Professional Documents
Culture Documents
F_
F# Project # Project Name Project Objectives (at least 3)
N
The main aim of the project is to manage the errors or bugs occur
during software development phase and cycle. After the
Secure File Sharing Using Access
2 implementation of this project, the employees can update the issue
Control in cloud sim
details, solve issues and update the system from any location with
internet access.
This application can help the placement officers with great ease and
University Campus Online Automation
3 without any difficulty. This application can help in automating the
Using Cloud Computing
placement related activities of the universities without any difficulty
Temperature-Aware Power
To increase resource utilization and reduce total server power
4 Consumption Modeling in Hyperscale
consumption costs.
Cloud Data Centers
Text Encryption Using Various Encrypting the text of nodes in network with various cryptography
12
Cryptograhy Algorithms algorithm
Secure and Efficient Authentication Enable message authentications between messages travelling on
17
Scheme for a Network different network
Implementation of One time Pad using Using MAC and IP, a key is generated to implement secure
19
MAC and IP communication and then share the key for further communication
Secure File Sharing Using Access Share large files securely with network nodes or with nodes outside
20
Control the network
To test the applications in the minimized the time and costs for the end
Performance modeling and verification users in the Cloud computing environment.
21
of cloud-based auto-scaling policies To propose a framework for the auto-scaling policies in order to give
the performance guarantee.
Distributed Resource Allocation for To achieve high and fair revenues for all Data Center Operators.To
23 Data Center Networks- A Hierarchical analyse the relationship between DCOs and Service Subscribers
Game Approach through the game.
2
Energy-aware Load Balancing and
To devise energy-aware policies which identify optimal regimes for
26 Application Scaling for the Cloud
the cloud servers and, at the same time, prevent SLA violations.
Ecosystem
An online auction mechanism for cloud To develop an online auction mechanism based on user requirements
computing resource allocation and and price.
29
pricing based on user evaluation and
cost To efficiently allocate the resources using the fast heuristic algorithm.
45
Navpreet Kaur(7347)1
46
4
Encryption - decryption of data for
secure network traffic
47 - Protecting information from attacks
In this project, Cloud is served on demand and scaled as per the demand to the
consumers. Cloud can also be known as online
computing of storing and retrieving data, creating, cloud sim, netbeans
deploying applications without their own hardware or
software.
The proposed project on Bug Tracking System is capable of storing old bug
details and providing record search facility. If a bug which has already occurred
Backlog,Bugzilla.
in any pre-developed software takes place in new system, it can be easily
detected using the bug tracking system application.
In order to solve this problem, the university campus online automation using
cloud computing application will be of great help. It can help to manage the
college related information to be stored in a more secure way. This will be one .Net Framework and C# Express2
of the interesting applications that one can work on and implement in real time
world with great ease
This project shows how the ambient temperature has a significant negative
impact on power consumption and for an accurate and proper estimation of the
power consumption of Hyperscale cloud data centers (HCDC) and proposes a cloud sim 4.0, netbeans with workflowsim
temperature-aware power consumption model. This model can apply to both
homogeneous and heterogeneous HCDCs
Placing critical data in the hands of a cloud provider should come with the
guarantee of security and availability for data at rest, in motion, and in use.
SecureDBaaS
Several alternatives exist for storage services, while data confidentiality
solutions for the database as a service paradigm are still immature.
The scheme prevents replay attacks and supports creation, modification and
reading data stored in the cloud. And also addresses user revocation. It is a
decentralized, robust and access control schemes designed for cloud. The .Net Framework and C# Express2
communication, computation, and storage overheads are comparable to
centralized approaches.
Cloud-based TRE needs to apply a judicious use of cloud resources so that the
bandwidth cost reduction combined with the additional cost of TRE cloud sim, netbeans
computation and storage would be optimized.
Cloud data center management is a key problem due to the numerous and
heterogeneous strategies that can be applied, ranging from the VM placement to
the federation with other clouds. Performance evaluation of cloud computing .Net Framework and C# Express2
infrastructures is required to predict and quantify the cost-benefit of a strategy
portfolio and the corresponding quality of service (QoS) experienced by users.
The identity of the signer on each block in shared data is kept private from a
third party auditor (TPA), who is still able to publicly verify the integrity of
shared data without retrieving the entire file. Our experimental results java development kit, cloud sim
demonstrate the effectiveness and efficiency of our proposed mechanism when
auditing shared data.
In EIRQ, queries are classified into multiple ranks, where a higher ranked query
can retrieve a higher percentage of matched files. A user can retrieve files on cloud sim, netbeans
demand by choosing queries of different ranks.
SecureDBaaS
Backlog,Bugzilla.
In this we will manage the resources in an efficient way such that the
services are provided at its best.
In this data stored in cloud needs to be secured. the concept of SLA can also be used
In this, the project is based on to develop such software which can be useful for home purposes
Team Leader - Mr. Raj Kumar
F# F_N P# Project Name Project Objectives (at least 3)
15
Sentiment Analysis the application.To provide a system to users so
that they can decide which application is fraud or
2 not.
To propose a system of connecting the consumer
Improve Consumer Retailer and the retailer.To improve the sales and
16
connectivity using Data Mining business of the retailer.To discover new trends
and patterns in market.
Real Estate Search Based On To figure out the characteristics required for
25 Data Mining
analysis of Real Estate Market and their trends
Er. Hatesh
Stock Market Analysis and To study the stock prediction and its features and
26 Prediction
to find out the changes over the time.
DETECTING MALICIOUS
33
FACEBOOK APPLICATIONS
Developing innovative
55 applications in agriculture using develop application and mine data
data mining
kanika
6
kanika
6
Dengue disease prediction using Dengue disease prediction using weka data mining
59 tool
weka data mining tool
Sentiment Knowledge
60 Discovery in Twitter Streaming data streaming
Data
Sentimental Analysis Opinion all users can easily find the comments for
Mining for Mobile Networks their post very easily.
Uncertainty
ne of the most is intrinsic to aproblems
significant wide spectrum of
in cluster
real-life applications, which inevitably applies
Efficient Mining of Frequent analysis is to determine the number of
to graph data. Representative uncertain
Patterns on Uncertain Graphs clusters in unlabeled data, which is the input
graphs
for mostare seen in algorithms.
clustering bio-informatics,
Some social
networks,have
methods etc. been developed to address
this problem. However, little attention has
Variable Weighting in Fuzzy been paid on algorithms that are insensitive
k-Means Clustering to to the initialization of cluster centers and
Determine the Number of utilize variable weights to recover the
Clusters number of clusters. To fill this gap, we
Kirti Joshi
Predicting Consumption
Patterns with Repeated and Prediction of consumption of items in malls
Novel Events
Multi-Party High-Dimensional
Data Publishing under To maintain the privacy of data
Differential Privacy Intelligent Transportation Systems (ITS) is a
cutting-edge traffic solution employing state-
ofthe-art information and communication
Multi-objective Transport technologies. Optimized bus-scheduling;
System Based on Regression being an integral part of ITS ensures safety,
Analysis and Genetic efficiency, traffic congestion-reduction,
Algorithm using Transport passengers’ forecast, resource-allocation,
Data and drivers’ experience enhancement.
Nevertheless, of its significance, recent
With
yearsexplosive growth limited
have witnessed of data,research
the multi-view
Multi-view Scaling Support
data
carriedis widely used
out in this in many fields, such as
context.
Vector Machines for
data mining, machine learning, and
Classification and Feature
computer vision and so on. Because such
Selection
data always has complex structure,
A big part of people rely on available content in
social media in their decisions (e.g., reviews and
NETWORK-BASED SPAM feedback on a topic or product). The possibility
DETECTION FRAMEWORK FOR that anybody can leave a review provides a
REVIEWS IN ONLINE SOCIAL golden opportunity for spammers to write spam
MEDIA reviews about products and services for
different
Data accessinterests.
controlIdentifying theseissue
is a challenging spammers
in
RECOMMENDATION FOR public cloud storage systems. Ciphertext-Policy
Attribute-Based Encryption (CP-ABE) has been
LOCATION PROMOTION IN adopted as a promising technique to provide
LOCATIONBASED SOCIAL flexible, fine-grained and secure data access
NETWORKS control for cloud storage with honest-but-
curious cloud servers.
AN ONLINE SOCIAL NETWORK Question and Answer (Q&A) systems play a vital
BASED QUESTION AND ANSWER role in our daily life for information and
SYSTEM knowledge sharing
TRUTH DISCOVERY IN
CROWDSOURCED DETECTION detection of spatial events
OF SPATIAL EVENTS
SEQUENTIAL PERSONALIZED
SPATIAL ITEM RECOMMENDER recommender system
SYSTEM
Project Description (at least 25 words) Tools/Technology/Framework
Diabetes is one of deadliest infections on the planet.Thier is a need of built up a
framework utilizing information mining which can anticipate whether the patient has
Matlab
diabetes or not. Moreover, foreseeing the illness early prompts treating the patients
previously.
