You are on page 1of 309

total required=50

F_
F# Project # Project Name Project Objectives (at least 3)
N

Cloud computing security using pixel


1 To ensure about privacy,security of information while transmitting
key pattern

The main aim of the project is to manage the errors or bugs occur
during software development phase and cycle. After the
Secure File Sharing Using Access
2 implementation of this project, the employees can update the issue
Control in cloud sim
details, solve issues and update the system from any location with
internet access.

This application can help the placement officers with great ease and
University Campus Online Automation
3 without any difficulty. This application can help in automating the
Using Cloud Computing
placement related activities of the universities without any difficulty

Temperature-Aware Power
To increase resource utilization and reduce total server power
4 Consumption Modeling in Hyperscale
consumption costs.
Cloud Data Centers

The proposed e-Learning platform based on Cloud computing


5 E-learning platform infrastructure would allow the independent LMS embedded in
different e-Learning standards to share the learning objects.

The efficacy of the proposed architecture is evaluated through


Distributed and Independent Access to theoretical analyses and extensive experimental results based on a
6
encrypted cloud databases prototype implementation subject to the TPC-C standard benchmark
for different numbers of clients and network latencies.
A new decentralized access control scheme for secure data storage in
Decentralized Access Control with
clouds, which supports anonymous authentication. In the proposed
7 Anonymous Authentication of Dara
scheme, the cloud verifies the authenticity of the user without
stored in clouds
knowing the user’s identity before storing the data

PACK's main advantage is its capability of offloading the cloud-server


Prediction Based Cloud Bandwidth and TRE effort to end-clients, thus minimizing the processing costs
8
Cost Reduction System induced by the TRE algorithm. Unlike previous solutions, PACK does
not require the server to continuously maintain clients' status.

Several performance metrics are defined and evaluated to analyze the


A Stochastic Model to Investigate Data behavior of a cloud data center: utilization, availability, waiting time,
9
Center Performance and QoS in IaaS and responsiveness. A resiliency analysis is also provided to take into
account load bursts.

With cloud storage services, it is commonplace for data to be not only


Oruta: Privacy-Preserving Public stored in the cloud, but also shared across multiple users. However,
10
Auditing for Shared Data in the Cloud public auditing for such shared data — while preserving identity
Randeep

privacy — remains to be an open challenge.


1
A user can retrieve files on demand by choosing queries of different
Towards Differential Query Services in
11 ranks. This feature is useful when there are a large number of matched
Cost-Efficient Clouds
files, but the user only needs a small subset of them.

Text Encryption Using Various Encrypting the text of nodes in network with various cryptography
12
Cryptograhy Algorithms algorithm

Secure data store developement with


The files and folder of a drive is checked for duplicacy and then store
13 removal functionality of duplicate
with encryption
entries
Secure Remote Communication Using
14 Implementation of DES for Secure Communication
DES Algorithm

Secure data store developement with


The files and folder of a drive is checked for duplicacy and then store
15 removal functionality of duplicate
with encryption
entries

- Protection from STRIDE


Providing Transport level security on
16 - Maintaining Quality of Service
Software define network
- Ensuring secure transmission

Secure and Efficient Authentication Enable message authentications between messages travelling on
17
Scheme for a Network different network

Comparative analysis of AES, DES and


18 Comparison based on factors like packets send and receive
RSA for data security

Implementation of One time Pad using Using MAC and IP, a key is generated to implement secure
19
MAC and IP communication and then share the key for further communication

Secure File Sharing Using Access Share large files securely with network nodes or with nodes outside
20
Control the network
To test the applications in the minimized the time and costs for the end
Performance modeling and verification users in the Cloud computing environment.
21
of cloud-based auto-scaling policies To propose a framework for the auto-scaling policies in order to give
the performance guarantee.

A Truthful Optimal Mechanism for On-


22 To achieve an auction mechanism truthful in expectation.
demand Cloud Resource Provisioning

Distributed Resource Allocation for To achieve high and fair revenues for all Data Center Operators.To
23 Data Center Networks- A Hierarchical analyse the relationship between DCOs and Service Subscribers
Game Approach through the game.

Energy-Efficient virtual machine


selection based on resource ranking and To diminish energy consumption without violation of service level
24
utilization factor approach in cloud agreements.
computing for IoT

Multi-Objective Scheduling for


Surabhi(8527)

To minimize makespan and cost simultaneously while satisfying the


25 Scientific Workflow in Multicloud
reliability constraint.
Environment

2
Energy-aware Load Balancing and
To devise energy-aware policies which identify optimal regimes for
26 Application Scaling for the Cloud
the cloud servers and, at the same time, prevent SLA violations.
Ecosystem

Adaptive selection of dynamic VM


consolidation algorithm using a neural To handle the trade-off between SLA violation and the energy
27
network for cloud resource consumption in order to manage the performance of the Cloud system
management
An intelligent/cognitive model of task
To minimize the delay with the maintenance of the precedence
28 scheduling for IoT applications in cloud
constraint.
computing environment

An online auction mechanism for cloud To develop an online auction mechanism based on user requirements
computing resource allocation and and price.
29
pricing based on user evaluation and
cost To efficiently allocate the resources using the fast heuristic algorithm.

To perform inter datacenter VM migration efficiently.


Online Inter-Datacenter Service
30
Migrations
To consider dynamic access pattern of service during migration.

Secure File Storage in Cloud


Computing Using
Cryptography.
31 develop a system for securing the important data from a file

automated offloading of the computation intensive


Android Offloading Computation Over
Cloud applications of their smartphones over to the virtual
processing over cloud through its smartphone image
32 online.
Customer can buy the bus ticket over the Internet, 24
hours
Cloud Based Bus Pass System a day throughout the week, this solves the issue of bus
ticket being misplaced or stolen. Users can recharge
33 The main cc
through goals
or of thiscar.
debit project is, to maximally reduce the
amount
of duplicates in one type of NoSQL DBs, namely the key-value
Cloud Based Improved File Handling store, to maximally increase the process performance such that
and Duplication the backup window is marginally affected, and to design with
Removal Using MD5 horizontal scaling in mind such that it would run on a Cloud
34 Platform competitively.
Singh(8770)
Kulvinder Singh(8770)
Cloud Based Local Train Ticketing
System We propose to build a unique and easy to use local train
ticketing project for efficient robust ticketing system using
35 cloud infrastructure.

Cloud Based Online Blood Bank


The software system is an online blood bank
3 System management system that
helps in managing various blood bank operations
36 effectively.
A Career Guidance System where students can see
various career
Cloud Based Career Guidance System opportunities, the system shows various fields available
after 12th, for
37 graduation and also fields available after graduation.

Cloud computing for Rural banking


A project based on Cloud computing to facilitate rural
38 banking.

An online bookstore software projects that acts as a


Online Bookstore System On Cloud
Infrastructure central database
containing various books in stock along with their title,
39 author and cost.

Digital Watermarking To Hide Text


Messages
used to embed the information into image and can be
40 efficiently extract back the information

Online Transaction Fraud Detection


using Backlogging on E-Commerce
Website to restrict and block the transaction performing by
41 attacker from genuine user’s credit card details
Agriculture Updates by SMS – A
Cloud Computing Approach
42

Cloud Computing for Agent-Based


Urban Transportation Systems
Project
43

Resource Management in Cloud


Computing
44

Security in Cloud Computing

45
Navpreet Kaur(7347)1

IoT for Home Environment

46
4
Encryption - decryption of data for
secure network traffic
47 - Protecting information from attacks

Hiding Data using Steganography Steganography embeds a secret message inside an


innocent looking cover medium, stealthily, without creating
48 any attention
A comparative study of
cryptographic methods over block
cipher Observing cryptography models, text encryption in block
49 cipher

Cryptography Security System


Generate public and private keys at both ends for encrypting
50 and decrypting data

Defending Against Web Application


Attacks
Defending the network Against various Web Application
51 Attacks
Team Leader - Ms. Randeep
Project Description (at least 25 words) Tools/Technology/Framework

In this project, Cloud is served on demand and scaled as per the demand to the
consumers. Cloud can also be known as online
computing of storing and retrieving data, creating, cloud sim, netbeans
deploying applications without their own hardware or
software.

The proposed project on Bug Tracking System is capable of storing old bug
details and providing record search facility. If a bug which has already occurred
Backlog,Bugzilla.
in any pre-developed software takes place in new system, it can be easily
detected using the bug tracking system application.

In order to solve this problem, the university campus online automation using
cloud computing application will be of great help. It can help to manage the
college related information to be stored in a more secure way. This will be one .Net Framework and C# Express2
of the interesting applications that one can work on and implement in real time
world with great ease

This project shows how the ambient temperature has a significant negative
impact on power consumption and for an accurate and proper estimation of the
power consumption of Hyperscale cloud data centers (HCDC) and proposes a cloud sim 4.0, netbeans with workflowsim
temperature-aware power consumption model. This model can apply to both
homogeneous and heterogeneous HCDCs

In the Cloud computing infrastructure, the sharable e-Learning platform can be


proposed to provide a good learning environment for learners. Three layer
java development kit, cloud sim with
architecture of the e-Learning platform is provided to facilitate the sharing,
extension
reusing learning objects and interoperability among various learning content
efficiently.

Placing critical data in the hands of a cloud provider should come with the
guarantee of security and availability for data at rest, in motion, and in use.
SecureDBaaS
Several alternatives exist for storage services, while data confidentiality
solutions for the database as a service paradigm are still immature.
The scheme prevents replay attacks and supports creation, modification and
reading data stored in the cloud. And also addresses user revocation. It is a
decentralized, robust and access control schemes designed for cloud. The .Net Framework and C# Express2
communication, computation, and storage overheads are comparable to
centralized approaches.

Cloud-based TRE needs to apply a judicious use of cloud resources so that the
bandwidth cost reduction combined with the additional cost of TRE cloud sim, netbeans
computation and storage would be optimized.

Cloud data center management is a key problem due to the numerous and
heterogeneous strategies that can be applied, ranging from the VM placement to
the federation with other clouds. Performance evaluation of cloud computing .Net Framework and C# Express2
infrastructures is required to predict and quantify the cost-benefit of a strategy
portfolio and the corresponding quality of service (QoS) experienced by users.

The identity of the signer on each block in shared data is kept private from a
third party auditor (TPA), who is still able to publicly verify the integrity of
shared data without retrieving the entire file. Our experimental results java development kit, cloud sim
demonstrate the effectiveness and efficiency of our proposed mechanism when
auditing shared data.

In EIRQ, queries are classified into multiple ranks, where a higher ranked query
can retrieve a higher percentage of matched files. A user can retrieve files on cloud sim, netbeans
demand by choosing queries of different ranks.

java development kit, cloud sim with


extension

cloud sim, netbeans


.Net Framework and C# Express2

SecureDBaaS

java development kit, cloud sim

.Net Framework and C# Express2

Backlog,Bugzilla.

.Net Framework and C# Express2

cloud sim 4.0, netbeans with workflowsim


A combination of performance modeling and formal verification is used in this
novel approach in order to give the performance guarantee for the auto-scaling
policies. Here, two public Cloud providers are used for validating the efficiency
and the usefulness of the proposed technique. The result proves that the
modeling process along with its model helps to minimize the QoS violations by
defining the auto-scaling policies.
It proposes an efficient randomized auction mechanism based on a novel
application of smoothed analysis and randomized reduction, for dynamic VM
provisioning and pricing in geo-distributed cloud data centers. It achieves,
truthfulness in expectation, polynomial running time in expectation, and (1-∈)-
optimal social welfare in expectation for resource allocation, where ∈ can be
arbitrarily closegame
A hierarchical to 0.to analyze the system where the Data Center Coordinators
and the Service Subscribers are regarded as the leaders and followers,
respectively. In the game, each SS selects its serving DCO with preferred
pricing and purchases the optimal amount of resources for their computing
requirements. Based on the responses of the service subscribers and the other
datacenter coordinators, the DCOs decide their resource prices to receive the
highest profit.
An energy-efficient resource ranking and utilization factor-based virtual
machine selection (ERVS) approach is proposed. ERVS encompasses the
resource requirement rate for task classification, comprehensive resource
balance ranking, processing element cost and the resource utilization square
model for migration. It evaluates overloaded and underloaded hosts and types of
VM by predicting CPU utilization rate and energy consumption
A multi-objective scheduling (MOS) algorithm for scientific workflow in
multicloud environment is proposed. The MOS algorithm is according to
particle swarm optimization (PSO) technology, and the corresponding coding
strategy takes both the tasks execution location and tasks order of data
transmission into consideration.

