Project List

Campus Recruitment System php

Web | Desktop Application
Campus Recruitment System This college campus recruitment system provides options like student login, company login and an admin login. This software system provides an option to the students to create their profiles and upload all their details including their marks onto the system. The admin can check each student details and can remove faulty accounts. The system also consists of a company login where various companies visiting the college can view a list of students in that college and their respective resumes. The software system allows students to view a list of companies who have posted for vacancy. The admin has overall rights over the system and can moderate and delete any details not pertaining to college placement rules. The project is beneficial for college students, various companies visiting the…
Read More

Online Blood Bank Project PHP

Web | Desktop Application
Online Blood Bank Project This is an online blood bank management system that helps in managing various blood bank operations effectively. The project consists of a central depository containing various blood deposits available along with associated details. These details include blood type, storage area and date of storage. Maintenance and the monitoring of blood deposits become easy with the help of this system. The project is an online system that provides an option to check the availability of the required blood group within the blood bank. Moreover, the system also has added features such as patient name and contacts, blood booking and requirement of blood group is posted on the website to find available donors for a blood emergency. This online system is developed on .net platform and supported by…
Read More

Cricket Club Management Project

Web | Desktop Application
Cricket Club Management Project Cricket club management project is designed with the motive of managing a cricket club. This software system consists of various online booking and management functionaries needed by a cricket club. It provides various options like ground bookings, member registrations, notice posting, member registration, batch registration and more. This software system assures efficient management and maintains the functioning on a cricket club. The project consists of the following features: Ground Booking: The user may fill and apply for club ground booking using an online form. Once the admin approves the application, the ground is booked accordingly. Member Registration: People may register for the club membership. Batch Registration: People may register for various cricket training batches through the website contact form. Notices: Recent notices can be seen on…
Read More

Salon management System Php

Web | Desktop Application
Salon management System Salon management system is specially designed for managing a hair salon. This system keeps track of all the activities that are carried on daily within the salon. It maintains stock of inventory coming in. It also manages individual employee salary. The system is even equipped to manage customer billing and data storage. This fully equipped system alone manages the entire functioning of a hair salon. The system works as follows: Administrator may login to the system. He may then manage and check employee salaries due date and payment to be made. The system also keeps track of inventory coming in. An employee login is also present for customer billing. As the employee enters various services, the system calculates the bill and generates the bill. This customer data…
Read More

Car Comparison System Project

Web | Desktop Application
Car Comparison System Project Before buying a car, it is best to compare its feature and characteristic with other cars. Car comparison system project focuses on providing information to buyers about the similarities and dissimilarities between two cars. User needs to select two cars and the system will generate a brief report indicating the benefits and defects. Thus, it helps user to analyze the cars effectively and user can make best decision before buying. The system provides an admin login that has sole control over it. He can post different cars and can put up notifications. The user logs into the system and can search for his car. The system then shows various car options for comparison with respect to the desired one. Hence, user can check out varieties of…
Read More

Computer Assembly Website Php

Web | Desktop Application
Computer Assembly Website It is a computer parts assembly website project, where a user may select various computer parts online and it will be delivered to the users address. The computer assembly website project allows users to select from a list of computer parts of various companies and models. The project works as follows: User gets an option to login to the website. The user needs to create a new account if he/she is not registered The user can then see various links saying Hard disk, motherboard, mouse, speaker etc. Once the user clicks on motherboard link, the motherboard selection page is opened. Here the user may view a list of motherboards of various companies, make and models. User is allowed to select any product needed and add it to…
Read More

Online Furniture Shop Project Php

Web | Desktop Application
Online Furniture Shop Project It is an online furniture shop that allows users to check for various furniture available at the online store and purchase online. The project provides a of list of furniture products displayed online in various models and designs. The user may browse through these products as per categories. If the user likes a product, he may add it to his shopping cart. User needs to register on the site before checking out so that he can login using same id password next time. User can select any payment option that he wish to like credit card or cash on delivery. user receives a copy of the shopping receipt on his email id once the transaction is successful. Here we use .net framework to make the entire…
Read More

Smart Health Prediction Using Data Mining

Data mining, Web | Desktop Application
Smart Health Prediction Using Data Mining The Health Prediction system is an end user support and online consultation project. This system allows users to get instant guidance on their health issues through an intelligent health care system online. The system contains data of various symptoms and the disease/illness associated with those symptoms. It also has an option for users of sharing their symptoms and issues. The system processes those symptoms to check for various illnesses that can be associated with it. The system is designed to use intelligent data mining techniques to guess the most accurate illness based on patient’s symptoms. If user’s symptoms do not exactly match any disease in the database, then it is shows the diseases user could probably have based on his/her symptoms. It also consists…
Read More

Credit Card Fraud Detection Project Php

Web | Desktop Application
Credit Card Fraud Detection Project The credit card fraud detection features makes use of the behavior and location of the user to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. The system requires revivification as soon as any unusual pattern is detected. User’s credit card data is being analyzed by the system for various characteristics. These characteristics include user’s country and usual spending procedures. The system recognizes unusual patterns in the payment procedures based upon previous data of that user. So now, the system may require the user to login again or even block the user for more than three invalid attempts.
Read More

Course Material Distribution System

Web | Desktop Application
Course Material Distribution System In various universities including IGNOU, dispatches material required for various courses after the affirmation are sent to students. The student data is provided including name, address as well as the course material to be dispatched to the student. Each course has a set of number of booklets, which are by and large pressed together before dispatch. Booklet Stock is printed and maintained independently. Availability of the stock of course material is crosschecked as soon as the new request for dispatch is received. The material is dispatched instantly if material for each course and booklet for the same is available. Rest of the information is moved to pending stack of course pending database. The inventory stock is updated on receiving new printed stock and dispatch is made…
Read More

Daily Expense Tracker System

Web | Desktop Application
Daily Expense Tracker System Daily Expense Tracker System is designed to keep a track of Income-Expense of a Housewife on a day-to-day basis. This System divides the Income based on daily expenses. If you exceed day’s expense, system will cut it from your income and will provide new daily expense allowed amount. If that day’s expense is less, system will add it in savings. Daily expense tracking System will generate report at the end of month to show Income-Expense Curve. It will let you add the savings amount, which you had saved for some particular Festivals or days like Birthday or Anniversary.
Read More