Reality TV is the new mantra of television producers and channel executives. It is the
means to increase TRP ratings and the end is always to outdo the other channels.The
comments from the viewer will be extracted along with the viewer details such as weka
gender, location, etc… Based on people’s comment and sentiments, the TV Show
popularity will be rated accordingly.
This plagiarism detector measures the similar text that matches and detects
plagiarism. Internet has changed the student’s life and also has changed their learning
Matlab
style. It allows the students to get deeper in the approach towards learning and
making their task easier.
Secure E-learning has been divided into two parts Data Security and user flexibility.
E-learning has huge database which carries lots of student records, course records,
Weka
course materials and so on. In this system user security provided by the admin, admin
himself authorize to candidate to enter into the system.
Most of us use android and IOS Mobiles these days and also uses the play store or
app store capability normally. Both the stores provide great number of application but
unluckily few of those applications are fraud. Such applications dose damage to Matlab
phone and also may be data thefts. Hence, such applications must be marked, so that
they will be identifiable for store users
This is a system of connecting the consumer and the retailer. This system creates a
bridge between consumer and retailer. By implementing an effective data mining
algorithm to analyze new patterns and trends. This system will gather data from the Weka
customer behavior pattern and is supplied to the retailers, so that retailers will able to
know the new patterns and trends.
The Heart Disease Prediction application is an end user support and online
consultation project. The application is fed with various details and the heart disease
Spark
associated with those details.The system can be used for free heart disease consulting
online.
Weather forecasting is the application of science and technology to predict the state
of the atmosphere for a given location.This system can be used in Air Traffic, Marine, Matlab
Agriculture, Forestry, Military, and Navy etc.
This system helps to find out whether the movie is super hit, hit, flop on the basis of
historical data of actor, actress, music director, writer, director, marketing budget and
release date of the new movie. If the movie releases on weekend, new movie will get Spark
higher weight age or if the movie releases on week days new movie will get low
weight age.
This project is an E-Commerce web application where the registered user will view
the product and product features and will comment about the product. System will
analyze the comments of various users and will rank product.The System takes Spark
comments of various users, based on the comment, system will specify whether the
product is good, bad, or worst
It provides support 24x7 and guide users about health features MATLAB
System will rate the website based on the comment of various users.
The role of the admin is to add various website to the system and to add keywords in MATLAB/PYTHON/Android
database
System will keep historical record of crime and can easily helps to prevent crime in
Weka/RapidMiner/Python
society
People can easily decide whether the posted topic is good or bad by using this
application.
Weka/RapidMiner/Python
Since system ranks the topic based on the keywords in database so the result is
appropriate.
Analysis of stocks using data mining will be useful for new investors to invest in
Weka/RapidMiner/Python
stock market based on the various factors considered by the software.
This system will help the human resource department to select right candidate for
Weka/RapidMiner/Python
particular job profile which in turn provide expert workforce for the organization.
This system will act as an evidence for investigation and can reduce crime over
Weka/RapidMiner/Python
internet
Provides large number of choices for books & also recommend for books.
MATLAB/PYTHON/Android
The system recommending algorithm scale well with co-rated items.
This system can be used to view the location view in map that the user wishes to
reach.
MATLAB/PYTHON/Android
The user can also find the paths to follow to reach the final destination in map which
gives a better view to the users.
Audio processing is rapidly becoming an important field in deep learning hence
here’s another challenging problem.
To check for unusual patterns. These patterns include user characteristics such as user
spending patterns as well as usual user geographic locations to verify his identity
Detailed summary of orders placed with option to search orders, update order status,
print orders, etc.
To analyze the clusters and cluster data stream with respect to density
It also consists of an innovative feature that allows users to post reviews of the
dealing process with a buyer after their deal.
System will rank the experience and key skills required for particular job position.
This includes searching by comparing with text data. This text data is easy to mine
since we just compare the words (alphabet combinations) to the words in our
database.
analyzing the various data mining techniques introduced in recent years for heart
disease prediction
large amount of data is stored in educational database, so in order to get required data
& to find the hidden relationship
analysis of the prediction of survivability rate of breast cancer patients using data
mining techniques
Chronic- Kidney-Disease prediction using weka data mining tool and its usage for
classification in the field of medical bioinformatics. It firstly classifies dataset and
then determines which algorithm performs better for diagnosis and prediction of
Chronic- Kidney-Disease
challenges that Twitter data streams pose, focusing on classification problems, and
then consider these streams for opinion mining and sentiment analysis. To deal with
streaming unbalanced classes, we propose a sliding window Kappa statistic for
evaluation in time-changing data streams.
to focuses on sharing posts in the application more effectively and easily. In this HTML,JAVA,SQL
application, users can share their posts whether they may be images any others.
Chronic- Lungs-Disease prediction using weka data mining tool and its usage for
classification in the field of medical bioinformatics. It firstly classifies dataset and
then determines which algorithm performs better for diagnosis and prediction of
Chronic- Lungs-Disease
large amount of data is stored in medical database, so in order to get required data &
to find the hidden relationship
Team Leader - Dr. Meenakshi Sharma
Dr. Meenakshi Sharma
32 Target Detection
Gaganjot kaur
37 Emotion Detection
Shefali Goyal
53 Digital Watermarking
preet singh
10
10 Jaspreet singh 54 Image Character Recognition
57 Fingerprint Recognition
58 Image ComDecom
59 Steganography
11
71 Image Editor
72 Object recognition using image analysis
12
75 STEGNOGRAPHY
13
13 Manish Sharma 81 Intelligent Traffic Light control Using Image Processing
14
15 93
IR-Depth Face Detection and Lip Localization Using
Kinect V2
97 Diagonistic Care
Damanpreet Kaur
16
Damanpreet Kau
16
18
19
22
24
Navjot Kaur
A Secure Image Steganography Based on RSA Algorithm
24 144 and Hash-LSB Technique
Objectives Of Project
1) To study about different types of noise and ... True color or RGB
5. Analyzing blinks
Nowadays, there are many cities worldwide facing a lot of problem for
vehicle parking due to less availability of parking places, high land
prices, etc. To overcome this issue here is a solution namely automatic
car parking system.
a) To deign software that cxan detect that input image has face or not. b)
To deign the hybrid technique using PCA. c) Improve the accuracy
Image can be made small sized so that more Images can share a storage
1.It provides a potential cost savings associated with sending less data
over switched telephone network where cost of call is usually based
upon its duration.
2.It not only reduces storage requirements but also overall execution
time.
3.It also reduces the probability of transmission errors since fewer bits
are transferred.
to provide security
object tracking
a) To deign software that cxan detect that input image has face or not. b)
To deign the hybrid technique using PCA. c) Improve the accuracy
how to create realistic lighting in computer graphics is one part that sets
a realistic scene apart from one that can easily be spotted to being made
in a computer. There are however many methods to reach realistic
results with lighting.
Brain, liver and other soft tissues such as tendons, muscles, cartilage
etc., are examples of solid organs. Colon and blood vessels are
examples of hollow organs. They greatly differ in structure and
mechanical behavior. Deformation of these types of structures is an
important phenomena during the process of medical simulation.
3D view is the new and future topic of Image Processing . May be used
to upgrade the Research
—We aim at finding the smallest set of genes that can ensure highly
accurate classification of cancers from microarray data by using
supervised machine learning algorithms
Project Description
There are approximately 50 currencies all over the world, with each of them looking totally different. For instance
the size of the paper is different, the same as the colour and pattern. The staffs who work for the money exchanging
(e.g. Forex Bank) have to distinguish different types of currencies and that is not an easy job. They have to
remember the symbol of each currency.
Analyzing through images is very important as from images, diseases can be detected and diagnosed at earlier stage.
From there, further actions like controlling, monitoring and prevention of diseases can be done. Images are used as
they are cheap and do not require expensive testing and lab equipments.The system will use features in microscopic
images and examine changes on texture, geometry, color and statistical analysis.
Leaf recognition technology plays an important role in plant classification and its key issue lies in whether selected
features are stable and have good ability to discriminate different kinds of leaves. It is well known that the correct
way to extract plant features involves plant recognition based on leaf images. In particular, identification process is
carried out by gathering leaves detached from the plants, treated and stained prior to the imaging.
Text Extraction is useful in information retrieving, searching, editing, documenting, archiving or reporting of image
text. However, variation of these texts due to differences in size, orientation style, and alignment, text is embedded in
complex colored document images, degraded documents image, low quality image, as well as low image contrast
and complex background make problem text extraction extremely difficult and challenging one.
Digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as an audio, video or image
data. It is typically used to identify ownership of the copyright of such signal.
Glaucoma is one of the leading causes of blindness. In closed angled Glaucoma, fluid pressure in the eye increases
because of inadequate fluid flow between the iris and the cornea. The inner eye pressure (also called intraocular
pressure or IOP) rises because the correct amount of fluid can’t drain out of the eye. The pressure causes damage and
eventually death of nerve fibers responsible for vision.
Face recognition across age progression remains one of the area's most challenging tasks, as the aging process affects
both the shape and texture of a face. One possible solution is to apply a probabilistic model to represent a face
simultaneously with its identity variable, which is stable through time, and its aging variable, which changes with
time.
Digital images are easy to manipulate and edit due to availability of powerful image processing
and editing software. Nowadays, it is possible to add or remove important features from an image
without leaving any obvious traces of tampering. As digital cameras and video cameras replace
their analog counterparts, the need for authenticating digital images, validating their content, and
detecting forgeries will only increase.
mage processing algorithms are developed to detect the plant infection or diseaseby identifying the colour feature of
the leaf area. K mean algorithm is used for colour segmentation and GLCM is used for diseases classification
Biometrics use an individual’s unique biological identifiers to verify his or her identity. This inherence-based
authentication presents an ideal enhancement to possession-based (something only you have) or knowledge-based
(something only you know) authentication
With the invention of new communication technologies, new features and facilities are provided in a smart
healthcare framework. The features and facilities aim to provide a seamless, easy-to-use, accurate, and real-time
healthcare service to clients. As health is a sensitive issue, it should be taken care of with utmost security and
caution.
Segmentation is identification of same region in images to identify objects. Need to segmentation for various
application such as diagnosis and object detection etc.
Need to segmentation for various application such as diagnosis and object detection etc.
There are various usage of edge detection in images including object detections, segmentation, identification
identical regions.
There are various usage of edge detection in images including object detections, segmentation, identification
identical regions.
Need to identify objects for various applications such as video surveillance
we propose a new variational level-set model for both global and interactive\selective segmentation tasks, which can
deal with intensity inhomogeneity and the presence of noise. The proposed method maintains the same performance
on clean and noisy vector-valued images. The model utilizes a combination of locally computed denoising
constrained surface and a denoising fidelity term to ensure a fine segmentation of local and global features of a given
image.
Open platform (OP) ultrasound systems are aimed primarily at the research community. They have been at the
forefront of the development of synthetic aperture, plane wave, shear wave elastography, and vector flow imaging.
Such platforms are driven by a need for broad flexibility of parameters that are normally preset or fixed within
clinical scanners. OP ultrasound scanners are defined to have three key features including customization of the
transmit waveform, access to the prebeamformed receive data, and the ability to implement real-time imaging.
Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption
It is a primary subfield within the Intelligent Transportation System (ITS) domain. The ATMS view is a top-down
management perspective that integrates technology primarily to improve the flow of vehicle traffic and improve
safety. Real-time traffic data from cameras, speed sensors, etc. flows into a Transportation Management Center
(TMC) where it is integrated and processed (e.g. for incident detection), and may result in actions taken (e.g. traffic
routing, DMS messages) with the goal of improving traffic flow.
Images are often degraded by noises. Noise can occur during image
capture, transmission, etc. Noise removal is an important task in
image processing. In general the results of the noise removal have a
strong influence on the quality of the image processing technique.
Several techniques for noise removal are well established in color
image processing. The nature of the noise removal problem depends
on the type of the noise corrupting the image
Text segmentation of health examination item based on character statistics and information measurement
Parking can be done without any body help. Automatic numbers will be generated
Helps in foundation of new era parking problem will be sorted with its help
Load balancing is implemented at the substation side at the power distribution level
The proposed system requires a power supply, a Raspberry Pi, Pi camera, and an android phone. And also an
operating system based on the Linux for Raspberry Pi & configuring of camera files. The video can be recorded with
the help of motion software where the motion is present in the room.This project is very useful for monitoring public
places like offices, homes, using an Android app. By using this one can capture the images, monitor and record the
live streaming videos.
Robust small target detection of low signal-to-noise ratio (SNR) is important in infrared search and track
applications for self-defense or attacks. To reduce the false alarm rate, an infrared small target detection algorithm
based on saliency detection and support vector machine was proposed. Firstly, we detect salient regions that may
contain targets with phase spectrum Fourier transform (PFT) approach. Then, target recognition was performed in
the salient regions. Experimental results show the proposed algorithm has ideal robustness and efficiency for real
infrared small target detection applications.
An analysis was performed upon the warm objects,it was proven that the image registration had been a successful
improvement of the existing system. It was also shown that vehicles can, to some extent, be eliminated as an error
source.
The main target of region of interest (ROI) based compression for medical image is to improve the compression
efficiency for transmission and storage. Main goal of Region of interest(ROI) compression is to compress ROI with
main quality as compared to other region call background. For an example, while compressing medical image the
system important region should be compressed with better quality than background. Thus, the ROI area is
compressed with less compression ratio and the background with the highest possible compression ratio in order to
get overall better compression performance.
The proposed system is used in public places like hotels, offices, theatres, homes, hospitals, stadiums, airports, etc.
There are several advantages by using this system such as it occupies less space, takes less time for taking as well as
delivering the car, safety, and security for the vehicle from thefts.
To interact with humans in general conversation, firstly there is a need to build an automated system which can ba
able to identify the expressions present on the face during conversation and system can reply according to the
category of emotion present on the face of the person.
The image compression is important for many applications. It ia a type of compression technique that reduces the
size of an image file without affecting or degrading its quality.
Face detection is a computer technology being used in a variety of applications that identifies human faces in digital
images. Face detection also refers to the psychological process by which humans locate and attend to faces in a
visual scene.
This work detects a target image in a given image according to maximization of Cross Correlation. This program
works only if the search image is the subset of the large image .this type of technique is used in SAR(Synthetic
aperture radar ) Images to identify the target
This work proposes anatomical image fusion based on second generation wavelet transform . The fusion rule is
based on neuro-fuzzy. The anatomical images are decomposed using IWT. The wavelet coefficients are then fused
using neuro-fuzzy algorithm
The purpose of the project is to localize that portion of the acquired image that corresponds to an iris . In particular, it
is necessary to localize that portion of the image derived from inside the limbus (the border between the sclera
This project provides the matlab code for integer wavelet transform,which could be used for numerous applications
in image processing
This work explains you to extract text from images .This code snippet could be used for applications like license
plate recognition ,OCR ,Text to speech conveter and other applications.
Implements real-time edge detection using Matlab , Edges characterize object boundaries useful for identification of
the object in a scene such as an X-Ray image
In banks, there is a need to check signature on cheques to verify that person authenticity. Write a program through
which you can check that whether a particular signature is belong to same person or not.(Data required: the writing
pattern of that person, pattern of each alphabet belong to signature etc.).
Create a dashboard to select the image and display its noise level. Remove the image noise using noise removal
techniques Compare the resultant image with original image. Display the level of noise in the resultant image
Create a dashboard for Encrypt Image and Decrypt image. Display the information about the image such as
size, height and width. A dialog box for selecting Image file, which you want to use hide information. Select
any type of file whatever you want to hide with the image. Similarly decrypt the image, the hidden file and image
file is saved into selected folder.
Edge detection method is used to detect edges and image intensity level is increased. Objects which have gaps are
filled. After Edge detection, image might contain many horizontal and vertical lines. These lines should be
removed from image which helps to extract only text from image. After applying image preprocessing steps,
image is left with few smaller unwanted objects. These unwanted objects are removed. After applying image
preprocessing steps, apply edge detection function on processed image.
Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture. When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched. It should display the similarity score.
Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture. When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched. It should display the similarity score.
Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture. When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched. It should display the similarity score.
Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture. When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched. It should display the similarity score.
Create dashboard where it will show the button for uploading of image file. It should also have two buttons - one for
compress the image and other to decompress the image. One separate form should be created. One button should
be for uploading of compressed file and other button should be for uploading of original file. Check size button
should be able to check both files and Check quality button should be able to check quality i.e. pixels for both files.
Image Acquisition :- The first step, image acquisition deals with capturing sequence of retina images from the
subject using cameras and sensors with High resolution and good sharpness.
Retina Segmentation- The first stage of iris segmentation to isolate the actual region in a digital eye image.
Normalization:- Once the iris segmented ,the next stage transform the eye region so that it has fixed dimensions in
order to allow comparisons. .