The basic philosophy of our approach is defining an energy-optimal operation


regime and attempting to maximize the number of servers operating in this
regime. Idle and lightly-loaded servers are switched to one of the sleep states to
save energy. The load balancing and scaling algorithms also exploit some of the
most desirable features of server consolidation mechanisms

A neural network-based adaptive selector system is proposed for selecting the


VM consolidation algorithm automatically using the priority of the Cloud
system in order to accomplish a trade-off between energy consumption and the
SLA violation. It results in a reduction of both the energy consumption and the
SLA violation.
A hybrid algorithm GAACO that is the combination of the Genetic Algorithm
(GA), and Ant Colony Optimization (ACO) is an Intelligent or Cognitive Model
proposed for scheduling the task of the IoT applications. In this project the ACO
algorithm finds the optimal solution, and the GA algorithm gives support to
refine this solution.

The proposed online virtual resource allocation and payment (OVRAP)


algorithm solves the multiple requirements and allocates different types of
resources such as CPU, memory, and bandwidth that satisfies the user
requirements. This online virtual resource auction mechanism improves the
revenue
An of the resource
offloading provider.
framework is proposed, which if used by the
developers of the application, will empower the application to
offload
Proposedits compute
work intensive,
considers the network non-interactive
load and dynamicparts accessbased
patternon
of static
analysis
services to the
during theSmartphone image
migration ofprovides
VMS on the
between datacloud. Athat
centers TimeStamp is
is required to
Cryptography
calculated algorithms
for every process selected an effective
by the userway tofor
process a
improve the QoS
protecting
query. Usersensitive information.
may select from a text It isoraamethod for storing and
file for processing
and
also transmitting data in a form that is only readable by
intended users. When the file is being
need to select a type of processing as local/cloud/hub added on the server,
and
the file
proceed gets converted into byte array. The byte array will
further
with thedivide into three
encryption. Thedifferent
TimeStamp partsisand each part
calculated for is
each
encrypted
process into respective techniques namely, AES, DES
and shown to the user in the form of statistics. The static analysis Python+ Cloud Sim
and RC2.
Windows Xp,
is done to make the decision making more fast and light than the Windows 7(ultimate, enterprise)
previous techniques. This framework will empower the application • Sql 2008
to offload
Bus pass web its compute
system to intensive part tomeans
put it simply, the cloud via internet
system after •
can provide Visual studio 2010
analyzing the cost using
pass identification of offloading
BAR code, overPass the cost of running
renewal, the
cancellation, • Windows Azure
applicationStudent
updating, on the phone
discount itself.
etc. Using this website we can check
all details related Bus pass and instruction like how to renew pass
how to update it, and also provide details of student discount.
This website keeps all information of all Bus passes. · Sql 2008
The Bus Scheduling and Booking System eliminate most of the V.B. Dot Net
limitations of the existing software. Windows Azure
an
account with unique id is created in the system. User may book
tickets for western, central and harbor lines and fare is calculated
according to station distance. The cloud server allows for
handling
The project consists of a central repository containing various
a large number of users using efficient computing power. It allows
blood
for
Since efficient
the system
deposits andneeds
available fast computing
to provide
along for ticket
service
with associated to acosts
largeto
details numerous
number
hosted of users
onstudents
itat a time. This balance is later deducted from user’s account. · Sql 2008
windows
needs
User a cloud infrastructure. Next the system allows
based cloud server. These details include blood type, storage users to give a test. · Visual studio 2012
Itmay
is later recharge his account through admin. · Windows Azure
area
actually a series of tests of various general questions. After test
and date of storage. These details help in maintaining and
completion
amonitoring
score is calculated for each test. Based on those results the system
the blood deposits.
manipulates The project
and calculates the bestiscareer
an online system
for that allowsis to · Sql 2008
that result
user. This
then
check whether required blood deposits of a particular group are · Visual studio 2012
emailed to that user. The system also consists
available in the blood bank efficiently using cloud server. of an admin module. The · Windows Azure
admin can login to the system and enter colleges along with their
specifications. The system also includes an ebooks page. Here user may
click to read career guidance ebooks in their browser. It allows for
robust · Sql 2008
This Project is uses
and enhanced cloud computing
experience by handling concepts to develop
a huge number a banking
of visitors with ·Python/ VB .net
system
efficiency. · Windows Azure
for rural areas. It considers various factors such as lack of devices and
This project
amenities inisrural
a website thatprovides
areas and acts as aefficient
central book store. This
functionality web
to fulfill
project
those
is developed
gaps. It uses theusing asp.net
latest C# as of
variations thecloud
frontcomputing
end and sql as a back-end.
technology for · Sql 2008
Such
filling ·Python
online bookstores
in the various tend to get
technological a large
gaps amount
in village of online visitors. In order · Windows Azure
amenities.
to
provide optimal performance and avoid site crash the system needs to
be
hosted on a cloud infrastructure. The sql database stores various book · Sql 2008
related details. A user visiting the website can see a wide range of books · Visual studio 2012
arranged in respective categories. · Windows Azure
This Agriculture Updates by SMS – A Cloud Computing
Approachproject is improvement of existing “Mobile based
Information System”, using Cloud Computing. The
technology is choosen, because it is ready to serve the small
and medium business segment, which is the area of concern.
The main aim
Considering of thistype
service Cloud Computing for Agent-Based
as Data-as-a-Service, where we are
Urban Transportation Systems Google android
providing Pricing Details to customer against the project is to
Database
provide decision management system support
Queries. And the particular Deployment Model is for traffic &
transport
Community management
Cloud, which strategies to control
is especially traffic.
for the This
Farmers. Cloud computing
android applicationwill be developed under mobile
multiagent technology. This software system works with
different layered methods 1) application method layer,
platform method layer, unified source method layer, and
fabric method layer. Cloud computing

In this we will manage the resources in an efficient way such that the
services are provided at its best.

In this data stored in cloud needs to be secured. the concept of SLA can also be used

In this, the project is based on to develop such software which can be useful for home purposes
Team Leader - Mr. Raj Kumar
F# F_N P# Project Name Project Objectives (at least 3)

1 Stock market prediction To predict Stock market behaviour

Data Mining for Sales


2 Data Mining for Sales Prediction in Tourism
Prediction in Tourism

Industry Higher Education Industry Higher Education Access Prediction


3
Access Prediction Software Software

4 Identify digits through images Identify digits through images

Employee Performance Employee Performance Evaluation For Top


5 Evaluation For Top Performers & Performers & Recruitment
Recruitment
Richa

Online Assignment Plagiarism Online Assignment Plagiarism Checker Project


6 Checker Project using Data using Data Mining
Mining
Online Book Recommendation Online Book Recommendation Using
7 Using Collaborative Filtering Collaborative Filtering

Cancer Prediction Using Data


8 Mining Cancer Prediction Using Data Mining

Online user Behavior Analysis Online user Behavior Analysis On Graphical


9 On Graphical Model Model

E Commerce Product Rating E Commerce Product Rating Based On Customer


10 Based On Customer Review Review Mining
Mining

To allow user to search for doctor’s help at any


Diebetes Prediction using Data
11 point of time.To diagnose their diabetes and get
Mining
instant result.To get Doctors more clients online.

To build a system that will recognize people’s


TV show populaity analysis sentimental comments on TV shows. To predict
12
using Data Mining the TV Show trending based on people rating.To
provide the show popularity to visitors.

To detect similarity among text documents


calculates content similarity among specified
Online assignment plagiarism
13 documents.To find out accurate results based on
checker using Data Mining
the content provided.To Check for code also, that
is structure-oriented detection.
To build a system that provide security to
learning material.To provide security to
Secure E learning using Data
14 candidate as well.To build a system that provides
Mining techniques
better knowledge, better experience using digital
learning.
To propose a web application which will process
the information. To propose a web application
Detecting Fraud Apps using which will check comments and the review of
Bharti Duhan(e8324)

15
Sentiment Analysis the application.To provide a system to users so
that they can decide which application is fraud or
2 not.
To propose a system of connecting the consumer
Improve Consumer Retailer and the retailer.To improve the sales and
16
connectivity using Data Mining business of the retailer.To discover new trends
and patterns in market.

To propose a web application that allows users to


get instant guidance on their heart disease
Heart Disease prediction using
17 through an intelligent system online. To allows
Data Mining
user to share their heart related issues.To get
more clients online from doctor's perspective.
To predict weather based on parameters such as
temperature, humidity and wind.To provides the
business with valuable information that the
Weather Forecasting using Data
18 business can use to make decisions about the
Mining
future of the organization.To enhance the system
in Air Traffic, Marine, Agriculture, Forestry,
Military, and Navy etc.
To develop a mathematical model for predicting
Movie success prediction using the success class such as flop, hit, super hit of
19
Data Mining the movies.To find out the review of the new
movie.
To propose an advanced Sentiment Analysis for
Product Rating system that detects hidden
sentiments in comments and rates the product
Sentiment Analysis for product
20 accordingly.To allow people to easily decide
rating
whether the product posted is good or bad by
using this application.To allow user to easily
share his view about the product.
Artificial Intelligence HealthCare To provide a health based application to users for
21 Chatbot System
providing multiple health benefits and records

Website Evaluation Using To ensure popularity of a website based on true


22
Opinion Mining rating process

To provide a system for predicting crime rates


Crime Rate Prediction Using K
23 Means and relating them to further analyse the
situations and criminals

Opinion Mining For Restaurant To be able to provide feedback about various


24 Reviews
Restaurants in a locality

Real Estate Search Based On To figure out the characteristics required for
25 Data Mining
analysis of Real Estate Market and their trends
Er. Hatesh

Stock Market Analysis and To study the stock prediction and its features and
26 Prediction
to find out the changes over the time.

A neuro-fuzzy agent based


Decision based sytem for HR process and to be
27 group decision HR system for
candidate ranking less time consuming
Monitoring Suspicious
To monitor the traffic over online forums and to
28 Discussions On Online Forums
Using Data Mining categorize them as suspicious

Online Book Recommendation


To create an application for recommendation of
29 Using Collaborative FIltering
books using collaborative filtering method
PHP

The application leads to quicker decision making


30 Android Smart City Traveler
with respect to places to visit.

Online Assignment Plagiarism The system designed to detect similarity among


31 Checker Project using Data text documents calculates content similarity
Mining among specified documents.

Fake Product Review


Monitoring And Removal For
32
Genuine Online Product
Reviews Using Opinion Mining

DETECTING MALICIOUS
33
FACEBOOK APPLICATIONS

A Survey on Political Event


34
Analysis in Twitter.
Rawat
Classify the documents
35
according to their labels.
Sonali Rawat

Figure out which celebrity the


36
voice belongs to.

Predict the time taken to solve a


37 problem given the current status
of the user.

Predict the survival of the


38 passengers aboard RMS
Titanic.

Predict the effect of


39 markdowns on the sales
during the holiday seasons

Predict the sales across various


40
departments in each store.

The E-Banking Log system features uses user


41 E-Banking Log System behavior and location scanning to check for
unusual patterns.
Completely automated online ordering of food in
42 Canteen Automation System
a canteen.

Faculty feedback and Growth


43 To analyze growth of faculty
Analyzer

Clustering Data Streams based


To analyze the clusters and cluster data stream
44 on Shared Density Between
with respect to density
Micro clusters

Automatic medical disease To overcome major diseases,diagnose them at


45
Priya Batta,E4978

treatment system early stages.

Efficient Mining of both


46 positive and negative Association Rule mining in detail
Association Rules

Improved techniques for


47 sentiment analysis on social To analyze sentiments on social network
network

It allows users to post property for sale as well as


Advanced Reliable Real Estate
48 search sort property and contact its dealers
Portal
online
This will enable a more effective way to short
list submitted candidate CVs from a large
Personality Prediction System
49 number of applicants providing a consistent and
through CV analysis.
fair CV ranking policy, which can be legally
justified.

This software project concentrates on improved


50 Image Mining Project
search for images

Prediction and Analysis of


51 Student Performance by Data Analysis of Student Performance
Mining in WEKA

An Analysis of Heart Disease


52 prediction of heart patients
Prediction

Data Mining in Educational


53 Mining in educational environment
System using WEKA

Predicting Breast Cancer


54 Survivability Using Data Mining to analyse cancer
Techniques

Developing innovative
55 applications in agriculture using develop application and mine data
data mining
kanika

6
kanika
6

The Prediction of Students’


56 predicting students’ academic performance
Academic Performance

Building effective defect-


57 defect-prediction model
prediction models in practice

Prediction of Chronic- Kidney-


58 Prediction of Chronic- Kidney-Disease
Disease

Dengue disease prediction using Dengue disease prediction using weka data mining
59 tool
weka data mining tool

Sentiment Knowledge
60 Discovery in Twitter Streaming data streaming
Data
Sentimental Analysis Opinion all users can easily find the comments for
Mining for Mobile Networks their post very easily.

