Traffic Signal: Management & Control System

Multimedia, Parallel And Distributed System, Web | Desktop Application
Traffic Signal: Management & Control System This innovative software projects is an effective traffic signal management project that allows for managing 4 way traffic signal management system. The system consists of 4 signals corresponding to each road. We here propose a density based traffic signal scheduling algorithm. The system is designed to manage traffic signal timings based on the density of traffic on its corresponding road. The system represents the traffic strength of a road graphically using traffic judgments. By measuring the traffic lined up on a particular road the signal timings are adjusted to let that particular way clear out and then the next populated one. The entire system works according to an algorithm that allows for smooth and efficient traffic flow across all four ways. It also consists…
Read More

Question paper generator system

Parallel And Distributed System, Web | Desktop Application
Question paper generator system In this system we present a smart question paper generating system. In our system we allow administrator to input a set of questions and respective answers for option ticking. We also allow admin to provide weight age and complexity for each of these questions. After this the questions are stored in database along with their weight age. Now on question paper generating time the admin just has to select the percentage of difficulty. On this selection the system selects questions randomly in a way that their weight age makes up for 100 marks and according to difficulty that admin chooses the questions are chosen based on their complexity level. After this q paper is converted to pdf file and emailed to colleges on button click.
Read More

Image Encryption For Secure Internet Transfer

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Image Encryption For Secure Internet Transfer Encryption is commonly used for encryption of text as well as images. Various encryption algorithms exist for this purpose. Here we propose to build a secured image encryption algorithm that can be used to encrypt as well as send images remotely to the intended receiver. Our system can link to remote client to our software installed on remote system and connect to it for image transfer. Our system uses RSA algorithm for this purpose. User may submit his image for encryption. Our system now gets the image and converts it into hex format before being encrypted. Then we use RSA algorithm to encrypt the image for sending through the internet. User may now select the intended user from among the list of users having…
Read More

College Enquiry Chat Bot

Data mining, Multimedia, Parallel And Distributed System, Web | Desktop Application
College Enquiry Chat Bot The College bot project is built using artificial algorithms that analyses user’s queries and understand user’s message. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chating. Students can chat using any format there is no specific format the user has to follow. The System uses built in artificial intelligence to answer the query. The answers are appropriate what the user queries. The User can query any college related activities through the system. The user does not have to personally go to the college for enquiry. The System analyses the question and than answers to the user. The system answers to the query as if it is answered…
Read More

Topic Detection Using Keyword Clustering

Data mining, Networking, Parallel And Distributed System, Web | Desktop Application
Topic Detection Using Keyword Clustering To find prominent topic in a collection of documents. We here propose a system to detect topic from a collection of document. We use an efficient method to discover topic in a collection of documents known as topic model. A topic model is a type of statistical model for discovering topics from collection of documents. One would expect particular words to appear in the document more or less frequently: “dog” and “bone” will appear more often in documents about dogs, “cat” and “meow” will appear in documents about cats, and “the” and “is” will appear equally in both. A document typically concerns multiple topics in different proportions; thus, in a document that is 10% about cats and 90% about dogs, there would probably be about…
Read More

Data Duplication Removal Using File Checksum

Multimedia, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Data Duplication Removal Using File Checksum Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to exclude the false positives, current research uses extraction of file data checksum. However, the target file stores multiple attributes such as user id, filename, size, extension, checksum and date-time table. Whenever user uploads a particular file, the system then first calculates the checksum and that checksum is cross verified with the checksum data stored in database. If the file already exists, then it will…
Read More

Secure Data Transfer Over Internet Using Image Steganography

Cloud Computing, Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Data Transfer Over Internet Using Image Steganography Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secrete information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a key or a pass word to…
Read More

Sending a secure message over a network to a remote site

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Sending a secure message over a network to a remote site We here use a system to securely transfer a message encrypted using Aes algorithm to a remote site so that only proper authentication at remote site can decrypt the message. The system also uses acknowledgements to signal the message integrity and delivery over the network. The system consists of two terminal applications running concurrently over two different PC’s. User may first use the sending tab to send a secure message. On using this function the accepts user string and key to encrypt it. The system then receives this message and encrypts it using AES algorithm. Now the system transfers this message to remote site using over a Tcp/ip internet connection. The receiving system sends out a notification acknowledgement to…
Read More

