Opinion Mining For Restaurant Reviews

Data mining, Web | Desktop Application
Opinion Mining For Restaurant Reviews This system rates any particular restaurant by detecting hidden sentiments in the feedback received by its customers. The system uses opinion-mining methodology in order to achieve desired functionality. Opinion Mining for Restaurant Reviews is a web application, which takes feedback of various users, and based on the opinion, system will specify whether the posted restaurant is good, bad, or worst. Database of the system have various keywords denoted as negative and positive words, which helps the system to recognize and match the feedback and rank them accordingly. The role of the admin is to post new restaurant and adds keywords in database. This application acts as a boon for food lovers and works as a source advertisements because it makes people aware about the services…
Read More

Smart Health Prediction Using Data Mining php

Data mining, Web | Desktop Application
Smart Health Prediction Using Data Mining The Health Prediction system is an end user support and online consultation project. This system allows users to get instant guidance on their health issues through an intelligent health care system online. The system contains data of various symptoms and the disease/illness associated with those symptoms. It also has an option for users of sharing their symptoms and issues. The system processes those symptoms to check for various illnesses that can be associated with it. The system is designed to use intelligent data mining techniques to guess the most accurate illness based on patient’s symptoms. If user’s symptoms do not exactly match any disease in the database, then it is shows the diseases user could probably have based on his/her symptoms. It also consists…
Read More

Automatic Time Table Generator php

Web | Desktop Application
Automatic Time Table Generator Most colleges have a number of different courses and each course has a number of subjects. Now there are limited faculties, each faculty teaching more than one subjects. So now the time table needed to schedule the faculty at provided time slots in such a way that their timings do not overlap and the time table schedule makes best use of all faculty subject demands. We use a customized algorithm for this purpose. In our Timetable Generation algorithm, we propose to utilize a timetable object. This object comprises of Classroom objects and the timetable for every them likewise a fitness score for the timetable. Fitness score relates to the quantity of crashes the timetable has regarding alternate calendars for different classes. Classroom object comprises of week…
Read More

Filtering political sentiment in social media from textual information

Web | Desktop Application
Filtering political sentiment in social media from textual information Nowadays, parents are worried about their children because of the high rate of kidnapping. Moreover, parents are having long working hours, so they simply do not have as much time to spend for their children Moreover, they will be persuaded by kidnapper before they enter the school .So, it is the responsibility for the school to take care of their students and they also know in-time and able to send an alert message to their parents if the students are not at the school at school start time. This System ensures safety of the students by making their parents aware about the various important status about their students like in-time, out-time, everything about their arrival. By using RFID technology it is…
Read More

College Admission Predictor PHP

Web | Desktop Application
This project Engineering Admission Predictor System is web based application in which students can register with their personal as well as marks details for prediction the admission in colleges and the administrator can allot the seats for the students. Administrator can add the college details and he batch details. Using this software, the entrance seat allotment became easier and can be implemented using system. The main advantage of the project is the computerization of the entrance seat allotment process. Administrator has the power for the allotment. He can add the allotted seats into a file and the details are saved into the system. The total time for the entrance allotment became lesser and the allotment process became faster.
Read More

Evaluation of Academic Performance of Students with Fuzzy Logic

Data mining, Web | Desktop Application
Evaluation of Academic Performance of Students with Fuzzy Logic Students’ academic success is evaluated by their performance in exams conducted by the institutes or Universities. This system evaluate students academic performance with fuzzy logic based performance evaluation method. In this method, we consider three parameters attendance, internal marks and external marks which are considered to evaluate students final academic performance. The fuzzy inference system has also been used to obtain Performance of Students for different input values student attendance, marks.
Read More

College Social Network

Web | Desktop Application
College Social Network Web application intends to provide a well-established web-based Social Network system between a job seeker and a recruiter. This documents a networking system scope, functionalities, requirements and feasibility. This project aims to develop a website which provides a Communication among peoples on network, which works quite similar to Social Media Site. This website also provides the features of writing and posting a post or any event all at one place. The main idea behind it is to share the job related details posted by placement officer via adding a post which can be read by all the student as well as faculty using the website. This web application can be handled by the admin and manage student as well as faculty. The following points are implemented in…
Read More

Document Sentiment Analysis Using Opinion Mining

Data mining, Web | Desktop Application
Document Sentiment Analysis Using Opinion Mining Sentiment analysis (also known as opinion mining) refers to the use of natural language processing, text analysis to identify and extract subjective information in source materials. Sentiment analysis aims to determine the attitude of a speaker or a writer with respect to some topic or the overall contextual polarity of a document. This system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found, the comments are with a sentiment rank. This system also scans documents in order to analyse the sentiment of the user.
Read More

CRM For Internet Service Provider

Web | Desktop Application
CRM For Internet Service Provider The main idea is to implement an online system for managing the internet customers and complaint system for customers for raising complaints on the issues related to ISP provider and provide best customer care service for users using this application. There are many Internet security providers in a country that will provide internet services for users on different packages. Basically ISP works on three connections, Dial Up using telephone service, Broad band and wireless connections. Admin manages the whole system by performing task such as adding/viewing/editing/deleting employee details. System allows admin to add customer details and predict the internet plans based on their business type, region or age. Internet plan expiry dates of each customer will be displayed to admin if the plan is expiring…
Read More

Crime Rate Prediction Using K Means

Data mining, Web | Desktop Application
Crime Rate Prediction Using K Means Crime rate is increasing now-a-days in many countries. In today’s world with such higher crime rate and brutal crime happening, there must be some protection against this crime. Here we introduced a system by which crime rate can be reduced. Crime data must be fed into the system. We introduced data mining algorithm to predict crime. K-means algorithm plays an important role in analyzing and predicting crimes. K-means algorithm will cluster co-offenders, collaboration and dissolution of organized crime groups, identifying various relevant crime patterns, hidden links, link prediction and statistical analysis of crime data. This system will prevent crime occurring in society. Crime data is analyzed which is stored in the database. Data mining algorithm will extract information and patterns from database. System will…
Read More