Prediction of Chronic- Lungs- to Predict the effected area


Disease

Data mining in medical system Mining in medical environment

Uncertainty
ne of the most is intrinsic to aproblems
significant wide spectrum of
in cluster
real-life applications, which inevitably applies
Efficient Mining of Frequent analysis is to determine the number of
to graph data. Representative uncertain
Patterns on Uncertain Graphs clusters in unlabeled data, which is the input
graphs
for mostare seen in algorithms.
clustering bio-informatics,
Some social
networks,have
methods etc. been developed to address
this problem. However, little attention has
Variable Weighting in Fuzzy been paid on algorithms that are insensitive
k-Means Clustering to to the initialization of cluster centers and
Determine the Number of utilize variable weights to recover the
Clusters number of clusters. To fill this gap, we
Kirti Joshi

7 extend the standard fuzzy k-means


clustering algorithm. It can automatically
Graph K-means based on determine the number of clusters by
Leader Identification, finding a set
iteratively of densely
calculating theconnected
weights of all
Dynamic Game and Opinion components with similar
variables and the membership opinionvalue
vectors
of each
Dynamics object in all clusters.
Multi-view graph-based clustering aims to
provide clustering solutions to multi-view
data. However, most existing methods do
not give sufficient consideration to weights of
different views and require an additional
clustering step to produce the final clusters.
GMC: Graph-based Multi-
They also
Deep usuallygains
clustering optimize theirperformance
superior objectives
view Clustering
basedconventional
than on fixed graph similarity
clustering by matrices
jointly of
all views. Infeature
performing this paper, we propose
learning a
and cluster
general Graph-based Multi-view
assignment. Although numerous deep Clustering
(GMC)
clustering to tackle thesehave
algorithms problems.
emerged GMC in takes
Adaptive Self-paced Deep the data graph matrices of all views and
various applications, most of them fail to
Clustering with Data fuses them
Augmentation
learn robust
Methods fortocluster-oriented
generate
cleaning a unified
dirty data matrix.
features which
typically
in turn hurts
employ the final
additional clusteringabout
information performance.
the
propose
To solve
data, such to leverage
this
as problem, theweemerging
user- provided propose deep
a two-
constraints
learning
stage deep techniques
clustering for sequential
algorithm
specifying when data is dirty, e.g., domain bymodeling
of user interests
incorporating
restrictions, data
illegalbased on
augmentation
value big social
anddata,
combinations, self-
or
Cleaning Data with Forbidden which
paced takes
learning.into account influence of their
logical rules. However, real-world scenarios
Itemsets social
usuallycircles.
only have First,dirty
we data
present a preliminary
available,
analysis for two popular big datasets
without known constraints. In such settings, from
Yelp and Epinions. We show
constraints are automatically discovered on statistically
sequential
dirty data and actions of all users
discovered and their
constraints are
Social-aware Sequential friends, and discover both
used to detect and repair errors. temporal
Modeling of User Interests: A autocorrelation and social influence on
Deep Learning Approach decision making, which motivates our
design. Then, we present a novel hybrid
deep learning model, Social-Aware Long
Short-Term Memory (SA-LSTM), for
pattern recognition, plagiarism detection
Similarity Search for Dynamic predicting the types of item/PoIs that a user
and recommender
will likely system
buy/visit next, whichon increasingly
features
Data Streams
larger data sets.
stacked LSTMs for sequential modeling and
an autoencoder-based deep model for social
influence modeling
privacy-Preserving Social
protecting the particular users' online activity
Media Data Publishing for
(e.g., tagging/rating/checking-in) on social
Personalized Ranking-Based
media
Recommendation

GERF: a group event


Event recommendation for a group of users
recommendation framework
that are upcoming according to their interest
based on learning-to-rank
Tourist identification and preference
analytics using city-scale transport data
(bus, subway, etc.). Our work is motivated
Tour Sense: A Framework for
by the observed limitations of utilizing
Tourist Identification and
traditional data sources (e.g., social media
Analytics Using Transport
data and survey data) that commonly suffer
Data
from the limited coverage of tourist
population and unpredictable information
A framework for supervised delay.
A framework for the evaluation of multiclass
classification performance
classifiers by exploring their confusion
analysis with information-
matrices.
theoretic methods
Charnpreet Kaur(5922)

sequence classification deals with the task


8 Mining Behavioral Sequence
of finding discriminative and concise
Constraints for Classification
sequential patterns.

Predicting Consumption
Patterns with Repeated and Prediction of consumption of items in malls
Novel Events

Multi-Party High-Dimensional
Data Publishing under To maintain the privacy of data
Differential Privacy Intelligent Transportation Systems (ITS) is a
cutting-edge traffic solution employing state-
ofthe-art information and communication
Multi-objective Transport technologies. Optimized bus-scheduling;
System Based on Regression being an integral part of ITS ensures safety,
Analysis and Genetic efficiency, traffic congestion-reduction,
Algorithm using Transport passengers’ forecast, resource-allocation,
Data and drivers’ experience enhancement.
Nevertheless, of its significance, recent
With
yearsexplosive growth limited
have witnessed of data,research
the multi-view
Multi-view Scaling Support
data
carriedis widely used
out in this in many fields, such as
context.
Vector Machines for
data mining, machine learning, and
Classification and Feature
computer vision and so on. Because such
Selection
data always has complex structure,
A big part of people rely on available content in
social media in their decisions (e.g., reviews and
NETWORK-BASED SPAM feedback on a topic or product). The possibility
DETECTION FRAMEWORK FOR that anybody can leave a review provides a
REVIEWS IN ONLINE SOCIAL golden opportunity for spammers to write spam
MEDIA reviews about products and services for
different
Data accessinterests.
controlIdentifying theseissue
is a challenging spammers
in
RECOMMENDATION FOR public cloud storage systems. Ciphertext-Policy
Attribute-Based Encryption (CP-ABE) has been
LOCATION PROMOTION IN adopted as a promising technique to provide
LOCATIONBASED SOCIAL flexible, fine-grained and secure data access
NETWORKS control for cloud storage with honest-but-
curious cloud servers.

AN ONLINE SOCIAL NETWORK Question and Answer (Q&A) systems play a vital
BASED QUESTION AND ANSWER role in our daily life for information and
SYSTEM knowledge sharing

Data generated on location-based social


MODELING URBAN BEHAVIOR networks provide rich information on the
BY MINING GEOTAGGED SOCIAL whereabouts of urban dwellers. Specifically,
DATA such data reveal who spends time where, when,
and on what type of activity

The objective is how Cloud software


A WORKFLOW MANAGEMENT technologies can be integrated to implement an
SYSTEM FOR SCALABLE DATA
Priyanka Sharma

effective environment for designing and


MINING ON CLOUDS executing scalable data analysis workflows.
9
To achieve compressed storage and avoid
PARALLEL MINING OF building conditional pattern bases, FiDoop
FREQUENT ITEMSETS USING incorporates the frequent items ultra-metric
MAPREDUCE. tree, rather than conventional FP trees.
Priy ANALYSIS OF TOP COLLEGES IN Analysis of best colleges
INDIA USING TWITTER DATA

INVERTED LINEAR QUADTREE:


EFFICIENT TOP K SPATIAL to get spatial location of object
KEYWORD SEARCH

TRUTH DISCOVERY IN
CROWDSOURCED DETECTION detection of spatial events
OF SPATIAL EVENTS

SEQUENTIAL PERSONALIZED
SPATIAL ITEM RECOMMENDER recommender system
SYSTEM
Project Description (at least 25 words) Tools/Technology/Framework
Diabetes is one of deadliest infections on the planet.Thier is a need of built up a
framework utilizing information mining which can anticipate whether the patient has
Matlab
diabetes or not. Moreover, foreseeing the illness early prompts treating the patients
previously.

Reality TV is the new mantra of television producers and channel executives. It is the
means to increase TRP ratings and the end is always to outdo the other channels.The
comments from the viewer will be extracted along with the viewer details such as weka
gender, location, etc… Based on people’s comment and sentiments, the TV Show
popularity will be rated accordingly.

This plagiarism detector measures the similar text that matches and detects
plagiarism. Internet has changed the student’s life and also has changed their learning
Matlab
style. It allows the students to get deeper in the approach towards learning and
making their task easier.
Secure E-learning has been divided into two parts Data Security and user flexibility.
E-learning has huge database which carries lots of student records, course records,
Weka
course materials and so on. In this system user security provided by the admin, admin
himself authorize to candidate to enter into the system.

Most of us use android and IOS Mobiles these days and also uses the play store or
app store capability normally. Both the stores provide great number of application but
unluckily few of those applications are fraud. Such applications dose damage to Matlab
phone and also may be data thefts. Hence, such applications must be marked, so that
they will be identifiable for store users
This is a system of connecting the consumer and the retailer. This system creates a
bridge between consumer and retailer. By implementing an effective data mining
algorithm to analyze new patterns and trends. This system will gather data from the Weka
customer behavior pattern and is supplied to the retailers, so that retailers will able to
know the new patterns and trends.

The Heart Disease Prediction application is an end user support and online
consultation project. The application is fed with various details and the heart disease
Spark
associated with those details.The system can be used for free heart disease consulting
online.

Weather forecasting is the application of science and technology to predict the state
of the atmosphere for a given location.This system can be used in Air Traffic, Marine, Matlab
Agriculture, Forestry, Military, and Navy etc.

This system helps to find out whether the movie is super hit, hit, flop on the basis of
historical data of actor, actress, music director, writer, director, marketing budget and
release date of the new movie. If the movie releases on weekend, new movie will get Spark
higher weight age or if the movie releases on week days new movie will get low
weight age.
This project is an E-Commerce web application where the registered user will view
the product and product features and will comment about the product. System will
analyze the comments of various users and will rank product.The System takes Spark
comments of various users, based on the comment, system will specify whether the
product is good, bad, or worst
It provides support 24x7 and guide users about health features MATLAB

System will rate the website based on the comment of various users.
The role of the admin is to add various website to the system and to add keywords in MATLAB/PYTHON/Android
database

System will keep historical record of crime and can easily helps to prevent crime in
Weka/RapidMiner/Python
society

People can easily decide whether the posted topic is good or bad by using this
application.
Weka/RapidMiner/Python
Since system ranks the topic based on the keywords in database so the result is
appropriate.

This system reduces searching time and eliminates travelling cost.


This system gives details of the property to the buyers depending on the preferences MATLAB/PYTHON/Android
entered.

Analysis of stocks using data mining will be useful for new investors to invest in
Weka/RapidMiner/Python
stock market based on the various factors considered by the software.

This system will help the human resource department to select right candidate for
Weka/RapidMiner/Python
particular job profile which in turn provide expert workforce for the organization.
This system will act as an evidence for investigation and can reduce crime over
Weka/RapidMiner/Python
internet

Provides large number of choices for books & also recommend for books.
MATLAB/PYTHON/Android
The system recommending algorithm scale well with co-rated items.

This system can be used to view the location view in map that the user wishes to
reach.
MATLAB/PYTHON/Android
The user can also find the paths to follow to reach the final destination in map which
gives a better view to the users.
Audio processing is rapidly becoming an important field in deep learning hence
here’s another challenging problem.

This is an advanced recommendation system challenge. In this practice problem, you


are given the data of programmers and questions that they have previously solved,
along with the time that they took to solve that particular question. As a data scientist,
the model you build will help online judges to decide the next level of questions to
recommend to a user.

Use Walmart Sales Forecasting Data Set

Use Walmart Sales Forecasting Data Set

To check for unusual patterns. These patterns include user characteristics such as user
spending patterns as well as usual user geographic locations to verify his identity
Detailed summary of orders placed with option to search orders, update order status,
print orders, etc.

To analyze growth of faculty

To analyze the clusters and cluster data stream with respect to density

To overcome major diseases,diagnose them at early stages such as cancer

Association Rule mining in detail using various algorithms

To analyze sentiments on social network

It also consists of an innovative feature that allows users to post reviews of the
dealing process with a buyer after their deal.
System will rank the experience and key skills required for particular job position.

This includes searching by comparing with text data. This text data is easy to mine
since we just compare the words (alphabet combinations) to the words in our
database.

to maintain the education quality of institute by minimizing the diverse affect of


these factors on student’s performance.

analyzing the various data mining techniques introduced in recent years for heart
disease prediction

large amount of data is stored in educational database, so in order to get required data
& to find the hidden relationship

analysis of the prediction of survivability rate of breast cancer patients using data
mining techniques

mine information from agricultural datasets


predicting students’ academic performance

Defective software modules cause software failures, increase development and


maintenance costs, and decrease customer satisfaction. Effective defect prediction
models can help developers focus quality assurance activities on defect-

Chronic- Kidney-Disease prediction using weka data mining tool and its usage for
classification in the field of medical bioinformatics. It firstly classifies dataset and
then determines which algorithm performs better for diagnosis and prediction of
Chronic- Kidney-Disease

to determine the prediction of disease and their accuracy using classifications of


different algorithms to find out the best performance.

challenges that Twitter data streams pose, focusing on classification problems, and
then consider these streams for opinion mining and sentiment analysis. To deal with
streaming unbalanced classes, we propose a sliding window Kappa statistic for
evaluation in time-changing data streams.
to focuses on sharing posts in the application more effectively and easily. In this HTML,JAVA,SQL
application, users can share their posts whether they may be images any others.