Online Bakery Shop System

Web | Desktop Application
Online Bakery Shop System This online Bakery shop allows users to check and purchase various bakery products available online. The project consists of list of bakery products displayed in various categories and the user can browse through the items. User can add the selected items it to his shopping cart. User needs to register on the site before checking out. He can then login using same id password next time. Now he may pay through a credit card or cash on delivery. The user receives a copy of the shopping receipt on his email id after the successful transaction. Here we use user-friendly interface to make the entire frontend. The middle tier or code behind model is designed for fast processing. In addition, SQL serves as a backend to store…
Read More

Online Herbs Shopping Project

Web | Desktop Application
Online Herbs Shopping Project This project helps the users to cure their disease by providing them the list of fruits and herbs that require consumption, in order to get rid of disease. This project helps the user by providing easy access and search for herbs and fruits that will be good for the health of the user depending on any health issue or disease that he/she is suffering from. This system reduces the searching time of the user, largely by allowing them to enter their health problem and search accordingly. The admin can add fruits and herbs along with their information to the system. This system provides the description of the selected herbs and the way that herb will help them to cure the disease and improve health. Once the…
Read More

Matrimonial Portal Project

Web | Desktop Application
Matrimonial Portal Project This online matrimonial site is developed to let individual find their potential matches for marriage as per their priorities. This project allows the phrase ‘Marriages are made in heaven’ to be rephrased as ‘Marriages are now made online’. This application allows browsing profiles of other registered users on the site. An individual needs to give their information such as Name, Gender, Religion, Caste, Marital status, Current salary, Occupation etc along with an option to upload photo of the individual registering and their kundali. The person looking for marriage can register and search for a profile that matches their requirement. This application allows individual to search by gender, age, religion, caste, marital status. It gives an option to an individual to view kundali, which is highest priority in…
Read More

Sentiment Based Movie Rating System Php

Web | Desktop Application
Sentiment Based Movie Rating System We often encounter online movie rating sites, where the admin manually rates the movie, depending upon the comments, ratings and reviews of the users. Sentiment based movie rating system is an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system analyzes the stored data to check for user sentiments associated with each comment. This system consists of a sentiment library designed for English as well as Hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found, the comments are with a sentiment rank. The system gathers all the comments for a particular movie and then calculates an average…
Read More

Online Loan Application & Verification System

Web | Desktop Application
Name Online Loan Application & Verification System Technology PHP, MySql Category Web Application Description In India, getting a loan is a very tiring and complicated process as it may take weeks even months for loan approval and people need to visit the loan office repeatedly for document and verification. This system is designed to automate the loan process from both, bankers as well as customer’s side. Here customers get information about various loans provided along with rate of interest and required documents. Once the customer fills basic enquiry form, it reaches the bank server and he gets a login id password. The server administrator now can check it and decide whether to approve or reject the candidate. If he decides to approve, the banker may select to send customer to…
Read More

Online Diagnostic Lab Reporting System Php

Web | Desktop Application
Online Diagnostic Lab Reporting System It is an online diagnostic lab manager application that brings up various diagnoses working online. Here patients get an option to register on the site and login using registered details. Once registered with their address and contact details, the patients may now see a variety of tests conducted by the lab along with their costs. The system allows patients to do the bookings for various tests like CBC, Blood Glucose, KFT, and LFT. The tests also consist of parameters like Hemoglobin, WBC, etc. The system allows users to book any test needed and after successful booking, system calculates costs and allows users to pay online. As soon as the payment is done, the patient test is booked and the lab may now collected samples from…
Read More

Software Piracy Protection Project Php

Web | Desktop Application
Software Piracy Protection Project The project is designed to maintain software piracy protection and assures that, only the authenticated users are accessing it. Piracy has become a major threat to software product companies on the internet. Hackers or an intruder can gain access to the system to steal the information with the help of malicious codes and programs. Hence there arises a need to protect the information and products from being plagiarized. This project is developed with the purpose to protect the software’s ownership of copyright and make all the transactions secure and threat free.
Read More

Banking Bot Project Php

Artificial Intelligence & ML, Web | Desktop Application
Banking Bot Project A banking bot project is based on artificial algorithms that analyzes user’s queries and understand user’s message. The system design is for banks use, where users are allowed to ask any bank related questions like loan, account, policy etc. This is an android application. The system recognizes user’s query and understands what the user wants to convey and simultaneously answers them appropriately. The format of user’s questions can be different as there is no specific format for users to ask questions. The built in artificial intelligence system recognizes the requirements of the users and provides suitable answers for the same. It makes use a graphical representation of a person speaking while giving answers as a real person would do.
Read More

Advanced Mobile Store Php

Artificial Intelligence & ML, Web | Desktop Application
This advanced mobile store adjusts according to user’s choice and ensures most profitability using artificial intelligence. It provides user with an easy and beautiful GUI. It shows a list of products to the user, the user sees a product and goes through its features and price, the system gets to know about user’s choices. Once the user selects a phone, the system remembers the choice for that particular user. Next time the user logs in; the system shows appropriate recommendations for that user along with other products. Once the user decides to buy a mobile phone goes towards the payment option, the system also shows him some mobile covers and mobile accessories for that particular mobile that he/she has selected, so that he can add it to cart as well.…
Read More

The Cibil System Project Php

Web | Desktop Application
The Cibil System Project A cibil system to keep tracks of peoples credit scores and dues of a particular person. The system is similar to the real cibil system with an enhancement (Here the defaulter can view his status and can apply for improvement by good behavior). This software system provides an option of admin login, Cibil associates login and individual login. Here, cibil associates are banks or companies who want to report faulty members. They may send faulty member data and this is passed on to the cibil admin. The cibil admin can view the data and approve after inspection. The system provides an option of member login for which a member first needs to register. He can then check if he is listed in the black list and…
Read More

