[go: up one dir, main page]

100% found this document useful (1 vote)
114 views82 pages

Credit Card Fraud Detection Using Machine Learning

The document discusses several papers related to security and privacy topics such as credit card fraud detection using machine learning, secure photo sharing in social networks, and a crowd sourcing worker quality evaluation algorithm for big data applications.

Uploaded by

shanmugaraja85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
114 views82 pages

Credit Card Fraud Detection Using Machine Learning

The document discusses several papers related to security and privacy topics such as credit card fraud detection using machine learning, secure photo sharing in social networks, and a crowd sourcing worker quality evaluation algorithm for big data applications.

Uploaded by

shanmugaraja85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 82

CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING

Credit card fraud is a serious and ever-growing problem with billions of dollars
lost every year due to fraudulent transactions. Fraud has always been present
and will always be. It is also ever changing, as the technology and usage
patterns change over time, which makes CCFD (credit card fraud detection) a
particularly hard problem. There are two major techniques for fraud detection,
namely, misuses (supervised) and anomaly detection (unsupervised). This
classification of techniques is proposed based on capability to process the
numerical and categorical datasets. Data will be processed by machine learning
(ML) based on decision tree, SVM and linear regression. This process gives
chart based result which has been prejudiced by data mining.
MINIMIZE SHOULDER SURFING ATTACK BY MEANS OF
MANUSCRIPT AND COLOUR BASED GRAPHICAL CODE WORD
PROPOSAL

A textual password scheme and passage based shoulder surfing unwilling


graphical code word system; the better text and colour based graphical
password system to decrease shoulder surfing attack is projected. By means of
this system user can professionally login the system. The proposed system is
used to decrease the shoulder surfing attack and it will get better the safety
measures of existing applications.
SECURE PHOTO SHARING IN SOCIAL NETWORKS
Usage of community media’s has been very much growing in today’s globe,
which enables the user to split their private in sequence like imagery with other
users. This enhanced knowledge leads to seclusion breach where the users can
contribute to great figure of images across the system. To make available safety
measures for the information, we put ahead this paper consisting adaptive
privacy strategy forecast (apsf) structure to help users generate safety measures
for their images. The position of images and its metadata are examined as a
calculate of user’s seclusion preferences. The skeleton determines the most
excellent isolation strategy for the uploaded imagery. It includes an
representation classification skeleton for connection of images with comparable
policies and a strategy forecast practice to robotically produce a seclusion
strategy for user-uploaded images.
SECURE ATM CARD USING BIOMETRIC IN MOBILE
TECHNOLOGY
An autonomous atm host has a right to use any bank. There is no safety
measures layer is implemented in the atm card except for pin number. It is very
expensive for the bank to scanner. We supervise the position of the atm usage,
time taken for the user to accessing the atm machine, sequence of events
processed by the user and expected amount of withdrawal by the user. These
entire factors are verified for the verification rationale of the user along with
atm scanning and biometric confirmation. If any of the above said, parameter
are differing and then the link is generated to the user’s mobile number for
further more secure authentication system. In the modification phase, an
automation user internet (bank server) recognition model using mobile is
designed to enhance the user comfort and detection of the time span spend by
the user in the atm machine.
ANTICIPATED SECURITY MODEL FOR SESSION TRANSFER AND
SERVICES USING OTP

Internet safety measures is a branch of computer sciences often involving


browser security, system safety measures, and application and functioning
systems to keep the internet as a protected channel to swap in order by sinking
the risk and attacks. There are figures of studies that have been conducted in
this field consequential in the growth of various safety measures models to
attain internet safety measures. However, episodic safety measures information
and earlier studies show that the most protected systems are not resistant from
risk and much attempt is necessary to get better internet safety measures. This
paper planned an effortless safety measures representation to progress internet
applications defence and services protections, particular admittance control,
cryptographic, cookies and session managements, defence programming
practices, care for security from early stage on expansion life cycle.
CO DETECT: FINANCIAL FRAUD DETECTION SYSTEM BASED ON
BEHAVIOR CERTIFICATE (BC)

In today’s world frauds are increasing in both regular purchasing and online
shopping. More increases in online shopping. For every transaction bank should
check whether the transaction is fraudulent or not. Fraudster uses various
techniques to generate the fraudulent transactions. Nowadays online
transactions are more fraudulent than offline transactions. Due to increase in
frauds more advance fraud detection system needed the most. Banking mostly
use data mining techniques for credit card fraud detection. In this paper we
propose a new credit card fraud detection system based on behavior certificate
(bc) which reflects the cardholders’ transaction habits using random tree data
mining technique.
PRIVACY PRESERVING FOR ONLINE USER BEHAVIOUR DATA

Online users’ privacy is thus under the risk of being exposed to third parties.
The last decade has spectator a body of research works trying to perform data
aggregation in a privacy-preserving way. Most of existing methods guarantee
strong privacy protection yet at the cost of very insufficient aggregation
operations, such as allowing only summation, which hardly satisfies the need of
behavior analysis. We propose a scheme ppsa, which encrypts users’ sensitive
data to prevent privacy exposure from both outside analysts and the aggregation
service provider, and fully supports selective aggregate functions for online user
behavior analysis while guaranteeing the exponent privacy. We have
implemented our method and evaluated its performance using a trace-driven
evaluation based on a real online behavior dataset. Experiment results show that
our scheme expertly supports both overall aggregate queries and various
selective aggregate queries with acceptable computation and communication
overheads.
TRUSTWORTHY CONVEY FOR SENSOR NETWORKS WITH
MOBILE SINK

The vehicles speed to prevent crashes occurrence and reduce the impact when
they occur, lessening the severity of injuries sustained by the victims. I propose
a modern and an efficient methodology for detecting and reporting illegal
speeds. The system alerts the driver if he exceeded the allowed speed limit. An
infraction is reported against him if he didn’t slow down within a predefined
amount of time. The infractions are sent to a central database and are displayed
in a webpage. The system was implemented in a local network, so an ethernet
cable sufficed for the communication purpose. Over speeding has been
identified as a major cause for traffic accidents. The accidents due to high speed
result in crashes, dangerous injuries and death.
ACCOUNT TRADE: ACCOUNTABILITY AGAINST DISHONEST BIG
DATA BUYERS AND SELLERS

