and IOS Mobiles these days and also uses the play store or app store capability normally. Both the stores provide great number of application but unluckily few of those applications are fraud. Such applications dose damage to phone and also may be data thefts. Hence, such applications must be marked, so that they will be identifiable for store users. So we are proposing a web application which will process the information, comments and the review of the application. So it will be easier to decide which application is fraud or not. Multiple application can be processed at a time with the web application. Also User cannot always get correct or true reviews about the product on internet. So rating/comments…
Read More

Data Standardization Using Hidden Markov Model

Security and Encryption, Web | Desktop Application
Data Standardization Using Hidden Markov Model Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is developed using Visual Studio with C# .Net as programming…
Read More

Advanced Intelligent Tourist Guide

Android Mobile development, Artificial Intelligence & ML, Web | Desktop Application
Advanced Intelligent Tourist Guide The project is developed using Visual Studio with Asp .Net as programming language. There are two entities who will have the access to the system. One is the admin and another one will be the registered user. Admin will add places with their details such as place name, image, address, area, latitude-longitude, tags and description. Admin can view all the added places and also can edit if required. User is new he/she will have to fill the registration form (username, password, email, full name, contact no. and type of places i.e. tags.). After registration, user can login with the valid id and password. After login, user will get the places recommendation based on the preferences which were taken in the form of tags while registration. Based…
Read More

Child Monitoring System App

Android Mobile development
Child Monitoring System App Solution for missing children with the help of GPS technologies. The application uses two main services that is GPS and telephonic services. For location services is GPS and telephony services is SMS, call logs and contacts. Android is a widely used OS used by a lot of masses globally. Internet is used for communicating between children and parent side. The System can be designed in a simple way. The application developed to make user-friendly approach on both sides. The parents and children both should have GPS Based smart phones. The application is used to track the Child’s location as well as call logs, messages and contact from their smartphone. Reason for choosing android OS is that to target more users.
Read More

Customizable Pointof- Interest Queries in Road Networks

Data mining, Web | Desktop Application
Customizable Pointof- Interest Queries in Road Networks networks within interactive applications. We show that partition-based algorithms developed for point-topoint shortest path computations can be naturally extended to handle augmented queries such as finding the closest restaurant or the best post office to stop on the way home, always ranking POIs according to a user-defined cost function. Our solution allows different trade-offs between indexing effort (time and space) and query time. Our most flexible variant allows the road network to change frequently (to account for traffic information or personalized cost functions) and the set of POIs to be specified at query time. Even in this fully dynamic scenario, our solution is fast enough for interactive applications on continental road networks.
Read More