Online Election System Project Php

Web | Desktop Application
Online Election System Project Online Election System would have Candidate registration, document verification, auto-generated User ID and pass for candidate and Voters. Election Commission will handle Admin Login and Candidate will handle Candidate Login. Voters will get Unique ID and Password, Using which they can vote for a Candidate only once per Election. The project is beneficial for Election Commission, for voters as the can get to know the candidate background and choose wisely, and even for Candidate. The software system allows the Candidate to login in to their profiles and upload all their details including their previous milestone onto the system. The admin can check each Candidate details and verify the documents. Candidate’s ID and Password will be generated only after the verification, and faulty accounts will be removed.…
Read More

Opinion Mining For Social Networking Site

Data mining, Web | Desktop Application
Opinion Mining For Social Networking Site This system uses opinion-mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application where a user will post his views related to some subject and other users will view and comment on it. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. Various users can view these changes. Database of the system have various keywords denoted as negative and positive words, which helps the system to recognize the comments and rank them accordingly. Once the user logins to the system, he/she can view their own status and topics posted by…
Read More

Real Estate Search Based On Data Mining

Data mining, Web | Desktop Application
Real Estate Search Based On Data Mining This project helps the users to make good decisions regarding buying or selling of valuable property. Prior to this online system, this process involved a lot of travelling costs and searching time. Due to this system, the users can search for the required property online and get the property details depending on its preferences, which save both time and energy. This system includes property details like Address, space measurement (sq ft), number of BHKs, Floor, Property Seller name and its contact number plus email-id. The user can search property depending on the area that it wants in, number of washrooms, bedrooms, halls and kitchen. The system contains an algorithm that calculates the amount of loan that the user can take along with the…
Read More

Automated Payroll With GPS Tracking And Image Capture

Android Mobile development, Web | Desktop Application
Automated Payroll With GPS Tracking And Image Capture This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When user logout the system again the image will be captured as well as GPS…
Read More

Android Smart Ticketing Using Rfid

Android Mobile development
Android Smart Ticketing Using Rfid This is an advanced Ticketing System making it easier for the commuter to travel in the bus and the driver to keep exact records of the passengers. This System is a web and Android Based System where the Android will have to apps one for the passenger and one for the bus which is connected to the RFID Reader while the web part is Purely Admin to set the fares and bus tops and to keep and monitor the current updates of a particular bus and passengers on it. This System has the potential of letting the admin know where the bus is exactly and how many passengers are travelling on the bus with their details. This System makes it very easier for security purposes…
Read More

Restaurant Table Booking Android Application

Android Mobile development
Restaurant Table Booking Android Application Table management systems and restaurant reservation systems are becoming increasingly sophisticated, if you’re considering installing a reservation system for your restaurant there are a number of factors to consider when selecting a system and provider. A restaurant reservation and table management system should provide you with the tools to plan and run your restaurant bookings effectively and manage tables, efficient table management means that a restaurant can maximize the potential of their dining room and this in turn should increase profits. Restaurant reservation systems with the option of combining a table management system are increasing in popularity with restaurant operators. With an increasing number of diners now using the web to find details of their favored dining location having the facility to take booking via…
Read More

Child Monitoring System App

Android Mobile development
Child Monitoring System App Solution for missing children with the help of GPS technologies. The application uses two main services that is GPS and telephonic services. For location services is GPS and telephony services is SMS, call logs and contacts. Android is a widely used OS used by a lot of masses globally. Internet is used for communicating between children and parent side. The System can be designed in a simple way. The application developed to make user-friendly approach on both sides. The parents and children both should have GPS Based smart phones. The application is used to track the Child’s location as well as call logs, messages and contact from their smartphone. Reason for choosing android OS is that to target more users.
Read More

Android Geo Fencing App Project

Android Mobile development, Web | Desktop Application
Android Geo Fencing App Project This developed project work for parents and their children’s. The parents and children’s both should have GPS based smart phones. The application is used to track the child’s location using their smartphone. To access this application, parent need to create an account by filling up basic registration details and create a login id and password. Using valid login credentials, parent can login and access the application modules. After successful login, parent need to add their child details and also need to create a login id and password for their child in order to track their location. While registering their child name, parent need to set a geo fence around their children by selecting a point on map. Parent can also update the fence around their…
Read More

Railway Ticket Booking System Using Qr Code

Android Mobile development, Web | Desktop Application
Railway Ticket Booking System Using Qr Code This project deals with the development and implementation of smart phone application which is more effective and simple than current ticketing system. The “Ticket Checker System” can be bought easily anytime, anywhere and ticket will be present in the customer’s phone in the form of “Quick Response Code”. GPS facility is used for validation of the ticket at the source and deletion at the destination. The information for each user is stored in a SQL database for security purpose which is unavailable in the current suburban railway system. Also the ticket checker is provided with an application to search for the user’s ticket with the ticket number in the cloud database for checking purposes.
Read More

Mobile Based Attendance System

Android Mobile development, Web | Desktop Application
Mobile Based Attendance System built to eliminate the time and effort wasted in taking attendances in schools and colleges. It also greatly reduces the amount of paper resources needed in attendance data management.This is an android mobile app. It’s built to be used for school/college faculty so that they may take student attendance on their phones. The system is divided into following modules:Student Attendance List Creation: Once this App is installed on a phone, a it allows user to create a student attendance sheet consisting of name, roll number, date, Absent/Present mark and subject. He has to fill student names along with associated roll numbers. Attendance Marking: The faculty has the list on his phone now. He may see the list call roll numbers and select absent id the student…
Read More

Secure Mining of Association Rules in Horizontally Distributed Databases

Data mining
Secure Mining of Association Rules in Horizontally Distributed Databases We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton [18]. Our protocol, like theirs, is based on the Fast Distributed Mining (FDM) algorithm of Cheung et al. [8], which is an unsecured distributed version of the Apriori algorithm. The main ingredients in our protocol are two novel secure multi-party  algorithms—one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. Our protocol offers enhanced privacy with respect to the protocol in [18]. In addition, it is simpler and is significantly more efficient in…
Read More

Policy-by-Example for Online Social Networks.