Chronic- Lungs-Disease prediction using weka data mining tool and its usage for
classification in the field of medical bioinformatics. It firstly classifies dataset and
then determines which algorithm performs better for diagnosis and prediction of
Chronic- Lungs-Disease

large amount of data is stored in medical database, so in order to get required data &
to find the hidden relationship
Team Leader - Dr. Meenakshi Sharma
Dr. Meenakshi Sharma

F# F_N P# Project Title

1 Currency Recognition System using Image Processing

Detection of Cancer in Human Blood Sample based on


2 Microscopic Images

3 A Leaf Recognition of Vegetables Using Matlab


Navjot Kaur

4 Text extraction from images

5 Digital Watermarking using MATLAB

6 Glaucoma Detection using MATLAB

7 Age invariant face recognition

8 Detection of copy move forgery


l
Anchal 9 Detection of diseases from the images of leaves

Lung cancer detection using segmentation from lung


10 images

11 Biometric liveness detection

12 Medical Image Forgery Detection for Smart Healthcare

Object Segmentation from colored Images using Genetic


13 Algorithm

Object detection Using adaptive Mean (AM) and


14 Adaptive Median (AMD) methods
Dr. Surender Singh

Object Segmentation from colored Images using Particle


15 swarm optimization (PSO) algorithm

Implementing various edge detection algorithms such as


16 Prewitt's, Sobel and Canny and comparing these.

Implementing various Canny edge detection algorithm


17 using Cellular logic Array Processing and comparing this
with standard method.
Object detection Using adaptive Single Gaussian and
18 Multiple Gaussian methods

19 Image Segmentation for Intensity Inhomogeneity

20 Ultrasound Open Platforms for Next-Generation

Secure and Robust Digital Image Watermarking Using


21
Jasmeet Kaur

Coefficient Differencing and Chaotic Encryption

22 Traffic monitoring system

23 Color Image Noise Reduction

Text segmentation of health examination item based on


24 character statistics and information measurement

25 Automated Car Parking Indicator System

26 Huffman Encoding and Decoding


ryal
Shikha Jaryal 27 Audio Compression using Wavelets

28 Recognition of Vehicle Number Plate

29 Power Load Balancing Using Fuzzy Logic

30 The Face Recognition and Counter machine using Matlab

31 Surveillance Checking with Android Phone

32 Target Detection
Gaganjot kaur

33 Region of Interest Based Image Compression

34 Drowsy Driver Detection

35 Automatic Vehicle Parking System


An early fire detection system through registration and
36 analysis of waste station IR-images

37 Emotion Detection
Shefali Goyal

7 38 Image Compression By DCT and DWT

39 Shadow detection and removal in images

40 JPEG Compression using MATLAB


Arshleen

8 41 Brain Tumor extraction using MATLAB

Detection of Cancer in Human Blood Sample based on


42 Microscopic Images

43 Matlab based Target Detection for Cross Corelation.

44 Neuro Fuzzy Based Image Fusion using IWT


d
Kumud 45 Iris Segmentation for localizing the Acquired Image

46 Integer Wavelet Transform for Image Processing

47 How to Extract Text from Images Using Matlab

Real Time Edge detection For Identifying the Objects Inn


48 X-Ray.

49 Graphical Password by Image Segmentation

50 Background estimation from an Image

51 Image Analysis and Compression

52 Image Retrieval based on Segmentation

53 Digital Watermarking
preet singh

10
10 Jaspreet singh 54 Image Character Recognition

55 Facial Expression Recognition

56 Hand Gesture Recognition

57 Fingerprint Recognition

58 Image ComDecom

59 Steganography

60 Exudate Segmentation in Retina Images

61 Image Compression by Wavelet Transform

62 Text Extraction from Digital Images Using Matlab


Amanjot Kaur 63 Image Retrieval based on GA Technique

64 RGB Object Recognition System

11

65 Removal of High Density Noise From Digital Images

Edge Detection in Images using Ant Colony Optimization


66 Technique

67 Medical Image segmentation using genetic algorithm

68 A Correlation-Based Fingerprint Verification System

Dual-tree Complex Wavelet Transform based Denoising


69 for Random Spray Image Enahcement Methods

70 Enco-Deco Stegnofy-A Stegnographic Tool

71 Image Editor
72 Object recognition using image analysis

73 Human Action recognition using Image Processing


Aarti

12

74 Drowsy Driver Detection

75 STEGNOGRAPHY

76 Pixel based object tracking

77 Power optimization for wearable devices

78 Currency Recognition System

Detection of cancer in Human blood sample based on


79 mircoscopic Images

Finger print Recogntion Algorithm Using Phase based


80 Image Matching
ish Sharma

13
13 Manish Sharma 81 Intelligent Traffic Light control Using Image Processing

82 Image Quality Enhancement Using Matlan

83 Face Emotion Recognition Using Matlab

84 Human Action recognition using Image Processing

Improved principle component analysis based gray


85 stretch algorithm for Landsat image segmentation.

Propose a new algorithm which will integrate the dark


86 channel prior and adapative histogram equalization to
improve accuracy of the fog removal algorithm
Harmanpreet Kaur

Enhanced Fog Removal Algorithm by Integrating the


87 Dark Channel Prior & Global White Balancing

14

Novel Curvature Features for 3D fingerprint recognition


88 algorithms

89 Region of Interest Based Image Compression


90 Medical Image segmentation using genetic algorithm

Secure ECG-based Biometric Authentication in Body


91 Area Sensor Networks

A Real-Time Testbed Environment for Cyber-


92 Physical Security on the Power Grid
Anju

15 93
IR-Depth Face Detection and Lip Localization Using
Kinect V2

94 Fingerprint Application Using Matlab and Verilog HDL

95 PCA method used for detection of Facial Expression

96 Hand Gesture Recognition Using Machine Learning

97 Diagonistic Care
Damanpreet Kaur

98 Fingerprint Recognition Using Machine Learning

16
Damanpreet Kau
16

99 Forgery Detection of Medical Image

100 Intelligent Traffic Light Control using Image Processing

101 Text Recognition in Images by Python

102 License Plate Recognition


Arshleen

17 103 Target Detection using Matlab through Image Processing

Ultrasound Imaging: Signal Acquisition – New Advanced


104 Processing for Biomedical and Industrial Applications

Computer Vision and Image Processing Techniques for


105 Mobile Applications

Implementation and Evaluation of Content-aware Video


106 Retargeting Techniques

Performance and Robustness Analysis of Co-Prime and


107 Nested Sampling
ot
Application of Image Processing For Development of
Amanjot 108 Automated Inspection System

18

109 Image Slider Using MATLAB

Pest Control in Agricultural Plantations Using Image


110 Processing

A New Algorithm for Image Noise Reduction using


111 Mathematical Morphology

Realistic Lighting in Autodesk Maya with Mental Ray


112 Area Light

113 GPU accelerated Nonlinear Soft Tissue Deformation

Plaque Identification using Automated Image


114 Enhancement
Anju

19

115 Breast Cancer Detection using Neural Networks

116 Image Processing with Matlab code for 3D SPIHT


117 Matlab Code for Image Restoration for image processing

Image Processing with Background estimation based on


118 Mode algorithm
Aarti

20 119 Medical Image Retrieval using Energy Efficient Wavelet

Blood Vessel Segmentation in Angiograms using FIS and


120 Morphological Operations

121 Image Compression using Run Length Encoding

122 Image Processing for Eye Tracking with matlab code

Red Colour Object Tracking with Matlab in Image


123 Processing

Matlab code for Optical Character recognition in Image


124 Processing
Harmandeep Kaur

21 125 Matlab Code for Haze Removal


Harmandee
21

Image Processing with Matlab code for Real Time


126 Motion Detection

Matlab Code for 3D DWT (3 Dimensonal Discrete


127 Wavelet Transform) with Image Processing

Matlab code for Diabetic Retinopathy using HSV and


128 Fuzzy

129 Raspberry Pi based Ball Tracing Robot

130 Identification of Human Act by Image Processing


Damanpreet Kaur

131 Driver Sleepiness Detection using Matlab

22

An Improved salient object detection algorithm


132 combining background and foreground connectivity for
brain image analysis

133 Erosion & Dilation of Images using Matlab

134 Global Contrast Based Salient Region Detection


A Model of Saliency-Based Visual Attention for Rapid
135 Scene Analysis

An Efficient Edge Detection Approach to Provide Better


136 Edge Connectivity for Image Analysis
Jaspreet singh

A kNN Method for Breast Cancer Prognosis that Uses a


23 137 Genetic Algorithm for Component Selection using
Matlab

Accurate Cancer Classification Using Expressions of


138 Very Few Genes

A New Classification Method for Breast Cancer


139 Diagnosis: Feature Selection Artificial Immune
Recognition System (FS-AIRS)

Parameters identification of unknown delayed genetic


140 regulatory networks by a switching particle swarm
optimization algorithmI

Gait recognition using Active Energy Image and Gabor


141 wavelet

Flower Classification Using Neural Network Based


142 Image Processing

Pointwise Shape-Adaptive DCT forcHigh-Quality


143 Denoising and DeblockingcofGrayscale and Color
Images
vjot Kaur

24
Navjot Kaur
A Secure Image Steganography Based on RSA Algorithm
24 144 and Hash-LSB Technique

Efficient image compression technique using full, column


145 and row transforms on colour image

146 Grading of rice grains by image processing

Texture Enhanced Histogram Equalization Using TV-L1


147 Image Decomposition

148 Colorization-Based Compression Using Optimization


MATLAB

Objectives Of Project

It is difficult for people to recognize currencies from different countries.


Our aim is to help people solve this problem.

The system should be efficient, reliable, less processing time, smaller


error, high accuracy, cheaper cost and must be robust towards varieties
that exist in individual, sample collection protocols, time and etc.

Recognizing plants is a vital problem especially for biologists,


agricultural researchers, and environmentalists. Plant recognition can
be performed by human experts manually but it is a time consuming
and low-efficiency process. Automation of plant recognition is an
important process for the fields working with plants.

The problem can be divided into the following subproblems: (i)


detection, (ii) localization, (iii) tracking, (iv) extraction and
enhancement, and (v) recognition (OCR)

1. Efficiency 2. Image fidelity 3. Robustness

An automated technique is developed to analyze the ultrasound images


of the eye to measure glaucoma angle. The technique will address the
following problems: Denoising, Poor Resolution, Poor contrast,
Identification and feature extraction.

1) maintain accuracy 2)to create a robust framework which can be used


for face recognition 3)use a published dataset 4) train the model with
the dataset

1) comparing the performance of proposed algorithm


2) attain accuracy
1) use publish dataset
2) to design algorithms fr early detection of diseases

1) use publish dataset 2) to design algorithms fr early detection of


diseases

1)train the model with the dataset


2) to attain accuracy

1) Medical Image Forgery Detection for Smart Healthcare

a) To design Algorithm(s) for for effective segmentation of image.


b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy

a) To design Algorithm(s) for for effective object detection of image.


b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy

a) To design Algorithm(s) for for effective segmentation of image.


b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy

a) To design Algorithm(s) for for effective object detection of image.


b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy

a) To design Algorithm(s) for for effective object detection of image.


b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy
a) To design Algorithm(s) for for effective object detection of image.
b)Evaluating Performance of proposed Algorithm
c) To Attain Greater Accuracy

1) maintain accuracy 2)to create a robust framework which can be used


for image segmentation 3)use a published dataset 4) train the model
with the dataset

1) use a published dataset 2) train the model with the dataset 3) to


design algorithm for early diagnosis of disease

1) objectiveis to build blind, secured, robust and perceptual transparent


digital image watermarking system in transform domain by embedding
high capacity payload in an image.