Mask Image
Input Query Image
Apply Feature Extraction
Apply Hashing on Features
Search on database using hashing codes
Index the hashing codes and extract features
A new, efficient switching median–mean filter is proposed to remove high density impulse noise from digital images.
The proposed method consists of detection and filtering stages. The pixels that are labeled noise-free in the detection
stage remain unchanged and the noisy-pixels are replaced by the reference image based the proposed filter with 3 × 3
window. The simulation results show that the proposed fil- ter outperforms some existing methods, both in vision
and quantitative measurements. Moreover, our method is not only efficient to remove high density impulse noise and
preserve the details in the image, but also possess a short processing time.
ACO analysis:- The image processing is the strategy which is put on process different characteristics of the image.
Many image processing based programs require the detection and the acceptance of the things. Segmentation is a
vital task for such purposes. In computer vision, image segmentation is the task of splitting a digital image into
numerous segments.. The goal of segmentation is to simplify and/or change the representation of a picture into
anything that is more significant and easier to analyze. In that work, means of edge detection is analyzed which is
predicated on picture segmentation. Ant Colony Optimization presents an alternative method of image edge
detection. Ant colony optimization (ACO) is a population-based metaheuristic that mimics the foraging conduct of
ants to locate estimated answers to difficult optimization problems
Genetic algorithms (GAs) have been found to be effective in the domain of medical image segmentation, since the
problem can often be mapped to one of search in a complex and multimodal landscape. The challenges in medical
image segmentation arise due to poor image contrast and artifacts that result in missing or diffuse organ/tissue
boundaries. The resulting search space is therefore often noisy with a multitude of local optima. Not only does the
genetic algorithmic framework prove to be effective in coming out of local optima, it also brings considerable
flexibility into the segmentation procedure.
A correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this
system directly uses the richer gray-scale information of the fingerprints.
The correlation-based fingerprint verification system first selects appropriate templates in the primary fingerprint,
uses template matching to locate them in the secondary print, and compares the template positions of both
fingerprints.
This work introduces a novel way to reduce point-wise noise introduced or exacerbated by image enhancement
methods leveraging the Random Spray sampling approach. Due to the nature of the spray, the sampling structure
used, output images for such methods tend to exhibit noise with unknown distribution.
Recognize human actions namely ‘walking’, ‘jogging’,’running’, ‘boxing’,’hand waving’, and ‘hand clapping’ using
image processing algorithm
Driver fatigue is a significant factor in a large number of vehicle accidents. There are several methods such as EEG
for drowsy detection ,and some used eyeblink sensors,this project uses web camera for Drowsy detection
A tracker which is based on structural information captured in pixels, thus facilitate a tracker which distinguishes
between the target and the background easily. This target-background posterior estimate is further used to track the
object. It is used for effective tracking of objects in generic computer vision system.
several wearable devices have been proposed for monitoring nutrition intake, tracking energy expenditure, and
performing activity recognition. Long device lifetimes are critical because frequent battery replacements increase
user burden and yield poor long-term compliance rates.
It is difficult for people to recognize currencies from different countries. Our aim is to help people solve this
problem.
study of developing a detection of leukemia types using microscopic blood sample images.
A major approach for fingerprint recognition today is to extract minutiae from fingerprint images and to perform
fingerprint matching based on the number of corresponding minutiae pairings
In India, with the growing number of vehicles, traffic congestion at junctions has become a serious issue. The density
of vehicles is increasing day by day and there is an urgent need of adaptive traffic signals
Design a code to Improve the quality of Image using Matlab Work like Adobe Photoshop
A Matlab code is written to recognize human actions namely ‘walking’, ‘jogging’,’running’, ‘boxing’,’hand waving’,
and ‘hand clapping’ using image processing algorithm
To do performance analysis, different metrics will be considered like Mean Square Error, Peak Signal to noise ration,
Bit Error Rate, Accuracy, Measure of Entropy and Root Mean Square error.
To overcome the difficulties of existing study a brand new incorporated algorithm will soon be proposed. New
algorithm may include the black route previous and Adaptive histogram equalization to improve the results further.
The main range of the planned algorithm is to improve the precision of the color images.
The main scope of the proposed algorithm is to improve the accuracy of the Intelligent Transportation System (ITS)
especially when lane detection kinds of application come in action in VANETs.
The uses of fuzzy logic for better classification of 3D images are also ignored. Therefore in order to overcome these
issues a new fuzzy based novel Curvature Features for 3D fingerprint recognition is proposed in this dissertation.
The overall objective is to improve accuracy further by introducing various attributes of 3D images.
The main target of region of interest (ROI) based compression for medical image is to improve the compression
efficiency for transmission and storage. Main goal of Region of interest(ROI) compression is to compress ROI with
main quality as compared to other region call background.
Genetic algorithms (GAs) have been found to be effective in the domain of medical image segmentation, since the
problem can often be mapped to one of search in a complex and multimodal landscape. The challenges in medical
image segmentation arise due to poor image contrast and artifacts that result in missing or diffuse organ/tissue
boundaries. The resulting search space is therefore often noisy with a multitude of local optima. Not only does the
genetic algorithmic framework prove to be effective in coming out of local optima, it also brings considerable
flexibility into the segmentation procedure.
Face detection is a computer technology being used in a variety of applications that identifies human faces in digital
images. Face detection also refers to the psychological process by which humans locate and attend to faces in a
visual scene.
Create dashboard where user will select the image and the option of
Selecting images
• Based upon the current input and type of images diseases are to be detected if
Automatically
Create dashboard where it will show the button for uploading of image to be
checked whether it matches in fingerprints database.
--When user upload the image , pattern should be checked , only then in that
Pattern folder images should be matched.
--It should display the similarity score.
The noise-map is formed in a boundary computing source, as the while the classification and filtering are completed
in a core cloud-computing source. Similarly, this project works effortlessly. The requirement of bandwidth is also
very reasonable for this project.
Day by day the traffic issue has become a major problem in India due to the rising number of motor vehicles. For
this reason, one has to utilize the traffic signals which can do the real-time checking of compactness of traffic.
Text recognition of an image is a very useful step to get the recovery of multimedia content. The proposed system is
used to detect the text in images automatically and remove horizontally associated text with difficult backgrounds.
Recognition of license plate figure done so that can help our Nation to help with recognition of culprites even when
there is exposure of them in public
It works only if the search image this type of technique is used in SAR(Synthetic Aperture Radar)
Use of ultrasound, namely in the biomedical diagnosis and industrial fields, pioneered in 1950s, is today particularly
widespread. In the last decades, ultrasound imaging has benefited from advances in numerical…
Camera phones have penetrated every corner of society and have become a focal point for communications. In our
research we extend the traditional use of such devices to help bridge the gap between physical and digital
The purpose of this master thesis was to study different content-aware video retargeting techniques, concentrating on
a generalization of seam carving for video. Focus have also been put on the possibility to combine different
Coprime and nested sampling are well known deterministic sampling techniques that operate at rates significantly
lower than the Nyquist rate, and yet allow perfect reconstruction of the spectra of wide sense stationary
In manufacturing industry, machine vision is very important nowadays. Computer vision has been developed widely
in manufacturing for accurate automated inspection. A model of automated inspection system is presented in
In this project we are going to control the wallpapers with our hands motion. This is done with help of MATLAB
tool by using some algorithms. The aim of this project is to let the experiment with control the wallpapers with
Monocropped plantations are unique to India and a handful of countries throughout the globe. Essentially, the
FOREST approach of growing coffee along with in India has enabled the plantation to fight many outbreaks of pests
MIC is useful for grayscale images corrupted by dense, low-amplitude, random or patterned noise. Such noise is
typical of scanned or still-video images. MIC differs from previous morphological noise filters in that it manipulates
residual images – the differences between the original image and morphologically smoothed versions.
The process will first be explained with a simple scene where the results of some of the most relevant settings will be
explained. Then, those techniques will be applied in two scenes to obtain a realistic result.
The primary focus of this project is on deformation of soft tissues. These kind of soft tissues usually undergo large
deformation. Deformation of an organ can be considered as mechanical response of that organ during medical
simulation. This can be modeled using continuum mechanics and FEM. The primary goal of any system, irrespective
of methods and models chosen, it must provide real-time response to obtain sufficient realism and accurate
information.
In this project we introduce automatic image enhancement techniques which are helpful in plaque identification.
Plaque is accumulation of Lipid pool & calcium cell in coronary artery which leads obstruction of blood flow & this
disease is called atherosclarosys.