Cloud Computing, Data mining, Security and Encryption
Policy-by-Example for Online Social Networks We introduce two approaches for improving privacy policy management in online social networks. First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management. To demonstrate the e ectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time. In addition, we demonstratedconsiderable reductions in policy authoring time using Same As Policy Management over traditional group based policy management approaches. Finally,…
Read More

Web Usage Mining Using Improved Frequent Pattern Tree Algorithms

Cloud Computing, Data mining
Web Usage Mining Using Improved Frequent Pattern Tree Algorithms Web mining can be broadly defined as discovery and analysis of useful information from the World Wide Web. Web Usage Mining can be described as the discovery and analysis of user accessibility pattern, during the mining of log files and associated data from a particular Web site, in order to realize and better serve the needs of Web-based applications. Web usage mining itself can be categorised further depending on the kind of usage data considered they are web server, application server and application level data. This Research work focuses on web use mining and specifically keeps tabs on running across the web utilization examples of sites from the server log records. The bonding of memory and time usage is compared by…
Read More

An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds (Data Mining with cloud)

Data mining
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds (Data Mining with cloud) We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive information in public clouds. The cloud is employed as a secure storage as well as…
Read More

Infrequent Weighted Itemset Mining Using Frequent Pattern Growth

Data mining
Infrequent Weighted Itemset Mining Using Frequent Pattern Growth Frequent weighted itemsets represent correlations frequently holding in data in which items may weight differently. However, in some contexts, e.g., when the need is to minimize a certain cost function, discovering rare data correlations is more interesting than mining frequent ones. This paper tackles the issue of discovering rare and weighted itemsets, i.e., the infrequent weighted itemset (IWI) mining problem. Two novel quality measures are proposed to drive the IWI mining process. Furthermore, two algorithms that perform IWI and Minimal IWI mining efficiently,driven by the proposed measures, are presented. Experimentalresults show efficiency and effectiveness of the proposed approach.
Read More

Reversible Data Hiding With Optimal Value Transfer

Cloud Computing, Data mining
Reversible Data Hiding With Optimal Value Transfer In reversible data hiding techniques, the values of host data are modified according to some particular rules and the original host content can be perfectly restored after extraction of the hidden data on receiver side. In this paper, the optimal rule of value modification under a payload -distortion criterion is found by using an iterative procedure, and a practical reversible data hiding scheme is proposed. The secret data, as well as the auxiliary information used for content recovery, are carried by the differences between the original pixel-values and the corresponding values estimated from the neighbours. Here, the estimation errors are modified according to the optimal value transfer rule. Also, the host image is divided into a number of pixel subsets and the auxiliary…
Read More

Public auditing cloud data storage- bilinear pairing

Cloud Computing, Data mining
Public auditing cloud data storage- bilinear pairing. Cloud data security is concern for the client while using the cloud services provided by the service provider. In this paper we are analyzed various mechanisms to ensure reliable data storage using cloud services. It mainly focuses on the way of providing computing resources in form of service rather than a product and utilities are provided to users over internet. In the cloud, application and services move to centralized huge data center and services and management of this data may not be trustworthy into cloud environment the computing resources are under control of service provider and the third-party-auditor ensures the data integrity over out sourced data. Third-party-auditor not only read but also may be change the data. Therefore a mechanism should be provided…
Read More

Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering.

Cloud Computing, Data mining
optimization of Horizontal Aggregation in SQL by Using K-Means Clustering. To analyze data efficiently, Data mining systems are widely using datasets with columns in horizontal tabular layout. Preparing a data set is more complex task in a data mining project, requires many SQL queries, joining tables and aggregating columns. Conventional RDBMS usually manage tables with vertical form. Aggregated columns in a horizontal tabular layout returns set of numbers, instead of one number per row. The system uses one parent table and different child tables, operations are then performed on the data loaded from multiple tables. PIVOT operator, offered by RDBMS is used to calculate aggregate operations. PIVOT method is much faster method and offers much scalability. Partitioning large set of data, obtained from the result of horizontal aggregation, in to…
Read More

Interpreting the Public Sentiment Variations on Twitter

Data mining
Interpreting the Public Sentiment Variations on Twitter Millions of users share their opinions on Twitter, making it a valuable platform for tracking and analyzing public sentiment. Such tracking and analysis can provide critical information for decision making in various domains. Therefore it has attracted attention in both academia and industry. Previous research mainly focused on modeling and tracking public sentiment. In this work, we move one step further to interpret sentiment variations. We observed that emerging topics(named foreground topics) within the sentiment variation periods are highly related to the genuine reasons behind the variations. Based on this observation, we propose a Latent Dirichlet Allocation (LDA) based model, Foreground and Background LDA (FB-LDA), to distill foreground topics and filter out lngstanding background topics. These foreground topics can give potential interpretations of…
Read More

Product Aspect Ranking and Its Applications

Data mining
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users.However,the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow dependency parser…
Read More

Supporting Privacy Protection in Personalized Web Search

Data mining, Web | Desktop Application
Supporting Privacy Protection in Personalized Web Search Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction…
Read More

Keyword Query Routing

Data mining, Web | Desktop Application
Keyword Query Routing Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are…
Read More

Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups

Data mining, Web | Desktop Application
Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups In data warehousing and OLAP applications, scalar level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex SQL queries composed by scalar-level operations are often formed to obtain even very simple set-level semantics. Such queries are not only difficult to write but also challenging for a database engine to optimize, thus can result in costly evaluation. This paper proposes to augment SQL with set predicate, to bring out otherwise obscured set-level semantics. We studied two approaches to processing set predicates—an aggregate function-based approach and a bitmap index-based approach. Moreover, we designed a histogram-based probabilistic method of set predicate selectivity…
Read More

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Data mining
An Empirical Performance Evaluation of Relational Keyword Search Techniques Extending the keyword search paradigm to relational data has been an active area of research within the database and IR community during the past decade. Many approaches have been proposed, but despite numerous publications, there remains a severe lack of standardization for the evaluation of proposed search techniques. Lack of standardization has resulted in contradictory results from different evaluations, and the numerous discrepancies muddle what advantages are proffered by different approaches. In this paper, we present the most extensive empirical performance evaluation of relational keyword search techniques to appear to date in the literature. Our results indicate that many existing search techniques do not provide acceptable performance for realistic retrieval tasks. In particular, memory consumption precludes many search techniques from scaling…
Read More