Customer Focused Ecommerce Site With AI Bot

Web | Desktop Application
Name Customer Focused Ecommerce Site With AI Bot Technology PHP,MySql Category Web Application Description With over 80% of global consumers trying online shopping at least once, the greatest opportunity for e-commerce companies is to build a long-lasting and profitable relationship with this already existing audience. Such a strong relationship requires utmost focus on the customer as a whole and making sense of a flood of real-time information that goes well beyond demographics or shopping behavior. There are two entities who will have the access to the system. One is the admin and another one will be the registered user. Admin will add the product with its details such as product name, description, features, warranty, add on product and delivery date. Admin can also view and edit the product information whenever…
Read More

ERP System For College Management PHP

Web | Desktop Application
ERP System For College Management PHP ERP School/college/university Management Module which is used by Schools as well as Colleges to manage their daily activities which include the management of Employees, Students, Books and Library Records, Parents details, Assignments, Admission Process, Results and Reports, Exams, Events, Attendance, Timetable, Fees and Other Reports. It provides one-point access to manage these wide range of activities both effectively and efficiently. Managing a school, university, college or any educational institution without a perfect software solution in the present times is painful, same in the case of any enterprises or business. Hence an appropriate solution is required which can ensure the smooth functioning of the organization as a whole, and with ERP college Management Module, this problem can simply be solved.
Read More

Secure E Learning Using Data Mining Techniques

Data mining, Web | Desktop Application
Secure E Learning Using Data Mining Techniques In today’s lifestyle every task has been executed by help of internet. The online system or the internet facilities getting more popular as well as its becoming part of human lifestyle. Now in days every individual recommends that learning should at any-place and any-time, and this recommendation is resolved by E-Learning system. Secure E-learning has been divided into two parts Data Security and user flexibility. E-learning has huge database which carries lots of student records, course records, course materials and so on. In this system user security provided by the admin, admin himself authorize to candidate to enter into the system. Course material also has been secured by using file encryption and decryption technique so that no one can access material outside the…
Read More

Predicting User Behavior Through Sessions Web Mining

Data mining, Web | Desktop Application
Predicting User Behavior Through Sessions Web Mining It is the method to extract the user sessions from the created session file. And depending on the sessions created the user behaviour is predicted by displaying them most visited page or the product. Usability is defined as the satisfaction, efficiency and effectiveness with which specific users can complete specific tasks in a particular environment. This process includes 3 stages, namely Data cleaning, User identification, Session identification. In this paper, we are implementing these three phases. Depending upon the frequency of users visiting each page mining is performed. By finding the session of the user we can analyze the user behaviour by the time spend on a particular page.
Read More

Online Book Recommendation Using Collaborative Filtering

Data mining, Web | Desktop Application
Online Book Recommendation Using Collaborative Filtering This Online book selling websites helps to buy the books online with Recommendation system which is one of the stronger tools to increase profit and retaining buyer. The book recommendation system must recommend books that are of buyer’s interest. Recommendation systems are widely used to recommend products to the end users that are most appropriate. This system uses features of collaborative filtering to produce efficient and effective recommendations. Collaborative recommendation is probably the most familiar, most widely implemented and most mature of the technologies. Collaborative recommender systems aggregate ratings of objects, recognize commonalities between users on the basis of their ratings, and generate new recommendations.
Read More

Movie Success Prediction Using Data Mining PHP

Data mining, Web | Desktop Application
Movie Success Prediction Using Data Mining PHP In this system we have developed a mathematical model for predicting the success class such as flop, hit, super hit of the movies. For doing this we have to develop a methodology in which the historical data of each component such as actor, actress, director, music that influences the success or failure of a movie is given is due to weight age and then based on multiple thresholds calculated on the basis of descriptive statistics of dataset of each component it is given class flop, hit, super hit label. Admin will add the film crew data. Admin will add movies data of a particular film crew. Admin will add new movie data along with film crew details as well as release date of…
Read More

Monitoring Suspicious Discussions On Online Forums PHP

Web | Desktop Application
Monitoring Suspicious Discussions On Online Forums PHP People now-a-days are very fond of using internet as a discussion medium. As internet technology had been increasing more and more, this technology led to many legal and illegal activities. It is found that much first-hand news has been discussed in Internet forums well before they are reported in traditional mass media. This communication channel provides an effective channel for illegal activities such as dissemination of copyrighted movies, threatening messages and online gambling etc. The law enforcement agencies are looking for solutions to monitor these discussion forums for possible criminal activities and download suspected postings as evidence for investigation. We propose a system which will tackle this problem effectively. In this project we had used a data mining algorithm to detect criminal activities…
Read More

Fake Product Review Monitoring & Removal For Genuine Ratings PHP

Web | Desktop Application
Fake Product Review Monitoring & Removal For Genuine Ratings PHP As most of the people require review about a product before spending their money on the product. So people come across various reviews in the website but these reviews are genuine or fake is not identified by the user. In some review websites some good reviews are added by the product company people itself in order to make in order to produce false positive product reviews. They give good reviews for many different products manufactured by their own firm. User will not be able to find out whether the review is genuine or fake. To find out fake review in the website this “Fake Product Review Monitoring and Removal for Genuine Online Product Reviews Using Opinion Mining” system is introduced.…
Read More

Detecting E Banking Phishing Using Associative Classification

Data mining, Web | Desktop Application
Detecting E Banking Phishing Using Associative Classification There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website. We proposed an intelligent, flexible and effective system that is based on using classification Data mining algorithm. We implemented classification algorithm and techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking phishing website can be detected based on some important characteristics like URL and Domain Identity, and security and encryption criteria in the final phishing detection rate. Once user…
Read More