In this paper, a set of account protocols denoted as account trade is


proposed for big data trading among dishonest consumers. For achieving secure
the big data trading environment, account trade achieves book-keeping ability
and accountability against dishonest consumers throughout the trading (i.e.,
buying and selling) of datasets. We investigate the consumers’ responsibilities
in the dataset trading, and then we design account trade to achieve
accountability against dishonest consumers that are likely to deviate from the
responsibilities. Specifically, a uniqueness index is defined and proposed, which
is a new rigorous measurement of the data uniqueness for this purpose.
Furthermore, several account trading protocols are presented to enable data
brokers to blame the misbehaving entities when misbehaviour is detected. The
accountability of account trade is formally defined, proved, and evaluated by an
automatic verification tool as well as extensive simulation with real-world
datasets.
BIG DATA ANALYTICS USING ASSOCIATION RULES IN E-
LEARNING
Technology in today’s world has reached to extent that it can be used to do
various task in day to day life easily with less effort and time. World today has
realized importance of education in one’s life which has led to revolution in
field of education. Universities, colleges, schools today have loads of task to be
completed in given timeline. In today’s scenario colleges needs to analyze
student results manually which takes lots of time and effort by faculties working
on it? Hence in order to simplify this tasks using big data analysis system is
introduced which can perform student result analysis. The system takes file of
student results obtained by universities in excel sheet format as an input. The
result of analysis will then be displayed in sorted manner using machine
learning according to rank of student. This system runs based on association
rule in e-learning.
A CROWD SOURCING WORKER QUALITY EVALUATION
ALGORITHM ON MAP REDUCE FOR BIG DATA APPLICATIONS
Crowd sourcing is a new emerging distributed computing and business model
on the backdrop of internet blossoming. With the development of crowd
sourcing systems, the data size of crowd sources, contractors and tasks grows
rapidly. The worker quality evaluation based on big data analysis technology
has become a critical challenge. This paper first proposes a general worker
quality evaluation algorithm that is applied to any critical tasks such as tagging,
matching, filtering, categorization and many other emerging applications,
without wasting resources. Second, we realize the evaluation algorithm in the
.net platform using the map reduce parallel programming model. Finally, to
effectively verify the accuracy and the effectiveness of the algorithm in a wide
variety of big data scenarios, we conduct a series of experiments. The
experimental results demonstrate that the proposed algorithm is accurate and
effective. It has high computing performance and horizontal scalability. And it
is suitable for large-scale worker quality evaluations in a big data environment.
FREQUENT ITEMSET IN SEQUENTIAL PATTERN MATCHING
USING BIGDATA
Abstract: a novel frequent item set mining algorithm, namely horizontal
parallel-apriori (hp-apriori), is proposed that divides database both horizontally
and vertically with partitioning mining process into four sub-processes so that
all four tasks are performed in parallel way. In addition, the hpapriori tries to
speed up the mining process by an index file that is generated in the first step of
algorithm. The proposed algorithm has been compared with count distribution
(cd) in terms of execution time and speedup criteria on the four real datasets.
Experimental results demonstrated that the hpapriori outperforms over cd in
terms of minimizing execution time and maximizing speedup in high
scalability. We deal with the problem of detecting frequent items in a stream
under the constraint that items are weighted, and recent items must be weighted
more than older ones. This kind of problem naturally arises in a wide class of
applications in which recent data is considered more useful and valuable with
regard to older, stale data. The weight assigned to an item is, therefore, a
function of its arrival timestamp.
AUTHENTICATED DATA EXCHANGE WITHOUT KEY PROTOCOLS
FOR PARALLEL NETWORK FILE SYSTEMS

Information division in the cloud is a practice that allows users to expediently


right to use information in excess of the cloud. The data possessor outsources
their information in the cloud owing to cost decrease and the huge conveniences
provided by cloud services. Data possessor is not able to control over their data,
since cloud service provider is third party provider. The major crisis with data
division in the cloud is the seclusion and safety measures issues. Data possessor
has lot of information on the cloud it should be categorized depends on
important of data. In third party user request data possessor, to right to use a
cloud it division a otp key to right to use cloud data within a duration they can
get data, if secret file means third-party fling request to data possessor, through
mail. Data possessor recognizes the request then only third party right to use the
data. This paper proposes a technique that allows user to accumulate and right
to use the data firmly from the cloud storage.
WEB REFINING VALIDATION THOUGHT USERS SESSION TIMING
FOR WEB SEARCH RESULT OPTIMIZATION

The World Wide Web has developed into a necessary current tool for people’s
every day routine. The reality it is suitable means for announcement and
information look for has completed it particularly accepted. This actuality led
companies to establish using online promotion by creating business website.
Through the quick increase in the figure of websites, search engines had to
approach up with a explanation of algorithms and programs to meet the criteria
the fallout of a search and make available the users with related satisfied to their
search. We can give main concern to their site according to this it show’s in the
users result. The main concern is based upon the position system. The position
is provided by which websites are mostly visited by the users and which
websites are stayed in more than time in the user’s window. The result of the
research showed us that the top factors that supply to higher rankings.
ATTRIBUTE BASED HYBRID BOOLEAN KEYWORD SEARCH OVER
OUTSOURCED ENCRYPTED DATA

Now a day there is several websites are available. If we search any information
that shows list of available sites. We need to show exact result for the user
search we can use the Boolean keyword. Boolean keywords are used as
conjunctions to combine or exclude keywords in a search. Using these Boolean
methods, you are able to focus your search on the results that will most helpful.
It finds only the exact result for users search. Each site contains the unique
Boolean id using that we can search information’s, it hides the unnecessary
information. This way we can made the users search easy and convenient
manner.
EFFECTIVE PATTERN DISCOVERY FOR TEXT MINING USING
HIDDEN PATTERN FILTER SORTING TECHNIQUES

In this paper, the emergence of the internet, billions of websites were created,
which made it hard for the average user to extract useful information from the
web efficiently for a specific search. For resolving a problem we can make
exact information search system. In this system admin can upload the data’s and
also mention the important words are as keywords. If users search some
information, first we can separate as individual keywords that can compare with
the uploaded files keywords to finds the exact matching information. And also
it have some symbolic meaning to symbols (+, - etc...) If we specify (+)
between words it add the information if we specify (-) between words it
eliminates that specific information. According to this we can make a search
process easily and also make a accuracy results to the users.
TOWARDS CONFIDENCE INTERVAL ESTIMATION IN TRUTH
DISCOVERY

In this paper, now a day’s generous judgement is further crucial. Ruling accused
surrounded by amount of believes will create extra conflict. Lie down finding is
an appraisal of an oral declaration with the objective to disclose a likely on
purpose dishonesty. Lie discovery might pass on to a cognitive procedure of
detecting dishonesty by evaluate communication satisfied as well as non-verbal
cues. To stay away from most important difficulty this mission is helpful for
ruling. Believe wants to answer for several questions. It is based on voice
assistant. Similar suspects want to answer for similar query for one more time.
It helps user to notice whether they believe is lie or not. Afterward user can
download the statement. And user also allows screening the whole report to
analyse who is accused. This helps public supplementary theoretically as an
alternative of wasting man power.
AUTOMATIC ONLINE LECTURE HIGHLIGHTING BASED ON
MULTIMEDIA ANALYSIS

