Grocery Shopping Android

Mobile Computing, Web Application
" Name Grocery Shopping Android Technology Android Category Mobile Computing Description A grocery shopping is an android application where users can purchase and order groceries online. The system is developed with a user-friendly and attractive GUI. It delivers a wide range of groceries available online. Users have to first login into the system to view the groceries and add them into their cart. They can then order it by making a secure online payment via CREDIT CARD. The system functionality of products and orders is stored on server side in a web service. The android app is for client usage. It consists of client side scripting for placing orders by connecting to the server side webservice. IEEE Paper Yes IEEE Paper Year 2015 "
Read More

Android Based Parking Booking System

Mobile Computing, Web Application
" Name Android Based Parking Booking System Technology Android Category Mobile Computing Description The proposed project is a smart parking booking system that provides customers an easy way of reserving a parking space online. It overcomes the problem of finding a parking space in commercial areas that unnecessary consumes time. Hence this project offers a web based reservation system where users can view various parking areas and select the space to view whether space is available or not. If the booking space is available then he can book it for specific time slot. The booked space will be marked yellow and will not be available for anyone else for the specified time. For demonstration we will be using 4 parking spaces and each parking space will have 20 time slots.…
Read More

Android Voting System

Mobile Computing, Web Application
" Name Android Voting System Technology Android Category Mobile Computing Description This application provides is a new technique of casting votes using mobile phones. Android voting system is an application developed for android devices to deploy an easy and flexible way of casting votes anytime and from anywhere. The application is especially developed for organizations to get employees votes for any new policy regulation or issues. The issues or arguments are fed into the system by the admin. Employees can then cast their vote as yes or no. One voter can only post one vote for an argument. Each and every vote casted is stored in the database for the respective argument. At the end of the voting process the system counts the total votes and generates a brief report…
Read More

Android AI Diet Consultant

Mobile Computing, Web Application
" Name Android AI Diet Consultant Technology Android Category Mobile Computing Description Artificial dietician project is an application with artificial intelligence about human diets. It acts as a diet consultant similar to a real dietician. This system acts in a similar way as that of a dietician. A person in order to know his/her diet plan needs to give some information to the dietician such as its body type, weight, height and working hour details. Similar way this system also provides the diet plan according to the information entered by the user. The system asks all his data from the user and processes it to provide the diet plan to the user. Thus the user does not need to visit any dietician which also saves time and the user can…
Read More

Android Employee Tracker

Mobile Computing, Web Application
" Name Android Employee Tracker Technology Android Category Mobile Computing Description This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work Employers. The Employee will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When employee logout the system again the image will be captured as…
Read More

Vehicle Tracking Using Driver Mobile Gps Tracking

Mobile Computing, Web Application
" Name Vehicle Tracking Using Driver Mobile Gps Tracking Technology Android Category Mobile Computing Description The Global Positioning System (GPS) is a space-based satellite navigation system that provides location information .This system uses GPS to track the location of the vehicle. This system will track location of the vehicle and will send details about the location to the admin. This system helps admin to find out the location of the driver driving the vehicle. Admin will know which driver is in which location. This system can be implemented in call taxi to find out the location of the driver driving the vehicle and will help the admin to allocate taxi to the customer. User login to the system using his user id and password. System will track the user’s location…
Read More

Android Local Train Ticketing Project

Mobile Computing, Web Application
" Name Android Local Train Ticketing Project Technology Android Category Mobile Computing Description A local train ticketing system project for local trains that allows users to book local train tickets and get ticket receipt online. This local train project provides login rights for normal users and admin. A normal user may login and get a ticket online, print it and travel by train. The ticketing process consists of a ticket booking form. The form allows the user to choose his source and destination. The source is the station from where the user will be boarding the train. Destination is the station he needs to get down at. The project database is already filled with stations on Mumbai western central and harbor line. It can be modified for any other city…
Read More

Student Faculty Document Sharing Android Project

Mobile Computing, Web Application
" Name Student Faculty Document Sharing Android Project Technology Android Category Mobile Computing Description This project is an online portal between students and faculty. This innovative system allows college faculty to share important data as well as notifications with engineering students. It consists of a faculty login along with student login. Since college faculty operates through pc and document uploading is simpler through a pc, the faculty login is to be performed through a computer. Faculty may upload documents of subject syllabus, timetable document, notifications, e notes etc through their provided login. The documents are uploaded by faculty to different corresponding departments. We propose to build this system on an online server that allows faculty to upload data and students may view search and download required documents through their android…
Read More

Android Graphical Information System

Mobile Computing, Web Application
" Name Android Graphical Information System Technology Android Category Mobile Computing Description The purpose of developing this android application is to search the places by inputting a keyword which smartly searches for the desired location and place. This application also enables users to add the missing places on the map by just providing the details. GIS for Tourist is an Android application which enables user to manually input data of new places with their attributes such as name of the place, area, location, phone no. (If Applicable) & image of that place. If some of the user is at such a location or place which doesn’t exist on a map then user can simply add the missing place on a map and also can capture and input image file while…
Read More

Geo Trends Classification Over Maps Android

Mobile Computing, Web Application
" Name Geo Trends Classification Over Maps Android Technology Android Category Mobile Computing Description The developed application is android based application from which multiple users can talk or comment about the latest trends. The application allows user to talk about ongoing latest trends from irrespective of user’s location. The application has the GPS (Global Positioning System) access to tag the GPS location of user while commenting or posting about the trend on an application. The system receives these GPS coordinates and allows the admin to check the coordinates of the user through a web application. The user may comment about various trends and can specify a special keyword using hash (#) tag. For ex. #Diwali. There is a web application developed for admin where admin will get to know about…
Read More

Android Based School Bus Tracking System

Mobile Computing, Web Application
" Name Android Based School Bus Tracking System Technology Android Category Mobile Computing Description This system is a combination of web as well as android application where the driver will be using the android application whereas admin and parent will be using web application. This application is meant for drivers who is driving the school bus. System allows admin to add a new driver where driver id and password is generated and stored into the system. The driver will have the android application installed in his android phone, when the driver will login to the application, his GPS location will be sent and stored into database. As soon as driver logs in, GPS location of the driver will be tracked automatically by the application and stores the GPS co-ordinates into…
Read More

Android Graphical Image Password Project

Mobile Computing, Web Application
" Name Android Graphical Image Password Project Technology Android Category Mobile Computing Description Picture Patten Locking System allows the user to set a Custom Picture may be from the gallery or click it instantly and set it as a Password. The Picture is then Divided into 9 parts and represented as a 3X3 Patten of Cubes for Authentication in any order i.e. they are scrambled. The User has to select all the Nine Cubes as per the Original Picture Row Wise similar to solving a puzzle. The Pictures are Stored in the Phones Device Memory with the Folder Named User’s Full Name Underscore User Id (username_userid). In this app if the user credentials are correct a Custom Calculator is opened, while you can use any app. IEEE Paper Year 2015…
Read More