A Commodity Search System For Online Shopping Using Web Mining

Data mining, Web | Desktop Application
A Commodity Search System For Online Shopping Using Web Mining With the popularity of Internet and e-commerce, the number of shopping websites has rapidly increased on the Internet, and this enables people to shop easily through the Internet. Consumers spend a lot of time searching commodity, because they need to filter and compare search results data by themselves. In recent years, there is a growing parity websites helping consumers to buy cheaper commodity. Although these websites can help consumers get the parity price of commodities, the search results are not so ideal. Because these websites may occur problems about the difference commodity between search results and consumers want to search, or the difference commodity price between search results and commodity web page. Therefore, this study attempts to use web mining…
Read More

Secure Online Auction System

Web | Desktop Application
Secure Online Auction System Online auction however is a different business model where the items are sold through price bidding. Usually bidding have start price and ending time. Potential buyers in auction and the winner is the one who bids the item for highest price. We treat the fraud detection with a binary classification. For buying product online user have to provide his personal details like email address, license number, PAN number etc. Only the valid user will have authority to bid. This prevents various frauds according in online shopping.
Read More

School Security System (SSS) using RFID

Sensor, Web | Desktop Application
School Security System (SSS) using RFID Nowadays, parents are worried about their children because of the high rate of kidnapping. Moreover, parents are having long working hours, so they simply do not have as much time to spend for their children Moreover, they will be persuaded by kidnapper before they enter the school .So, it is the responsibility for the school to take care of their students and they also know in-time and able to send an alert message to their parents if the students are not at the school at school start time. This System ensures safety of the students by making their parents aware about the various important status about their students like in-time, out-time, everything about their arrival. By using RFID technology it is easy track the…
Read More

Car Comparison System Project

Web | Desktop Application
Car Comparison System Project Before buying a car, it is best to compare its feature and characteristic with other cars. Car comparison system project focuses on providing information to buyers about the similarities and dissimilarities between two cars. User needs to select two cars and the system will generate a brief report indicating the benefits and defects. Thus, it helps user to analyze the cars effectively and user can make best decision before buying. The system provides an admin login that has sole control over it. He can post different cars and can put up notifications. The user logs into the system and can search for his car. The system then shows various car options for comparison with respect to the desired one. Hence, user can check out varieties of…
Read More

Salon management System Php

Web | Desktop Application
Salon management System Salon management system is specially designed for managing a hair salon. This system keeps track of all the activities that are carried on daily within the salon. It maintains stock of inventory coming in. It also manages individual employee salary. The system is even equipped to manage customer billing and data storage. This fully equipped system alone manages the entire functioning of a hair salon. The system works as follows: Administrator may login to the system. He may then manage and check employee salaries due date and payment to be made. The system also keeps track of inventory coming in. An employee login is also present for customer billing. As the employee enters various services, the system calculates the bill and generates the bill. This customer data…
Read More

Cricket Club Management Project

Web | Desktop Application
Cricket Club Management Project Cricket club management project is designed with the motive of managing a cricket club. This software system consists of various online booking and management functionaries needed by a cricket club. It provides various options like ground bookings, member registrations, notice posting, member registration, batch registration and more. This software system assures efficient management and maintains the functioning on a cricket club. The project consists of the following features: Ground Booking: The user may fill and apply for club ground booking using an online form. Once the admin approves the application, the ground is booked accordingly. Member Registration: People may register for the club membership. Batch Registration: People may register for various cricket training batches through the website contact form. Notices: Recent notices can be seen on…
Read More

Online Blood Bank Project PHP

Web | Desktop Application
Online Blood Bank Project This is an online blood bank management system that helps in managing various blood bank operations effectively. The project consists of a central depository containing various blood deposits available along with associated details. These details include blood type, storage area and date of storage. Maintenance and the monitoring of blood deposits become easy with the help of this system. The project is an online system that provides an option to check the availability of the required blood group within the blood bank. Moreover, the system also has added features such as patient name and contacts, blood booking and requirement of blood group is posted on the website to find available donors for a blood emergency. This online system is developed on .net platform and supported by…
Read More

Campus Recruitment System php

Web | Desktop Application
Campus Recruitment System This college campus recruitment system provides options like student login, company login and an admin login. This software system provides an option to the students to create their profiles and upload all their details including their marks onto the system. The admin can check each student details and can remove faulty accounts. The system also consists of a company login where various companies visiting the college can view a list of students in that college and their respective resumes. The software system allows students to view a list of companies who have posted for vacancy. The admin has overall rights over the system and can moderate and delete any details not pertaining to college placement rules. The project is beneficial for college students, various companies visiting the…
Read More

Online Herbs Shopping Project

Web | Desktop Application
Online Herbs Shopping Project This project helps the users to cure their disease by providing them the list of fruits and herbs that require consumption, in order to get rid of disease. This project helps the user by providing easy access and search for herbs and fruits that will be good for the health of the user depending on any health issue or disease that he/she is suffering from. This system reduces the searching time of the user, largely by allowing them to enter their health problem and search accordingly. The admin can add fruits and herbs along with their information to the system. This system provides the description of the selected herbs and the way that herb will help them to cure the disease and improve health. Once the…
Read More

Online Bakery Shop System

Web | Desktop Application
Online Bakery Shop System This online Bakery shop allows users to check and purchase various bakery products available online. The project consists of list of bakery products displayed in various categories and the user can browse through the items. User can add the selected items it to his shopping cart. User needs to register on the site before checking out. He can then login using same id password next time. Now he may pay through a credit card or cash on delivery. The user receives a copy of the shopping receipt on his email id after the successful transaction. Here we use user-friendly interface to make the entire frontend. The middle tier or code behind model is designed for fast processing. In addition, SQL serves as a backend to store…
Read More