This project explains breast cancer detection using neural networks .MIAS database has been used for testing the
performance of the system
The following Matlab project contains the source code and Matlab examples used for 3d spiht. These functions
implement the 3D SPIHT algorithm, used for the compression of 3d wavelet coefficients. Such 3d wavelet
coefficients are produced during
A robust structure-adaptive hybrid vector filter is proposed for digital color image restoration in this project. At each
pixel location, the image vector (i.e., pixel) is first classified into several different signal activity categories by app
In this project, we evaluate the performance of a fuzzy inference system and morphology filters for blood vessel
segmentation in a noise angiograms image
Image compression may be lossy or lossless. This project explains a lossy compression scheme based on Run Length
Encoding
This Project track the eyes in real time from a web camera using viola jone face detection algorithm.This code could
be used for eye tracking and drowsy driver applications.
This code is used to track red colour objects in a Video.the same code can be used for tracking other colour
This project provides the matlab code for Basic Optical Character recognition using Correlation .
Haze removal (or dehazing) is highly desired in both consumer/computational photography and computer vision
applications.
Introduction to Real time Motion Detection in video surveillance, video signals from multiple remote locations are
displayed on several TV screens which are typically placed together in a control room
In this project, a 3D discrete wavelet transform (DWT) approach is proposed for performing 3D compression and
other 3d applications.
People with diabetes can have an eye disease called diabetic retinopathy. This is when high blood sugar levels cause
damage to blood vessels in the retina. These blood vessels can swell and leak.
This project is used to build a Robot for ball tracing using Raspberry Pi. Here this robot utilizes a camera for
capturing the images, as well as to perform image processing for tracking the ball. This project uses a raspberry pi
camera module as a microcontroller for tracing the ball and allows the Matlab code for image analysis.
This project is used to identify the human act by image processing in real time, and the main intention is to
communicate the identified gestures using the camera system. This system starts on recognizing the human act given
in the database as it transmits the activate signs to the camera arrangement for recording & storing the video stream
in the system.
A new approach towards automobile safety and security in an autonomous area is primarily expected on the
automotive system. Nowadays, an automobile drowsy driving accident has been increased. To overcome this
problem, here is a project solution namely driver alert system, which gives an alert by watching each driver’s eyes
while driving a vehicle.
An algorithm that covers both the boundary connectivity from background cues and foreground connectivity has
been proposed in this paper. This Proposed algorithm handles the limitations of existing object detection algorithms
effectively and accurately by working on the edges of the objects or images.
There are several types of morphological operations are available for the image processing. But, the image
processing can be done using the most common types of morphological operations based on the image shape such as
Erosion & Dilation. Here, Erosion is used to reduce the feature of an image whereas dilation is used to increase the
area and emphasize features of an object.
—Automatic estimation of salient object regions across images, without any prior assumption or knowledge of the
contents of the corresponding scenes, enhances many computer vision and computer graphics applications. We
introduce a regional contrast based salient object detection algorithm, which simultaneously evaluates global contrast
differences and spatial weighted coherence scores. The proposed algorithm is simple, efficient, naturally multi-scale,
and produces full-resolution, high-quality saliency maps. These saliency maps are further used to initialize a novel
iterative version of GrabCut, namely SaliencyCut, for high quality unsupervised salient object segmentation
A visual attention system, inspired by the behavior and the neuronal architecture of the early primate visual system,
is presented. Multiscale image features are combined into a single topographical saliency map. A dynamical neural
network then selects attended locations in order of decreasing saliency
In the kNN method we can change the percentage of data used for classification, the number of neighbors k and
choose to normalize the data before using it. Normalization of the data helps to improve the accuracy of kNN 7–9)
for prognosis and diagnosis. Usually, in the kNN method the similarity metric is based on the Euclid distance
extended to the number of components in the data. Changing this metric usually leads to improvements too
The significance of finding the minimum gene subsets is three-fold: 1) It greatly reduces the computational burden
and “noise” arising from irrelevant genes. In the examples studied in this paper, finding the minimum gene subsets
even allows for extraction of simple diagnostic rules which lead to accurate diagnosis without the need for any
classifiers. 2) It simplifies gene expression tests to include only a very small number of genes rather than thousands
of genes, which can bring down the cost for cancer testing significantly. 3) It calls for further investigation into the
possible biological relationship between these small numbers of genes and cancer development and treatment
The feature number of each data was reduced to 6 from 9 in the feature selection sub-program by means of forming
rules related to the breast cancer data with the C4.5 decision tree algorithm. After separating the 683 data set with
reduced feature number into training and test sets by 10 fold cross validation method in the second stage, the data set
was classified in the third stage with AIRS and a quite satisfying result was obtained
By using a evolutionary factor, a new switching PSO (SPSO) algorithm is first proposed and analyzed, where the
velocity updating equation jumps from one mode to another according to a Markov chain, and acceleration
coefficients are dependent on mode switching. Furthermore, a leader competitive penalized multilearning approach
(LCPMLA) is introduced to improve the global search ability and refine the convergent solutions
Gabor wavelet is used in face recognition successfully, so we use the Gabor wavelet to extract the amplitude spectral
of AEI, research the recognition ability of amplitude feature. The algorithm is tested in the CASIA Datasets B and
gain high correct recognition rates.
A flower image is segmented using a threshold based method. The data set has different flower images with similar
appearance .The database of flower images is a mixture of images taken from World Wide Web and the images taken
by us. The ANN has been trained by 50 samples to classify 5 classes of flowers and achieved classification accuracy
more than 85% using GLCM features only.
In this project we present a novel approach to image Þlteringbased on the SA-DCT. We use the SA-DCT in
conjunction withthe Anisotropic Local Polynomial Approximation (LPA) - Inter-section of ConÞdence Intervals
(ICI) technique, which deÞnes theshape of the transform.s support in a pointwise adaptive manner.The thresholded
or attenuated SA-DCT coefÞcients are used toreconstruct a local estimate of the signal within the adaptive-shape
support. Since supports corresponding to different pointsare in general overlapping, the local estimates are
averagedtogether using adaptive weights that depend on the region.sstatistics.
From time to time researchers have developed many techniques to fulfill secure transfer of data and steganography
is one of them. In this project we have proposed a new technique of image steganography i.e. Hash-LSB with RSA
algorithm for providing more security to data as well as our data hiding method. The proposed technique uses a hash
function to generate a pattern for hiding data bits into LSB of RGB pixel values of the cover image.
These transforms are applied in three different ways namely: column, row and full transform. From each transformed
image, specific number of low energy coefficients is eliminated and compressed images are reconstructed by
applying inverse transform. Root Mean Square Error (RMSE) between original image and compressed image is
calculated in each case. From the implementation of proposed technique it has been observed that, RMSE values and
visual quality of images obtained by column transform are closer to RMSE values given by full transform of images.
The food grain types and their quality are rapidly assessed through visual inspection by human inspectors. The
decision making capabilities of human-inspectors are subjected to external influences such as fatigue, vengeance,
bias etc. with the help of image processing we can overcome that. By image processing we can also identify any
broken grains mixed . Here we discuss the various procedures used to obtain the percentage quality of rice grains.
Histogram transformation defines a class of image processing operations that are widely applied in the
implementation of data normalization algorithms.Initially apply total variation (TV) minimization with a L1 fidelity
term to decompose the input image with respect to cartoon and texture components. Contrary to previous papers that
rely solely on the information encompassed in the distribution of the intensity information, in this paper, the texture
information is also employed to emphasize the contribution of the local textural features in the CE process.
The colorization-based coding problem into an optimization problem, i.e., an L1 minimization problem. In
colorization-based coding, the encoder chooses a few representative pixels (RP) for which the chrominance values
and the positions are sent to the decoder, whereas in the decoder, the chrominance values for all the pixels are
reconstructed by colorization methods. The main issue in colorization-based coding is how to extract the RP well
therefore the compression rate and the quality of the reconstructed color image becomes good. By formulating the
colorization-based coding into an L1 minimization problem, it is guaranteed that, given the colorization matrix, the
chosen set of RP becomes the optimal set in the sense that it minimizes the error between the original and the
reconstructed color image.
meenakshisharma.Projects Required= 150
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Matlab
Team Leader - Dr. Jaspreet Singh
F_No. P# Project Title Project Objectives (at least 3)
Performance Analysis of (RSA, DES, 3DES Implementation Encryption Algorithms (RSA, DES, 3DES and
1
and AES) for Information Security AES) for Information Security
Encryption & Decryption Using Deffie Implementation of Deffie Hellman Algorithm to encrypt and
2
Hellman Algorithm decrypt the network data
3 Digital Watermarking To Hide Text Messages Applying the technique in hiding messages into some images
Secure and Efficient Authentication Scheme Enable message authentications between messages travelling on
4
for a Network different network
Dr. Jaspreet Singh
Text Encryption Using Various Cryptograhy Encrypting the text of nodes in network with various
6
Algorithms cryptography algorithm
Implementation and Comparative Analysis of Implementation of both algorithm to encrpt & decrpt data in the
7
RSA and MD5 Algorithm network
Applying the DOS attack in the netwok and securing the data
8 Preventing the network from DOS attack
from attack
Secure data store developement with removal The files and folder of a drive is checked for duplicacy and then
12
functionality of duplicate entries store with encryption
Security Analysis of various authentication Various authentication protocols are analysed agains various
18
protocols using AVISPA attacks using AVISPA
22 Implementation of DES Algorithm Based on different factors and implementation in java code
In the Project, once the email id and password is authenticated,
the user may proceed with next authentication section where
he/she need to select the type of authentication as QR (Quick
Response) Code or OTP (One Time Password). Once the user
selects the authentication type as QR Code, then system will
23
generate a QR Code and send it to user’s mail id over internet.