Android Smart City Traveler

Mobile Computing, Web Application
Name Android Smart City Traveler Technology Android Category Mobile Computing Description The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes for…
Read More

Voice Assistant For Visually Impaired

Mobile Computing, Web Application
Name Voice Assistant For Visually Impaired Technology Android Category Mobile Computing Description This is an innovative System for visually impaired people and acts as a voice assistant for them. This system is used to help the visually impaired to have access to the most important features of the phone enhancing the quality of the system making use of different custom layouts and using speech to text. The System has custom messaging feature with inbox and sent items, call log and dialer, notes and battery level checking and reminder. All actions performed by the user the system speaks out and helps the user to know his current position. The System helps the user to also read the contents of the message along with the sender and the date and time, in…
Read More

Farming Assistance Web Service

Data mining, Networking, Parallel And Distributed System, Web Application
Name Farming Assistance Web Service Technology DotNET,MS SQL Category Web Application Description A Web project to help farmers ensure greater profitability through direct farmer to supplier and farmer to farmer communication. This service boosts business communication and brings transparency in the system. This innovative site allows for good farmer, retailer and supplier communication. It allows farmers to login and communicate to respective dealers. When dealers publish an advertisement or offer, the respective farmers get notified via Sms message. The farmers may also submit their greviences and complaints to respective dealers or authorities using their farmer login on a separate complaints page and authorities will get acess to that page regularly using their login id and passwords. IEEE Paper Yes IEEE Paper Year 2015
Read More

Smart Health Consulting Project

Data mining, Networking, Web Application
Name Smart Health Consulting Project Technology DotNET,MS SQL Category Web Application Description This system aims at maintaining patient health records and even getting appointments from various doctors for related treatments. The system user must register as a member of this system and keep updating his medical history. Patients can then select from a list of specialized doctors for respective treatments such as (skin specialist, ENT specialist cardiologist etc) at particular locations. Patients may also select suitable appointment timings for their meeting. This Project contains 7 useful areas: i. General User area ii. Doctor’s area iii. Patient’s area iv. Transaction/Blling area v. Administrator area vi. Pharmacy area vii. Insurance area IEEE Paper Yes IEEE Paper Year 2015
Read More

Graphical Password By Image Segmentation

Image Processing, Parallel And Distributed System, Security and Encryption, Web Application
Name Graphical Password By Image Segmentation Technology DotNET,MS SQL Category Web Application Description The project allows user to input an image as its password and only user knows what the image looks like as a whole. On receiving the image the system segments the image into an array of images and stores them accordingly. The next time user logs on to the system the segmented image is received by the system in a jumbled order. Now if user chooses the parts of image in an order so as to make the original image he sent then user is considered authentic. Else the user is not granted access. The system uses image segmentation based on coordinates. The coordinates of the segmented image allow the system to fragment the image and store…
Read More

Student Attendance System By Qr Scan

Mobile Computing, Networking, Web Application
Name Student Attendance System By Qr Scan Technology DotNET,MS SQL Category Web Application Description A system that takes down students attendance using Qr code. Every student is provided with a card containing a unique Qr code. Students just have to scan their cards in front of webcam and the system notes down their attendance as per dates. Each Qr code contains a unique id for students. System then stores all the students’ attendance records and generates defaulter list. It also generates an overall report in excel sheet for admin. Such type of application is very useful in school as well as in college for daily attendance. IEEE Paper Yes IEEE Paper Year 2015
Read More

Face Recognition Attendance System

Image Processing, Parallel And Distributed System, Web Application
Name Face Recognition Attendance System Technology DotNET,MS SQL Category Web Application Description The system is developed for deploying an easy and a secure way of taking down attendance. The software first captures an image of all the authorized persons and stores the information into database. The system then stores the image by mapping it into a face coordinate structure. Next time whenever the registered person enters the premises the system recognizes the person and marks his attendance along with the time. It the person arrives late than his reporting time, the system speaks a warning “you are xx minutes late! Do not repeat this.” Note: This system has around 40%-60% accuracy in scanning and recognizing faces. IEEE Paper Yes IEEE Paper Year 2015
Read More

Artificial Intelligence Dietician

Data mining, Parallel And Distributed System, Web Application
Name Artificial Intelligence Dietician Technology DotNET,MS SQL Category Web Application Description The online artificial dietician is a bot with artificial intelligence about human diets. It acts as a diet consultant similar to a real dietician. Dieticians are educated with nutrient value of foods. A dietician consults a person based on his schedule, body type, height and weight. The system too asks all this data from the user and processes it. It asks about how many hour the user works, his height, weight, age etc. The system stores and processes this data and then calculates the nutrient value needed to fill up users needs. The system then shows an appropriate diet to the users and asks if user is ok with it, else it shows other alternate diets to fill up…
Read More

Cursor Movement By Hand Gesture Project

Image Processing, Multimedia, Web Application
Name Cursor Movement By Hand Gesture Project Technology DotNET,MS SQL Category Web Application Description Name Automated Attendance System Technology DotNET,MS SQL Category Web Application Description We all wonder it would have been so comfortable if we could control cursor through the use of hand gestures. Well our proposed project puts forward a hand gesture based system that allows user to control the pc mouse movements through the use of hand movements. Our system uses pc webcam in order to detect hand gesture movements. The system continuously scans the camera input for five finger hand like patterns. Once a hand is detected, the system then locks it as an objects. A flag is set on the object in order to mark it as an object. After the object has been flagged…
Read More

Web Server to Client communication for web usage data analysis

Multimedia, Networking, Parallel And Distributed System, Web Application
Name Web Server to Client communication for web usage data analysis Technology DotNET,MS SQL Category Web Application Description We usually come across fields where web data proves very important for business as well as security analysis. Ecommerce as well as website usage data is of prime importance these days. Our proposed project puts for ward a system that allows a web server to record web data analytics of web usage patterns of various web links. The system is configured to record web page clicks, seo score computed as per a search engine ranking algorithm as well as other parameters associated with the each web page. The server has an inbuilt configuration logic required to scan live web pages similar to crawlers and then record/store that data for later processing. Since…
Read More

Customer Behaviour Prediction Using Web Usage Mining

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Customer Behaviour Prediction Using Web Usage Mining Technology DotNET,MS SQL Category Web Application Description Web usage mining involves first recording behavior and flow of customers on a website and then mining through this data for behavioural patterns. It is an important part of ecommerce world that allows websites to go through previously recorded web traffic data. Ecommerce sites analyse this data in order to provide better performance and also suggest better products and services to customers by identifying them next time. The system is tuned to record web shopping/buying patterns and track various analytics data that tend to provide future prediction statistics. The system scans for user budget tracking, tallying to previous years, user bounce rates- number of users returning from payment page and other site usage factors. Factors…
Read More