In this paper, online lecture is widely useful for those who are doing distance
education and interested students. This project plays major role in absence of
lecturers. This will reduce more work of faculties. Voice assistant is used in this
project to take lectures. To highlight sentences project will repeat more than
once to avoid use of highlighter. FAQ (frequently asked question) is also
allowed in this project to get students feedback. This can be simply accessed by
using keys. Voice based answers will be provided by admin for users feedback
or questions.
ACCESSING NETWORK USING SECURE ANDROID APPLICATIONS
Android has the biggest market share among all smart phone operating system.
Security is one of the main concerns for smart phone users today. As the power
and features of smartphone’s increase, so has their vulnerability for attacks by
viruses etc. Perhaps android is more secured operating system than any other
Smartphone operating system today. Android has very few restrictions for
developer, increases the security risk for end users. In this paper we have
reviewed android security model, application level security and security issues
in the android based Smartphone.
ADBLOCK USAGE IN WEB ADVERTISEMENT
Web users are increasingly turning to ad blockers to avoid ads, which are often
perceived as annoying or an invasion of privacy. While there has been
significant research into the factors driving ad blocker adoption and the
detrimental effect to ad publishers on the web, the resulting effects of ad blocker
usage on web users’ browsing experience is not well understood. To approach
this problem, we conduct a retrospective natural field experiment using firefox
browser usage data, with the goal of estimating the effect of ad blocking on user
engagement with the web. We focus on new users who installed an ad blocker
after a baseline observation period, to avoid comparing different populations.
Their subsequent browser activity is compared against that of a control group,
whose members do not use ad blockers, over a corresponding observation
period, controlling for prior baseline usage. In order to estimate causal effects,
we employ propensity score matching on a number of other features recorded
during the baseline period. In the group that installed an ad blocker, we find
significant increases in both active time spent in the browser (+28% over
control) and the number of pages viewed (+15% over control), while seeing no
change in the number of searches. Additionally, by reapplying the same
methodology to other popular Firefox browser extensions, we show that these
effects are specific to ad blockers. We conclude that ad blocking has a positive
impact on user engagement with the web, suggesting that any costs of using ad
blockers to users’ browsing experience are largely drowned out by the utility
that they offer.
CHILDREN TRACKING CLASSIFICATION CONTROL USING
ANDROID
Children tracking system based on android terminals is proposed. Recently, all
over the world crime against the children in the age of 14 to 17 years is more
popular. Parent’s always worry about their children whenever they are outside
from the home. In this paper, the proposed system consists of two sides out of
them one is parent module and another is the child module. The child module
consists of arm7microcontroller (lpc 2148), gps(global positioning system),
gsm(global system for mobile communication) and voice chip where the parent
module consists of android mobile phone. This paper gives the information
about missing child from school campus. There are two android mobile phones
for the safety of the both module. The system tracking the child from source to
destination i.e. from home to school or anywhere.
E- TAX INFORMATION MANAGEMENT SYSTEM

For that purpose we are developing this application, which can collect the tax
information from different authorities based on the house no’s and owner name
by using web services and stores the data in our own database. For getting the
information regarding taxes citizens need to register first. The bill is calculating
on different modes like annual, half yearly, quarterly etc. By using the user id
and password citizens can log into the system and collect the necessary
information from the home page. For this every user need to provide his house
no and owner name. By clicking on the search button they will get their own.
REVERSIBLE DATA HIDING IN HOMOMORPHIC ENCRYPTED
DOMAIN BY MONITORING CIPHERTEXT GROUP

Since few years, a new problem is trying to combine in a single step,


compression, encryption and data hiding. So far, few solutions have been
proposed to combine image encryption and compression for example.
Nowadays, a new challenge consists to embed data in encrypted images. Since
the entropy of encrypted image is maximal, the embedding step, considered like
noise, is not possible by using standard data hiding algorithms. A new idea is to
apply reversible data hiding algorithms on encrypted images by wishing to
remove the embedded data before the image decryption. Recent reversible data
hiding methods have been proposed with high capacity, but these methods are
not applicable on encrypted images. In this paper we propose an analysis of the
local standard deviation of the marked encrypted images in order to remove the
embedded data during the decryption step. We have applied our method on
various images, and we show and analyze the obtained results.
HEALTHCARE TELEMEDICINE’S MANAGEMENT SYSTEM
Android has the biggest market share among all Smartphone operating system.
Security is one of the main concerns for Smartphone users today. As the power
and features of Smartphone’s increase, so has their vulnerability for attacks by
viruses etc. Perhaps android is more secured operating system than any other
Smartphone operating system today. Android has very few restrictions for
developer, increases the security risk for end users. In this paper we have
reviewed android security model, application level security and security issues
in the android based Smartphone.
VOICE BASED INFORMATION SHARING SYSTEM FOR VISUALLY
IMPAIRED PEOPLE