Daily Expense Tracker System

Web | Desktop Application
Daily Expense Tracker System Daily Expense Tracker System is designed to keep a track of Income-Expense of a Housewife on a day-to-day basis. This System divides the Income based on daily expenses. If you exceed day’s expense, system will cut it from your income and will provide new daily expense allowed amount. If that day’s expense is less, system will add it in savings. Daily expense tracking System will generate report at the end of month to show Income-Expense Curve. It will let you add the savings amount, which you had saved for some particular Festivals or days like Birthday or Anniversary.
Read More

Course Material Distribution System

Web | Desktop Application
Course Material Distribution System In various universities including IGNOU, dispatches material required for various courses after the affirmation are sent to students. The student data is provided including name, address as well as the course material to be dispatched to the student. Each course has a set of number of booklets, which are by and large pressed together before dispatch. Booklet Stock is printed and maintained independently. Availability of the stock of course material is crosschecked as soon as the new request for dispatch is received. The material is dispatched instantly if material for each course and booklet for the same is available. Rest of the information is moved to pending stack of course pending database. The inventory stock is updated on receiving new printed stock and dispatch is made…
Read More

Credit Card Fraud Detection Project Php

Web | Desktop Application
Credit Card Fraud Detection Project The credit card fraud detection features makes use of the behavior and location of the user to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. The system requires revivification as soon as any unusual pattern is detected. User’s credit card data is being analyzed by the system for various characteristics. These characteristics include user’s country and usual spending procedures. The system recognizes unusual patterns in the payment procedures based upon previous data of that user. So now, the system may require the user to login again or even block the user for more than three invalid attempts.
Read More

Real Estate Search Based On Data Mining

Data mining, Web | Desktop Application
Real Estate Search Based On Data Mining This project helps the users to make good decisions regarding buying or selling of valuable property. Prior to this online system, this process involved a lot of travelling costs and searching time. Due to this system, the users can search for the required property online and get the property details depending on its preferences, which save both time and energy. This system includes property details like Address, space measurement (sq ft), number of BHKs, Floor, Property Seller name and its contact number plus email-id. The user can search property depending on the area that it wants in, number of washrooms, bedrooms, halls and kitchen. The system contains an algorithm that calculates the amount of loan that the user can take along with the…
Read More

Smart Health Prediction Using Data Mining

Data mining, Web | Desktop Application
Smart Health Prediction Using Data Mining The Health Prediction system is an end user support and online consultation project. This system allows users to get instant guidance on their health issues through an intelligent health care system online. The system contains data of various symptoms and the disease/illness associated with those symptoms. It also has an option for users of sharing their symptoms and issues. The system processes those symptoms to check for various illnesses that can be associated with it. The system is designed to use intelligent data mining techniques to guess the most accurate illness based on patient’s symptoms. If user’s symptoms do not exactly match any disease in the database, then it is shows the diseases user could probably have based on his/her symptoms. It also consists…
Read More

Opinion Mining For Social Networking Site

Data mining, Web | Desktop Application
Opinion Mining For Social Networking Site This system uses opinion-mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application where a user will post his views related to some subject and other users will view and comment on it. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. Various users can view these changes. Database of the system have various keywords denoted as negative and positive words, which helps the system to recognize the comments and rank them accordingly. Once the user logins to the system, he/she can view their own status and topics posted by…
Read More

Online Furniture Shop Project Php

Web | Desktop Application
Online Furniture Shop Project It is an online furniture shop that allows users to check for various furniture available at the online store and purchase online. The project provides a of list of furniture products displayed online in various models and designs. The user may browse through these products as per categories. If the user likes a product, he may add it to his shopping cart. User needs to register on the site before checking out so that he can login using same id password next time. User can select any payment option that he wish to like credit card or cash on delivery. user receives a copy of the shopping receipt on his email id once the transaction is successful. Here we use .net framework to make the entire…
Read More

Online Election System Project Php

Web | Desktop Application
Online Election System Project Online Election System would have Candidate registration, document verification, auto-generated User ID and pass for candidate and Voters. Election Commission will handle Admin Login and Candidate will handle Candidate Login. Voters will get Unique ID and Password, Using which they can vote for a Candidate only once per Election. The project is beneficial for Election Commission, for voters as the can get to know the candidate background and choose wisely, and even for Candidate. The software system allows the Candidate to login in to their profiles and upload all their details including their previous milestone onto the system. The admin can check each Candidate details and verify the documents. Candidate’s ID and Password will be generated only after the verification, and faulty accounts will be removed.…
Read More

Computer Assembly Website Php

Web | Desktop Application
Computer Assembly Website It is a computer parts assembly website project, where a user may select various computer parts online and it will be delivered to the users address. The computer assembly website project allows users to select from a list of computer parts of various companies and models. The project works as follows: User gets an option to login to the website. The user needs to create a new account if he/she is not registered The user can then see various links saying Hard disk, motherboard, mouse, speaker etc. Once the user clicks on motherboard link, the motherboard selection page is opened. Here the user may view a list of motherboards of various companies, make and models. User is allowed to select any product needed and add it to…
Read More

The Cibil System Project Php

Web | Desktop Application
The Cibil System Project A cibil system to keep tracks of peoples credit scores and dues of a particular person. The system is similar to the real cibil system with an enhancement (Here the defaulter can view his status and can apply for improvement by good behavior). This software system provides an option of admin login, Cibil associates login and individual login. Here, cibil associates are banks or companies who want to report faulty members. They may send faulty member data and this is passed on to the cibil admin. The cibil admin can view the data and approve after inspection. The system provides an option of member login for which a member first needs to register. He can then check if he is listed in the black list and…
Read More