Facilitating Document Annotation Using Content and Querying Value

Data mining, Web | Desktop Application
Facilitating Document Annotation Using Content and Querying Value A large number of organizations today generate and share textual descriptions of their products, services, and actions. Such collections of textual data contain significant amount of structured information, which remains buried in the unstructured text. While information extraction algorithms facilitate the extraction of structured relations, they are often expensive and inaccurate, especially when operating on top of text that does not contain any instances of the targeted structured information. We present a novel alternative approach that facilitates the generation of the structured metadata by identifying documents that are likely to contain information of interest and this information is going to be subsequently useful for querying the database. Our approach relies on the idea that humans are more likely to add the necessary metadata during creation time, if prompted by the interface; or that it is much easier…
Read More

Context-Based Diversification for Keyword Queries Over XML Data

Data mining, Web | Desktop Application
Context-Based Diversification for Keyword Queries Over XML Data While keyword query empowers ordinary users to search vast amount of data, the ambiguity of keyword query makes it difficult to effectively answer keyword queries, especially for short and vague keyword queries. To address this challenging problem, in this paper we propose an approach that automatically diversifies XML keyword search based on its different contexts in the XML data. Given a short and vague keyword query and XML data to be searched, we first derive keyword search candidates of the query by a simple feature selection model. And then, we design an effective XML keyword search diversification model to measure the quality of each candidate. After that, two efficient algorithms are proposed to incrementally compute top-k qualified query candidates as the diversified search intentions. Two selection criteria are targeted: the k selected query candidates are most relevant to…
Read More

Customizable Pointof- Interest Queries in Road Networks

Data mining, Web | Desktop Application
Customizable Pointof- Interest Queries in Road Networks networks within interactive applications. We show that partition-based algorithms developed for point-topoint shortest path computations can be naturally extended to handle augmented queries such as finding the closest restaurant or the best post office to stop on the way home, always ranking POIs according to a user-defined cost function. Our solution allows different trade-offs between indexing effort (time and space) and query time. Our most flexible variant allows the road network to change frequently (to account for traffic information or personalized cost functions) and the set of POIs to be specified at query time. Even in this fully dynamic scenario, our solution is fast enough for interactive applications on continental road networks.
Read More

Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions

Data mining, Web | Desktop Application
Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions The large number of potential applications from bridging web data with knowledge bases has led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.
Read More

Tweet Segmentation and Its Application to Named Entity Recognition

Data mining, Web | Desktop Application
Tweet Segmentation and Its Application to Named Entity Recognition Twitter has attracted millions of users to share and disseminate most up-to-date information, resulting in large volumes of data produced everyday. However, many applications in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the noisy and short nature of tweets. In this paper, we propose a novel framework for tweet segmentation in a batch mode, called HybridSeg . By splitting tweets into meaningful segments, the semantic or context information is well preserved and easily extracted by the downstream applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the stickiness scores of its candidate segments. The stickiness score considers the probability of a segment being a phrase in English (i.e., global context) and the probability of a segment being a phrase within the batch of tweets (i.e., local…
Read More

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Data mining, Web | Desktop Application
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking algorithm is exploited to estimate the confidence of each candidate. Finally, candidates with higher confidence are extracted as opinion targets or opinion words. Compared to previous methods based on the nearest-neighbor rules, our model captures opinion relations more precisely, especially for long-span relations. Compared to syntaxbased methods, our word alignment model effectively alleviates the negative effects of parsing errors…
Read More

Polarity Consistency Checking for Domain Independent Sentiment Dictionaries

Data mining, Web | Desktop Application
Polarity Consistency Checking for Domain Independent Sentiment Dictionaries Polarity classification of words is important for applications such as Opinion Mining and Sentiment Analysis. A number of sentiment word/sense dictionaries have been manually or (semi)automatically constructed. We notice that these sentiment dictionaries have numerous inaccuracies. Besides obvious instances, where the same word appears with different polarities in different dictionaries, the dictionaries exhibit complex cases of polarity inconsistency, which cannot be detected by mere manual inspection. We introduce the concept of polarity consistency of words/senses in sentiment dictionaries in this paper. We show that the consistency problem is NP-complete. We reduce the polarity consistency problem to the satisfiability problem and utilize two fast SAT solvers to detect inconsistencies in a sentiment dictionary. We perform experiments on five sentiment dictionaries and WordNet to show inter- and intra-dictionaries inconsistencies.
Read More

RRW—A Robust and Reversible Watermarking Technique for Relational Data

Data mining, Web | Desktop Application
RRW—A Robust and Reversible Watermarking Technique for Relational Data Advancement in information technology is playing an increasing role in the use of information systems comprising relational databases. These databases are used effectively in collaborative environments for information extraction; consequently, they are vulnerable to security threats concerning ownership rights and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data tampering. When ownership rights are enforced using watermarking, the underlying data undergoes certain modifications; as a result of which, the data quality gets compromised. Reversible watermarking is employed to ensure data quality along-with data recovery. However, such techniques are usually not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge discovery. Therefore, reversible watermarking is required that ensures; (i) watermark encoding and decoding by…
Read More

Access Control Mechanisms for Outsourced Data in Cloud

Cloud Computing, Web | Desktop Application
Access Control Mechanisms for Outsourced Data in Cloud Traditional access control models often assume that the en- tity enforcing access control policies is also the owner of data and re- sources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving con dentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become pri- vacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable com- munication overhead and at the same time limits the information that the cloud learns…
Read More

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Cloud Computing, Web | Desktop Application
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving. However, some data might be sensitive that the data owner does not want to move to the cloud unless the data confidentiality and query privacy are guaranteed. On the other hand, a secured query service should still provide efficient query processing and significantly reduce the in-house workload to fully realize the benefits of cloud computing. We propose the random space perturbation (RASP) data perturbation method to provide secure and efficient range query and kNN query services for protected data in the cloud. The RASP data perturbation method combines order preserving encryption, dimensionality expansion, random…
Read More

Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

Cloud Computing, Web | Desktop Application
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It therefore becomes possible for policy-based authorization systems to make unsafe decisions that might threaten sensitive resources. In this paper, we highlight the criticality of the problem. We then define the notion of trusted transactions when dealing with proofs of authorization. Accordingly, we propose several increasingly stringent levels of policy consistency constraints, and present different enforcement approaches to guarantee the trustworthiness of transactions executing on cloud servers. We propose a Two-Phase Validation Commit protocol…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web | Desktop Application
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web | Desktop Application
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow…
Read More

Typicality-Based Collaborative Filtering Recommendation

Cloud Computing, Data mining, Security and Encryption
Typicality-Based Collaborative Filtering Recommendation Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. In this paper, we borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A distinct feature of typicality-based CF is that it finds “neighbors” of users based on user typicality degrees in user groups (instead of the corated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. TyCo outperforms many CF recommendation methods on recommendation accuracy (in terms of MAE) with an improvement of…
Read More

A Location- and Diversity-aware News Feed System for Mobile Users

Android Mobile development, Security and Encryption
A Location- and Diversity-aware News Feed System for Mobile Users A location-aware news feed system enables mobile users to share geo-tagged user-generated messages, e.g., a user can receive nearby messages that are the most relevant to her. In this paper, we present MobiFeed that is a framework designed for scheduling news feeds for mobile users. MobiFeed consists of three key functions, location prediction, relevance measure, and news feed scheduler. The location prediction function is designed to predict a mobile user’s locations based on an existing path prediction algorithm. The relevance measure function is implemented by combining the vector space model with non-spatial and spatial factors to determine the relevance of a message to a user. The news feed scheduler works with the other two functions to generate news feeds for…
Read More

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Security and Encryption, Web | Desktop Application
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search Existing semantically secure public-key searchable encryption schemes take search time linear with the total number of the ciphertexts. This makes retrieval from large-scale databases prohibitive. To alleviate this problem, this paper proposes Searchable Public-Key Ciphertexts with Hidden Structures (SPCHS) for keyword search as fast as possible without sacrificing semantic security of the encrypted keywords. In SPCHS, all keyword-searchable ciphertexts are structured by hidden relations, and with the search trapdoor corresponding to a keyword, the minimum information of the relations is disclosed to a search algorithm as the guidance to find all matching ciphertexts efficiently. We construct a SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. We prove our scheme to be semantically secure in…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

Identity-Based Distributed Provable Data Possession in Multicloud Storage

Cloud Computing, Web | Desktop Application
Identity-Based Distributed Provable Data Possession in Multicloud Storage Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without downloading the whole data. In some application scenarios, the clients have to store their data on multi-cloud servers. At the same time, the integrity checking protocol must be efficient in order to save the verifier’s cost. From the two points, we propose a novel remote data integrity checking model: ID-DPDP (identity-based distributed provable data possession) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete ID-DPDP protocol is designed. The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH (computational Diffie-Hellman) problem. In…
Read More

Query Aware Determinization of Uncertain Objects

Data mining, Web | Desktop Application
Query Aware Determinization of Uncertain Objects This paper considers the problem of determinizing probabilistic data to enable such data to be stored in legacy systems that accept only deterministic input. Probabilistic data may be generated by automated data analysis/enrichment techniques such as entity resolution, information extraction, and speech processing. The legacy system may correspond to pre-existing web applications such as Flickr, Picasa, etc. The goal is to generate a deterministic representation of probabilistic data that optimizes the quality of the end-application built on deterministic data. We explore such a determinization problem in the context of two different data processing tasks -- triggers and selection queries. We show that approaches such as thresholding or top-1 selection traditionally used for determinization lead to suboptimal performance for such applications. Instead, we develop a…
Read More

Discovery of Ranking Fraud for Mobile Apps

Data mining
Discovery of Ranking Fraud for Mobile Apps Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App develops to use shady means, such as inflating their Apps’ sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we investigate two types of evidences, ranking based evidences and rating based evidences, by modeling Apps’ ranking and rating behaviors through statistical hypotheses…
Read More

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Cloud Computing, Web | Desktop Application
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the Attribute-Based Encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semi-anonymous privilege control scheme AnonyControl to address not only the data privacy but also the user identity privacy in existing access control schemes.AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi-anonymity. Besides, it…
Read More

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Cloud Computing, Security and Encryption
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data The project defines and solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) while preserving strict system wise privacy in the cloud computing paradigm. Data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their…
Read More

Design of a Secured E-voting System

Android Mobile development
Design of a Secured E-voting System E-voting systems are becoming popular with the widespread use of computers and embedded systems. Security is the vital issue should be considered in such systems. This paper proposes a new e-voting system that fulfills the security requirements of e-voting. It is based on homomorphic property and blind signature scheme. The proposed system is implemented on an embedded system which serves as a voting machine. The system employes RFID to store all conditions that comply with the rule of the government to check voter eligibility.
Read More

Shopping Application System With Near Field Communication (NFC) Based on Android

Android Mobile development, Web | Desktop Application
Shopping Application System With Near Field Communication (NFC) Based on Android The rapid development of mobile communications systems today, along with the changing times and technology, both in terms of hardware, operating system used and the use of Internet bandwidth, making some mobile applications also contribute to exploit these developments. Mobile Commerce Applications for an example, became the most popular applications for mobile users who do not want to trouble yourself with having to carry cash everywhere. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that NFC represents the potential and tremendous business, leading companies such as Nokia, Microsoft and NXP Semiconductors, actively engaged in the NFC Forum. Shopping application process integrated with NFC technologybased on Android. Shopping application system designed, for the…
Read More

Developing an Android based Learning Application for Mobile Devices

Android Mobile development
Developing an Android based Learning Application for Mobile Devices his paper is about the development of MLEA, a platform that assists, through Android cellphones and tablets, the mobility of users of learning virtual environments. MLEA is an application that implements computational techniques such as web services, design patterns, ontologies, and mobile computational techniques in order to allow the communication between mobile devices and the content management system – Moodle. It´s based on a service oriented, client server architecture that combines the REST protocol and JSON format for data interchange. The client will be provided with features for alerts, file downloads, chats and forums, grade books, quizzes, and calendar, among others.
Read More

Location Based Reminder Using GPS For Mobile

Android Mobile development
Location Based Reminder Using GPS For Mobile Although location-based reminder applications have been widely prototyped, there are few results regarding their impact on people: how are they used, do they change people’s behavior and what features influence usefulness the most. Cell phones provide a compelling platform for the delivery of location-based reminders within a user's everyday natural context. We present requirements for location-based reminders resulting from a qualitative study performed at small area in the city, and elaborate how these results are influencing ongoing design of a more comprehensive location-based reminder system. In this paper we propose an architecture of location based services which uses GPS. Within the architecture, we discuss the challenges for context management, service trigger mechanism and preference-based services.
Read More

Learn to Personalized Image Search from the Photo Sharing Websites

Multimedia, Web | Desktop Application
Learn to Personalized Image Search from the Photo Sharing Websites Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since the users’ original annotation is too sparse…
Read More

Trust modeling in social tagging of multimedia content.