In today’s world communication has become so easy due to integration of


communication technologies with internet. However the visually challenged
people find it very difficult to utilize this technology because of the fact that
using them requires visual perception. Even though many new advancements
have been implemented to help them use the computers efficiently no naïve user
who is visually challenged can use this technology as efficiently as a normal
naïve user can do that is unlike normal users they require some practice for
using the available technologies. This paper aims at developing an email system
that will help even a naïve visually impaired person to use the services for
communication without previous training. The system will not let the user make
use of keyboard instead will work only on mouse operation and speech
conversion to text. Also this system can be used by any normal person also for
example the one who is not able to read. The system is completely based on
interactive voice response which will make it user friendly and efficient to use.
RANSOMWARE: CURRENT TREND, CHALLENGES, AND
RESEARCH DIRECTIONS
Ransom ware attacks have become a global incidence, with the primary aim of
making monetary gains through illicit means. The attack started through e-mails
and has expanded through spamming and phishing. Ransom ware encrypts
targets’ files and display notifications, requesting for payment before the data
can be unlocked. Ransom demand is usually in form of virtual currency, bit
coin, because it is difficult to track. In this paper, we give a brief overview of
the current trend, challenges, and research progress in the bid to finding lasting
solutions to the menace of ransom ware that currently challenge computer and
network security, and data privacy.
SECURE FINE GRAINED SCRUTINIZE DATA IN CLOUD
Cloud computing, outsources the encrypted sensitive data to multiple fog nodes
to decrease latency and network congestion. However, the existing cipher text
retrieval schemes rarely focus on the fog computing environment and most of
them still impose high computational and storage overhead on resource-limited
end users. Fog computing by extending cipher text-policy attribute-based
encryption (CP-ABE) and searchable encryption (SE) technologies, which can
achieve fine-grained access control and keyword search simultaneously. The
LFGS can shift partial computational and storage overhead from end users to
chosen fog nodes. Furthermore, the basic LFGS system is improved to support
conjunctive keyword search and attribute update to avoid returning irrelevant
search results and illegal accesses.
A MACHINE LEARNING LIBRARY AUTOMATION PLATFORM
BASED ON ROBOTIC PROCESS AUTOMATION WITH QR CODE
ACCESSMENT
Qr code (abbreviated from quick response code) is the trademark for a type of
matrix barcode (or two-dimensional barcode) first designed for the automotive
industry in japan. A barcode is a machine-readable optical label that contains
information about the item to which it is attached. A qr code uses four
standardized encoding modes (numeric, alphanumeric, byte / binary, and kanji)
to efficiently store data; extensions may also be used. The qr code system has
become popular outside the automotive industry due to its fast readability and
greater storage capacity compared to standard upc barcodes. A qr code consists
of black modules (square dots) arranged in a square grid on a white background,
which can be read by an imaging device (such as a camera) and processed using
reed–solomon error correction until the image can be appropriately interpreted.
The required data are then extracted from patterns present in both horizontal and
vertical components of the image. In this project we will be using qr codes for
data analysis and data mining on different sectors of marketing.
EFFICIENT SEMANTIC SEARCH OVER ENCRYPTED DATA IN
CLOUD
Now a day, use of cloud storage for storing and retrieving huge amount of data
has been increased tremendously. Storing and retrieving such a large amount of
data consumes lot of time as data in the cloud needs to be always stored in
encrypted format while storing and needs to be decrypted while searching. This
ultimately slows down the process of searching. To avoid this massive
consumption of time, data searching speed can be increased by directly
searching over encrypted data in the cloud. There are many methodologies
available in the market for searching the encrypted data over the cloud. Most of
these methodologies for search over encrypted data in the cloud are having
some performance issues that can lead to lower the accuracy of the technique.
SMART-HOME AUTOMATION USING IOT-BASED SENSING AND
MONITORING PLATFORM
In order to help maintain comfortable living conditions within a home, home
monitoring and automation are utilized. The standards of human’s comfort in
homes can be categorized into several types. Among these categories, the most
significant ones are the thermal comfort, which is related to temperature and
humidity, followed by the visual comfort, related to colors and light, and
hygienic comfort, associated with air quality. A system can be set to monitor
these parameters to help maintain them within an acceptable range.
Additionally, making the house smart is to allow for intelligent automatic
executing of several commands after analyzing the collected data. Automation
can be accomplished by using the internet of things (iot). This gives the
inhabitant accesses to certain data in the house and the ability to control some
parameters remotely. This paper presents the complete design of an iot based
sensing and monitoring system for smart home Automation. The proposed
design uses the emoncms platform for collecting and Visualizing monitored
data and remote controlling of home appliances and devices. The selected
platform is very flexible and user-friendly. The sensing of different variables
inside the house is conducted using the nodemcu-esp8266 microcontroller
board, which allows real-time data sensing, processing and
uploading/downloading to/from the emoncms cloud server.
E-PETITION SYSTEM

This application will help the common people under the jurisdiction of a
municipal corporation to register their grievances about day to day problems in
their ward through a mobile application. It will provide a common man to
deliver his complaints and problems to municipal authority as well as let the
municipal authorities to address the problem in a short period of time. This
application provides an interface to register one’s complained and follow it up.
It provides a camera module which helps clicking up a picture of any problem
that people are facing and upload its image along with the complaint.
ONLINE PRISONERS MANAGEMENT SYSTEM

Automated prison management system is the collection of register cases for


each prisoner entering the prison for automated release diary generator. A good
system for prison service should be automated, because it enhances the
administrative and experience to design, develop and implement a prison
management system for prison defence and security. 
In spite of the benefits of the use of computer to provide timely and accurate
information, which is absent in most of Nigeria prison, it is not all problem
arises as to how computer can be utilize that is programmed to achieve desire
result. The introduction of computer has brought many changes to various
fields, such as prison, health sector, hotel, and bank and in business sector
generally. Just because it helps to carry out complex and lengthy analytical
operation very rapidly to effective communication system, it is also time saving,
versatile, flexible storage of large information and reduce human labour.
ONLINE VOTING SYSTEM

Fingerprint based voting project is an application where the user is recognized


by his finger pattern. Since the finger pattern of each human being is different,
the voter can be easily authenticated. The system allows the voter to vote
through his fingerprint. Finger print is used to uniquely identify the user. The
finger print minutiae features are different for each human being. Finger print is
used as a authentication of the voters.
Voter can vote the candidate only once, the system will not allow the
candidate to vote for the second time. The system will allow admin to add the
candidate name and candidate photo who are nominated for the election. Admin
only has the right to add candidate name and photo who are nominated. Admin
will register the voters name by verifying voter. Admin will authenticate the
user by verifying the user’s identity proof and then admin will register the voter.
The number of candidate added to the system by the admin will be
automatically deleted after the completion of the election.
Admin has to add the date when the election going to end. Once the user has got
the user id and password from the admin the user can login and vote for the
candidate who are nominated. The system will allow the user to vote for only
one candidate. The system will allow the user to vote for one time for a
particular election. Admin can add any number of candidates when the new
election will be announced. Admin can view the election result by using the
election id. Even user can view the election result.
EMPLOYEE MANAGEMENT INFORMATION SYSTEM FOR
COLLEGE
This project entitled “employee management system” has been designed
towards improving the management of employee information in the field. It
maintains seniority, leave records, transfer & postings and other basic
information of employee. Various mis reports can be generated through it viz.
leave order, seniority list, vacancy position and cr status etc. It is a web-based
application; it will be accessed simultaneously from many fields. Field offices
are supposed to enter information of employee of their region. This information
is compiled and used at headquarter level for mis purposes.
ELECTRONIC COMPLAINT MANAGEMENT SYSTEM FOR
MUNICIPAL CORPORATION
This project mainly focuses on sanitation and development of a municipal
corporation. To make it possible, the people who belong to the municipal
corporation are provided with an opportunity of raising a complaint regarding
any issue that take place in their locality. The issues are garbage management,
water supply, electricity management, road repairs or layering of roads and
threatening of animals. To raise the complaints through electronic complaint
management system (ECMS) for municipal corporation regarding the above
categories, a simplified solution is designed where the different type of
complaints made by people are integrated.
POLICE E- COMPLIANT MANAGEMENT SYSTEM
E-police system is an e-government related service and it makes the
communication process a possibility, a great success for modern era which
increases the professional efficiency for the government police administration.
In this paper we focus on the infrastructure of an e-police system as well as its
steps, challenges of implementation and its necessity. E-police is intended to
provide total computerized information system support for the work of the
police. This system registers the complaints from people through online and is
helpful to the police department for further process. The aim of this project is to
develop an e-police reporting and management system which is easily
accessible to the public, police department and the administrative department.
E-police would also help provide division heads and senior officers with
management information about crime control, and about administration and
support services such as accounting and personnel management. This helps to
higher authorities of police to have an overview about the progress of the
investigation; feature is made available to public for interaction with police
indirectly.
AUTOMATED POLICE INFORMATION SYSTEMS
A police information system consists of people, computer equipment and
related programs, a dynamic data base, and institutional procedures interacting
in a prescribed systems pattern. It is designed to collect, store, update, and
facilitate the automated use of data on a continuing basis. Such data and its
processing and analysis are related to both the internal affairs of the police
organization and the external environment. The manifold purposes of such an
information system are to meet operational requirements; to facilitate various
summarizing or analytical techniques relevant to the definition of community
problems; to assist the search for program goals; to generate cybernetic flows
for evaluation and control; and to permit the exchange of information among
governmental units (other law enforcement agencies, criminal justice agencies,
and non-law enforcement government organizations) and with the public.
VEHICLE INSURANCE MANAGEMENT SYSTEM