E Authentication System Using QR Code & If user select’s OTP, then SMS will be sent on his/her registered
OTP mobile number. If the user passes the authentication, then
Er. Shikha Atwal
system will redirect to the main page. The QR Code and OTP
are randomly generated by the system at the time of login.
Securing thenetwork aginst Distributed Denial Implementation of algorithm to preventthe network traffic
24
3
Encryption & Decryption Using Deffie Implementation of the said Algorithm based upon various
27
Hellman Algorithm parameters
Denial of Service attack Detection and
28 Based on Multivariate Correlation Analysis
Prevention
32 analysis of AES and DES for data security Comparison based on factors like packets send and receive
parameters
Online Transaction Fraud Detection using to restrict and block the transaction performing by attacker from
36
Backlogging on E-Commerce Website genuine user’s credit card details
Blockchain
Er. Parminder
6
42 Secure multipath routing protocols in WSNs
In the Project the secret message is divided into two parts after
which the message the first half of the message is encrypted
48
Sugandhi Midha
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
C++
Java
Java
Java
Java
Java
Java
Java
Java
AVISPA/Linux
Java
Java/C++
Java
Java
Java
Java
Java
Java
Java
Java
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Java/C++
Project
Name
Team Leader - Dr. Amandeep
S.N F_N
F# PROJECT NAME OBJECTIVES
o. o.
The main aim of this free online notice board project is make
17 Digital Notice Board information dissemination much easier in a paperless
community.
Online Time-Table Generation To manage the details of Timetable, faculty, subject, student,
26
System course.
31 Online Taxi Service To connect passengers with drivers who have a car.
To identify the first name and last name mentioned in the given
36 Person Name Classification
text
The proposed system will identify the writing pattern of the user and
values from data set provided. According to the writing style of user, RDF/OWL
next word is predicted.
The proposed system will identify the quotes in the documents and
based on the data set will categorize the quotes for further RDF/OWL
applications like parapharasing.
It’s a web application providing you facility for ordering your food
HTML, CSS, JavaScript, PHP
online.
It’s a web application providing facility for online booking of hotels. HTML, CSS, JavaScript, PHP
Online Election System is a voting system by which any voter can use
HTML, CSS, JavaScript, PHP
his/her voting rights from anywhere in the country.
POS tags have been used for a variety of NLP tasks and are extremely
useful as they provide linguistic signal on how a word is being used Any Classification NLP toolkit
within the scope of a phrase, sentence, or document.
Language translation is a sub-field of computational linguistics that Various Deep Learning Models like RNN,
investigates the use of software to translate text or speech from one CNN provide insights for performing
language to another. Language Translation task.
Text summarization is the process of creating a short and coherent a. Neural Network b. LSTM c. Bag of
version of a longer document. Words Model
Predicting how the stock market will perform & potential to unearth
patterns and these can be used to make unerringly accurate a. RNN b. CNN + LSTM
predictions.
(iii) To assess the short term as well as long term solvency position
1 of the firm.
Gurmeet kaur saini
1
2 1. Most of the persons, mainly men do not know how to cook with
the right.
2. This intelligent
cooking app will help these people to cook for themselves even if
Intelligent cooking app
they don’t know how to.
3. This app will ask for
the availability of ingredients and shows an appropriate dish which
can be made using only those ingredients
1. The user will be able to set an alert which would immediately
inform the police about any theft activity around their location.
Anti-theft app 2. This
app can include a database in which users can provide the
information about criminal activity in their locations.
1. This app will give the user access to monitor over their security
systems via Wi-Fi.
2. This will also allow
Security control via Wi-fi them to answer the people at the door, monitor camera footage, or
any other activity to keep them and their house safe.
3. This can all be accessible
through their smartphones.
1. During rush hours the user can easily access parking spots which
are near to them.
Smart car parking
2. This parking app will enable users to find a
parking spot according to GPS which is not taken by any other
driver.
Auto Responder
JOpenIT
Cloud library
Machine learning methods for
span or ham e-mail
IFreeLancer
E-COPS
BARCODE GENERATION
Company Mailer
QR Code Scanner
Implement BLOWFISH to
perform Encryption
Intranet Chatting
Vijay Kumar
3
Mobile Sampling of Sensor
Vijay Kumar Field Data
Multi-Lingual Website
Improving Utilization Of
Infrastructure Clouds
E-Filling ITR
Twitter Analyzer
PPF Analyzer
SIP Analyzer
Web Enabled Automated
Manufacturing System
Ecurrency Invester
Unique Social Security Number
Manager
Youtube Analyzer
This project aims to build an Online Exam Suite that can be used to
conduct an exam and present results in the absence of an invigilator.
This system will eliminate the need for institutions to post
Exam Suite
invigilators, collect and grade answer sheets, and will keep the
whole process
Sometimes yousecure. There are
come across twoproblems
small mannerswhere
in which
youquestions
to need
can be posted:Fixed
consult doctors aboutquestion set and
your health Uniqueorquestion
problems sets ones
for the nearest
and follow their prescriptions. Online Doctor System will provide
you the power of direct interaction between doctors of your choice
as and when required for your small problems. Using this web
Doctor Online
Amrita Chaudhary
The main aim of this project is to store the result scores of students,
process the scores in user-defined way and produce their results in
Grade Processing System the form of report cards or other analysis charts. In this web-based
software, both grading pattern and examination pattern are user
configurable.
Farmer’s buddy for farmers to know which season is better for
which crop and what soils are used for crops these are clearly
known in this application. In this application, the admin will log in,
Farmers Buddy add seasons, season time and what soil suitable for what crop also
admin add the all the necessary details. Admin can view the user
queries if any registered user sends the query to the admin and
admin sends the solution to the user.
This system provides online technical services to its customers on a
24×7 basis. The whole process involves writing large volume of
Online Customer Care and data in registers and preparing several reports daily. This ‘Call
Service Center Center cum Service Center’ manages all the online queries, all the
records of their customers, services details as well as provides
technical support.
The Blood Donors Symbiosis project is programmed in order to
help the humans or patients who are seeking blood at a particular
Blood Donors Symbiosis location. it also maintains a centralized database to store
information related to blood donors and blood providing
organizations.
6
• It provide high level of security with different level of
authentication.
Document Manager
• To provide central repository for maintaining the documents
The Query Redressal System is designed for the customers of the Global
Bank. Through this system, the bank will manage the complaints from
the customers and provide the better services for their customers.J
ASP.Net
ASP.Net
The Online Campus Selection System developed for HR Department
with including automate the functioning of HR Department. This system
is helpful for HR Department to make easy student selection process. We
can say this system similar to Human Resource Management System
ASP.Net
ASP.Net
Visual Cryptography (VC) aims at providing a facility to cast vote for
critical and confidential internal corporate decisions. It has the flexibility
to allow casting of vote from any remote place. The election is held in
full confidentiality by applying appropriate security measures to allow
the voter to vote for any participating candidate only if he logs into the
system by entering the correct password which is generated by merging
ASP.Net
the two shares using VC scheme
• Providing proper technical assistance to the user
• Automates the selection process activities that the HR Department
has to perform prior to and after the actual act of selecting the ASP.NET using c# or VB.net
employees.
it helps the needy person who r in need of blood of any group. ASP.NET using c# or VB.net
It provide single file uploads & bulk file uploading, it provides us better
ASP.NET using c# or VB.net
place to store all documents together
It will help Job seekeers to upload their information in the form of cv,
Visitor /company representatives logging in may also access/search any ASP.NET using c# or VB.net
information put up by job aspirants
Any employee interested to undergo training should be able to register in
desired course.Employee is allotted fixed amount of timeduring which he
ASP.NET using c# or VB.net
is supposed to complete training.
it gives us better way to see the leaves ledger and apply leave online. ASP.NET using c# or VB.net
Get a coder is online easy way to find the best coder. it helps us in saving
ASP.NET using c# or VB.net
time and money.