Multimedia
Trust modeling in social tagging of multimedia content. Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content. However, noisy and spam annotations often make it difficult to perform an efficient search. Users may make mistakes in tagging and irrelevant tags and content may be maliciously added for advertisement or self-promotion. This article surveys recent advances in techniques for combatting such noise and spam in social tagging. We classify the state-of-the-art approaches into a few categories and study representative examples in each. We also qualitatively compare and contrast them and outline open issues for future research.
Read More

Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica

Multimedia, Security and Encryption
Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment Medias. The large-scale usergenerated meta-data not only facilitate users in sharing and organizing multimedia content, but provide useful information to improve media retrieval and management. Personalized search serves as one of such examples where the web search experience is improved by generating the returned list according to the modified user search intents. In this paper, we exploit the social annotations and propose a novel framework simultaneously considering the user and query relevance to learn to personalized image search. The basic premise is to embed the user preference and query-related search intent into user-specific topic spaces. Since the users’ original annotation is too…
Read More

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in

Parallel And Distributed System
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden…
Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Parallel And Distributed System, Web | Desktop Application
Privacy-Preserving Updates to Anonymous and Confidential Databases Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the…
Read More

The Geometric Efficient Matching Algorithm for Firewalls

Parallel And Distributed System, Web | Desktop Application
The Geometric Efficient Matching Algorithm for Firewalls The firewall is one of the central technologies allowing high-level access control to organization networks. Packet matching in firewalls involves matching on many fields from the TCP and IP packet header. At least five fields (protocol number, source and destination IP addresses, and ports) are involved in the decision which rule applies to a given packet. With available bandwidth increasing rapidly, very efficient matching algorithms need to be deployed in modern firewalls to ensure that the firewall does not become a bottleneck Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Thus, algorithms from computational geometry can be applied. In this paper we consider a…
Read More

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

Parallel And Distributed System, Web | Desktop Application
In Cloud, Can Scientific Communities Benefit from the Economies of Scale? The basic idea behind Cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of Cloud computing: in Cloud, can small or medium-scale scientific computing communities benefit from the economies of scale? Our research contributions are three fold: first, we propose an enhanced scientific public cloud model (ESP) that encourages small or medium scale research organizations rent elastic resources from a public cloud provider; second, on a basis of the ESP model, we design and implement the Dawning Cloud system that can consolidate heterogeneous scientific workloads on a Cloud site; third, we propose an innovative emulation methodology and perform a comprehensive evaluation. We found…
Read More

A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

Parallel And Distributed System, Security and Encryption, Web | Desktop Application
A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities. In this paper we have proposed a new approach named as "A Novel Anti phishing framework based on visual cryptography" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (vc) is used. The use of visual cryptography is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do…
Read More

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

Parallel And Distributed System, Web | Desktop Application
Balancing the Tradeoffs between Query Delay and Data Availability in MANETs. In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. Existing data replication solutions in either wired or wireless networks aim at either reducing the query delay or improving the data availability, but not both. As both metrics are important for mobile nodes, we propose schemes to balance the tradeoffs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the…
Read More

Resource-Aware Application State Monitoring.

Parallel And Distributed System
Resource-Aware Application State Monitoring. The increasing popularity of large-scale distributed applications in datacenters has led to the growing demand of distributed application state monitoring. These application state monitoring tasks often involve collecting values of various status attributes from a large number of nodes. One challenge in such large-scale application state monitoring is to organize nodes into a monitoring overlay that achieves monitoring scalability and cost-effectiveness at the same time. In this paper, we present REMO, a REsource-aware application state MOnitoring system, to address the challenge of monitoring overlay construction. REMO distinguishes itself from existing works in several key aspects. First, it jointly considers inter-task costsharing opportunities and node-level resource constraints. Furthermore, it explicitly models the per-message processing overhead which can be substantial but is often ignored by previous works. Second,…
Read More

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge

Parallel And Distributed System, Web | Desktop Application
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emerge With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare…
Read More

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.

Parallel And Distributed System, Web | Desktop Application
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values…
Read More

Location Based Services using Android Mobile Operating System

Android Mobile development, Web | Desktop Application
Location Based Services using Android Mobile Operating System The motivation for every location based information system is: “To assist with the exact information, at right place in real time with personalized setup and location sensitiveness”. In this era we are dealing with palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes. We have vast number of applications and usage where a person sitting in a roadside café needs to get relevant data and information. Such needs can only be catered with the help of LBS. These applications include security related jobs, general survey regarding traffic patterns, decision based on vehicular information for validity of registration and license numbers etc. A very appealing application includes surveillance where instant information is needed to decide if the…
Read More

OCRAndroid: A Framework to Digitize Text Using Mobile Phones

Android Mobile development
OCRAndroid: A Framework to Digitize Text Using Mobile Phones As demand grows for mobile phone applications, research in optical character recognition, a technology well developed for scanned documents, is shifting focus to the recognition of text embedded in digital photographs. In this paper, we present OCRdroid, a generic framework for developing OCR-based applications on mobile phones. OCRdroid combines a light-weight image preprocessing suite installed inside the mobile phone and an OCR engine connected to a backend server. We demonstrate the power and functionality of this framework by implementing two applications called PocketPal and PocketReader based on OCRdroid on HTC Android G1 mobile phone. Initial evaluations of these pilot experiments demonstrate the potential of using OCRdroid framework for realworld OCR-based mobile applications.
Read More