Insurance management system project is implemented in java platform using


oracle as backend application. Main aim of this project is to develop an online
application for insurance company to atomize work procedure, using these
system agents and policy holders can know details about present policies,
schemes, policy specifications, terms and conditions on policy, policy
registration by the customers. Agent’s commission is based upon customer
policy registration and target agent achieves for every month or year. This
system maintains information of branch managers who can deal with agents and
customers. In existing system manual procedure is followed where records are
used to maintain data which is a time taking process and require more man
power and calculating commissions dues...etc are done manually. In present
system there is no need of human interference in calculating any details. Total
work is done using management system which will save time and less paper
work and even human resource.
AGRI INFORMATION SHARING USING ANDROID
So, the paper presented here suggest various ways in which a farmer can utilize
mobile computing (mc) on their handsets using application called “agri info”, to
assist them for relatively better cultivation and merchandise. The main
awareness of this work is focused on indian farmers as it addresses the key
problems of getting the market updates of different products, weather updates
and information about the rain and also provides multiple language support.
This will effectively help farmers to sell their product in global market and earn
remarkable profit. Hence, this framework uses mc, which in effect, puts power
into a farmer’s hand. The experimental setup uses tools like android sdk. In this
research an android based mobile devices are used for testing.
SECURE YOUR DATA USING ANDROID APP

Android has the biggest market share among all Smartphone operating
system. Security is one of the main concerns for Smartphone users today. As the
power and features of Smartphone’s increase, so has their vulnerability for
attacks by viruses etc. Perhaps android is more secured operating system than
any other Smartphone operating system today. Android has very few
restrictions for developer, increases the security risk for end users. In this paper
we have reviewed android security model, application level security and
security issues in the android based Smartphone.
BLOOD BANK MANAGEMENT SYSTEM

Entering the details about the blood groups, members, addresses etc. And
tracking the database is complicated when the details are maintained manually.
This makes the maintenance of schedule erroneous. This is a web application
allows you to access the whole information about blood bank management
software, readily scalable and adaptable to meet the complex need of blood
banks who are key facilitator for the healthcare sector, it also supports all the
functionalities of blood bank.
BOOK SHOP MANAGEMENT SYSTEM

Today it is becoming very difficult to maintain records manually.


Software system easily does the job of maintaining daily records as well as the
transaction according to the user requirements. Only basic knowledge of
computers is required for operations. The software system consists of all
information of books and sold to the customer. The proposed system provides
lots of facility to the user to store information of the books and it provide
information in quick time in a systematic manner. The processing time on the
data is very fast. It provides required data quickly to the user and also in
specified manner to the user. There is lot of duplicate woks, and chance of
mistake when the records are changed they need to update each and every excel
file. There is no option to find and print previous saved records there is any
security; anybody can access any report and sensitive data. This bookshop
management system is used to overcome entire problem which they are facing
currently, and making complete atomization of manual system to computerized
system.
A COLLEGE CAMPUS RECRUITMENT SYSTEM

A college campus recruitment system that consists of a student login, company


login and an admin login. The project is beneficial for college students, various
companies visiting the campus for recruitment and even the college placement
officer. The software system allows the students to create their profiles and
upload all their details including their marks onto the system. The admin can
check each student details and can remove faulty accounts. The system also
consists of a company login where various companies visiting the college can
view a list of students in that college and also their respective resumes. The
software system allows students to view a list of companies who have posted
for vacancy. The admin has overall rights over the system and can moderate and
delete any details not pertaining to college placement rules. The system handles
student as well as company data and efficiently displays all this data to
respective sides.
CAR AND APARTMENT RENTAL SYSTEM

The purpose of this project is to provide a platform for users and rental
product(s) owners in an effective and efficient manner. Online renting system is
a one stop rental portal. It provides services such as hiring motor vehicles,
service apartments, hotels, guest houses, meeting & conference halls, audio
visuals, party rentals, computers and other products. It provides the facility to
make online orders and get everything done before you reach the destination.
CIVIL REGISTRY

A critical problem which characterizes developing countries is the


implementation of an effective civil registration system. The primary objective
of this web site is to give awareness about the government or legal documents
and its registration details as well as to help to register or apply for those
documents. This also acts as a consultancy agency to assist the public. The main
purpose of the web site is to reduce the effort by the candidate and save his time
and avoid unwanted rushes at the government offices and assure a smooth
working schedule at government offices. The project civil registry still requires
more development of it solutions and its applications to improve the issuance of
copies of government certificates and legal documents. Civil registry team
trying to get more affiliation to government offices and departments. Now civil
registry team acting as an agency to help the public.
COLLEGE SOCIAL WEBSITE

This paper discusses about the project implementation of social networking site
for teaching and learning purposes. The type of social space available to users
can provide a more personalized and interactive experience for educative
purpose. The growing demand of engineers in the industry makes it very
important for the students to know about the practical use of technologies that
are taught in the college and also to know about the latest technology and
projects that the industry works with. Thus, a platform where students can
interact with the industry professionals would prove to be a great benefit for
them. In this project a social networking site exclusive for the college has been
created whereby students, faculty and selective people from the industry would
be able to socialize and share their knowledge. Also it would be a hub to share
information about all the ongoing activities in the college campus. This paper
describes the features implemented in this project and presents a glimpse of how
the website works.
DATA TRANSFER WITHOUT NET