Web Mining For Suspicious Keyword Prominence

Cloud Computing, Data mining, Web Application
Name Web Mining For Suspicious Keyword Prominence Technology DotNET,MS SQL Category Web Application Description Web mining can be termed as an information mining method to naturally search, collect and organize data from indexed online records which might be in various organized, unstructured or semi-organized structure. We usually use web mining techniques in order to assess the viability of a specific web page/entity in order to figure out various factors related to it. This project consolidates the best researched mechanisms from the semantic web and synaptic web at low entropy in order to build structural engineering of Semantic-Synaptic web mining. Our proposed project aims at web mining for finding out density of selected keywords in order to check its keyword prominence on those web pages. This is an important factor in…
Read More

Credit Card Fraud Detection

Cloud Computing, Security and Encryption, Web Application
Name Credit Card Fraud Detection Technology DotNET,MS SQL Category Web Application Description The credit card fraud detection features uses user behavior and location scanning to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. If any unusual pattern is detected, the system requires revivification. The system analyses user credit card data for various characteristics. These characteristics include user country, usual spending procedures. Based upon previous data of that user the system recognizes unusual patterns in the payment procedure. So now the system may require the user to login again or even block the user for more than 3 invalid attempts. IEEE Paper Yes IEEE Paper Year 2015
Read More

Active Chat Monitoring and Suspicious Chat Detection over Internet

Data mining, Security and Encryption, Web Application
Name Active Chat Monitoring and Suspicious Chat Detection over Internet Technology DotNET,MS SQL Category Web Application Description A lot of terrorist activities and groups communicate over apps and chat programs over the internet. They also use these chat application over the internet for getting their message to young generation and making new terrorists. Well we here propose a internet chat application that actively monitors various chats going on and also alerts the admin about any suspicious chat process taking place. The system is built to process all chats taking place over and saving them with history. The chat process is handled by server. As data passes through server it continuously scans it for any suspicious keywords. The admin may however keep a watch at any chat he desires. A special…
Read More

Internet Based Live Courier Tracking And Delivery System

Networking, Web Application
Name Internet Based Live Courier Tracking And Delivery System Technology DotNET,MS SQL Category Web Application Description Courier service providers usually have a very large network across countries. A courier goes through several places including distribution center, aeroplane, ship, road transport etc. At this time even customer is conscious about where has his package reached. The customer can track his courier through a login where he may enter this courier number and track the location status of his package. Here we propose a dedicated courier tracking system where customer may check the status and location of his courier. Here every distribution channel including centre, airport terminal, rail, road terminal has a system operated by authorized people of that particular point of distribution. Each point of distribution has its login access. On…
Read More

Secure Remote Communication Using DES Algorithm

Networking, Security and Encryption, Web Application
Name Secure Remote Communication Using DES Algorithm Technology DotNET,MS SQL Category Web Application Description The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here…
Read More

Automated College Timetable Generator

Multimedia, Web Application
Name Automated College Timetable Generator Technology DotNET,MS SQL Category Web Application Description Most colleges have a number of different courses and each course has a number of subjects. Now there are limited faculties, each faculty teaching more than one subjects. So now the time table needed to schedule the faculty at provided time slots in such a way that their timings do not overlap and the time table schedule makes best use of all faculty subject demands. We use a genetic algorithm for this purpose. In our Timetable Generation algorithm we propose to utilize a timetable object. This object comprises of Classroom objects and the timetable for every them likewise a fitness score for the timetable. Fitness score relates to the quantity of crashes the timetable has regarding alternate calendars…
Read More

Criminal Investigation Tracker with Suspect Prediction

Data mining, Multimedia, Networking, Web Application
Name Criminal Investigation Tracker with Suspect Prediction Technology DotNET,MS SQL Category Web Application Description We here propose a criminal investigation tracker system that tracks the investigation status of criminal cases with logs and also predicts primary suspects. The system is proposed to help agencies like CBI, CID and other such bureau’s to sped up investigation process and track status of multiple cases at a time. The system keeps logs of a case which includes case summary, people involved, disputes, past criminal history of those involved, Items recovered on scene and other details. The system realizes the type of case, allows admin to update the status of investigation, upload more images of crime, items found on scene etc. This allows authorized officers to check case status and look into its status…
Read More

Automated Payroll With GPS Tracking And Image Capture

Mobile Computing, Networking, Web Application
Name Automated Payroll With GPS Tracking And Image Capture Technology DotNET,MS SQL Category Web Application Description This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again the…
Read More

Opinion Mining For Social Networking Site

Data mining, Parallel And Distributed System, Web Application
Name Opinion Mining For Social Networking Site Technology DotNET,MS SQL Category Web Application Description This system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application. Here the user will post his views related to some subject other users will view this post and will comment on this post. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. These changes can be viewed by various users. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is…
Read More

Web Data Mining To Detect Online Spread Of Terrorism

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Web Data Mining To Detect Online Spread Of Terrorism Technology DotNET,MS SQL Category Web Application Description Terrorism has grown its roots quite deep in certain parts of the world. With increasing terrorist activities it has become important to curb terrorism and stop its spread before a certain time. So as identified internet is a major source of spreading terrorism through speeches and videos. Terrorist organizations use internet to brain wash individuals and also promote terrorist activities through provocative web pages that inspire helpless people to join terrorist organizations. So here we propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Data mining is a technique used to mine out patterns of useful data from large data sets and make…
Read More

Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining Technology DotNET,MS SQL Category Web Application Description As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company people itself in order to make in order to produce false positive product reviews. They give good reviews for many different products manufactured by their own firm. User will not be able to find out whether the review is genuine or fake. To find out fake review in the website this “Fake Product Review Monitoring and…
Read More

Monitoring Suspicious Discussions On Online Forums Using Data Mining

Data mining, Networking, Security and Encryption, Web Application
Name Monitoring Suspicious Discussions On Online Forums Using Data Mining Technology DotNET,MS SQL Category Web Application Description People now-a-days are very fond of using internet as a discussion medium. As internet technology had been increasing more and more, this technology led to many legal and illegal activities. It is found that much first-hand news has been discussed in Internet forums well before they are reported in traditional mass media. This communication channel provides an effective channel for illegal activities such as dissemination of copyrighted movies, threatening messages and online gambling etc. The law enforcement agencies are looking for solutions to monitor these discussion forums for possible criminal activities and download suspected postings as evidence for investigation. We propose a system which will tackle this problem effectively. In this project we…
Read More