Team Leader - Dr. Nishtha
5 Weather forcasting
6 Higher Education Access Prediction
17 Object recognition
18 Weather forcasting
23 Pneumonia detection
37 Malaria Prediction
47 Voice Biometrics
50 chat-bot
54 Diabetes prediction
CLASSIFICATION OF DISORDERs
61
USING ML
9 77
Amarpreet Kaur
9 77 Credit Card fraud prediction
Handwriting Recognition
92 Pneumonia detection
Yamini Singh
10
digital hospital
95
12
Geetika Sharma
Recommendation engine on Amazon
12 121
Prime
To design and implement the prediction framework using a web application for Smart Filteration.
1. To analyze the dataset for Netflix Data.
2. To design and implement the Recommendation framework using a web application.
To build a clustering technique for detection of occurence of motifs in the genomic data.
To build a web application for clustering of documents on the basis of their similarity
To design and implement a framework for prediction of mood of a person on the basis of facial expression and then
recommend musical songs
To build a web application for Clustering the fake news on the website
To analyze dataset and to analyze dynamic data amd detect the mail is spam or not according to positive and negative
values and words
to analyze the offline dataset from repositories. to predict the persons suffering from diabetes
to analyze movies related dataset and predict the prices of various categories of movie tickets
to analyse the data set of Iris flowers and to apply different classification method under supervised learning.
To extract special symbols using a web application from the text questions
to analyze dataset of weather from previous years and predict tje future climate conditions
To analyze the dataset of cheques/forms and to extract the required text using Machine learning approaches.
To collect PCAP files dataset and detect DGA botnets by clustering the Non existent domains using ML.
To analyze the dataset of different activities collected using different sensors. To detect and recognize human activities
using ML approaches
To build disease detection model for crops using deep learning or machine learning.
To analyze the dataset of different disorders and classification of disabilities using ML approaches
To analyze the dataset of different social media applications .To build an analytics model using machine learning .
To detect and recognize faces by considering different facial features using Deep learning.
1.To analyze the dataset of news articles. 2. To predict the stock market based on the data analysis using Machine
leaning approaches.
To analyze data, especially real-time traffic data, from different sources. To estimate and predict traffic conditions using
Deep learning approaches.
To gather and analyze the dataset of Parking places.To reduce the congestion in crowded areas by providing real-time
indications of occupancy of parking spaces.
To collect and analyze the dataset of fraud customers by analysing their behavior, transactions, demographics data and
usage patterns. To build a model for credit card fraud detection.
To collect and analyze different malware samples. To build a model that will classify and categorize different malwares.
To analyse, how the chnaging of training data size can have impact on the market price prediction based on price
prediction accuracy
To analyse prediction based risk and return of invested money of various sectors of Bombay Stock Exchange and
National Stock Exchange
To choose best performing stocks which can return high profit in the future after analyzing small cap and large cap
companies.
To predict the stock price after analyzing the sentiment of twitter data.
To predict the future market trend after analyzing the market behaviour using various fumdamental and technical tools
To forecast the future trend after analyzing differnt companies of different sectors which are highly correlated
To predict the future trend of SENSEX and NIFTY after analyzing the stock exchanges of neighbour countries of India
And the U.S. stock exchange
To reccomend movies based on the data of user's details and movie rating
To recommend the types of movies users likely to watch after analyzing the movie genres and user's details
To predict the crop yeild based on weather dataset
To predict whether any patient do have cancer or not based on physician's report
To predict the defects in softwares from open source datasets library of NASA
Gather available customer behavior, transactions, demographics data and usage patterns Utilize these data points to
predict customer segments who are likely to churn Create a model to pattern the risk tolerance of the business with
respect to churn probability. Design an intervention model to consider how the level of intervention could affect the churn
percentages and customer lifetime value (CLV)
To recognise the handwriting of different users, based on the patterns to convert written text to a pdf or typed one.
Goal is to translate simulation data into a musical form in order to present a different way to interact with data.
Specifically, the goals are 1) to generate music, i.e. melodies that are indistinguishable from those composed by humans,
and 2) to have those melodies.
Scene graphs offer powerful representations of images, aimed at preserving information relating to semantic and spatial
relationships, as well as salient attributes of objects. We explore relationship prediction on dataset.
Aim to improve upon such methods by utilizing machine learning to train a physically-based model of an acoustic piano,
allowing for the generation of novel, more realistic sounds.
Approximately 610,000 people die from heart disease each year, which is equivalent to 1 in every 4 deaths. This study
attempts to improve prediction performance past that of existing prediction systems to further improve and save lives.
The input will be 10-13 features of medical data that are easily obtainable and typically used for heart disease diagnosis
and the output will be the prediction of heart disease.
The objective of project is to classify the damage type (i.e. no/flexural/shear/combined damage) and the damage level
(i.e. no/minor/moderate/heavy damage) of the structures, which is mainly assessed by human experience traditionally.
The classes of images change based on different datasets including binary classification and softmax classification.
Create a software to perform analysis of news and keep a track of its impact on
sensex values
Use RSS feed of various news channels to ensure better results
· Use Data Sets for extracting news
Sports betting... Predict box scores given the data available at the time right before each new game.
Talent scouting... Use college statistics to predict which players would have the best professional careers.
General managing... Create clusters of players based on their strengths in order to build a well-rounded team
Create a software to perform analysis of email sent on hourly basis on server and keep a track of its impact on abnormal
behavior of email text. · Use text recognition of various server to ensure better results
· Use Data Sets for extracting texts in email.
Create a software to classify documents based on predefined classes like sports,education, technical etc.
· Ability to select multiple files
· Ability to cluster similar kind of files in one folder
Mining this rich data can prove unprecedented ways to keep a pulse on opinions, trends, and public sentiment. Facebook,
Twitter, YouTube, WeChat, WhatsApp Design API Data streaming
Create a software/tool that automatically detects and classify image data, such as scans, x-rays, etc to detect disease
Treatment automatically adopted mapped to disease detected
Create a software for recognizing text from audio signals · Text recognition usingNatural Language Processing
Create a software for analyzing data sets stored in database. · Ability to find key influencers among network designers ·
Ability to highlight percentage of similarity of networks
The challenge of this project is to accurately predict the future closing value of a given stock across a given period of
time in the future.
Built a model to accurately predict the future closing price of a given stock, using Long Short Term Memory Neural net
algorithm.
This project utilizes Deep Learning models, Long-Short Term Memory (LSTM) Neural Network algorithm, to predict
stock prices.
It recognizes the text contained in the images of segmented words As these word-images are smaller than images of
complete text-lines, the NN can be kept small and training on the CPU is feasible.
If you can find or agree upon a definition, then you must collect and properly label real and fake news Once collected,
you must then find useful features to determine fake from real news. fields of machine learning (ML), natural language
processing (NLP) and artificial intelligence (AI) that could help us fight this situation.
The main goal of this machine learning project is to build a machine learning model to predict the quality of wines by
exploring their various chemical properties. there are several factors other than age that go into wine quality certification
which include physiochemical tests like alcohol quantity, fixed acidity, volatile acidity, determination of density, pH and
more.
From Netflix to Hulu, the need to build an efficient movie recommender system has gain importance over time with
increasing demand from modern consumers for customized content. One of the most popular dataset available on the web
for beginners to learn building recommender systems is the Movielens Dataset
To build a classification model that can precisely identify human fitness activities. The smartphone dataset consists of
fitness activity recordings of 30 people captured through smartphone enabled with inertial sensors.
Social media data today has become relevant for branding, marketing, and business as a whole.
A sentiment analyser learns about various sentiments behind a “content piece” (could be IM, email, tweet or any other
social media post) through machine learning and predicts the same using AI.
Twitter data is considered as a definitive entry point for beginners to practice sentiment analysis machine learning
problems.
Gender prediction using face recognition . Object detection based eyes and facial hair. Prediction of gender using ML
algorithms.
Prediction of Movies using ML algorithms.
To analyze the dataset of different activities collected using different sensors. To detect and recognize human activities
using ML approaches
Neural Networks and Deep Learning (Online Book) – Chapter 1 walks through how to write a neural network from
scratch in Python to classify digits from MNIST. The author also gives a very good explanation of the intuition behind
neural networks.
With Twitter data, you get an interesting blend of data (tweet contents) and meta-data (location, hashtags, users, re-
tweets, etc.) that open up nearly endless paths for analysis.
There has recently been significant effort to alleviate doctors’ workload and improve the overall efficiency of the health
care system with the help of machine learning.
1. To analyze the dataset for Breast Cancer.
2. To design and implement the prediction framework using a web application for Breast cancer prediction.
To analyze the dataset of different social media applications and build an analytics model.