This paper is about sending data without using internet or Bluetooth because
these days Smartphone’s acquiring the whole world via android OS where one
uses apps to fulfill their needs. But for sending SMS or data either they will
have to send message by normal manner or by using e-mail or apps. This
application works on the same paradigm as e-mail does. What happen if internet
balance get finished unfortunately at that time when he or she is in great need of
that, than one can’t send data from any app , at that time this app can be proved
to be a boon for the person, sometimes government has to send guidelines via e-
mail to their employees, villagers etc. Or any catastrophe occurs than doctors
could help the people by sending guidelines where mostly internet connection
not available at that point of time this app can be fruitful and one can send files
through SMS to remote area also. With this low-cost application a user can send
attached file like .txt, .pdf, .doc etc. With maximum characters as compared to
normal SMS. This paper proposes a SMS application through which a user can
attach a file from the sd-card (retrieve) just like e-mail and send it to the
recipient to the remote area. And nominal charge will be deducted from the user
who sends data to the recipient.
LEAVE MANAGEMENT SYSTEM (LMS)

This project is aimed at developing an online leave management system that is


of importance to either an organization. The leave management system (lms) is
an intranet based application that can be accessed throughout the organization
or a specified group/dept. This system can be used to automate the workflow of
leave applications and their approvals. The periodic crediting of leave is also
automated. There are features like email notifications, automatic approval of
leave, report generators etc in this system. Leave management application will
reduce paper work and maintains record in more efficient way.
EMPLOYEE MANAGEMENT SYSTEM

In any organization such as schools, colleges, companies, industry, etc


certain numbers of employee’s are employed. Managing this type information
by just simply noting them in a diary is a tedious task to do. So in order to
manage employee’s details some automation is required. Employee
management which includes automated management of an employee’s
attendance payroll activities based on attendance, gratuity, and provident fund
and generates salary slip, thus reducing large amount of paper work.
EVENT MANAGEMENT SYSTEM

This project performs the task of developing a web application that enables the
students and faculty to retrieve the data very easily. The main purpose of event
management system is to provide a platform for the users to view the
information about the events that took place in the past and the ones which are
about to take place in the near future. The users can be faculty, students and
administrator. They can first login into the website and see through the
information such as details about the events like the venue, theme of the event ,
participants, chief guests ,etc. The faculty can keep the record of the attendance
also .the administrator can login and update the information ,delete any
unwanted data ,arrange the information accordingly so that the user can go
through an user friendly and know all the where about of their college.
ONLINE MISSING VEHICLE TRACKING SYSTEM

Online missing vehicle tracking system application for police department


project provides knowledge about the latest technology in developing
application, this application has to web enabled application and it provides more
knowledge about client server technology how they are communicating in a
sufficient manner. Thousands of automobiles are missing every year, usually
these automobiles recovered by police, actually the problem is to find the lost of
vehicle was totally change. The police have to be tried to trace out actual
owners of vehicle by considering RTO based license and chassis number. But
this ia a lengthy process time consuming is very high to check the records of
RTO, because of this delay the vehicles are reached to their owner has taking
long-time.
INSURANCE RENEWAL SYSTEM

This project aims at providing an online platform where the records of a typical
vehicle insurance company are properly and efficiently managed so as to ensure
improvement in the productivity of operations of the company. The proposed
vehicle insurance policy system is a web-based application that aims to develop
a complete and fully functional independent system to manage records of
vehicle insurance companies. It is developed with the intent of providing such
insurance companies an online platform for accurate processing, organized data
handling, and efficient retrieval and storage of records.
ONLINE EXAM FOR LICENSE
Technology has supported online examinations successfully for a number of
years, and has progressively enhanced the online examination process over the
years. However, some company’s particularly public tertiary offices in
developing countries are still involved in the conventional manual system of
writing examination. This manual system of writing examination has a lot of
demerits. The manual process of taking examinations is not only time-
consuming and tedious, but cumbersome, hence the need for a better, faster and
more reliable means of examining applicants. The objective of this paper is to
provide a report on the implementation of a web-based examination system for
RTO office purpose of license test.
PC AND LAPTOP CAN BE CONTROLLED FROM REMOTE PLACE
WITH SMARTPHONE
This paper represents how your pc and laptop can be controlled from remote
place with smartphone using internet. It basically turns your smart phone into
wireless keyboard and mouse with touchpad. This application can be performed
with some wireless connection between the pc or laptop and the Smartphone
with android operating system. By accessing the ip address of pc, we can
establish a connection between them using wi-fi connection. This application
not only turns your Smartphone into wireless keyboard and mouse but it also
provides various other features including voice to text conversion. The
implemented application consists of two parts; the first one is an application for
android Smartphone and the second one is a server application that executes the
command selected by user’s application. The outcome of this implementation is
a handy, easy-to-use application.
RESULT ALERT THROUGH EMAIL

With the advent of mobile network communication system, users have been
offered lots of services such as ability to send multimedia messages like sms,
video, data files, images etc. This paper describes the design and
implementation of a system (result alert system) that conveniently provides
examination results to students with the use of email and sms technology via
their mobile phones and devices. Mobile phones and devices are necessary
assets, most especially to students as it makes communication and the spread of
information a lot easier.
SEARCH ENGINE FOR USER ENHANCEMENT

Search engine optimization (seo) is important for websites to improve the rank
for search results and get more page views requested by the user. This search
engine ranks provide the better and optimized result to user, which will help
them to view the popular page among the number of pages available in the
search results. Apart from this search engine ranking, it also enables the
websites to compete with other rival’s website as each and every website owner
expect to see their own website on the list before other’s websites. This paper
puts forward idea about seo principles and basic strategies. It also expresses
different techniques that are employed by search engines to improve its results.
Also it presents the observation section, which gives the comparative analysis of
seo techniques. Update concepts sent to concern seo search member.
SIGN BOARD DETECTION IN ROADWAYS

Very often we see many road accidents taking place, which could be due to
many reasons like drivers ignorance of seeing the signboard, invisible sign
board during bad weather conditions or even due to the damaged signboards.
Road signboard information system is one such approach where the driver gets
the information about the upcoming hurdles. At night time and even during fog
and rainy season it is difficult for the driver to keep track of signboards .one
such solution for these problem is the road signboard information system, where
in image is displayed in the android app and voice alert system helps the driver
to concentrate on the road without even worrying about the signboards.
 ANDROID BASED ATTENDANCE SYSTEM USING SESSION OTP

Students are the important part of the institution that matters. The attendance of
the students is also as important. It is the factor that matters a lot to the people in
their career. There are situations where students need to struggle if there is
shortage of attendance. It might go the extreme level also. There have been
technologies that have been introduced in order to reduce the work of the
faculties. Even the pen paper method of taking attendance can be reduced.
The android based attendance system using session otp is an application that
will allow the user to mark the attendance based on the otp sent. This will help
in managing the attendance of students of the institutions in a well organized
way.
UID