Movie Success Prediction Using Data Mining

Data mining, Multimedia, Networking, Web Application
Name Movie Success Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description In this system we have developed a mathematical model for predicting the success class such as flop, hit, super hit of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, super hit label. Admin will add the film crew data. Admin will add movies data of a particular film crew. Admin will add new movie data along with film crew…
Read More

Opinion Mining For Comment Sentiment Analysis

Cloud Computing, Data mining, Networking, Web Application
Name Opinion Mining For Comment Sentiment Analysis Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Comment Sentiment Analysis system that detects hidden sentiments in comments and rates the post accordingly. The system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Comment Sentiment Analysis is a web application which gives review of the topic that is posted by the user. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Once the user logins to the system, user can view…
Read More

Opinion Mining For Restaurant Reviews

Data mining, Networking, Parallel And Distributed System, Web Application
Name Opinion Mining For Restaurant Reviews Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Restaurant Review system that detects hidden sentiments in feedback of the customer and rates the restaurant accordingly. The system uses opinion mining methodology in order to achieve desired functionality. Opinion Mining for Restaurant Reviews is a web application which gives review of the feedback that is posted. The System takes feedback of various users, based on the opinion, system will specify whether the posted restaurant is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user feedback is ranked. Once the user login to the system he views the restaurant and gives…
Read More

Railway Tracking and Arrival Time Prediction

Mobile Computing, Multimedia, Networking, Security and Encryption, Web Application
Name Railway Tracking and Arrival Time Prediction Technology DotNET,MS SQL Category Web Application Description It has happened so many times that you have been waiting on railway station for someone to arrive and you don’t have any exact information about train timing and other stuff. So here we present to you a project on Railway Tracking and Arrival Time Prediction. Using this system user’s can get the information about train timing, and is it on time or not, and other information. In this, system will track the train timing at what time train departed from a particular station and pass these timing details to other station’s system where it will display the timing according to train departed from previous station. If system will find any delay in train due to…
Read More

Weather Forecasting Using Data Mining

Cloud Computing, Data mining, Multimedia, Networking, Web Application
Name Weather Forecasting Using Data Mining Technology DotNET,MS SQL Category Web Application Description Weather forecasting is the application of science and technology to predict the state of the atmosphere for a given location. Ancient weather forecasting methods usually relied on observed patterns of events, also termed pattern recognition. For example, it might be observed that if the sunset was particularly red, the following day often brought fair weather. However, not all of these predictions prove reliable. Here this system will predict weather based on parameters such as temperature, humidity and wind. This system is a web application with effective graphical user interface. User will login to the system using his user ID and password. User will enter current temperature; humidity and wind, System will take this parameter and will predict…
Read More

E Commerce Product Rating Based On Customer Review Mining

Data mining, Networking, Parallel And Distributed System, Web Application
Name E Commerce Product Rating Based On Customer Review Mining Technology DotNET,MS SQL Category Web Application Description There are many users who purchase products through E-commerce websites. Through online shopping many E-commerce enterprises were unable to know whether the customers are satisfied by the services provided by the firm. This boosts us to develop a system where various customers give reviews about the product and online shopping services, which in turn help the E-commerce enterprises and manufacturers to get customer opinion to improve service and merchandise through mining customer reviews. An algorithm could be used to track and manage customer reviews, through mining topics and sentiment orientation from online customer reviews. In this system user will view various products and can purchase products online. Customer gives review about the merchandise…
Read More

Fingerprint Based ATM System

Multimedia, Web Application
Name Fingerprint Based ATM System Technology DotNET,MS SQL Category Web Application Description Fingerprint Based ATM is a desktop application where fingerprint of the user is used as a authentication. The finger print minutiae features are different for each human being so the user can be identified uniquely. Instead of using ATM card Fingerprint based ATM is safer and secure. There is no worry of losing ATM card and no need to carry ATM card in your wallet. You just have to use your fingerprint in order to do any banking transaction. The user has to login using his fingerprint and he has to enter the pin code in order to do further transaction. The user can withdraw money from his account. User can transfer money to various accounts by mentioning…
Read More

Sentiment Analysis for Product Rating

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Web Application
Name Sentiment Analysis for Product Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Sentiment Analysis for Product Rating system that detects hidden sentiments in comments and rates the product accordingly. The system uses sentiment analysis methodology in order to achieve desired functionality. This project is an E-Commerce web application where the registered user will view the product and product features and will comment about the product. System will analyze the comments of various users and will rank product. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user comment is ranked. Comment will be analyzed by comparing the comment with the keywords stored in database. The System takes comments…
Read More

Detecting E Banking Phishing Websites Using Associative Classification

Data mining, Multimedia, Networking, Security and Encryption, Web Application
Name Detecting E Banking Phishing Websites Using Associative Classification Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption…
Read More

Fingerprint Voting System Project

Multimedia, Parallel And Distributed System, Web Application
Name Fingerprint Voting System Project Technology DotNET,MS SQL Category Web Application Description Fingerprint Based Voting Project is a application where the user is recognized by his finger pattern. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. Voter can vote the candidate only once, the system will not allow the candidate to vote for the second time. The system will allow admin to add the candidate name and candidate photo who are nominated for the election. Admin only has the right to add…
Read More

Image Steganography With 3 Way Encryption

Cloud Computing, Parallel And Distributed System, Security and Encryption, Web Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Content Summary Generation Using NLP

Data mining, Parallel And Distributed System, Web Application
Name Content Summary Generation Using NLP Technology DotNET,MS SQL Category Web Application Description To find prominent summarized points in a collection of documents. We here propose a system to detect summarized points from a huge or multiple paragraph. We use an efficient method to discover summarized points from the provided content using Natural language processing (NLP). The provided content is divided into two parts as Summarized Content and Summarized Point. One would expect particular words to appear in the content more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about…
Read More

Android Smart City Traveler

Mobile Computing, Parallel And Distributed System, Web Application
Name Android Smart City Traveler Technology DotNET,MS SQL Category Web Application Description The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes…
Read More

Periodic Census With Graphical Representation

Cloud Computing, Mobile Computing, Networking, Web Application
Name Periodic Census With Graphical Representation Technology DotNET,MS SQL Category Web Application Description A census is the procedure of systematically acquiring and recording information about the members of a given population. It is a regularly occurring and official count of a particular population. The term is used mostly in connection with national population and housing censuses; other common censuses include agriculture, business, and traffic censuses. The United Nations defines the essential features of population and housing censuses as “individual enumeration, universality within a defined territory, simultaneity and defined periodicity”, and recommends that population censuses be taken at least every 10 years. United Nations recommendations also cover census topics to be collected, official definitions, classifications and other useful information to co-ordinate international practice. IEEE Paper Yes IEEE Paper Year 2015
Read More

