Remote Java 2 Dotnet Communication Application

Networking, Web Application
Name Remote Java 2 Dotnet Communication Application Technology DotNET,MS SQL Category Web Application Description Java and dot net are two different but very useful technology when it comes to information technology. Both of them have different development platforms. Well for a study and integration of two major technologies together we propose a client server based communication application made by integrating JAVA with dotnet technology. Here we propose a dedicated client server based architecture that allows for chat as well as authoritative commands by the server over client application. We integrate the two technology and have a working communication between these two technologies. We here propose to build the server application using JAVA and the client side application using Dotnet(C#) technology. Our system consists of the server as an authorities admin…
Read More

Automated Payroll With GPS Tracking And Image Capture

Mobile Computing, Networking, Web Application
Name Automated Payroll With GPS Tracking And Image Capture Technology DotNET,MS SQL Category Web Application Description This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again the…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security & Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Android Smart City Traveler

Mobile Computing, Parallel And Distributed System, Web Application
Name Android Smart City Traveler Technology DotNET,MS SQL Category Web Application Description The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes…
Read More

Periodic Census With Graphical Representation

Cloud Computing, Mobile Computing, Networking, Web Application
Name Periodic Census With Graphical Representation Technology DotNET,MS SQL Category Web Application Description A census is the procedure of systematically acquiring and recording information about the members of a given population. It is a regularly occurring and official count of a particular population. The term is used mostly in connection with national population and housing censuses; other common censuses include agriculture, business, and traffic censuses. The United Nations defines the essential features of population and housing censuses as “individual enumeration, universality within a defined territory, simultaneity and defined periodicity”, and recommends that population censuses be taken at least every 10 years. United Nations recommendations also cover census topics to be collected, official definitions, classifications and other useful information to co-ordinate international practice. IEEE Paper Yes IEEE Paper Year 2015
Read More

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

Image Processing
Name Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval. Technology Matlab, Dot net Category Image Processing Description With many potential practical applications, content- based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among various RF approaches, support-vector-machine (SVM)-based RF is one of the most popular techniques in CBIR. Despite the success, directly using SVM as an RF scheme has two main drawbacks. First, it treats the positive and negative feedbacks equally, which is not appropriate since the two groups of training feedbacks have distinct properties. Second, most of the…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing
Name Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Technology Matlab, Dot net Category Image Processing Description Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential…
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing
Name An effective image steganalysis method based on neighborhood information of pixels Technology Matlab, Dot net Category Image Processing Description This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Automatic Plant Leaf Classification for a Mobile Field Guide

Image Processing
Name Automatic Plant Leaf Classification for a Mobile Field Guide Technology Matlab, Dot net, Java Category Image Processing Description In this paper we describe the development of an Android application that gives users the ability to identify plant species based on photographs of the plant’s leaves taken with a mobile phone. At the heart of this application is an algorithm that acquires morphological features of the leaves, computes welldocumented metrics such as the angle code histogram (ACH), then classifies the species based on a novel combination of the computed metrics. The algorithm is first trained against several samples of known plant species and then used to classify unknown query species. Aided by features designed into the application such as touchscreen image rotation and contour preview, the algorithm is very successful…
Read More

Cloud Data Protection for the Masses

Cloud Computing
Name Cloud Data Protection for the Masses Technology JAVA / Dot Net Category Cloud Computing Description Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Dynamic Bandwidth Allocation in Cloud Computing

Cloud Computing
Name Dynamic Bandwidth Allocation in Cloud Computing Technology Java / Dot Net Category Cloud Computing Description Cloud Computing is a use of computing resources that is delivered as a service over a network. Sharing the data in the cloud depends on the network performance of the data centers. Bandwidth allocation plays a major role in sharing the resources towards the data center networks. Server performance is the major problem in cloud computing. When multiple users send a request for the same server at a time, the performance of the server is considerably decreased. So we describe a novel method of reallocating the bandwidth dynamically from passive users to active users using bandwidth mutual sharing and fair sharing technique. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact…
Read More

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

Cloud Computing
Name DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Technology Java / Dot Net Category Place Category Here Description Abstract Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password…
Read More

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing

Cloud Computing
Name Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing Technology Java / Dot Net Category Cloud Computing Description With the growing popularity of data and service outsourcing, where the data resides on remote servers in encrypted form, there remain open questions about what kind of query operations can be performed on the encrypted data. In this paper, we focus on one such important query operation, namely range query. One of the basic security primitive that can be used to evaluate range queries is secure comparison of encrypted integers. However, the existing secure comparison protocols strongly rely on the encrypted bit-wise representations rather than on pure encrypted integers. Therefore, in this paper, we first propose an efficient method for converting an encrypted integer z into encryptions of the individual…
Read More

N-Square Approach For Lossless Image Compression And Decompression

Image Processing
Name N-Square Approach For Lossless Image Compression And Decompression Technology Matlab, Dot net Category Image Processing Description There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless encoding and decoding technique which even better reduces the entropy there by reducing the average number of bits…
Read More