Unique id management is an engineering project for which we provide flexible


and efficient way to provide the unique id in rto. Our project on “unique id
management” provides the information about the citizen in any country. A
citizen has unique id to find out the personal information in each and every
department or service wherever a citizen goes. This information can be found
out by the unique id of the citizen. If any citizen wants to utilize the services or
utilities by the government, he has to go to each and every department with
different id for that particular department. In unique id the citizen will perform
the all rto details basing on id.
VOICE AND VIDEO OVER WIRELESS LAN

“Voice and video over wireless LAN” is concerned with establishing audio and
video calls using wireless LAN. We are using client server model for achieving
this purpose. A wireless router is used to establish the wireless lan. Establishing
wireless LAN is easier, cost effective and less time consuming than establishing
wired LAN. This system provides flexibility of operation. We are configuring
one system having minimum of 1gb ram as a server. Server is responsible for
establishing and maintaining connection among clients. Any pc within the range
of wlan can be configured as client. Installation and maintenance of wired LAN
is tedious and expensive. Comparatively installation of WLAN is simple and
quicker. Maintenance required is also less. Comparatively it is easier to
troubleshoot. Hence we propose a wireless system for audio and video calls
within an organization.
BREAST CANCER
Although uncommon, breast cancer in young women is worthy of special
attention due to the unique and complex issues that are raised. This article
reviews specific challenges associated with the care of younger breast cancer
patients, which include fertility preservation, management of inherited breast
cancer syndromes, maintenance of bone health, secondary prevention, and
attention to psychosocial issues.
BLOOD AND ORGAN DONOR ONLINE

Blood and organ is an important aspect for all living things. It proves to be a
lifesaving component in case of emergency requirement. In this users can view
all the information provided. The main aim of developing this application is to
reduce the time to a great extend that is spent in searching for the right donor
and the availability of blood and organ required. As well as user can register
himself for his/her organ donation after his/her death to the needed ones.
E- BUS PASS REGISTER AND RENEWAL

Bus pass registration is useful for passengers who are facing problems with the
current manual work of bus pass registration and renewal. His/her renewal or
registration can be done through credit card. In the manual system the user has
to go on particular date and time if they fail then the renewal cannot be done.
This online bus pass registration application will help candidates to save their
time and renewal bus pass without standing in a line for hours near counters.
Initially uses need to register with the application by submitting their details
through online. The administrator will verify the candidate details and if they
are satisfied they will approve bus pass. The candidate can login with their
username and password and renewal is performed. The renewal process is
carried by paying the money using the credit card. The candidate can give their
valuable feedback for further enhancement of this project.
ANDROID BASED SUBURBAN TRAIN TICKET BOOKING SYSTEM

Sometimes instead of excessive waiting in the queue, people prefer to travel by


their own vehicle or sometimes they just cancel down their journey due to the
problems they have to face, for buying tickets only. Booking ticket via ticket
counter after killing time on the ticket window, may sometimes lead to missing
up of the train as well. A local train ticketing system project for local trains that
allows users to book local train tickets and get ticket receipt online. This local
train project provides login rights for normal users and admin. A normal user
may login and get a ticket online, print it and travel by train. The ticketing
process consists of a ticket booking form. The form allows the user to choose
his source and destination. The source is the station from where the user will be
boarding the train. Destination is the station he needs to get down at. The
project database is already filled with stations on mumbai western central and
harbor line. It can be modified for any other city as needed. The system also
consists of an option to select weather ticket is a single journey or a return ticket
and the journey will be commenced on first class or a second class. It also
consists of an admin account. The admin may recharge user account balance
and check for various journey tickets processed in the system.
MOBILE WEB SEARCH
Every user has a distinct background and a specific goal when searching for
information on the web. The goal of web search personalization is to tailor
search results to a particular user based on that user’s interests and preferences.
Effective personalization of information access involves two important
challenges: accurately identifying the user context and organizing the
information in such a way that matches the particular context. We present an
approach to personalized search that involves building models of user context as
ontological profiles by assigning implicitly derived interest scores to existing
concepts in a domain ontology. A spreading activation algorithm is used to
maintain the interest scores based on the user’s ongoing behavior. Our
experiments show that re-ranking the search results based on the interest scores
and the semantic evidence in an ontological user profile is effective in
presenting the most relevant results to the user.
PUBLIC KEY ENCRYPTION

Signatures on papers traditionally link a document to its signer. A digital


signature, when supported by cryptography, serves the same purposes and
achieves better results than a handwritten signature. Cryptography is a
mathematical science of transforming data into a seemingly nonsensical form
and back again in a prescribed way. Using cryptographic techniques, a signer
creates a digital signature by applying a hash function on the message to create
a mathematical message digest. The receiver can verify the sent message by
applying the same hash function followed by the sender’s public key. Digital
signatures can be verified by a trusted certification authority.
AUTOMATIC TIME TABLE GENERATION
Many colleges use manual way of preparing timetables with large number of
students is very time consuming. This usually ends up with various courses
clashing this may be either at same room or with same teachers having more
than one course at a time. These are just due to common human errors which are
very difficult to prevent in the processes. To avoid these problems people
usually taking the previous years’ timetable and modifying it but still it is a
difficult job to do incorporate changes. To overcome all these problems we
propose this system. This system will take various inputs like details of
students, subjects and classrooms and teachers available, depending upon these
input it will generate possible timetable, making the utilization of all of these
resources in a way that will best suit any of constrains of college rules.
CONVOCATION MANAGEMENT SYSTEM

The graduation project is a cornerstone of the academic life, and professional


career, of many students, and so whatever time is invested in such a project is
truly worthwhile. Furthermore, students’ extending themselves beyond their
limitations in this endeavor is essential to enhancing the concepts they learned
in previous courses. However, managing these projects poses real challenges for
them, their supervisors, and the members of the graduation project committee.
The purpose of this paper is to improve the ability of all these parties to manage
the projects through the use of software that will allow students to organize their
tasks and deadlines with minimum effort, enable supervisors to easily keep
track of students and their progress, and ultimately permit graduation project
committee members to monitor all transactions taking place to ensure that all is
well.
CRIMINAL RECORDS FOUND

The proposed system applies to all police stations across the country and
specifically looks into the subject of crime records management. It is well
understood that crime prevention, detection and conviction of criminals depend
on a highly responsive backbone of information management. The efficiency of
the police function and the effectiveness with which it tackles crime depend on
what quality of information it can derive from its existing records and how fast
it can have access to it.

It is proposed to centralize information management in crime for the purposes


of fast and efficient sharing of critical information across all police stations
across the territory. Initially, the system will be implemented across cities and
towns and later on, be interlinked so that a police detective can access
information across all records in the state thus helping speedy and successful
completion to cases. The system would also be used to generate information for
pro-active and preventive measures for fighting crime.
SMART RATION SHOP SYSTEM
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better ration systems with easy to
use user interface and payment features. The existing system uses smart cards
where we propose to use user recognition devices for authentication and
payment features for billing process.
 