Product Review Analysis For Genuine Rating

Data mining, Networking, Web Application
Name Product Review Analysis For Genuine Rating Technology DotNET,MS SQL Category Web Application Description Here we propose an advanced Products Review analysis system which provides a platform to registered users to rate a particular or multiple products using this system. The system uses product review analysis in order to achieve desired functionality. Product review analysis is a web application which consist multiple products added by admin to review to rate and review them. The System takes reviews of various users, based on their personal opinion, system will specify whether the posted product is good, bad, or worst. We use a database of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user review is ranked. Once the user login…
Read More

Smart Health Prediction Using Data Mining

Data mining, Multimedia, Networking, Parallel And Distributed System, Web Application
Name Smart Health Prediction Using Data Mining Technology DotNET,MS SQL Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Health Prediction system is an end user support and online consultation project. Here we propose a system that allows users to get instant guidance on their health issues through an intelligent health care system online. The system is fed with various symptoms and the disease/illness associated with those systems. The system allows user to share their symptoms and issues. It then processes users symptoms to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness that…
Read More

Graphical Password To Avoid Shoulder Surfing

Multimedia, Security and Encryption, Web Application
Name Graphical Password To Avoid Shoulder Surfing Technology DotNET,MS SQL Category Web Application Description Since conventional password schemes are vulnerable to shoulder surfing, many shoulder surfing resistant graphical password schemes have been proposed. However, as most users are more familiar with textual passwords than pure graphical passwords, text-based graphical password schemes have been proposed. Unfortunately, none of existing text-based shoulder surfing resistant graphical password schemes is both secure and efficient enough. In this paper, we propose an improved text-based shoulder surfing resistant graphical password scheme by using colours. In the proposed scheme, the user can easily and efficiently login system. Next, we analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder surfing and accidental login. The shoulder surfing attack in…
Read More

Student Grade Prediction Using C4.5 Decision Tree

Data mining, Multimedia, Networking, Web Application
Name Student Grade Prediction Using C4.5 Decision Tree Technology DotNET,MS SQL Category Web Application Description We here come up with a system where student final grade is predicted based on the marks he had scored during his previous course and years. In order to predict the grade of the student we need some data to analyze and to predict the grade. So we will input student basic information and their previous academic information into the system which will be used to predict the grade of the student. We here used an effective data mining algorithm to predict the result. We used C4.5 decision tree algorithm to predict the grade of the student.C4.5 is a program for inducing classification rules in the form of decision trees from a set of given…
Read More

Online user Behavior Analysis On Graphical Model

Data mining, Parallel And Distributed System, Web Application
Name Online user Behavior Analysis On Graphical Model Technology DotNET,MS SQL Category Web Application Description Online shopping is growing on large scale. People purchase their products via internet. They just have to choose their products and make the payment. Users get their products on doorstep. Online shopping had made people’s life easier and faster. As online shopping is increasing, large amount of data on people’s online activities have become available on web. Use of such data can benefit a lot of applications. User behavior, online customer classification can be extracted from these web data. We proposed a system where we can extract the user’s online shopping behavior. System will extract user’s online behavior pattern and will show in graphical format. This graphical format helps the admin during decision making process.…
Read More

Implementing Triple DES With OTP

Parallel And Distributed System, Security and Encryption, Web Application
Name Implementing Triple DES With OTP Technology DotNET,MS SQL Category Web Application Description Triple DES is advantageous because it has a significantly sized key length, which is longer than most key lengths affiliated with other encryption modes. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Triple DES encrypts input data three times. The three keys are referred to as k1, k2 and k3. Thus due to the use of 3 key ,triple DES is more secure and is sometimes preferred over the normal DES. The system combines…
Read More

Image Character Recognition Using Signal & Pattern Analysis

Multimedia, Parallel And Distributed System, Web Application
Name Image Character Recognition Using Signal & Pattern Analysis Technology DotNET,MS SQL Category Web Application Description Optical character recognition is conversion of images of typed, handwritten or printed text into machine-encoded text from image. Here we come up with system where pattern of the image is extracted and image text is recognized using Optical character recognition in matlab. System will recognize the pattern and will detect the characters in image. And will display those characters as output. Since image can be scanned photos or other images. We applied image preprocessing steps in order to extract only text from image. Image patterns will be stored in another directory. The query image is compared with image patterns stored in database. If image matches with the pattern stored in directory, system will apply…
Read More

Secure File Storage On Cloud Using Hybrid Cryptography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure File Storage On Cloud Using Hybrid Cryptography Technology DotNET,MS SQL Category Web Application Description The proposed software product is liable to meet the required security needs of data center of cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum throughput for encryption and decryption from other symmetric algorithms. The idea of splitting and merging adds on to meet the principle of data security. The hybrid approach when deployed in cloud environment makes the remote server more secure and thus, helps the cloud providers to fetch more trust of their users. For data security and privacy protection issues, the fundamental challenge of separation of sensitive data and access control is fulfilled. Cryptography technique translates original data into unreadable form. Cryptography technique is divided…
Read More

Search Engine Using Web Annotation

Networking, Parallel And Distributed System, Web Application
Name Search Engine Using Web Annotation Technology DotNET,MS SQL Category Web Application Description When user enters some words in search engine, system fetches automatically those pages which contain those words this happens due to web annotation. Web annotation has become one of the ongoing research topics. Here in this project we will apply web annotation on pages or images. User must enter the image names he is searching for and system will fetch those images which contains same image annotation. Web annotation helps to create user friendliness. A web annotation which is associated with web resources such as web pages or images. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself. Web annotations are visible to the…
Read More

Card Payment Security Using RSA

Cloud Computing, Parallel And Distributed System, Security and Encryption, Web Application
Name Card Payment Security Using RSA Technology DotNET,MS SQL Category Web Application Description Due to increasing e-commerce activity nowadays, there is a need for some encryption technique to ensure security and a way to ensure that the user’s data are securely stored in the database. Thus the system introduces RSA for this purpose. The RSA algorithm is a kind of asymmetric encryption algorithm which appeared in 1978. The algorithm is public key encryption algorithm which is a widely accepted and implemented by public. The use of RSA in this the system makes the process more secure. Now the bank transactions can be done securely without worrying about attacker getting access to the database as the data will be in encrypted form. IEEE Paper Yes IEEE Paper Year 2015
Read More