1) Improved management of the flow of traffic through bottlenecks to


minimise track occupancy times 2)To improve the traffic flow
throughout the entire system by providing effective, real-time
information to traffic controllers and drivers

1) To study about different types of noise and ... True color or RGB

1) create a robust framework which can be used for image segmentation


2) uracymaintain ac

Upgradation Of Parking System make Parkinng very easy

Base is JPEG Image compression . Analysis for fequency


Algorithm to compress audio file for increasing storage

Characters can be used in new way

Fuzzy Logic Box is used for controlling Overload Problems

Medical Science usage

1. monitoring public places like offices, homes, using an Android app


2. one can
capture the images
3. monitor record
the live streaming videos

1.detects a target image in a given image according to maximization of


Cross Correlation.
2 this technique uses
in SAR(Synthetic aperture radar ) Images to identify the target
1. an investigation was performed to find ways of differencing between
fires and vehicles at waste stations in hope of removing vehicles as a
source of error during early fire detection. The existing system makes
use of a heat camera, which rotates in 48 different angles (also known
as zones) inana algorithm
1. propose fixed position.
which compresses medical images.
2.If the heat is above a certain value within a2.zoneThethe
system sounds
objective the fireredundancies
is to reduce alarm.The rotation of the
of image datacamera results
in order in to
to able an
unwanted displacement
store or transmit the databetween two successive
in an efficient form. Theframes within
reduction in the
file same
size
zone.
allows more images to be stored in a given amount of disk or memory.
It is also reduction the time required for images to be sent over the
Internet. It also reduction the time for downloaded from Web pages.
1. locating segmenting eye 3.The purpose of image compression is to
achieve a very low bit rate representation . In case of conventional
compression schemes the equal loss2.Binarzing
of information will occur for whole
image, as they are compressed with equal CR but in contextual
compression schemes, the visual quality of important area (ROI) will be
3. labelling
quite better due to less information loss of ROI as compared to back
ground.
4. segmentation

5. Analyzing blinks
Nowadays, there are many cities worldwide facing a lot of problem for
vehicle parking due to less availability of parking places, high land
prices, etc. To overcome this issue here is a solution namely automatic
car parking system.

a) To design algorithm (s) for detecting the present emotion. b )


Comparing the performance of proposed algorithm. c) To attain the
greater accuracy.

a) The goal of image compression is to remove the redundancies by


minimizing the number of bits required to represent an image. b) It also
reduces the storage memory to load an image. c) to design algorithm
with greater accuracy.

a) To deign software that cxan detect that input image has face or not. b)
To deign the hybrid technique using PCA. c) Improve the accuracy

Image can be made small sized so that more Images can share a storage

Medical sciences can be helped

Cancer can be cured at early stage

1 To.detects a target image in a given image by using appropriate


method. 2 To Improve the Efficiency by using certain parameter

1) To imrove the quality of image by using wavelet function. 2) To


compare with previous work with parameter
1) To define the segmentaion for iris by using segmentaion method 2)
To improve the quality

1) To implement algorithm for image by using wavelet transform 2)


comparing the performance of system

1) To implement algorithms to extract text from images 2) comparing


the performance of a system

1) To improve detection quality by using appropriate method2) To


compare with previous work.

Create a software to check the authenticity of signatures  Ability to


calculate the similarity  User Login/Registration

 To display noise level in a selected image.  To remove the noise


from a selected image.

 To product security tool based on steganography techniques.  To


explore techniques of hiding data using encryption module  To
explore techniques of getting secret data using decryption module.

Image processing and computer vision methodology to detect edges of


an object.

Create software for recognizing from images stored in database. 


Ability to reduce the search time for selecting the pattern  Ability to
highlight percentage of similarity  User Login/Registration
Create software for recognizing from images stored in database. 
Ability to reduce the search time for selecting the pattern  Ability to
highlight percentage of similarity  User Login/Registration

Create software for recognizing from images stored in database. 


Ability to reduce the search time for selecting the pattern  Ability to
highlight percentage of similarity  User Login/Registration

Create software for recognizing from images stored in database. 


Ability to reduce the search time for selecting the pattern  Ability to
highlight percentage of similarity  User Login/Registration

Create software for recognizing fingerprint from images stored in


database.  Ability to reduce the search time for selecting the pattern 
Ability to highlight percentage of similarity  User Login/Registration

Create software to compress and decompress image files.  Ability to


select multiple files  Checking of size and quality of compressed file

Can be used to easy the work in government offices

1. To implement algorithms to make the retina recognition


2. Performance Evaluation of retina recognition system.
3. Design of a Security Template to secure retina recognition system.

1.It provides a potential cost savings associated with sending less data
over switched telephone network where cost of call is usually based
upon its duration.
2.It not only reduces storage requirements but also overall execution
time.
3.It also reduces the probability of transmission errors since fewer bits
are transferred.

1. To implement algorithms to extract text from images


2. Performance Evaluation of framework 3.Comparing the performance
of system.
1.To implement algorithms for make image retrieval based on Genetic
Algorithm segmentation.
2.Performance Evaluation of system. 3. Comparing the performance of
system.

1. To implement algorithms for make color detection systems.


2. Performance Evaluation of system 3.Comparing the performance of
existing system.

1.To implement algorithms for removal of Noise .


2.Performance Evaluation of system 3.Comparing the performance of
system.

1.To implement algorithms for image segmentation.


2. Performance Evaluation of system 3. Comparing the performance of
system.

1. To implement algorithms for image segmentation.


2.Performance Evaluation of system 3. Comparing the performance of
existing system.

1.To implement algorithms for fingerprint recognition.


2.Performance Evaluation of system 3.Comparing the performance of
system.

1. To implement algorithms for image enhancement.


2. Performance evaluation of system. 3. Comparing the performance
of system.

Hide important data behind image/audio/video

To resize and edit images of different formats


Detects a target image

Recognize human actions

Driver fatigue is a significant factor in a large number of vehicle


accidents

to provide security

object tracking

Energy-efficiency optimizations for wearable devices

Aim is to recognize currencies

To Find out the cancer from Human Blood

To detect Finger print from images using Recogntion Algorithm


Aim is to design a traffic control due to the large Traffic.

Design a code to Improve the quality of Image using Matlab

This project recognition the emotion in face images

A Matlab code is written to recognize human actions namely ‘walking’,


‘jogging’,’running’, ‘boxing’,’hand waving’, and ‘hand clapping’ using
image processing algorithm

Following are the principal objectives of this research work:


1. To implement existing image segmentation technique like gray
stretch based segmentation.
2. To propose an improved principle component analysis based gray
stretch algorithm for Landsat image segmentation.
3. To compare the proposed algorithm with the state of art techniques
based upon the various parameters.
Objectives
1. To evaluate the performance of the existing image enhancement
techniques.
2.
i. To propose
The a new algorithm
main objective which work
of this research will integrate the dark
is to evaluate the
channel prior and adapative histogram equalization to improve
performance of the fog removal using bilateral filter, dark channel accuracy
prior
of the fog
and CLAHE. removal algorithm.
ii. To propose a new integrated algorithm that will integrate the
global white balancing, dark channel prior and adaptive gamma
correction.
iii. The main scope of this algorithm is to improve the accuracy of
the Intelligent Transportation System (ITS) especially when lane
detection kinds of application come in action in VANETs. Therefore the
proposed algorithm will become more useful in to preventing the road
accidents as accidents rate is growing day by day due to poor driving
Themore
and maintraffic.
objectives of proposed work are as follows:
1. To evaluate the performance of novel Curvature Features for 3D
fingerprint recognition algorithms.
2. To utilize Fuzzy logic for improving the accuracy of the novel
Curvature Features for 3D fingerprint recognition.

1. propose an algorithm which compresses medical images. 2. The


objective is to reduce redundancies of image data in order to able to
store or transmit the data in an efficient form.It also reduction the time
for downloaded from Web pages. 3.The purpose of image compression
is to achieve a very low bit rate representation
1. To implement algorithms for image segmentation.
2.Performance Evaluation of system 3. Comparing the performance of
existing system.

to ensure continuous reliable operation even in exposed network


environments.

a) To deign software that cxan detect that input image has face or not. b)
To deign the hybrid technique using PCA. c) Improve the accuracy

Ability to reduce the search time for selecting the pattern


Ability to highlight percentage of similarity
User Login/Registration

Create a software/tool that automatically detects and classify image


data, such as scans, x-rays, etc to detect disease.
--Treatment automatically adopted mapped to disease detected.
--User Login/Registration

Create a software for recognizing fingerprint from images stored in


database.
•Ability to reduce the search time for selecting the pattern
--Ability to highlight percentage of similarity
User Login/Registration
this project is based on a noise chart of an image, uses a multi-
resolution failure filter, --the output to the classifiers like extreme
learning and support vector.

To study various methods of image processing techniques.


To build a framework p for changing the duration of the traffic light as
it depends on the traffic density of crossroads at a traffic signal.

Propose a color decrease technique, a technique for edge recognition,


as well as the localization of text areas and geometrical belongings.

To Design an efficient Algorithm to recognize the license Plate

Detects Image according to maximization of cross Correlation

For use in Biological Processes

Use in Mobile for better version Of camera

To make Videography more quality improved

To analyze the sampling techinques


Machine vision is increased with Accuracy

To enhance the touch of mobile Phones

To help farmers for the plantation throughtout the globe

Morphological openings and closings are useful for the smoothing of


grayscale images. However, their use for image noise reduction is
limited by their tendency to remove important, thin features from an
image along with the noise.

how to create realistic lighting in computer graphics is one part that sets
a realistic scene apart from one that can easily be spotted to being made
in a computer. There are however many methods to reach realistic
results with lighting.

Brain, liver and other soft tissues such as tendons, muscles, cartilage
etc., are examples of solid organs. Colon and blood vessels are
examples of hollow organs. They greatly differ in structure and
mechanical behavior. Deformation of these types of structures is an
important phenomena during the process of medical simulation.

Image enhancement is a task of applying certain transformations to an


original image for obtaining output image visually more pleasant, more
detailed, or less noisy. The transformation usually requires
interpretation and feedback from a human evaluator for the output result
image.

To find out the Breast Cancer before advanced state

It is a wavelet enhancing Process used for incrementation of wavelet


It is for the Restoration Of the color of Image

It can used to change or extract the background of any Image

Useage of Image Processing Done in Medical Field can be Enhanced by


this Project

blood vessels can be segment by this Image Processing Techniques

Length of Image can be calculated by this Approach

Real time Project, eye can detect a image in a better way

Color detecting is very new topic for Image Processing

Characters can be Identify by Computers themselves. Can be used to


take education to next level

For help in taking off of Aeroplanes even in very bad weather


Little motion can be felt can be used to avoid robery

3D view is the new and future topic of Image Processing . May be used
to upgrade the Research

Replacement of Operations in Daibitic Conditions

Algorithm(s)to capture the more zoomed photographs, Algorithm(s) for


analysis of Photographs

Algorithm(s) for real time use, Algorithm(s) for Smart Outcomes

Algorithm(s) for detecting sleepiness by using Matlab in Image


Processing

An algorithm that covers both the boundary connectivity from


background cues and foreground connectivity has been proposed in this
paper

An Algorithm which guides for the dugging of Earth for minerals

The proposed algorithm is simple, efficient, naturally multi-scale, and


produces full-resolution, high-quality saliency ma
Algorithm that breaks down the complex problem of scene
understanding

The majorly used canny edge operator focuses on two thresholds


selections and still witnesses few gaps for optimal results. To handle
the loopholes of canny edge operator our method selects the simulated
triple thresholds that targets to the prime issues of edge detection:
image contrast, effective edge pixels selection, errors handling and
similarity to the ground truth.

genetic algorithm (GA) to improve the accuracy of a kNN method


when using it for breast cancer prognosis.

—We aim at finding the smallest set of genes that can ensure highly
accurate classification of cancers from microarray data by using
supervised machine learning algorithms

A new approach, FS-AIRS (Feature Selection Artificial Immune


Recognition System) algorithm that has an important place in
classification systems and was developed depending on the Artificial
Immune Systems.

An algorithm has to be developed to solve global optimization


problems with applications in identifying unknown parameters of a
class of genetic regulatory networks (GRNs)

Gait recognition has gained significant attention. It is the identification


of individuals in a video sequences, the recognition method is by the
way they walk. Active Energy Image (AEI) is a more efficient represent
method than Gait Energy Image (GEI)

it is proposed to have a method for classification of flowers using


Artificial Neural Network (ANN) classifier. The proposed method is
based on textural features such as Gray level co-occurrence matrix
(GLCM) and discrete wavelet transform (DWT).

A special structural constraint in luminance-chrominance spaceis also


proposed to enable an accurate Þltering of color images.Simulation
experiments show a state-of-the-art quality of theÞnal estimate, both in
terms of objective criteria and visualappearance.
This technique makes sure that the message has been encrypted before
hiding it into a cover image. If in any case the cipher text got revealed
from the cover image, the intermediate person other than receiver can't
access the message as it is in encrypted form.

Image compression technique based on column transform, row


transform and full transform of an image. Different transforms like,
DFT, DCT, Walsh, Haar, DST, Kekre’s Transform and Slant transform
are applied on colour images of size 256x256x8 by separating R, G, and
B colour planes.

Grading of rice grains by image processing technique. Commercially


the grading of rice is done according to the size of the grain kernel

A new variational approach for image enhancement that is constructed


to alleviate the intensity saturation effects that are introduced by
standard contrast enhancement (CE) methods based on histogram
equalization

A method to construct the colorization matrix that colorizes the image


in a multiscale manner. This, combined with the proposed RP extraction
method, allows us to choose a very small set of RP
5043

Project Description

There are approximately 50 currencies all over the world, with each of them looking totally different. For instance
the size of the paper is different, the same as the colour and pattern. The staffs who work for the money exchanging
(e.g. Forex Bank) have to distinguish different types of currencies and that is not an easy job. They have to
remember the symbol of each currency.