TO NEAREST PLACES FINDER USING TRAJECTORY DATA
Report on a new approach on enhancing advancements in certain detection
applications which is to provide better efficiency using location awareness
system. The existing system provides uses clustering methods to find places
nearby but the proposed system allows the user to experience the places with
the help of pattern recognition and trajectory data calculations.
SMART BANKING SYSTEM WITH BOT ASSISTANT

Project is built using artificial algorithms that analyzes user’s queries and
understand user’s message. In banks, human is insufficient and usually takes
long time to process the single request which results in wastage of time and also
reduce quality of customer service. The primary goal of this chat bot is, banking
officials can interact with mentioning their queries in plain english and the chat
bot can resolve their queries with appropriate response in return. The system is
designed for banks use where banking officials can ask (type) any bank related
questions like loan, account, policy etc. The system recognizes user’s query and
understands what he wants to convey and simultaneously answers them
appropriately. The built in artificial intelligence system realizes users
requirements and provides suitable answers to the banking officials. Our
intelligent system will first take input from bank officials. This input will be
taken as written format (by typing queries). According to input, intelligent
system will processes the query and give response to user.
SMART FARE AND PASSENGER MANAGEMENT SYSTEM
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better management system on
passenger and fare management using recognition devices for better
authentication with message notification for passengers. The existing system
allows only reservations but the proposed system enhances real time fare
management with dropping point notification to passengers.
ONLINE EXAM AUTHENTICATION SYSTEM USING FACE
RECOGNITION
Report on a new approach on enhancing advancements in certain user
recognition applications which is to provide better authentication using
recognition devices. The existing system provides authentication using
traditional username password fields but the proposed system allows facial
recognition for better authentication in the online system.
ATTRIBUTE BASED DATA TRANSFER WITH GENERAL POLICIES
With the popularity of cloud computing, there have been increasing concerns
about its security and privacy. Since the cloud computing environment is
distributed and untrusted, data owners have to encrypt outsourced data to
enforce confidentiality. Therefore, how to achieve practicable access control of
encrypted data in an untrusted environment is an urgent issue that needs to be
solved. Attribute-based methods provide authorization to parties based on
whether their set of attributes (e.g., name, mail id, mobile number, etc.) Fulfills
a policy. In this paper, we combine elements of abe and abcs together with
garbled circuits to construct attribute-based data transfer (abdt). Our focus is on
an interactive solution involving a client that holds a certificate (issued by an
authority) vouching for that client’s attributes and a server that holds a policy
computable on such a set of attributes.
COLLEGE MANAGEMENT SYSTEM
College management system software allows college authorities to streamline
education process and manage students with ease and provide a unified
environment where teaching & learning can thrive. This project includes
process like students module, teachers module, faculties module, subjects
module, and score module where all the results of students are available, article
posting module and location module. We can easily identify the details of each
and everything in this college management system.
CONTENT-BASED INFORMATION RETRIEVAL TECHNIQUES
Distributed information retrieval methods are growing rapidly because of the
rising need to access and search distributed digital documents. However, the
content based information retrieval (CBIR) is concentrated to extract and
retrieve the information from massive digital libraries, which require a huge
amount of computing and storage resources. The grid computing provides the
reliable infrastructure for effective and efficient retrieval on these large
collections. In order to build an effective and efficient cbir technique, varieties
of architectures were developed based on grid technologies. The goal of such
architecture is to solve interoperability and heterogeneous resource issues, and
increase the efficiency and effectiveness of information retrieval (IR)
techniques by harnessing the grid computing capabilities. This paper reviews
and analyzes latest research carried out in the domain of large-scale dataset IR
based on a grid. The evaluation is based on scalability, response time, scope,
data type, search technique, middleware, and query type. The contribution is to
illustrate the features, capabilities, and shortages of current solutions that can
guide the researchers in this evolving area.
SECURE INFORMATION SHARING USING STEGNOGRAPHY AND
CRYPTOGRAPHY
Steganography techniques are used to address digital copyrights management,
protect information, and conceal secrets. Steganography and cryptography are
two popular ways of sending vital information in a secret way. One hides the
existence of the message and the other distorts the message itself. This paper
discussed a technique used on the advanced LSB (least significant bit) and RSA
algorithm. By matching data to an image, there is less chance of an attacker
being able to use steganalysis to recover data. Before hiding the data in an
image the application first encrypts it.
WEB BASED RECRUITMENT MANAGEMENT SYSTEM IN PHP
This project is an ideal web-based recruitment tool for companies and
co-op/internship programs. Candidates will also able to get the selected list and
future upcoming jobs and eligibility criteria to fill the form. Admin will have
the authority to fully maintain the database and make any changes as per their
requirements. It contains modules for job postings, applications, company and
applicant information, interview signup, and advanced reporting/searching.
 
DEVELOPMENT OF WEB PORTAL FOR HEALTH CENTRE
The objectives were to provide a complete informative website for aromas users
with the option to make an appointment for a vaccination or health certificate,
order prescriptions and get update information directly published by aromas
staff. And to give the staff of aroma a graphical web interface to manage the
content and the booking system. The report goes through the basic language
used and why. Further it takes up it how works and how the final product looks
and behaves.
A DATA SHARING PROTOCOL TO MINIMIZE SECURITY AND
PRIVACY RISKS IN CLOUD STORAGE
Data sharing in the cloud is a technique that allows users to conveniently access
data over the cloud. The data owner outsources their data in the cloud due to
cost reduction and the great conveniences provided by cloud services. Data
owner is not able to control over their data, because cloud service provider is a
third party provider. The main crisis with data sharing in the cloud is the
privacy and security issues. Various techniques are available to support user
privacy and secure data sharing. This paper focus on various schemes to deal
with secure data sharing such as Data sharing with forward security, secure data
sharing for dynamic groups, Attribute based data sharing, encrypted data
sharing and Shared Authority Based Privacy-Preserving Authentication
Protocol for access control of outsourced data.
SKIN LESION CLASSIFICATION USING SUPERVISEDALGORITHM
IN DATA MINING
Skin cancer is one of the major types of cancers with an increasing incidence
over the past decades. Accurately diagnosing skin lesions to discriminate
between benign and skin lesions is crucial.J48 Algorithm and SVM (SUPPORT
VECTOR MACHINE) based techniques to estimate effort.In this work
proposed system of the project is using data mining techniques for collecting the
datasets for skin cancer. So that system can overcome to diagnosing the disease
quickly and accuracy. Comparing to other algorithm proposed algorithm has
more accuracy. When we have to using two kind of algorithm .They are J48,
SVM. J48 Algorithm produced better accuracy more than SVM algorithm. The
accuracy of the proposed system is 90.2381%. It means This prediction is very
close to the actual values

You might also like