Advanced Mobile Store Php

Artificial Intelligence & ML, Web | Desktop Application
This advanced mobile store adjusts according to user’s choice and ensures most profitability using artificial intelligence. It provides user with an easy and beautiful GUI. It shows a list of products to the user, the user sees a product and goes through its features and price, the system gets to know about user’s choices. Once the user selects a phone, the system remembers the choice for that particular user. Next time the user logs in; the system shows appropriate recommendations for that user along with other products. Once the user decides to buy a mobile phone goes towards the payment option, the system also shows him some mobile covers and mobile accessories for that particular mobile that he/she has selected, so that he can add it to cart as well.…
Read More

Banking Bot Project Php

Artificial Intelligence & ML, Web | Desktop Application
Banking Bot Project A banking bot project is based on artificial algorithms that analyzes user’s queries and understand user’s message. The system design is for banks use, where users are allowed to ask any bank related questions like loan, account, policy etc. This is an android application. The system recognizes user’s query and understands what the user wants to convey and simultaneously answers them appropriately. The format of user’s questions can be different as there is no specific format for users to ask questions. The built in artificial intelligence system recognizes the requirements of the users and provides suitable answers for the same. It makes use a graphical representation of a person speaking while giving answers as a real person would do.
Read More

Software Piracy Protection Project Php

Web | Desktop Application
Software Piracy Protection Project The project is designed to maintain software piracy protection and assures that, only the authenticated users are accessing it. Piracy has become a major threat to software product companies on the internet. Hackers or an intruder can gain access to the system to steal the information with the help of malicious codes and programs. Hence there arises a need to protect the information and products from being plagiarized. This project is developed with the purpose to protect the software’s ownership of copyright and make all the transactions secure and threat free.
Read More

Online Diagnostic Lab Reporting System Php

Web | Desktop Application
Online Diagnostic Lab Reporting System It is an online diagnostic lab manager application that brings up various diagnoses working online. Here patients get an option to register on the site and login using registered details. Once registered with their address and contact details, the patients may now see a variety of tests conducted by the lab along with their costs. The system allows patients to do the bookings for various tests like CBC, Blood Glucose, KFT, and LFT. The tests also consist of parameters like Hemoglobin, WBC, etc. The system allows users to book any test needed and after successful booking, system calculates costs and allows users to pay online. As soon as the payment is done, the patient test is booked and the lab may now collected samples from…
Read More

Online Loan Application & Verification System

Web | Desktop Application
Name Online Loan Application & Verification System Technology PHP, MySql Category Web Application Description In India, getting a loan is a very tiring and complicated process as it may take weeks even months for loan approval and people need to visit the loan office repeatedly for document and verification. This system is designed to automate the loan process from both, bankers as well as customer’s side. Here customers get information about various loans provided along with rate of interest and required documents. Once the customer fills basic enquiry form, it reaches the bank server and he gets a login id password. The server administrator now can check it and decide whether to approve or reject the candidate. If he decides to approve, the banker may select to send customer to…
Read More

Sentiment Based Movie Rating System Php

Web | Desktop Application
Sentiment Based Movie Rating System We often encounter online movie rating sites, where the admin manually rates the movie, depending upon the comments, ratings and reviews of the users. Sentiment based movie rating system is an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system analyzes the stored data to check for user sentiments associated with each comment. This system consists of a sentiment library designed for English as well as Hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found, the comments are with a sentiment rank. The system gathers all the comments for a particular movie and then calculates an average…
Read More

Matrimonial Portal Project

Web | Desktop Application
Matrimonial Portal Project This online matrimonial site is developed to let individual find their potential matches for marriage as per their priorities. This project allows the phrase ‘Marriages are made in heaven’ to be rephrased as ‘Marriages are now made online’. This application allows browsing profiles of other registered users on the site. An individual needs to give their information such as Name, Gender, Religion, Caste, Marital status, Current salary, Occupation etc along with an option to upload photo of the individual registering and their kundali. The person looking for marriage can register and search for a profile that matches their requirement. This application allows individual to search by gender, age, religion, caste, marital status. It gives an option to an individual to view kundali, which is highest priority in…
Read More

Automated Payroll With GPS Tracking And Image Capture

Android Mobile development, Web | Desktop Application
Automated Payroll With GPS Tracking And Image Capture This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again the image will be captured as well as GPS…
Read More

Android Geo Fencing App Project

Android Mobile development, Web | Desktop Application
Android Geo Fencing App Project This developed project work for parents and their children’s. The parents and children’s both should have GPS based smart phones. The application is used to track the child’s location using their smartphone. To access this application, parent need to create an account by filling up basic registration details and create a login id and password. Using valid login credentials, parent can login and access the application modules. After successful login, parent need to add their child details and also need to create a login id and password for their child in order to track their location. While registering their child name, parent need to set a geo fence around their children by selecting a point on map. Parent can also update the fence around their…
Read More

Railway Ticket Booking System Using Qr Code

Android Mobile development, Web | Desktop Application
Railway Ticket Booking System Using Qr Code This project deals with the development and implementation of smart phone application which is more effective and simple than current ticketing system. The “Ticket Checker System” can be bought easily anytime, anywhere and ticket will be present in the customer’s phone in the form of “Quick Response Code”. GPS facility is used for validation of the ticket at the source and deletion at the destination. The information for each user is stored in a SQL database for security purpose which is unavailable in the current suburban railway system. Also the ticket checker is provided with an application to search for the user’s ticket with the ticket number in the cloud database for checking purposes.
Read More