Analyzing through images is very important as from images, diseases can be detected and diagnosed at earlier stage.
From there, further actions like controlling, monitoring and prevention of diseases can be done. Images are used as
they are cheap and do not require expensive testing and lab equipments.The system will use features in microscopic
images and examine changes on texture, geometry, color and statistical analysis.

Leaf recognition technology plays an important role in plant classification and its key issue lies in whether selected
features are stable and have good ability to discriminate different kinds of leaves. It is well known that the correct
way to extract plant features involves plant recognition based on leaf images. In particular, identification process is
carried out by gathering leaves detached from the plants, treated and stained prior to the imaging.

Text Extraction is useful in information retrieving, searching, editing, documenting, archiving or reporting of image
text. However, variation of these texts due to differences in size, orientation style, and alignment, text is embedded in
complex colored document images, degraded documents image, low quality image, as well as low image contrast
and complex background make problem text extraction extremely difficult and challenging one.

Digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as an audio, video or image
data. It is typically used to identify ownership of the copyright of such signal.

Glaucoma is one of the leading causes of blindness. In closed angled Glaucoma, fluid pressure in the eye increases
because of inadequate fluid flow between the iris and the cornea. The inner eye pressure (also called intraocular
pressure or IOP) rises because the correct amount of fluid can’t drain out of the eye. The pressure causes damage and
eventually death of nerve fibers responsible for vision.

Face recognition across age progression remains one of the area's most challenging tasks, as the aging process affects
both the shape and texture of a face. One possible solution is to apply a probabilistic model to represent a face
simultaneously with its identity variable, which is stable through time, and its aging variable, which changes with
time.

Digital images are easy to manipulate and edit due to availability of powerful image processing
and editing software. Nowadays, it is possible to add or remove important features from an image
without leaving any obvious traces of tampering. As digital cameras and video cameras replace
their analog counterparts, the need for authenticating digital images, validating their content, and
detecting forgeries will only increase.
mage processing algorithms are developed to detect the plant infection or diseaseby identifying the colour feature of
the leaf area. K mean algorithm is used for colour segmentation and GLCM is used for diseases classification

lung cancer detection using segmentation from lung images

Biometrics use an individual’s unique biological identifiers to verify his or her identity. This inherence-based
authentication presents an ideal enhancement to possession-based (something only you have) or knowledge-based
(something only you know) authentication

With the invention of new communication technologies, new features and facilities are provided in a smart
healthcare framework. The features and facilities aim to provide a seamless, easy-to-use, accurate, and real-time
healthcare service to clients. As health is a sensitive issue, it should be taken care of with utmost security and
caution.

Segmentation is identification of same region in images to identify objects. Need to segmentation for various
application such as diagnosis and object detection etc.

Need to identify objects for various applications such as video surveillance

Need to segmentation for various application such as diagnosis and object detection etc.

There are various usage of edge detection in images including object detections, segmentation, identification
identical regions.

There are various usage of edge detection in images including object detections, segmentation, identification
identical regions.
Need to identify objects for various applications such as video surveillance

we propose a new variational level-set model for both global and interactive\selective segmentation tasks, which can
deal with intensity inhomogeneity and the presence of noise. The proposed method maintains the same performance
on clean and noisy vector-valued images. The model utilizes a combination of locally computed denoising
constrained surface and a denoising fidelity term to ensure a fine segmentation of local and global features of a given
image.

Open platform (OP) ultrasound systems are aimed primarily at the research community. They have been at the
forefront of the development of synthetic aperture, plane wave, shear wave elastography, and vector flow imaging.
Such platforms are driven by a need for broad flexibility of parameters that are normally preset or fixed within
clinical scanners. OP ultrasound scanners are defined to have three key features including customization of the
transmit waveform, access to the prebeamformed receive data, and the ability to implement real-time imaging.

Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption

It is a primary subfield within the Intelligent Transportation System (ITS) domain. The ATMS view is a top-down
management perspective that integrates technology primarily to improve the flow of vehicle traffic and improve
safety. Real-time traffic data from cameras, speed sensors, etc. flows into a Transportation Management Center
(TMC) where it is integrated and processed (e.g. for incident detection), and may result in actions taken (e.g. traffic
routing, DMS messages) with the goal of improving traffic flow.
Images are often degraded by noises. Noise can occur during image
capture, transmission, etc. Noise removal is an important task in
image processing. In general the results of the noise removal have a
strong influence on the quality of the image processing technique.
Several techniques for noise removal are well established in color
image processing. The nature of the noise removal problem depends
on the type of the noise corrupting the image

Text segmentation of health examination item based on character statistics and information measurement

Parking can be done without any body help. Automatic numbers will be generated

It can compress all sorts of Data . Entropy based algorithm.


Helps in hearing audio frequency above or below audible sound

Helps in foundation of new era parking problem will be sorted with its help

Load balancing is implemented at the substation side at the power distribution level

Recognises the Face by cionnecting it to database system already storded.

The proposed system requires a power supply, a Raspberry Pi, Pi camera, and an android phone. And also an
operating system based on the Linux for Raspberry Pi & configuring of camera files. The video can be recorded with
the help of motion software where the motion is present in the room.This project is very useful for monitoring public
places like offices, homes, using an Android app. By using this one can capture the images, monitor and record the
live streaming videos.

Robust small target detection of low signal-to-noise ratio (SNR) is important in infrared search and track
applications for self-defense or attacks. To reduce the false alarm rate, an infrared small target detection algorithm
based on saliency detection and support vector machine was proposed. Firstly, we detect salient regions that may
contain targets with phase spectrum Fourier transform (PFT) approach. Then, target recognition was performed in
the salient regions. Experimental results show the proposed algorithm has ideal robustness and efficiency for real
infrared small target detection applications.

An analysis was performed upon the warm objects,it was proven that the image registration had been a successful
improvement of the existing system. It was also shown that vehicles can, to some extent, be eliminated as an error
source.

The main target of region of interest (ROI) based compression for medical image is to improve the compression
efficiency for transmission and storage. Main goal of Region of interest(ROI) compression is to compress ROI with
main quality as compared to other region call background. For an example, while compressing medical image the
system important region should be compressed with better quality than background. Thus, the ROI area is
compressed with less compression ratio and the background with the highest possible compression ratio in order to
get overall better compression performance.
The proposed system is used in public places like hotels, offices, theatres, homes, hospitals, stadiums, airports, etc.
There are several advantages by using this system such as it occupies less space, takes less time for taking as well as
delivering the car, safety, and security for the vehicle from thefts.

To interact with humans in general conversation, firstly there is a need to build an automated system which can ba
able to identify the expressions present on the face during conversation and system can reply according to the
category of emotion present on the face of the person.

The image compression is important for many applications. It ia a type of compression technique that reduces the
size of an image file without affecting or degrading its quality.

Face detection is a computer technology being used in a variety of applications that identifies human faces in digital
images. Face detection also refers to the psychological process by which humans locate and attend to faces in a
visual scene.

Extraction in the next of Image Processing in Medical Sciences

Tensor Flow can be used in Cancer Detection

This work detects a target image in a given image according to maximization of Cross Correlation. This program
works only if the search image is the subset of the large image .this type of technique is used in SAR(Synthetic
aperture radar ) Images to identify the target

This work proposes anatomical image fusion based on second generation wavelet transform . The fusion rule is
based on neuro-fuzzy. The anatomical images are decomposed using IWT. The wavelet coefficients are then fused
using neuro-fuzzy algorithm
The purpose of the project is to localize that portion of the acquired image that corresponds to an iris . In particular, it
is necessary to localize that portion of the image derived from inside the limbus (the border between the sclera

This project provides the matlab code for integer wavelet transform,which could be used for numerous applications
in image processing

This work explains you to extract text from images .This code snippet could be used for applications like license
plate recognition ,OCR ,Text to speech conveter and other applications.

Implements real-time edge detection using Matlab , Edges characterize object boundaries useful for identification of
the object in a scene such as an X-Ray image

In banks, there is a need to check signature on cheques to verify that person authenticity.  Write a program through
which you can check that whether a particular signature is belong to same person or not.(Data required: the writing
pattern of that person, pattern of each alphabet belong to signature etc.).

 Create a dashboard to select the image and display its noise level.  Remove the image noise using noise removal
techniques  Compare the resultant image with original image.  Display the level of noise in the resultant image

 Create a dashboard for Encrypt Image and Decrypt image.  Display the information about the image such as
size, height and width.  A dialog box for selecting Image file, which you want to use hide information.  Select
any type of file whatever you want to hide with the image.  Similarly decrypt the image, the hidden file and image
file is saved into selected folder.

Edge detection method is used to detect edges and image intensity level is increased. Objects which have gaps are
filled.  After Edge detection, image might contain many horizontal and vertical lines. These lines should be
removed from image which helps to extract only text from image.  After applying image preprocessing steps,
image is left with few smaller unwanted objects. These unwanted objects are removed. After applying image
preprocessing steps, apply edge detection function on processed image.

Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture.  When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched.  It should display the similarity score.
Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture.  When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched.  It should display the similarity score.

Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture.  When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched.  It should display the similarity score.

Create dashboard where it will show the button for uploading of image to be checked whether it matches in database
for gesture.  When user upload the image, pattern should be checked , only then in that pattern folder images
should be matched.  It should display the similarity score.

Create dashboard where it will show the button for uploading of image file. It should also have two buttons - one for
compress the image and other to decompress the image.  One separate form should be created. One button should
be for uploading of compressed file and other button should be for uploading of original file.  Check size button
should be able to check both files and Check quality button should be able to check quality i.e. pixels for both files.

Image Acquisition :- The first step, image acquisition deals with capturing sequence of retina images from the
subject using cameras and sensors with High resolution and good sharpness.
Retina Segmentation- The first stage of iris segmentation to isolate the actual region in a digital eye image.
Normalization:- Once the iris segmented ,the next stage transform the eye region so that it has fixed dimensions in
order to allow comparisons. .

Post processing by morphology operations

Mask Image
Input Query Image
Apply Feature Extraction
Apply Hashing on Features
Search on database using hashing codes
Index the hashing codes and extract features

Read the input image.


Generating red, green and blue color bands of the image.
Compute and plot the red, green and blue color band histogram
Conversion of RGB image into grayscale and then to binary image using thresholding process.
Removing objects having less than 300 pixels

A new, efficient switching median–mean filter is proposed to remove high density impulse noise from digital images.
The proposed method consists of detection and filtering stages. The pixels that are labeled noise-free in the detection
stage remain unchanged and the noisy-pixels are replaced by the reference image based the proposed filter with 3 × 3
window. The simulation results show that the proposed fil- ter outperforms some existing methods, both in vision
and quantitative measurements. Moreover, our method is not only efficient to remove high density impulse noise and
preserve the details in the image, but also possess a short processing time.
ACO analysis:- The image processing is the strategy which is put on process different characteristics of the image.
Many image processing based programs require the detection and the acceptance of the things. Segmentation is a
vital task for such purposes. In computer vision, image segmentation is the task of splitting a digital image into
numerous segments.. The goal of segmentation is to simplify and/or change the representation of a picture into
anything that is more significant and easier to analyze. In that work, means of edge detection is analyzed which is
predicated on picture segmentation. Ant Colony Optimization presents an alternative method of image edge
detection. Ant colony optimization (ACO) is a population-based metaheuristic that mimics the foraging conduct of
ants to locate estimated answers to difficult optimization problems
Genetic algorithms (GAs) have been found to be effective in the domain of medical image segmentation, since the
problem can often be mapped to one of search in a complex and multimodal landscape. The challenges in medical
image segmentation arise due to poor image contrast and artifacts that result in missing or diffuse organ/tissue
boundaries. The resulting search space is therefore often noisy with a multitude of local optima. Not only does the
genetic algorithmic framework prove to be effective in coming out of local optima, it also brings considerable
flexibility into the segmentation procedure.

A correlation-based fingerprint verification system is presented. Unlike the traditional minutiae-based systems, this
system directly uses the richer gray-scale information of the fingerprints.
The correlation-based fingerprint verification system first selects appropriate templates in the primary fingerprint,
uses template matching to locate them in the secondary print, and compares the template positions of both
fingerprints.

This work introduces a novel way to reduce point-wise noise introduced or exacerbated by image enhancement
methods leveraging the Random Spray sampling approach. Due to the nature of the spray, the sampling structure
used, output images for such methods tend to exhibit noise with unknown distribution.

official data can be sent securely from sender to receiver

To get customized and quality images.


Detects a target image in a given image according to maximization of Cross Correlation.