To analyize the bio metric of heena handed person after c omparing with normal hand
to analalyse the system behviour and recommend on the basis of contant base filtering
predict the empirial college of london dataset of loan/ credit card deafault prediction
Given an photo of a natural landscape we trained models to predict the Koppen-Geiger climate type depicted
in the image. While similar studies have attempted to use satellite imagery for this, few have directly used
groundlevel photos.
Distracted driving is a main factor that cause severe car accidents. It has been suggested as a possible
contributor to the increase in fatal crashes from 2014 to 2018 and is a source of growing public concern. This
project focuses on driver distraction activities detection via images, which is useful for vehicle accident
precaution. Aim to build a high-accuracy classifiers to distinguish whether drivers is driving safely or
experiencing a type of distraction activity.
Stocks of public companies in the biotech sector tend to be extremely volatile and largely dissociated from
traditional fundamentals (e.g. EPS, P/E ratio). There are numerous obscure factors that drive the valuation of
companies in the life sciences. We propose a deep learning-based investment strategy, which includes
diversification through clustering and portfolio construction by selecting stocks in each cluster based on Sharpe
ratio.
: Payments fraud is a significant and growing issue • More than $8 billion in in 2015; up 37% from 2012 • Key
challenge with fraud data is class imbalance.
Tools/Technology/Framework Project Description (at least 25 words)
To help the users cope with this information explosion,
companies have deployed recommendation systems to guide
their users. The research in the area of recommendation
Python and Big Analysis systems has been going on for several decades now, but the
interest
Being able stilltoremains highidentify
accurately because of the abundance of
practical
sentiment from online textthe
applications and problem
allows rich domain.To
businesses help user
to better understand
to pick the best movies as per
their customers. It gives businesses their choice.
invaluable insight about what were the pain points
in their products and services, what potential improvements can
Python they make on their products and
services, and etc. Because of its potential to obtain
high-level insight from large amounts of data, sentiment analysis
has applications in various domains
.Automatic
Sentimentface analysis can be used
recognition aims to
to summarize
extract these meaningful
user reviews
Identification on
pieces of information review-related sites
and putisthem
of bird species together into
a challenging taska often
usefulresulting
Python representation
in ambiguous labels.in order to perform
Even a classification/identification
professional bird watchers sometimes
task on them.
disagree on the species given an image of a bird. It is a difficult
problem that pushes the limits of the visual abilities for both
humans and computers. Although different bird species share the
same basic set of parts, different bird species can vary
dramatically in
Python shape and appearance. Intraclass variance is high due to variation
in lighting and background and
extreme variation in pose (e.g., flying birds, swimming birds, and
perched birds that are partially
occluded by branches).
Our project aims to employ the power of machine learning to
Matlab help amateur bird watchers identify
bird species from the images they capture.
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Weka/RapidMiner/Python
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Python/R
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Weka/Python/Matlab
Python/Weka/Matlab/Tensorflow
Python/Weka/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
Python
AzureML/Weka
Provisioning virtualized cloud services in IP/MPLS- minimize the total cost and obtain a better
28
over-EON Networks system performancethrough simulation
DHCP Exhaustion and DNS MiTM using A pair of modules to do DHCP exhaustion
34
Metaslpoit attack and then act as a DNS MiTM.
3
Ravinder Saini
keylooger installation and gathering
3 37 Keylogging using metasploit
information from the device under attack
Creation of awk, pdf, exe, or any other malicious use of malicious files to exploit remote
42
extension using metasploit devices
43 3 layer Hierarchical model Understanding the 3 layer hierarchical model
Centralized ARP proxy server over SDN controller efficiently processes address resolution while
51 to cut down ARP broadcast in large-scale data reducing ARP broadcast traffic by dozens of
center networks times to hundreds of times.
Toward a privacy model for social networking A causal model that explains the relationships
54
services between the constructs is proposed.
Operate the Change Control Authority
effectively and efficiently to ensure control
55 Intercontinental Connectivity over network maintenance activity and
changes to service carrying network elements
are in place and work
Adhering to the principles of software-defined
networking paradigm from the design, xSDN
An Expressive Simulator for Dynamic Network focuses to be lean, light-weight, easy to learn
56
Flows and configure, and efficient, that can simulate
networks of a scale of million nodes within a
few seconds.
Implementation and Evaluation of OSPF routing To study performance of Protocol on the basis
60
Protocol of various parameters
To design an efficient automatic authorized
61 Vehicle Number Plate Recognition using Matlab vehicle identification system by using the
vehicle number plate.
62 Design Energy Efficient Protocol for WSN To improve the network performance.
63 Intrusion Detection System for Network To detect the malicious node from the network
5
Prabhjot Kaur
5
68 Simulation of DOS Attack Using MATLAB To detect the DOS attack on the network.
71 Implement and Analysis of DSR routing protocol To design DSR routing Protocol
Deployment of Wireless Sensor Network using To deploy WSN and separate the genuine
74
MATLAB nodes and malicious nodes.
77 Creation of IDS for insider attacks To Create IDS for insider attacks
6
Nitika
6 79 Isolation of sybil attack in VANET To isolate Sybil Attack in VANET
107 Detecting node failures in mobile wireless networks To achive high failure detection rate
code based neighbor discovery protocol in mobile To achive better perfprmance in neighbour
108
wireless networks discovery
Bandwidth estimation technique for end to end To estimate the bandwidth with good accuracy
109
network path and less intrusively
Mitigating denial of services attack in OLSR To defend the OLSR protocol from node
110
algorithm isolation attack
113 TCP and UDP packet delay for file transfer To show which has more delay in file transfer
117 Compare AODV and DSR protocol To find which has better efficiency
9
121 Campus network design A campus network design for a college
Guljar Singh
125 Brute force attack detection using wireshark to detect Brute force using wireshark
Small Business Network Design with Guest to make Small Business Network Design with
128
Network Guest Network
131 LAN Speed testing tool to make LAN Speed testing tool
Real-Time QoS Routing Protocols in Wireless To Find real time QOS in wireless sensor
136
Multimedia Sensor Networks networks
Secure MANET from SYBIL attack for high using optimization techniques to detect
138
network lifetime attacks
139 Smart Attendance System using smart card Simulation of Networking Devices
10
142 Access your phone without help of internet personal offline digital assistant
11
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
packet tracer
Centralized ARP proxy server over SDN controller to cut down
ARP broadcast in large-scale data center networks Today’s cloud
services are driving the wide-spread deployment of multi-tenant
large-scale data centers. These data centers must have agility in
order to provide diverse services to users in an efficient way, via
dynamic allocation of the virtual machines (VMs) to the servers.
Read more:
http://www.businessdictionary.com/definition/network-
organization.html
VNPR is used by municipalities to keep track of incoming and
outgoing traffic. Since a number plate is unique, it can be used for
signaling suspect cars, (blacklist matching) or regulating access to
a private area (whitelist matching).
MATLAB
MATLAB
Packet Tracer is a tool used to simulate various Network Scenarios Packet tracer
(iii) To assess the short term as well as long term position of the
network.
Packet tracer
Packet tracer
The purpose is how to protect our data in between the serves only
Packet tracer
or we can se from any stranger like hacker
Packet tracer
Packet tracer
Packet tracer
Packet tracer
Packet tracer
Packet tracer
Packet tracer
Packet tracer
Packet tracer
These are popular protocol which are used for reliability and data
Packet tracer
transfer
Brute force attacks are used for detecting login credentials using
random combinations of username and passwords. The project
wireshark
demonstrates a technique by which brute force attacks on FTP
servers can be detected using Wireshark Analysis.
The projects develops a packet loss testing tool which would send
required number of ping packets to a destination and returns the O/S –Linux (Tested on Ubuntu),
number of packets sent and lost packets.
The goal of the project is to identify the time it takes for a data
packet to travel between two computers on a LAN. For this Python / Scapy ( Free download)
purpose, a ping request packet is crafted and sent to the destination
automation tool written in JAVA to download errorfree videos Selenium lib., JAVA JDK
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
An efficient flow classification algorithm in Software-Defined
Networking In Software-Defined Network environment, operator
can see the global view of network. So it can be manage flows
with network-wide view, but legacy flow classification method
cannot satisfy the integrated tables of all switches because of out
of memory and long compilation time.
The framework employs a virtual control plane which operates on
the user demand rate for data objects in the network, and an actual
plane which handles Interest Packets and Data Packets. We
develop distributed algorithms within the virtual plane to achieve NS 2.35
network load balancing through dynamic forwarding and caching,
thereby maximizing the user demand rate that the NDN network
can satisfy
CONA: Inter Cluster Onos Network application Several Network
Operating Systems have been proposed in the last few years for
Software Defined Networks; however, only few of them are
offering resiliency, scalability and high availability required for
production environments.