Mobile Based Attendance System

Android Mobile development, Web | Desktop Application
Mobile Based Attendance System built to eliminate the time and effort wasted in taking attendances in schools and colleges. It also greatly reduces the amount of paper resources needed in attendance data management.This is an android mobile app. It’s built to be used for school/college faculty so that they may take student attendance on their phones. The system is divided into following modules:Student Attendance List Creation: Once this App is installed on a phone, a it allows user to create a student attendance sheet consisting of name, roll number, date, Absent/Present mark and subject. He has to fill student names along with associated roll numbers. Attendance Marking: The faculty has the list on his phone now. He may see the list call roll numbers and select absent id the student…
Read More

Supporting Privacy Protection in Personalized Web Search

Data mining, Web | Desktop Application
Supporting Privacy Protection in Personalized Web Search Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction…
Read More

Keyword Query Routing

Data mining, Web | Desktop Application
Keyword Query Routing Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are…
Read More

Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups

Data mining, Web | Desktop Application
Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups In data warehousing and OLAP applications, scalar level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex SQL queries composed by scalar-level operations are often formed to obtain even very simple set-level semantics. Such queries are not only difficult to write but also challenging for a database engine to optimize, thus can result in costly evaluation. This paper proposes to augment SQL with set predicate, to bring out otherwise obscured set-level semantics. We studied two approaches to processing set predicates—an aggregate function-based approach and a bitmap index-based approach. Moreover, we designed a histogram-based probabilistic method of set predicate selectivity…
Read More

Facilitating Document Annotation Using Content and Querying Value

Data mining, Web | Desktop Application
Facilitating Document Annotation Using Content and Querying Value A large number of organizations today generate and share textual descriptions of their products, services, and actions. Such collections of textual data contain significant amount of structured information, which remains buried in the unstructured text. While information extraction algorithms facilitate the extraction of structured relations, they are often expensive and inaccurate, especially when operating on top of text that does not contain any instances of the targeted structured information. We present a novel alternative approach that facilitates the generation of the structured metadata by identifying documents that are likely to contain information of interest and this information is going to be subsequently useful for querying the database. Our approach relies on the idea that humans are more likely to add the necessary metadata during creation time, if prompted by the interface; or that it is much easier…
Read More

Context-Based Diversification for Keyword Queries Over XML Data

Data mining, Web | Desktop Application
Context-Based Diversification for Keyword Queries Over XML Data While keyword query empowers ordinary users to search vast amount of data, the ambiguity of keyword query makes it difficult to effectively answer keyword queries, especially for short and vague keyword queries. To address this challenging problem, in this paper we propose an approach that automatically diversifies XML keyword search based on its different contexts in the XML data. Given a short and vague keyword query and XML data to be searched, we first derive keyword search candidates of the query by a simple feature selection model. And then, we design an effective XML keyword search diversification model to measure the quality of each candidate. After that, two efficient algorithms are proposed to incrementally compute top-k qualified query candidates as the diversified search intentions. Two selection criteria are targeted: the k selected query candidates are most relevant to…
Read More

Customizable Pointof- Interest Queries in Road Networks

Data mining, Web | Desktop Application
Customizable Pointof- Interest Queries in Road Networks networks within interactive applications. We show that partition-based algorithms developed for point-topoint shortest path computations can be naturally extended to handle augmented queries such as finding the closest restaurant or the best post office to stop on the way home, always ranking POIs according to a user-defined cost function. Our solution allows different trade-offs between indexing effort (time and space) and query time. Our most flexible variant allows the road network to change frequently (to account for traffic information or personalized cost functions) and the set of POIs to be specified at query time. Even in this fully dynamic scenario, our solution is fast enough for interactive applications on continental road networks.
Read More

Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions

Data mining, Web | Desktop Application
Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions The large number of potential applications from bridging web data with knowledge bases has led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.
Read More

Tweet Segmentation and Its Application to Named Entity Recognition

Data mining, Web | Desktop Application
Tweet Segmentation and Its Application to Named Entity Recognition Twitter has attracted millions of users to share and disseminate most up-to-date information, resulting in large volumes of data produced everyday. However, many applications in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the noisy and short nature of tweets. In this paper, we propose a novel framework for tweet segmentation in a batch mode, called HybridSeg . By splitting tweets into meaningful segments, the semantic or context information is well preserved and easily extracted by the downstream applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the stickiness scores of its candidate segments. The stickiness score considers the probability of a segment being a phrase in English (i.e., global context) and the probability of a segment being a phrase within the batch of tweets (i.e., local…
Read More

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Data mining, Web | Desktop Application
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking algorithm is exploited to estimate the confidence of each candidate. Finally, candidates with higher confidence are extracted as opinion targets or opinion words. Compared to previous methods based on the nearest-neighbor rules, our model captures opinion relations more precisely, especially for long-span relations. Compared to syntaxbased methods, our word alignment model effectively alleviates the negative effects of parsing errors…
Read More

Polarity Consistency Checking for Domain Independent Sentiment Dictionaries

Data mining, Web | Desktop Application
Polarity Consistency Checking for Domain Independent Sentiment Dictionaries Polarity classification of words is important for applications such as Opinion Mining and Sentiment Analysis. A number of sentiment word/sense dictionaries have been manually or (semi)automatically constructed. We notice that these sentiment dictionaries have numerous inaccuracies. Besides obvious instances, where the same word appears with different polarities in different dictionaries, the dictionaries exhibit complex cases of polarity inconsistency, which cannot be detected by mere manual inspection. We introduce the concept of polarity consistency of words/senses in sentiment dictionaries in this paper. We show that the consistency problem is NP-complete. We reduce the polarity consistency problem to the satisfiability problem and utilize two fast SAT solvers to detect inconsistencies in a sentiment dictionary. We perform experiments on five sentiment dictionaries and WordNet to show inter- and intra-dictionaries inconsistencies.
Read More