Recognize human actions namely ‘walking’, ‘jogging’,’running’, ‘boxing’,’hand waving’, and ‘hand clapping’ using
image processing algorithm

Driver fatigue is a significant factor in a large number of vehicle accidents. There are several methods such as EEG
for drowsy detection ,and some used eyeblink sensors,this project uses web camera for Drowsy detection

data hide with in image file

A tracker which is based on structural information captured in pixels, thus facilitate a tracker which distinguishes
between the target and the background easily. This target-background posterior estimate is further used to track the
object. It is used for effective tracking of objects in generic computer vision system.

several wearable devices have been proposed for monitoring nutrition intake, tracking energy expenditure, and
performing activity recognition. Long device lifetimes are critical because frequent battery replacements increase
user burden and yield poor long-term compliance rates.

It is difficult for people to recognize currencies from different countries. Our aim is to help people solve this
problem.

study of developing a detection of leukemia types using microscopic blood sample images.

A major approach for fingerprint recognition today is to extract minutiae from fingerprint images and to perform
fingerprint matching based on the number of corresponding minutiae pairings
In India, with the growing number of vehicles, traffic congestion at junctions has become a serious issue. The density
of vehicles is increasing day by day and there is an urgent need of adaptive traffic signals

Design a code to Improve the quality of Image using Matlab Work like Adobe Photoshop

This project recognition the emotion in face images

A Matlab code is written to recognize human actions namely ‘walking’, ‘jogging’,’running’, ‘boxing’,’hand waving’,
and ‘hand clapping’ using image processing algorithm

To do performance analysis, different metrics will be considered like Mean Square Error, Peak Signal to noise ration,
Bit Error Rate, Accuracy, Measure of Entropy and Root Mean Square error.

To overcome the difficulties of existing study a brand new incorporated algorithm will soon be proposed. New
algorithm may include the black route previous and Adaptive histogram equalization to improve the results further.
The main range of the planned algorithm is to improve the precision of the color images.

The main scope of the proposed algorithm is to improve the accuracy of the Intelligent Transportation System (ITS)
especially when lane detection kinds of application come in action in VANETs.

The uses of fuzzy logic for better classification of 3D images are also ignored. Therefore in order to overcome these
issues a new fuzzy based novel Curvature Features for 3D fingerprint recognition is proposed in this dissertation.
The overall objective is to improve accuracy further by introducing various attributes of 3D images.

The main target of region of interest (ROI) based compression for medical image is to improve the compression
efficiency for transmission and storage. Main goal of Region of interest(ROI) compression is to compress ROI with
main quality as compared to other region call background.
Genetic algorithms (GAs) have been found to be effective in the domain of medical image segmentation, since the
problem can often be mapped to one of search in a complex and multimodal landscape. The challenges in medical
image segmentation arise due to poor image contrast and artifacts that result in missing or diffuse organ/tissue
boundaries. The resulting search space is therefore often noisy with a multitude of local optima. Not only does the
genetic algorithmic framework prove to be effective in coming out of local optima, it also brings considerable
flexibility into the segmentation procedure.

Face detection is a computer technology being used in a variety of applications that identifies human faces in digital
images. Face detection also refers to the psychological process by which humans locate and attend to faces in a
visual scene.

Create Login Form using python


Create dashboard where it will show the button for uploading of image to be checked whether it matches in
database.
When User upload the image , pattern should be checked , only then in that pattern folder images should be matched
it should display the similarity score.
Create a software/tool that automatically detects and classify image data, such as scans, x-rays, etc to detect disease.

Create dashboard where user will select the image and the option of
Selecting images
• Based upon the current input and type of images diseases are to be detected if
Automatically

Create dashboard where it will show the button for uploading of image to be
checked whether it matches in fingerprints database.
--When user upload the image , pattern should be checked , only then in that
Pattern folder images should be matched.
--It should display the similarity score.
The noise-map is formed in a boundary computing source, as the while the classification and filtering are completed
in a core cloud-computing source. Similarly, this project works effortlessly. The requirement of bandwidth is also
very reasonable for this project.

Day by day the traffic issue has become a major problem in India due to the rising number of motor vehicles. For
this reason, one has to utilize the traffic signals which can do the real-time checking of compactness of traffic.

Text recognition of an image is a very useful step to get the recovery of multimedia content. The proposed system is
used to detect the text in images automatically and remove horizontally associated text with difficult backgrounds.

Recognition of license plate figure done so that can help our Nation to help with recognition of culprites even when
there is exposure of them in public

It works only if the search image this type of technique is used in SAR(Synthetic Aperture Radar)

Use of ultrasound, namely in the biomedical diagnosis and industrial fields, pioneered in 1950s, is today particularly
widespread. In the last decades, ultrasound imaging has benefited from advances in numerical…

Camera phones have penetrated every corner of society and have become a focal point for communications. In our
research we extend the traditional use of such devices to help bridge the gap between physical and digital

The purpose of this master thesis was to study different content-aware video retargeting techniques, concentrating on
a generalization of seam carving for video. Focus have also been put on the possibility to combine different

Coprime and nested sampling are well known deterministic sampling techniques that operate at rates significantly
lower than the Nyquist rate, and yet allow perfect reconstruction of the spectra of wide sense stationary
In manufacturing industry, machine vision is very important nowadays. Computer vision has been developed widely
in manufacturing for accurate automated inspection. A model of automated inspection system is presented in

In this project we are going to control the wallpapers with our hands motion. This is done with help of MATLAB
tool by using some algorithms. The aim of this project is to let the experiment with control the wallpapers with

Monocropped plantations are unique to India and a handful of countries throughout the globe. Essentially, the
FOREST approach of growing coffee along with in India has enabled the plantation to fight many outbreaks of pests

MIC is useful for grayscale images corrupted by dense, low-amplitude, random or patterned noise. Such noise is
typical of scanned or still-video images. MIC differs from previous morphological noise filters in that it manipulates
residual images – the differences between the original image and morphologically smoothed versions.

The process will first be explained with a simple scene where the results of some of the most relevant settings will be
explained. Then, those techniques will be applied in two scenes to obtain a realistic result.

The primary focus of this project is on deformation of soft tissues. These kind of soft tissues usually undergo large
deformation. Deformation of an organ can be considered as mechanical response of that organ during medical
simulation. This can be modeled using continuum mechanics and FEM. The primary goal of any system, irrespective
of methods and models chosen, it must provide real-time response to obtain sufficient realism and accurate
information.

In this project we introduce automatic image enhancement techniques which are helpful in plaque identification.
Plaque is accumulation of Lipid pool & calcium cell in coronary artery which leads obstruction of blood flow & this
disease is called atherosclarosys.

This project explains breast cancer detection using neural networks .MIAS database has been used for testing the
performance of the system

The following Matlab project contains the source code and Matlab examples used for 3d spiht. These functions
implement the 3D SPIHT algorithm, used for the compression of 3d wavelet coefficients. Such 3d wavelet
coefficients are produced during
A robust structure-adaptive hybrid vector filter is proposed for digital color image restoration in this project. At each
pixel location, the image vector (i.e., pixel) is first classified into several different signal activity categories by app

We propose a novel background extraction algorithm based on Mode algorithm

Medical Image Retrieval using Energy Efficient Wavelet

In this project, we evaluate the performance of a fuzzy inference system and morphology filters for blood vessel
segmentation in a noise angiograms image

Image compression may be lossy or lossless. This project explains a lossy compression scheme based on Run Length
Encoding

This Project track the eyes in real time from a web camera using viola jone face detection algorithm.This code could
be used for eye tracking and drowsy driver applications.

This code is used to track red colour objects in a Video.the same code can be used for tracking other colour

This project provides the matlab code for Basic Optical Character recognition using Correlation .

Haze removal (or dehazing) is highly desired in both consumer/computational photography and computer vision
applications.
Introduction to Real time Motion Detection in video surveillance, video signals from multiple remote locations are
displayed on several TV screens which are typically placed together in a control room

In this project, a 3D discrete wavelet transform (DWT) approach is proposed for performing 3D compression and
other 3d applications.

People with diabetes can have an eye disease called diabetic retinopathy. This is when high blood sugar levels cause
damage to blood vessels in the retina. These blood vessels can swell and leak.

This project is used to build a Robot for ball tracing using Raspberry Pi. Here this robot utilizes a camera for
capturing the images, as well as to perform image processing for tracking the ball. This project uses a raspberry pi
camera module as a microcontroller for tracing the ball and allows the Matlab code for image analysis.

This project is used to identify the human act by image processing in real time, and the main intention is to
communicate the identified gestures using the camera system. This system starts on recognizing the human act given
in the database as it transmits the activate signs to the camera arrangement for recording & storing the video stream
in the system.

A new approach towards automobile safety and security in an autonomous area is primarily expected on the
automotive system. Nowadays, an automobile drowsy driving accident has been increased. To overcome this
problem, here is a project solution namely driver alert system, which gives an alert by watching each driver’s eyes
while driving a vehicle.

An algorithm that covers both the boundary connectivity from background cues and foreground connectivity has
been proposed in this paper. This Proposed algorithm handles the limitations of existing object detection algorithms
effectively and accurately by working on the edges of the objects or images.

There are several types of morphological operations are available for the image processing. But, the image
processing can be done using the most common types of morphological operations based on the image shape such as
Erosion & Dilation. Here, Erosion is used to reduce the feature of an image whereas dilation is used to increase the
area and emphasize features of an object.

—Automatic estimation of salient object regions across images, without any prior assumption or knowledge of the
contents of the corresponding scenes, enhances many computer vision and computer graphics applications. We
introduce a regional contrast based salient object detection algorithm, which simultaneously evaluates global contrast
differences and spatial weighted coherence scores. The proposed algorithm is simple, efficient, naturally multi-scale,
and produces full-resolution, high-quality saliency maps. These saliency maps are further used to initialize a novel
iterative version of GrabCut, namely SaliencyCut, for high quality unsupervised salient object segmentation
A visual attention system, inspired by the behavior and the neuronal architecture of the early primate visual system,
is presented. Multiscale image features are combined into a single topographical saliency map. A dynamical neural
network then selects attended locations in order of decreasing saliency

An edge detection is important for its reliability and


security that delivers a better understanding of object recognition
in applications of computer vision such as pedestrian detection,
face detection, and video surveillance. This paper introduced two
fundamental limitations encountered in edge detection: edge
connectivity and edge thickness, those have been used by various
developments in the state-of-the-art.

In the kNN method we can change the percentage of data used for classification, the number of neighbors k and
choose to normalize the data before using it. Normalization of the data helps to improve the accuracy of kNN 7–9)
for prognosis and diagnosis. Usually, in the kNN method the similarity metric is based on the Euclid distance
extended to the number of components in the data. Changing this metric usually leads to improvements too

The significance of finding the minimum gene subsets is three-fold: 1) It greatly reduces the computational burden
and “noise” arising from irrelevant genes. In the examples studied in this paper, finding the minimum gene subsets
even allows for extraction of simple diagnostic rules which lead to accurate diagnosis without the need for any
classifiers. 2) It simplifies gene expression tests to include only a very small number of genes rather than thousands
of genes, which can bring down the cost for cancer testing significantly. 3) It calls for further investigation into the
possible biological relationship between these small numbers of genes and cancer development and treatment

The feature number of each data was reduced to 6 from 9 in the feature selection sub-program by means of forming
rules related to the breast cancer data with the C4.5 decision tree algorithm. After separating the 683 data set with
reduced feature number into training and test sets by 10 fold cross validation method in the second stage, the data set
was classified in the third stage with AIRS and a quite satisfying result was obtained

By using a evolutionary factor, a new switching PSO (SPSO) algorithm is first proposed and analyzed, where the
velocity updating equation jumps from one mode to another according to a Markov chain, and acceleration
coefficients are dependent on mode switching. Furthermore, a leader competitive penalized multilearning approach
(LCPMLA) is introduced to improve the global search ability and refine the convergent solutions

Gabor wavelet is used in face recognition successfully, so we use the Gabor wavelet to extract the amplitude spectral
of AEI, research the recognition ability of amplitude feature. The algorithm is tested in the CASIA Datasets B and
gain high correct recognition rates.

A flower image is segmented using a threshold based method. The data set has different flower images with similar
appearance .The database of flower images is a mixture of images taken from World Wide Web and the images taken
by us. The ANN has been trained by 50 samples to classify 5 classes of flowers and achieved classification accuracy
more than 85% using GLCM features only.

In this project we present a novel approach to image Þlteringbased on the SA-DCT. We use the SA-DCT in
conjunction withthe Anisotropic Local Polynomial Approximation (LPA) - Inter-section of ConÞdence Intervals
(ICI) technique, which deÞnes theshape of the transform.s support in a pointwise adaptive manner.The thresholded
or attenuated SA-DCT coefÞcients are used toreconstruct a local estimate of the signal within the adaptive-shape
support. Since supports corresponding to different pointsare in general overlapping, the local estimates are
averagedtogether using adaptive weights that depend on the region.sstatistics.
From time to time researchers have developed many techniques to fulfill secure transfer of data and steganography
is one of them. In this project we have proposed a new technique of image steganography i.e. Hash-LSB with RSA
algorithm for providing more security to data as well as our data hiding method. The proposed technique uses a hash
function to generate a pattern for hiding data bits into LSB of RGB pixel values of the cover image.