Mobile Phone Based Drunk Driving Detection

Android Mobile development
Mobile Phone Based Drunk Driving Detection Drunk driving, or officially Driving Under the Influence (DUI) of alcohol, is a major cause of traffic accidents throughout the world. In this paper, we propose a highly efficient system aimed at early detection and alert of dangerous vehicle maneuvers typically related to drunk driving. The entire solution requires only a mobile phone placed in vehicle and with accelerometer and orientation sensor. A program installed on the mobile phone computes accelerations based on sensor readings, and compares them with typical drunk driving patterns extracted from real driving tests. Once any evidence of drunk driving is present, the mobile phone will automatically alert the driver or call the police for help well before accident actually happens. We implement the detection system on Android G1 phone…
Read More

Android based elimination of potholes

Android Mobile development, Web | Desktop Application
Android based elimination of potholes Its a web based project where user or normal residential people can complain about their nearby potholes. They can take an image of it and upload it to submit to BMC department. Every user will have their own credentials to login and to view the potholes. BMC will have their own admin login details to look after the posting and tackle or reply to each complaints so that they can sort those problem as soon as possible.
Read More

A Personalized Mobile Search Engine

Android Mobile development
A Personalized Mobile Search Engine We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their clickthrough data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned by GPS) are used to supplement the location concepts in PMSE. The user preferences are organized in an ontology-based, multi-facet user profile, which are used to adapt a personalized ranking function for rank adaptation of future search results. To characterize the diversity of the concepts associated with a query and their relevances to the users need, four entropies are introduced to balance the weights between the content and location facets. Based on the client-server model, we also…
Read More

Designing the Next Generation of Mobile Tourism Application based on Situation Awareness

Android Mobile development
Designing the Next Generation of Mobile Tourism Application based on Situation Awareness Mobile tourism applications are changing the way travelers plan and experience tourism in the years to come. A large and growing body of literature has investigated the development of context awareness mobile applications for tourism industry. Various aspects of context awareness are studied and applied in tour guide companions and recommendation systems. However, these context awareness mobile applications do not improve traveler’s situation awareness especially in pre-visiting and during visiting phases. In other words, when using mobile applications, travelers may not perceive the situation correctly, fail to comprehend the situation or they are unable to anticipate the future development. This paper proposes a theoretical approach for designing mobile tourism applications using situation awareness. Three scenarios of traveler visiting…
Read More

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

Image Processing
Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval. With many potential practical applications, content- based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among various RF approaches, support-vector-machine (SVM)-based RF is one of the most popular techniques in CBIR. Despite the success, directly using SVM as an RF scheme has two main drawbacks. First, it treats the positive and negative feedbacks equally, which is not appropriate since the two groups of training feedbacks have distinct properties. Second, most of the SVM-based RF techniques do not take into account the…
Read More

Automatic image equalization and contrast enhancement using Gaussian mixture

Image Processing, Web | Desktop Application
Automatic image equalization and contrast enhancement using Gaussian mixture Abstract In this paper, we propose an adaptive image equalization algorithm which automatically enhances the contrast in an input image. The algorithm uses Gaussian mixture model (GMM) to model the image grey-level distribution, and the intersection points of the Gaussian components in the model are used to partition the dynamic range of the image into input grey-level intervals. The contrast equalized image is generated by transforming the pixels’ grey levels in each input interval to the appropriate output grey-level interval according to the dominant Gaussian component and cumulative distribution function (CDF) of the input interval. To take account of human perception the Gaussian components with small variances are weighted with smaller values than the Gaussian components with larger variances, and the…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing, Web | Desktop Application
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential for face retrieval. Experimenting on two public datasets, the…
Read More

CloudProtect: Managing Data Privacy in Cloud Applications

Cloud Computing, Web | Desktop Application
CloudProtect: Managing Data Privacy in Cloud Applications This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in general, do not support encrypted data management. Therefore, CloudProtect strives to carry out the data transformations (encryption/decryption) in a manner that is transparent to the application, i.e., preserves all functionalities of the application, including those that require data to be in plaintext. Additionally, CloudProtect allows users flexibility in trading off performance for security in order to let them optimally balance their privacy needs and usage-experience.
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing, Web | Desktop Application
An effective image steganalysis method based on neighborhood information of pixels This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect.
Read More

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing.

Cloud Computing, Web | Desktop Application
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper,…
Read More

Ensuring Data Storage Security in Cloud Computing

Cloud Computing, Web | Desktop Application
Ensuring Data Storage Security in Cloud Computing Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with…
Read More

Automatic Plant Leaf Classification for a Mobile Field Guide

Image Processing
Automatic Plant Leaf Classification for a Mobile Field Guide In this paper we describe the development of an Android application that gives users the ability to identify plant species based on photographs of the plant’s leaves taken with a mobile phone. At the heart of this application is an algorithm that acquires morphological features of the leaves, computes welldocumented metrics such as the angle code histogram (ACH), then classifies the species based on a novel combination of the computed metrics. The algorithm is first trained against several samples of known plant species and then used to classify unknown query species. Aided by features designed into the application such as touchscreen image rotation and contour preview, the algorithm is very successful in properly classifying species contained in the training library.
Read More

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Cloud Computing
Fuzzy Keyword Search over Encrypted Data in Cloud Computing As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users’ searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. In our solution, we exploit edit distance to quantify keywords similarity and develop two…
Read More

Secure And Authenticated Reversible Data Hiding In Encrypted Images

Image Processing, Web | Desktop Application
Secure And Authenticated Reversible Data Hiding In Encrypted Images Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes…
Read More

Developing Secure Social Healthcare System over the Cloud

Cloud Computing, Web | Desktop Application
Developing Secure Social Healthcare System over the Cloud Healthcare application is a social media application which is developed over the cloud. Now a day we hear two cutting edge technologies most social media and cloud computing. Developing and maintaining a healthcare system with self infrastructure well cost more. Many small hospitals save hard copies of patient’s records. This healthcare application will provide web service which is developed over the cloud so it well reduces the cost and they need not be worried about infrastructure. Cloud providers well provide up to date software so, software well be up to date. Since data is present in the cloud most of them worry about security. By using role based access control healthcare system is secured.
Read More

    Open chat