RRW—A Robust and Reversible Watermarking Technique for Relational Data

Data mining, Web | Desktop Application
RRW—A Robust and Reversible Watermarking Technique for Relational Data Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by…
Read More

Access Control Mechanisms for Outsourced Data in Cloud

Cloud Computing, Web | Desktop Application
Access Control Mechanisms for Outsourced Data in Cloud Traditional access control models often assume that the en- tity enforcing access control policies is also the owner of data and re- sources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving con dentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become pri- vacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable com- munication overhead and at the same time limits the information that the cloud learns…
Read More

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud Computing, Web | Desktop Application
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random…
Read More

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Cloud Computing, Web | Desktop Application
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It therefore becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, we highlight the criticality of the problem. We then define the notion of trusted transactions when dealing with proofs of authorization. Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. We propose a Two-Phase Validation Commit protocol…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web | Desktop Application
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web | Desktop Application
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption, Web | Desktop Application
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically secure in…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Cloud Computing, Web | Desktop Application
Identity-Based Distributed Provable Data Possession in Multicloud Storage Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In…
Read More

Query Aware Determinization of Uncertain Objects

Data mining, Web | Desktop Application
Query Aware Determinization of Uncertain Objects This paper considers the problem of determinizing probabilistic data to enable such data to be stored in legacy systems that accept only deterministic input. Probabilistic data may be generated by automated data analysis/enrichment techniques such as entity resolution, information extraction, and speech processing. The legacy system may correspond to pre-existing web applications such as Flickr, Picasa, etc. The goal is to generate a deterministic representation of probabilistic data that optimizes the quality of the end-application built on deterministic data. We explore such a determinization problem in the context of two different data processing tasks -- triggers and selection queries. We show that approaches such as thresholding or top-1 selection traditionally used for determinization lead to suboptimal performance for such applications. Instead, we develop a…
Read More

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Cloud Computing, Web | Desktop Application
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi-anonymous privilege control scheme AnonyControl to address not only the data privacy but also the user identity privacy in existing access control schemes.AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi-anonymity. Besides, it…
Read More

Shopping Application System With Near Field Communication (NFC) Based on Android

Android Mobile development, Web | Desktop Application
Shopping Application System With Near Field Communication (NFC) Based on Android The rapid development of mobile communications systems today, along with the changing times and technology, both in terms of hardware, operating system used and the use of Internet bandwidth, making some mobile applications also contribute to exploit these developments. Mobile Commerce Applications for an example, became the most popular applications for mobile users who do not want to trouble yourself with having to carry cash everywhere. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that NFC represents the potential and tremendous business, leading companies such as Nokia, Microsoft and NXP Semiconductors, actively engaged in the NFC Forum. Shopping application process integrated with NFC technologybased on Android. Shopping application system designed, for the…
Read More

Learn to Personalized Image Search from the Photo Sharing Websites

Multimedia, Web | Desktop Application
Learn to Personalized Image Search from the Photo Sharing Websites Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since the users’ original annotation is too sparse…
Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Parallel And Distributed System, Web | Desktop Application
Privacy-Preserving Updates to Anonymous and Confidential Databases Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the…
Read More

The Geometric Efficient Matching Algorithm for Firewalls

Parallel And Distributed System, Web | Desktop Application
The Geometric Efficient Matching Algorithm for Firewalls The firewall is one of the central technologies allowing high-level access control to organization networks. Packet matching in firewalls involves matching on many fields from the TCP and IP packet header. At least five fields (protocol number, source and destination IP addresses, and ports) are involved in the decision which rule applies to a given packet. With available bandwidth increasing rapidly, very efficient matching algorithms need to be deployed in modern firewalls to ensure that the firewall does not become a bottleneck Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Thus, algorithms from computational geometry can be applied. In this paper we consider a…
Read More

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

Parallel And Distributed System, Web | Desktop Application
In Cloud, Can Scientific Communities Benefit from the Economies of Scale? The basic idea behind Cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of Cloud computing: in Cloud, can small or medium-scale scientific computing communities benefit from the economies of scale? Our research contributions are three fold: first, we propose an enhanced scientific public cloud model (ESP) that encourages small or medium scale research organizations rent elastic resources from a public cloud provider; second, on a basis of the ESP model, we design and implement the Dawning Cloud system that can consolidate heterogeneous scientific workloads on a Cloud site; third, we propose an innovative emulation methodology and perform a comprehensive evaluation. We found…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do…
Read More

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

Parallel And Distributed System, Web | Desktop Application
Balancing the Tradeoffs between Query Delay and Data Availability in MANETs. In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. Existing data replication solutions in either wired or wireless networks aim at either reducing the query delay or improving the data availability, but not both. As both metrics are important for mobile nodes, we propose schemes to balance the tradeoffs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the…
Read More

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge

Parallel And Distributed System, Web | Desktop Application
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare…
Read More

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.

Parallel And Distributed System, Web | Desktop Application
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values…
Read More

Location Based Services using Android Mobile Operating System

Android Mobile development, Web | Desktop Application
Location Based Services using Android Mobile Operating System The motivation for every location based information system is: “To assist with the exact information, at right place in real time with personalized setup and location sensitiveness”. In this era we are dealing with palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes. We have vast number of applications and usage where a person sitting in a roadside café needs to get relevant data and information. Such needs can only be catered with the help of LBS. These applications include security related jobs, general survey regarding traffic patterns, decision based on vehicular information for validity of registration and license numbers etc. A very appealing application includes surveillance where instant information is needed to decide if the…
Read More

Android based elimination of potholes

Android Mobile development, Web | Desktop Application
Android based elimination of potholes Its a web based project where user or normal residential people can complain about their nearby potholes. They can take an image of it and upload it to submit to BMC department. Every user will have their own credentials to login and to view the potholes. BMC will have their own admin login details to look after the posting and tackle or reply to each complaints so that they can sort those problem as soon as possible.
Read More