Improved Data Leakage Detection

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Improved Data Leakage Detection Data leakage detection techniques are built for users to track if data has been leaked and the trace the sources of data leakage. Many times we come across cases where leaked data is found at unauthorized places. For example we may find sensitive data stored on an unauthorized laptop or website. At such a time it becomes important to trace the source of data leakage. For this purpose we propose an improved data leakage detection technique to trace back sources of unauthorized leakage by using a strategy of data allocation across various agents. The strategy allows user to transfer data to users by considering receivers as agents who are allocated data along with some id based undetectable alterations. These alterations allow our system to trace back…
Read More

Secure Electronic Fund Transfer Over Internet Using DES

Networking, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Secure Electronic Fund Transfer Over Internet Using DES Nowadays people often need to transfer cash from one account to another. In such cases they need to go to bank or search for PC connected to internet to get access to the services offered by internet banking for reliable fund transfer. This system proves to be really beneficial in such cases. As with the help of this system the user just needs to enter the account details. For security, DES algorithm is used along with instant verification and consistency check algorithm. All these are performed for secure electronic fund transfer. Thus a user just needs to visit any EFT center, in order to make the payment. The transfer is done instantly using a single portable card. In this way the user…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in

Parallel And Distributed System
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden…
Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Parallel And Distributed System, Web | Desktop Application
Privacy-Preserving Updates to Anonymous and Confidential Databases Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the…
Read More

The Geometric Efficient Matching Algorithm for Firewalls

Parallel And Distributed System, Web | Desktop Application
The Geometric Efficient Matching Algorithm for Firewalls The firewall is one of the central technologies allowing high-level access control to organization networks. Packet matching in firewalls involves matching on many fields from the TCP and IP packet header. At least five fields (protocol number, source and destination IP addresses, and ports) are involved in the decision which rule applies to a given packet. With available bandwidth increasing rapidly, very efficient matching algorithms need to be deployed in modern firewalls to ensure that the firewall does not become a bottleneck Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Thus, algorithms from computational geometry can be applied. In this paper we consider a…
Read More

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

Parallel And Distributed System, Web | Desktop Application
In Cloud, Can Scientific Communities Benefit from the Economies of Scale? The basic idea behind Cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of Cloud computing: in Cloud, can small or medium-scale scientific computing communities benefit from the economies of scale? Our research contributions are three fold: first, we propose an enhanced scientific public cloud model (ESP) that encourages small or medium scale research organizations rent elastic resources from a public cloud provider; second, on a basis of the ESP model, we design and implement the Dawning Cloud system that can consolidate heterogeneous scientific workloads on a Cloud site; third, we propose an innovative emulation methodology and perform a comprehensive evaluation. We found…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do…
Read More

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

Parallel And Distributed System, Web | Desktop Application
Balancing the Tradeoffs between Query Delay and Data Availability in MANETs. In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. Existing data replication solutions in either wired or wireless networks aim at either reducing the query delay or improving the data availability, but not both. As both metrics are important for mobile nodes, we propose schemes to balance the tradeoffs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the…
Read More

Resource-Aware Application State Monitoring.

Parallel And Distributed System
Resource-Aware Application State Monitoring. The increasing popularity of large-scale distributed applications in datacenters has led to the growing demand of distributed application state monitoring. These application state monitoring tasks often involve collecting values of various status attributes from a large number of nodes. One challenge in such large-scale application state monitoring is to organize nodes into a monitoring overlay that achieves monitoring scalability and cost-effectiveness at the same time. In this paper, we present REMO, a REsource-aware application state MOnitoring system, to address the challenge of monitoring overlay construction. REMO distinguishes itself from existing works in several key aspects. First, it jointly considers inter-task costsharing opportunities and node-level resource constraints. Furthermore, it explicitly models the per-message processing overhead which can be substantial but is often ignored by previous works. Second,…
Read More

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge

Parallel And Distributed System, Web | Desktop Application
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare…
Read More

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.

Parallel And Distributed System, Web | Desktop Application
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values…
Read More