An Efficient Real Time Moving Object Detection Method for Video Surveillance System

Image Processing
Name An Efficient Real Time Moving Object Detection Method for Video Surveillance System Technology MATLAB, Dot net Category Image Processing Description Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper, we propose an efficient moving object detection method using enhanced edge localization mechanism and gradient directional masking for video surveillance system. In our proposed method, gradient map images are initially generated from the input and background images using a gradient operator. The gradient difference map is then calculated from gradient map images. The moving object is then detected by using appropriate directional masking and thresholding. Simulation results indicate that the proposed method consistently performs well under different illumination conditions including indoor, outdoor,…
Read More

A robust skew detection method based on maximum gradient difference and R-signature

Image Processing
Name A robust skew detection method based on maximum gradient difference and R-signature Technology MATLAB, Dot net Category Image Processing Description In this paper we study the detection of skewed text lines in scanned document images. The aim of our work is to develop a new automatic approach able to estimate precisely the skew angle of text in document images. Our new method is based on Maximum Gradient Difference (MGD) and R-signature. It detects zones that have high variations of gray values in different directions using the MGD transform. We consider these zones as being text regions. R-signature which is a shape descriptor based on Radon transform is then applied in order to approximate the skew angle. The accuracy of the proposed algorithm is evaluated on an open dataset by…
Read More

Image-based object detection under varying illumination in environments with specular surfaces

Image Processing
Name Image-based object detection under varying illumination in environments with specular surfaces Technology MATLAB, Dot net Category Image Processing Description Image-based environment representations capture the appearance of the surroundings of a mobile robot and are useful for the detection of novelty. However, image-based novelty detection can be impaired by illumination effects. In this paper we present an approach for the image-based detection of novel objects in a scene under varying lighting conditions and in the presence of objects with specular surfaces. The computation of an illumination-invariant image-based environment representation allows for the extraction of the shading of the environment from camera images. Using statistical models infered from the luminance and the saturation component of the shading images, secularities and shadows are detected and suppressed in the process of novelty detection.…
Read More

A New Block Compressive Sensing to Control the Number of Measurements

Image Processing
Name A New Block Compressive Sensing to Control the Number of Measurements Technology Dot net, MATLAB Category Image Processing Description Compressive Sensing (CS) aims to recover a sparse signal from a small number of projections onto random vectors. Be- cause of its great practical possibility, both academia and in- dustries have made efforts to develop the CS’s reconstruction performance, but most of existing works remain at the theo- retical study. In this paper, we propose a new Block Compres- sive Sensing (nBCS), which has several benefits compared to the general CS methods. In particular, the nBCS can be dynamically adaptive to varying channel capacity because it conveys the good inheritance of the wavelet transform. IEEE Paper Yes IEEE Paper Year 2011 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Lossless image compression based on data folding

Image Processing
Name Lossless image compression based on data folding Technology Dot net, MATLAB Category Image Processing Description The paper presents an approach for lossless image compression in spatial domain for continuous-tone images using a novel concept of image folding. The proposed method uses the property of adjacent neighbor redundancy for prediction. In this method, column folding followed by row folding is applied iteratively on the image till the image size reduces to a smaller pre-defined value. For column folding, elements of even columns are subtracted from elements of odd columns. Thereafter, row folding is applied on odd columns in a similar fashion. In row folding, even rows are subtracted from odd rows and the resultant odd rows are used for next iteration. The difference data, thus obtained, is stored in a…
Read More

A chaotic system based fragile watermarking scheme for image tamper detection

Image Processing
Name A chaotic system based fragile watermarking scheme for image tamper detection Technology Dot net, MATLAB Category Image Processing Description In the past few years, various fragile watermarking techniques have been proposed for image authen- tication and tamper detection. In this paper, a novel chaos based watermarking scheme for image authentication and tamper detection is proposed. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. Our scheme can detect any modifica- tion made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme two chaotic maps are employed. Since chaotic maps are sensitive to initial values, the corresponding position relation between pixels in the watermarked image and the watermark get disturbed, which helps…
Read More

Linear distance coding for image classification

Image Processing
Name Linear distance coding for image classification Technology Dot net, MATLAB Category Image Processing Description The traditional SPM approach based on bag-of-features (BoF) requires nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effective coding scheme called Locality-constrained Linear Coding (LLC) in place of the VQ coding in traditional SPM. LLC utilizes the locality constraints to project each descriptor into its local-coordinate system, and the projected coordinates are integrated by max pooling to generate the final representation. With linear classifier, the proposed approach performs remarkably better than the traditional nonlinear SPM, achieving state-of-the-art performance on several benchmarks. Compared with the sparse coding strategy [22], the objective function used by LLC has an analytical solution. In addition, the paper proposes a fast approximated LLC method by…
Read More

Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing

Networking
Name Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing Technology Java Category Networking Description It has been observed that transient failures are fairly common in IP backbone networks and there have been several proposals based on local rerouting to provide high network availability despite failures. While most of these proposals are effective in handling single failures, they either cause loops or drop packets in the case of multiple independent failures. To ensure forwarding continuity even with multiple failures, we propose Localized On-demand Link State (LOLS) routing. Under LOLS, each packet carries a blacklist, which is a minimal set of failed links encountered along its path, and the next hop is determined by excluding the blacklisted links. We show that the blacklist can be reset when the…
Read More

Security Enhancement Scheme for Image Steganography using S-DES Technique

Image Processing
Name Security Enhancement Scheme for Image Steganography using S-DES Technique Technology Dot net, MATLAB Category Image Processing Description In today‟s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. This paper presents a new generalized model by combining cryptographic and steganographic Technique. These two techniques encrypt the data as well as hide the encrypted data in another medium so the fact that a message being sent is concealed. In cryptography we are using Simplified Data Encryption Standard (S-DES) algorithm to encrypt secret message and…
Read More

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Networking
Name FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks Technology Java Category Networking Description Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. In this paper, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of FireCol using extensive simulations and a…
Read More

Participatory Privacy: Enabling Privacy in Participatory Sensing

Networking
Name Participatory Privacy: Enabling Privacy in Participatory Sensing Technology Java Category Networking Description Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed…
Read More

A Fast Re-Route Method

Networking
Name A Fast Re-Route Method Technology Java Category Networking Description We present a method to find an alternate path, after a link failure, from a source node to a destination node, before the Interior Gateway Protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of nodes) regional access subnetwork of a service provider’s network, which is a typical access scale encountered in practice. We illustrate the method and prove that it will find a path if one exists. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks

Networking
Name Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks Technology Java Category Networking Description The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. We identify the challenges in the development of a centralized topology control scheme, named Cooperative Bridges, which reduces transmission power of nodes as well as increases network connectivity. Prior research on topology control with CC only focuses on maintaining the network connectivity, minimizing the transmission power of each node, whereas ignores the energy efficiency of paths in constructed topologies. This may cause inefficient routes and hurt the overall network…
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Name Detecting and Resolving Firewall Policy Anomalies Technology Java Category Networking Description Abstract-As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7…
Read More

Efficient and Discovery of Patterns in Sequence Data Sets.

Data mining
Name Efficient and Discovery of Patterns in Sequence Data Sets. Technology Dot net Category Data Mining Description Existing sequence mining algorithms mostly focus on mining for subsequences. However, a large class of applications, such as biological DNA and protein motif mining, require efficient mining of “approximate” patterns that are contiguous. The few existing algorithms that can be applied to find such contiguous approximate pattern mining have drawbacks like poor scalability, lack of guarantees in finding the pattern, and difficulty in adapting to other applications. In this paper, we present a new algorithm called Flexible and Accurate Motif DEtector (FLAME). FLAME is a flexible suffix-tree-based algorithm that can be used to find frequent patterns with a variety of definitions of motif (pattern) models. It is also accurate, as it always finds…
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Name Detecting and Resolving Firewall Policy Anomalies Technology Java Networking Description Abstract-As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data. IEEE Paper Yes IEEE Paper Year 2012 Contact Form [contact-form-7 id="71"…
Read More

Denial of Service Defense through Web Referral

Networking
Name Denial of Service Defense through Web Referral Technology Java Dot Net Category Networking Description The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a website, using a new web referral architecture for privileged service (?WRAPS?). WRAPS allows a legitimate client to obtain a privilegeURL through a click on a referral hypherlink, from a website trusted by the target website. Using that URL, the client can get privileged access to the target website in a manner that is far less vulnerable to a DDoS flooding attack. WRAPS does not require changes to web client software and is extremely lightweight for referrer websites, which eases its deployment. The massive scale of the…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security & Encryption
Name Slicing A New Approach to Privacy Preserving Data Publishing. Technology Java Category Security & Data Mining Description Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes. IEEE Paper Yes IEEE Paper Year 2013 Contact Form [contact-form-7 id="71" title="Contact form 1"]
Read More

A Bayesian Approach to Filtering Junk E-Mail

Data mining
Name A Bayesian Approach to Filtering Junk E-Mail Technology Java Category Data Mining Description Abstract In addressing the growing problem of junk E-mail on the Internet, we examine methods for the automated construction of lters to eliminate such unwanted mes- sages from a user's mail stream. By casting this prob- lem in a decision theoretic framework, we are able to make use of probabilistic learning methods in conjunc- tion with a notion of di erential misclassi cation cost to produce lters which are especially appropriate for the nuances of this task. While this may appear, at rst, to be a straight-forward text classi cation prob- lem, we show that by considering domain-speci c fea- tures of this problem in addition to the raw text of E-mail messages, we can produce much more accurate lters.…
Read More