Automatic image equalization and contrast enhancement using Gaussian mixture

Image Processing, Web | Desktop Application
Automatic image equalization and contrast enhancement using Gaussian mixture Abstract In this paper, we propose an adaptive image equalization algorithm which automatically enhances the contrast in an input image. The algorithm uses Gaussian mixture model (GMM) to model the image grey-level distribution, and the intersection points of the Gaussian components in the model are used to partition the dynamic range of the image into input grey-level intervals. The contrast equalized image is generated by transforming the pixels’ grey levels in each input interval to the appropriate output grey-level interval according to the dominant Gaussian component and cumulative distribution function (CDF) of the input interval. To take account of human perception the Gaussian components with small variances are weighted with smaller values than the Gaussian components with larger variances, and the…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing, Web | Desktop Application
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential for face retrieval. Experimenting on two public datasets, the…
Read More

CloudProtect: Managing Data Privacy in Cloud Applications

Cloud Computing, Web | Desktop Application
CloudProtect: Managing Data Privacy in Cloud Applications This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in general, do not support encrypted data management. Therefore, CloudProtect strives to carry out the data transformations (encryption/decryption) in a manner that is transparent to the application, i.e., preserves all functionalities of the application, including those that require data to be in plaintext. Additionally, CloudProtect allows users flexibility in trading off performance for security in order to let them optimally balance their privacy needs and usage-experience.
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing, Web | Desktop Application
An effective image steganalysis method based on neighborhood information of pixels This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect.
Read More

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing.

Cloud Computing, Web | Desktop Application
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper,…
Read More

Ensuring Data Storage Security in Cloud Computing

Cloud Computing, Web | Desktop Application
Ensuring Data Storage Security in Cloud Computing Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with…
Read More

Secure And Authenticated Reversible Data Hiding In Encrypted Images

Image Processing, Web | Desktop Application
Secure And Authenticated Reversible Data Hiding In Encrypted Images Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes…
Read More

Developing Secure Social Healthcare System over the Cloud

Cloud Computing, Web | Desktop Application
Developing Secure Social Healthcare System over the Cloud Healthcare application is a social media application which is developed over the cloud. Now a day we hear two cutting edge technologies most social media and cloud computing. Developing and maintaining a healthcare system with self infrastructure well cost more. Many small hospitals save hard copies of patient’s records. This healthcare application will provide web service which is developed over the cloud so it well reduces the cost and they need not be worried about infrastructure. Cloud providers well provide up to date software so, software well be up to date. Since data is present in the cloud most of them worry about security. By using role based access control healthcare system is secured.
Read More

Access Control Mechanisms for Outsourced Data in Cloud

Cloud Computing, Web | Desktop Application
Access Control Mechanisms for Outsourced Data in Cloud Traditional access control models often assume that the en- tity enforcing access control policies is also the owner of data and re- sources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving con dentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become pri- vacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable com- munication overhead and at the same time limits the information that the cloud learns…
Read More

An extended visual cryptography scheme without pixel expansion for halftone images

Image Processing, Web | Desktop Application
An extended visual cryptography scheme without pixel expansion for halftone images Visual cryptography is a secret sharing scheme which use images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach.
Read More

Cloud Data Protection for the Masses

Cloud Computing, Web | Desktop Application
Cloud Data Protection for the Masses Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
Read More

Dynamic Bandwidth Allocation in Cloud Computing

Cloud Computing, Web | Desktop Application
Dynamic Bandwidth Allocation in Cloud Computing Cloud Computing is a use of computing resources that is delivered as a service over a network. Sharing the data in the cloud depends on the network performance of the data centers. Bandwidth allocation plays a major role in sharing the resources towards the data center networks. Server performance is the major problem in cloud computing. When multiple users send a request for the same server at a time, the performance of the server is considerably decreased. So we describe a novel method of reallocating the bandwidth dynamically from passive users to active users using bandwidth mutual sharing and fair sharing technique.
Read More

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG

Image Processing, Web | Desktop Application
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Abstract—A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the PNG image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel…
Read More

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

Cloud Computing, Web | Desktop Application
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abstract Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done…
Read More

Robust Face-Name Graph Matching for Movie Character Identification

Image Processing, Web | Desktop Application
Robust Face-Name Graph Matching for Movie Character Identification Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification. The contributions of this work include: 1) A noise insensitive character relationship representation is incorporated. 2) We introduce an edit operation based graph matching algorithm. 3) Complex character changes are handled by simultaneously graph partition and graph matching. 4) Beyond existing…
Read More

A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY

Image Processing, Web | Desktop Application
A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY Since years due to the increase of technology, the means of communication and transferring information from one point to the other has been drastically changed. Because of this rapid development of technology, few people misusing the technology to unveil the confidential data. To provide high end security to the data to prevent form the attackers we are proposing a dynamic method in this paper. Two things are important to provide security to the data confidentiality and encryption. In this paper we are using signcryption technique to provide high security to the data, by encrypting the data with digital signature, because of this the attacker cannot do any kind of modification to the data in case the data is decrypted…
Read More

Mitigating of fire based disaster using IP

Image Processing, Web | Desktop Application
Mitigating of fire based disaster using IP Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame edge detection. This paper focuses on optimizing the flame detection by identifying gray cycle pixels nearby the flame, which is generated because of smoke and of spreading of fire pixel and the area spread of flame. These techniques can be used to reduce false alarms along with fire detection methods . The novel system simulate the existing fire detection techniques with above given new techniques of fire detection and give optimized way to detect the fire in terms of less false alarms by giving the accurate…
Read More

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Image Processing, Web | Desktop Application
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits…
Read More