Preventing Phishing Attack On Voting System Using Visual Cryptography

Cloud Computing, Multimedia, Parallel And Distributed System, Security and Encryption, Web Application
Name Preventing Phishing Attack On Voting System Using Visual Cryptography Technology DotNET,MS SQL Category Web Application Description Voting system Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place. The election is held in full confidentiality by applying appropriate security measures to allow the voter to vote for any participating candidate only if he logs into the system by entering the correct password which is generated by merging the two shares using VC scheme. Administrator sends share 1 to voter e-mail id before election and share 2 will be available in the voting system for his login during election. Voter will get the secret password to cast his…
Read More

Detecting Phishing Websites Using Machine Learning

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web Application
Name Detecting Phishing Websites Using Machine Learning Technology DotNET,MS SQL Category Web Application Description There are number of users who purchase products online and make payment through various websites.There are multiple websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of websites is known as phishing website. In order to detect and predict phishing website, we proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate.…
Read More

E Authentication System Using QR Code & OTP

Cloud Computing, Data mining, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name E Authentication System Using QR Code & OTP Technology DotNET,MS SQL Category Web Application Description In the proposed scheme, the user can easily and efficiently login into the system. We analyze the security and usability of the proposed scheme, and show the resistance of the proposed scheme to hacking of login credentials, shoulder surfing and accidental login. The shoulder surfing attack can be performed by the adversary to obtain the user’s password by watching over the user’s shoulder as he enters his password. Since, we have come up with a secure system schemes with different degrees of resistance to shoulder surfing have been proposed. In order to use this authentication system, user need to first register himself into this system by filing up the basic registration details. After a…
Read More

Organizational Procurement Management System

Web Application
Name Organizational Procurement Management System Technology DotNET,MS SQL Category Web Application Description Many domestic enterprises not only procurement costs, labour costs remain high. Especially with the continuous development of enterprises, procurement has expanded the traditional mode of operation and methods of procurement cannot meet the needs of modern enterprise procurement. In order to achieve the pursuit of efficiency and effectiveness, the establishment of procurement management information system is very necessary. In this paper, detailed analysis of the many drawbacks of purchasing management of domestic enterprises on the basis of the procurement and put forward their own views of management information systems, and we using Asp.net technology to establish a specific experimental model. Today, different organizations employ various management techniques to carry out the efficient functioning of their departments. Procurement management…
Read More

Traffic Signal: Management & Control System

Multimedia, Parallel And Distributed System, Web Application
Name Traffic Signal: Management & Control System Technology MsSql, Dot NET Category Web Application Description This innovative software projects is an effective traffic signal management project that allows for managing 4 way traffic signal management system. The system consists of 4 signals corresponding to each road. We here propose a density based traffic signal scheduling algorithm. The system is designed to manage traffic signal timings based on the density of traffic on its corresponding road. The system represents the traffic strength of a road graphically using traffic judgments. By measuring the traffic lined up on a particular road the signal timings are adjusted to let that particular way clear out and then the next populated one. The entire system works according to an algorithm that allows for smooth and efficient…
Read More

Question paper generator system

Parallel And Distributed System, Web Application
Name Question paper generator system Technology MsSql, Dot NET Category Web Application Description In this system we present a smart question paper generating system. In our system we allow administrator to input a set of questions and respective answers for option ticking. We also allow admin to provide weight age and complexity for each of these questions. After this the questions are stored in database along with their weight age. Now on question paper generating time the admin just has to select the percentage of difficulty. On this selection the system selects questions randomly in a way that their weight age makes up for 100 marks and according to difficulty that admin chooses the questions are chosen based on their complexity level. After this q paper is converted to pdf…
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Image Encryption For Secure Internet Transfer Technology MsSql, Dot NET Category Web Application Description Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Data Transfer Over Internet Using Image Steganography Technology MsSql, Dot NET Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly,…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web Application
Name Sending a secure message over a network to a remote site Technology MsSql, Dot NET Category Web Application Description We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection.…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security and Encryption, Web Application
Name Improved Data Leakage Detection Technology MsSql, Dot NET Category Web Application Description Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable…
Read More

Sentiment Based Movie Rating System

Data mining, Networking, Web Application
Name Sentiment Based Movie Rating System Technology MsSql, Dot NET Category Web Application Description We usually come across movie rating websites where users are allowed to rate ad comment on movies online. These ratings are provided as input to the website rating system. The admin then checks reviews, critic’s ratings and displays an online rating for every movie. Here we propose an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system now analyzes this data to check for user sentiments associated with each comment. Our system consists of a sentiment library designed for English as well as hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web Application
Name Secure Electronic Fund Transfer Over Internet Using DES Technology MsSql, Dot NET Category Web Application Description Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using…
Read More

Bikers Portal

Web Application
Name Bikers Portal Technology MsSql, Dot NET Category Web Application Description This is an online Bike and bike parts store that has listings of various bike along with their features. It also consists of Bike service Registration. This system allows user to buy bike, bike parts and inventory online. System allow user to check various articles submitted by user and even comment on them. Credit card payment facility is available. This system also consists of ‘Rent a Bike’ feature where user can ask admin for bike on rent. The visitor who visits the system must register himself by filling up personal details. After registration user can login to the system with his username and password in order to access the system. User can check various bike listing and can view…
Read More

College Enquiry Chat Bot

Data mining, Multimedia, Parallel And Distributed System, Web Application
Name College Enquiry Chat Bot Technology MsSql, Dot NET Category Web Application Description The College bot project is built using artificial algorithms that analyses user’s queries and understand user’s message. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chating. Students can chat using any format there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate what the user queries. The User can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The System analyses the question and than answers to the user. The system…
Read More

Unique User Identification Across Multiple Social Networks

Multimedia, Security and Encryption, Web Application
Name Unique User Identification Across Multiple Social Networks Technology MsSql, Dot NET Category Web Application Description There are number of social network sites that connect a large amount of people around the world. All social networking sites differ from each other based on various components such as Graphical User Interface, functionality, features etc. Many users have virtual identities on various social network sites. It is common that people are users of more than one social network and also their friends may be registered on multiple social network sites. User may login to different social networking sites at different timing, so user may not find his friends online when he logins to the particular social networking website. To overcome this issue our proposed system will bring together our online friends on…
Read More

Heart Disease Prediction Project

Data mining, Multimedia, Web Application
Name Heart Disease Prediction Project Technology MsSql, Dot NET Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Heart Disease Prediction application is an end user support and online consultation project. Here, we propose a web application that allows users to get instant guidance on their heart disease through an intelligent system online. The application is fed with various details and the heart disease associated with those details. The application allows user to share their heart related issues. It then processes user specific details to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess the most accurate illness…
Read More

Warehouse Management System

Web Application
Name Warehouse Management System Technology MsSql, Dot NET Category Web Application Description The Warehouse Management System is a real-time warehouse database capable of handling large inventories of an organization. This can be used to track the inventory of a single store, or to manage the distribution of stock between several stores of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. The main goal of Warehouse Management System is to ensure consistent availability of supplies for consumers. Thus, Warehouse Management System is directed toward owners of small to large stores and stock managers who are responsible of maintaining…
Read More

Exam Cell Automation System

Web Application
Name Exam Cell Automation System Technology MsSql, Dot NET Category Web Application Description Currently Exam cell activity mostly includes a lot of manual calculations and is mostly paper based. The project aims to bring in a centralized system that will ensure the activities in the context of an examination that can be effectively managed. This system allows students to enroll themselves into the system by registering their names or by sharing details to admin. This is done by providing their personal and all the necessary details like Name, email, examination, semester, etc. The provided details are then entered by admin into the system to create their hall tickets and also creates login id and password for them. After creating the hall ticket, the system mails the link of soft copy…
Read More

Cooperative Housing Society Manager Project

Mobile Computing, Networking, Web Application
Name Cooperative Housing Society Manager Project Technology MsSql, Dot NET Category Web Application Description The Housing Society Management System allows members to login with their own account and get updated with society happenings. This system is the web portal to reduce conflicts among society members. The system has automated functionality for calculating monthly maintenance bill as well as members can view their bill status using their account. The system provides a unique interface to every user to interact with the system. System accepts queries from users and evaluates the need of the query and fires it over the database and results are displayed to the user. This system of maintaining a society is made in such a manner, so that the most common problem faced in residential societies are solved.…
Read More

Smart Cab System Using Barcode Scan

Networking, Web Application
Name Smart Cab System Using Barcode Scan Technology MsSql, Dot NET Category Web Application Description Smart Cab Barcode is a system that provides better service for Cab Drivers as well as Passengers. By using smart cab barcode, you can travel and pay using your travel card and all the payment will be done using this card. Here, we have an Admin who can register Drivers to this system by feeding details and his image into the system. Admin will also register users using his details and image into the system he will get a unique code and traveler’s card with this unique code, using which he can pay in future. Admin also has rights so add balance into the users account and he can view all details of User and…
Read More

Topic Detection Using Keyword Clustering

Data mining, Networking, Parallel And Distributed System, Web Application
Name Topic Detection Using Keyword Clustering Technology MsSql, Dot NET Category Web Application Description To find prominent topic in a collection of documents. We here propose a system to detect topic from a collection of document. We use an efficient method to discover topic in a collection of documents known as topic model. A topic model is a type of statistical model for discovering topics from collection of documents. One would expect particular words to appear in the document more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats…
Read More

A New Hybrid Technique For Data Encryption

Networking, Security and Encryption, Web Application
Name A New Hybrid Technique For Data Encryption Technology MsSql, Dot NET Category Web Application Description Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption technique, data encryption techniques using Fibonacci series, XOR logic, PN sequence are studied, analyzed and their performance is compared in this paper. The message is divided into three parts and these three different techniques are applied to these parts and the performance is again analyzed. The application of these three different methods to…
Read More

High Security Encryption Using AES & Visual Cryptography

Multimedia, Networking, Security and Encryption, Web Application
Name High Security Encryption Using AES & Visual Cryptography Technology MsSql, Dot NET Category Web Application Description A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates to the requirement of increased network security and better and fast encryption algorithms. This system addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security and Encryption, Web Application
Name Data Duplication Removal Using File Checksum Technology MsSql, Dot NET Category Web Application Description Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in…
Read More

Expression Identification Using Image Processing

Image Processing, Web Application
Name Expression Identification Using Image Processing Technology MsSql, Dot NET Category Web Application Description There can be number of expression to explore emotions. Here we proposed a system where emotions can be analyzed and studied about emotions based on expression recognition technology. We will be working on images. Images are prone to noise so we will be using image preprocessing methodology to remove noise from image and to get accurate result. There will be expressive images stored in folder we extract color value of these images and store it into dataset. Filter is used to remove noise from image. Image is given as input to the system. We used an effective algorithm to recognize the expression. The proposed system is able to detect expression with 50%-60% success rate. IEEE Paper…
Read More

E Banking Log System

Web Application
Name E Banking Log System Technology MsSql, Dot NET Category Web Application Description The E-Banking Log system features uses user behavior and location scanning to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. If any unusual pattern is detected, the system requires re-verification. The system analyses user credit card data for various characteristics. These characteristics include user country, usual spending procedures. Based upon previous data of that user the system recognizes where Sequential Pattern Mining Algorithm will be applied, where system will mine the previous transaction, and check if the current transaction exceeds the amount or system feels that the user is not official user then system will block him, or if system…
Read More

Financial Status Analysis Using Credit Score Rating

Web Application
Name Financial Status Analysis Using Credit Score Rating Technology MsSql, Dot NET Category Web Application Description Banks and credit card companies use credit scores of the consumers. This banks and Credit Card Score Company lend money to the consumers based on the credit score of the consumer. Consumer can have poor, fair, good or excellent credit scores. Based on these credit score banker and credit company provide money to the consumer. We here proposed a web based application that keeps track of people’s credit scores. This system can be used by the consumers to know their credit score. User must register himself by adding the personal details and credit card and credit details. System will provide user with credentials to access the system. User can access his personal details as…
Read More

Using Data Mining To Improve Consumer Retailer Connectivity

Data mining, Web Application
Name Using Data Mining To Improve Consumer Retailer Connectivity Technology MsSql, Dot NET Category Web Application Description Many consumers prefer online shopping. Day-to-day busy schedule made many consumers to visit online e-commerce websites for shopping. This saves time and cost of the consumer. With the growth of the e-commerce websites retailers tend to fail to attract more and more consumers. Consumers no longer feel difference between e-shopping and offline shopping. We proposed a system of connecting the consumer and the retailer. This system creates a bridge between consumer and retailer. We had implemented an effective data mining algorithm to analyze new patterns and trends. This system will gather data from the customer behavior pattern and is supplied to the retailers, so that retailers will able to know the new patterns…
Read More

Symptom Based Clinical Document Clustering by Matrix Factorization

Data mining, Web Application
Name Symptom Based Clinical Document Clustering by Matrix Factorization Technology MsSql, Dot NET Category Web Application Description Here we proposed a Doctor’s clinic management kind of system, where patients will visit the clinic and if the patient is new to clinic, then receptionist will feed his/her details into the system else if the patient is already registered then the receptionist will search for the patient’s name and add into the queue. When the patients turn appear, doctor will be able to see his/her details and also can check details about previous conditions if any. After doctor sees the patient, he will make entry of medicines patient needs to take. Receptionist will get those details, and there will be a section to add symptom. So at the end we will have…
Read More

Cancer Prediction Using Data Mining

Data mining, Web Application
Name Cancer Prediction Using Data Mining Technology MsSql, Dot NET Category Web Application Description It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Cancer Disease Prediction application is an end user support and online consultation project. Here, we propose a web application that allows users to get instant guidance on their cancer disease through an intelligent system online. The application is fed with various details and the cancer disease associated with those details. The application allows user to share their health related issues for cancer prediction. It then processes user specific details to check for various illness that could be associated with it. Here we use some intelligent data mining techniques to guess…
Read More

TV Show Popularity Analysis Using Data Mining

Data mining, Web Application
Name TV Show Popularity Analysis Using Data Mining Technology MsSql, Dot NET Category Web Application Description Reality TV is the new mantra of television producers and channel executives. It is the means to increase TRP ratings and the end is always to outdo the other channels and the “similar -but-tweaked-here-and-there” shows churned out by the competition. Most of the television shows which are being telecast nowadays are reality shows specializing in dancing, singing, and acting. We conclude to build such a system that will recognize people’s sentimental comments on TV shows. The comments from the viewer will be extracted along with the viewer details such as gender, location, etc…The comments will be gathered from various sources and the entry will be maintained into the excel sheet. The excel file will…
Read More

Secure Backup Software System

Cloud Computing, Web Application
Name Secure Backup Software System Technology MsSql, Dot NET Category Web Application Description Using Software backup system, users can store files, documents, images, videos through windows application in a secured manner. In this user can store documents and files in any format which is kept in a separate folder made for each user. The stored folder is only accessible to the authorized users who can access their own folder. It’s a windows application, where all the file details store in SQL Database. If the user found to be unauthorized by the admin, then admin can block a user and also can unblock it whenever required. IEEE Paper Yes IEEE Paper Year 2015
Read More

Online Pizza Ordering System

Networking, Web Application
Name Online Pizza Ordering System Technology MsSql, Dot NET Category Web Application Description You must have ordered your pizzas on phone for home delivery. The process seems easy to use but at times there is miscommunication. As there is no visual menu shown during a phone call, the employees have to repeat a lot of things again and again to the customers. It’s a time consuming process which at times irritates customers. Also it takes a lot of time of the pizzeria staff. It would be much more comfortable for the customers to have an online pizza ordering system. It would be hassle free for users as they can select the pizzas they want and make payment for it. Also it will reduce the purchasing time for customers. Let us…
Read More

Intelligent Tourist Guide

Web Application
Name Intelligent Tourist Guide Technology MsSql, Dot NET Category Web Application Description Nowadays people use mobile phones and other mobile devices. Most of us have a small computing device that is always with us. People use it example for calling, as calendar and organizer. Mobile devices with GPS receiver are also used to find paths in navigation. The main idea of this thesis was to design a system that will run on most of phones and palms and will be helpful when visiting some new places and cities. This system should be able to find a route using user criteria. Those criteria should be simple and natural, like for example: a list of museums, the most famous historical objects, restaurants to visit, constraints to travel by bus and by walking.…
Read More

Encryption & Decryption Using Deffie Hellman Algorithm

Multimedia, Security and Encryption, Web Application
Name Encryption & Decryption Using Deffie Hellman Algorithm Technology MsSql, Dot NET Category Web Application Description The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio…
Read More

Detecting Fraud Apps Using Sentiment Analysis

Data mining, Networking, Web Application
Name Detecting Fraud Apps Using Sentiment Analysis Technology MsSql, Dot NET Category Web Application Description Most of us use android and IOS Mobiles these days and also uses the play store or app store capability normally. Both the stores provide great number of application but unluckily few of those applications are fraud. Such applications dose damage to phone and also may be data thefts. Hence, such applications must be marked, so that they will be identifiable for store users. So we are proposing a web application which will process the information, comments and the review of the application. So it will be easier to decide which application is fraud or not. Multiple application can be processed at a time with the web application. Also User cannot always get correct or…
Read More

Data Standardization Using Hidden Markov Model

Security and Encryption, Web Application
Name Data Standardization Using Hidden Markov Model Technology MsSql, Dot NET Category Web Application Description Record linkage refers to the process of joining records that relate to the same entity or event in one or more data collections. In the absence of a shared, unique key, record linkage involves the comparison of ensembles of partially-identifying, non-unique data items between pairs of records. Data items with variable formats, such as names and addresses, need to be transformed and normalized in order to validly carry out these comparisons. Traditionally, deterministic rule-based data processing systems have been used to carry out this pre-processing, which is commonly referred to as “standardization”. This project describes an alternative approach to standardization, using a combination of lexicon-based tokenization and probabilistic Hidden Markov Models (HMMs). The project is…
Read More

Advanced Intelligent Tourist Guide

Web Application
Name Advanced Intelligent Tourist Guide Technology MsSql, Dot NET Category Web Application Description The project is developed using Visual Studio with Asp .Net as programming language. There are two entities who will have the access to the system. One is the admin and another one will be the registered user. Admin will add places with their details such as place name, image, address, area, latitude-longitude, tags and description. Admin can view all the added places and also can edit if required. User is new he/she will have to fill the registration form (username, password, email, full name, contact no. and type of places i.e. tags.). After registration, user can login with the valid id and password. After login, user will get the places recommendation based on the preferences which were…
Read More

Automated Payroll With GPS Tracking And Image Capture

Mobile Computing, Web Application
Name Automated Payroll With GPS Tracking And Image Capture Technology Android, Dot net Category Mobile Computing Description This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again…
Read More

Android Smart Ticketing Using Rfid

Mobile Computing
Name Android Smart Ticketing Using Rfid Technology Android, Dot net Category Mobile Computing Description This is an advanced Ticketing System making it easier for the commuter to travel in the bus and the driver to keep exact records of the passengers. This System is a web and Android Based System where the Android will have to apps one for the passenger and one for the bus which is connected to the RFID Reader while the web part is Purely Admin to set the fares and bus tops and to keep and monitor the current updates of a particular bus and passengers on it. This System has the potential of letting the admin know where the bus is exactly and how many passengers are travelling on the bus with their details.…
Read More

Restaurant Table Booking Android Application

Mobile Computing
Name Restaurant Table Booking Android Application Technology Android, Dot net Category Mobile Computing Description Table management systems and restaurant reservation systems are becoming increasingly sophisticated, if you’re considering installing a reservation system for your restaurant there are a number of factors to consider when selecting a system and provider. A restaurant reservation and table management system should provide you with the tools to plan and run your restaurant bookings effectively and manage tables, efficient table management means that a restaurant can maximize the potential of their dining room and this in turn should increase profits. Restaurant reservation systems with the option of combining a table management system are increasing in popularity with restaurant operators. With an increasing number of diners now using the web to find details of their favored…
Read More