These transforms are applied in three different ways namely: column, row and full transform. From each transformed
image, specific number of low energy coefficients is eliminated and compressed images are reconstructed by
applying inverse transform. Root Mean Square Error (RMSE) between original image and compressed image is
calculated in each case. From the implementation of proposed technique it has been observed that, RMSE values and
visual quality of images obtained by column transform are closer to RMSE values given by full transform of images.

The food grain types and their quality are rapidly assessed through visual inspection by human inspectors. The
decision making capabilities of human-inspectors are subjected to external influences such as fatigue, vengeance,
bias etc. with the help of image processing we can overcome that. By image processing we can also identify any
broken grains mixed . Here we discuss the various procedures used to obtain the percentage quality of rice grains.

Histogram transformation defines a class of image processing operations that are widely applied in the
implementation of data normalization algorithms.Initially apply total variation (TV) minimization with a L1 fidelity
term to decompose the input image with respect to cartoon and texture components. Contrary to previous papers that
rely solely on the information encompassed in the distribution of the intensity information, in this paper, the texture
information is also employed to emphasize the contribution of the local textural features in the CE process.
The colorization-based coding problem into an optimization problem, i.e., an L1 minimization problem. In
colorization-based coding, the encoder chooses a few representative pixels (RP) for which the chrominance values
and the positions are sent to the decoder, whereas in the decoder, the chrominance values for all the pixels are
reconstructed by colorization methods. The main issue in colorization-based coding is how to extract the RP well
therefore the compression rate and the quality of the reconstructed color image becomes good. By formulating the
colorization-based coding into an L1 minimization problem, it is guaranteed that, given the colorization matrix, the
chosen set of RP becomes the optimal set in the sense that it minimizes the error between the original and the
reconstructed color image.
meenakshisharma.Projects Required= 150

Tools Room No. Contact No.

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab

Matlab
Matlab

Matlab

Matlab

Matlab

Matlab
Team Leader - Dr. Jaspreet Singh
F_No. P# Project Title Project Objectives (at least 3)

Performance Analysis of (RSA, DES, 3DES Implementation Encryption Algorithms (RSA, DES, 3DES and
1
and AES) for Information Security AES) for Information Security

Encryption & Decryption Using Deffie Implementation of Deffie Hellman Algorithm to encrypt and
2
Hellman Algorithm decrypt the network data

3 Digital Watermarking To Hide Text Messages Applying the technique in hiding messages into some images

Secure and Efficient Authentication Scheme Enable message authentications between messages travelling on
4
for a Network different network
Dr. Jaspreet Singh

Share large files securely with network nodes or with nodes


5 Secure File Sharing Using Access Control
1

outside the network

Text Encryption Using Various Cryptograhy Encrypting the text of nodes in network with various
6
Algorithms cryptography algorithm
Implementation and Comparative Analysis of Implementation of both algorithm to encrpt & decrpt data in the
7
RSA and MD5 Algorithm network

Applying the DOS attack in the netwok and securing the data
8 Preventing the network from DOS attack
from attack

Defending the network Against various Web Application


9 Defending Against Web Application Attacks
Attacks

Multi-User Authentication Protocol Authentication Protocol development for distributed


10
Implimentation environment

combines the features of both the algorithm in a efficient fiestal


11
structure to create an “un-crackable” encryption algorithm.
Hybrid AES DES encryption algorithm

Secure data store developement with removal The files and folder of a drive is checked for duplicacy and then
12
functionality of duplicate entries store with encryption

Share key after every periodic time interval using Diffie


Customized AES using one time pad And
13 Hellman and then AES will be performed for secure
Diffie Hellman Key Exchange
communication
n Anand
Secure Remote Communication Using DES
Er. Darpan Anand 14 Implementation of DES for Secure Communication
Algorithm
2

In order to accomplish the Hybrid encryption technique, data


encryption techniques using Fibonacci series, XOR logic, PN
15 Hybrid Technique For Data Encryption
sequence are analyzed and implemented their performance will
be measured

Story based captcha technique for avoiding


16 The general story is implemented for graphical captcha
DOS attack

Secure File Storage On Cloud Using Hybrid


17 Store the file on cloud using hybrid cryptography
Cryptography

Security Analysis of various authentication Various authentication protocols are analysed agains various
18
protocols using AVISPA attacks using AVISPA

Using MAC and IP, a key is generated to implement secure


Implementation of One time Pad using MAC
19 communication and then share the key for further
and IP
communication

Comparative analysis of AES, DES and RSA


20 Comparison based on factors like packets send and receive
for data security
A comparative study of cryptographic
21 Observing cryptography models, text encryption in block cipher
methods over block cipher

22 Implementation of DES Algorithm Based on different factors and implementation in java code
In the Project, once the email id and password is authenticated,
the user may proceed with next authentication section where
he/she need to select the type of authentication as QR (Quick
Response) Code or OTP (One Time Password). Once the user
selects the authentication type as QR Code, then system will
23
generate a QR Code and send it to user’s mail id over internet.
E Authentication System Using QR Code & If user select’s OTP, then SMS will be sent on his/her registered
OTP mobile number. If the user passes the authentication, then
Er. Shikha Atwal

system will redirect to the main page. The QR Code and OTP
are randomly generated by the system at the time of login.
Securing thenetwork aginst Distributed Denial Implementation of algorithm to preventthe network traffic
24
3

of Service Attacks against the attack

The project comprises of text password i.e. pass phrase, image


25 based segmentation password and graphical password for the
three levels respectively
Three Level Password Authentication System

Generate public and private keys at both ends for encrypting


26 Cryptography Security System
and decrypting data

Encryption & Decryption Using Deffie Implementation of the said Algorithm based upon various
27
Hellman Algorithm parameters
Denial of Service attack Detection and
28 Based on Multivariate Correlation Analysis
Prevention

IMPLEMENTATION OF DNA Implemenation of Bi-directional DNA Encryption Algorithm


29
4

CRYPTOGRAPHY IN a NETWORK (BDEA) is for data security

Digital signature authentication for providing security to


30 Implementation of DSS Algorithm
network

31 Authentication Kerberos System Requesting access from server

32 analysis of AES and DES for data security Comparison based on factors like packets send and receive

Assesment of SHA-3 Algorithm on varios


33 various versions of SHA-3
5

parameters

used to embed the information into image and can be efficiently


34 Digital Watermarking To Hide Text Messages
extract back the information
Steganography embeds a secret message inside an innocent
35 Hiding Data using Steganography
looking cover medium, stealthily, without creating any attention

Online Transaction Fraud Detection using to restrict and block the transaction performing by attacker from
36
Backlogging on E-Commerce Website genuine user’s credit card details

Intrusion detection system implementation for


37
securing systems from DoS attacks

Privacy-preserving protocols for


38
communication in IoT devices

Data access control in for securing network


39
communication

40 Defenses against advanced botnet


Er. Parminder Singh

Dynamic access control policy for bitcoins'


41
6

Blockchain
Er. Parminder
6
42 Secure multipath routing protocols in WSNs

Elliptic Curve Digital Signature Algorithm


43
(ECDSA) implementation

Big Data Analytics Data-driven information


44
security approach

Data Security in SDN Based on Diffie


45
Hellman and Elliptical Curve Cryptography.

- Protecting from Man in the Middle Attack


Protecting the DoS attack on Software define
46 - Maintaining Quality of Service
network
- Ensuring secure transmission

- Protection from STRIDE


Providing Transport level security on
47 - Maintaining Quality of Service
Software define network
- Ensuring secure transmission

In the Project the secret message is divided into two parts after
which the message the first half of the message is encrypted
48
Sugandhi Midha

using AES and the second share of the message is embedded in


High Security Encryption Using AES & Visual the image using LSB.
Cryptography
7
Sugandhi Midha
7
49
Network Traffic Monitoring & windows
Remote Manager

Algorithm looks forward to identify and detect and control


Prevention of Network from Congestion
50 unresponsive flow of traffic, just at the border of the network to
Collapse
make network more secure against attacks

Encryption - decryption of data for secure


51 - Protecting information from attacks
network traffic
Project Description (at least 25 words) Tools/Technology/Framework

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++
Java/C++

Java/C++

C++

Java

Java

Java

Java
Java

Java

Java

Java

AVISPA/Linux

Java

Java/C++
Java

Java

Java

Java

Java

Java

Java
Java

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++
Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++
Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++

Java/C++
Java/C++

Java/C++

Java/C++
Project
Name
Team Leader - Dr. Amandeep

S.N F_N
F# PROJECT NAME OBJECTIVES
o. o.

1) Project can decide what emotion a text is written.


2) Analyze the content that people share over social media.
1 Sentiment Analysis
3) Detect and respond to the positive or negative comments
that people write.

Create a summary with the major points of the original


2 Text summarization document Abstractive approach by writing your own summary
Extractive approach by selecting pieces of text from original.

Predicting the rating a user will give on a movie Rating the


3 Movie Recommender movie using the movies that user has rated in the past, as well
as the ratings similar users have given similar movies.
· Choosing a type of text format that typically contains useful
information, but in written language.
· Building a system that extracts relevant information for
4 Information Extraction products being offered for sale, such as the price, make, model,
etc.
· Your system will read the sentences and extract the key pieces
of information automatically.
· Classify literary work based on nationality.
Classification of literary work
5 · Identify dominance of country on literature
based on nationality
· Identify difference in writing.

· Building system that automatically answer questions posed by


humans in a natural language.
A natural language system for
6 · Simulation of facts contained in the sentences using a
Gursimran(7544)

question and answer


description of real objects as well as actions and events
connected with these objects.
1
Gursimran(7544)
1

· Prediction of prices based on past experiences.


7 Predict stock prices Technical Analysis like reading the charts and using statistical
figures to identify the trends in the stock market.

A system for natural language · Methodology based on multilingual grammar


8
translation · Translation on rule writing principles.

· Prediction of next words on the basis user’s writing style.


9 Next word prediction · Creating corpus of words of similar meaning for better
vocabulary.

· Dividing documents into coherent sections


· Identifying topic boundaries and performing topic
10 Topic Segmentation
segmentation.
· Implementing segmentation on various documents of corpora.

· Detecting quotation families.


11 Quote Clustering · Identifying quotes and categorizing them.
· Analyzing variation in pattern of quotation

· Transliteration of words of one language to the other.


Natural language transliteration
12 · Identification of alphabets for words of the language.
system
· Meaning of the sentence to be retained
1) To replace the existing system which is more time
consuming by making a web application for managing various
activities.
2) To provide quick and efficient way for gathering student
13 Hostel Management System
information along with their fees, rooms and finally check-in
and check-out.
3) To provide an online platform too students for posting their
complaints.
1) To maintain a centralized repository of information about all
activities regarding a library.
14 Library Management System
2) The software keeps track of all the information about the
books and their complete details.

1) To provide an interface through which student can appear for


examination online.
15 Online Quiz System
2) Answers will be checked automatically by the system from
the database.

The objective of the project is to enable jobseekers to place


16 Online Job Portal their resumes and find appropriate jobs while companies to
publish their vacancies and find good candidates.

The main aim of this free online notice board project is make
17 Digital Notice Board information dissemination much easier in a paperless
community.

1) To develop a system that will surely satisfied the customer


service.
18 Food Order & Delivery App 2)To design a system able to accommodate huge amount of
orders at a time
3) To automatically compute the bill.

1) The objective is to reduce paper work and provide a interface


for leave application and approvals.
19 Leave Management System
2) The periodic crediting of leaves is automated.
3) Features for cancellation of leave is also there.

An area for faculty posting of class materials such as course


20 Course Management System
syllabus, assignments and handouts.
· 1) Promoting a service or product online.
21 Online Shopping Website · 2) Selling a product online.
· 3) Providing product support or customer service.

The main objective of the application is to automate the


22 Bus Reservation System existing system of issuing tickets so that each customer can
Ritika (8244)

look ticket at his or her place.

23 E-Library To make online information retrieval system.

1) To provide solution for hotel to manage most there work


using computerized process.
24 Hotel Reservation System 2) This software application will help admin to handle
customers information, room allocation details, payment
details, billing information etc.

The objective of the e-VOTE project is to design, implement


25 Online Voting System and validate an Internet Based Electronic Voting System (e-
VOTE) .

Online Time-Table Generation To manage the details of Timetable, faculty, subject, student,
26
System course.

To improve the interaction of the students with the school


27 Student Record System environment, the transportation system coordinates all efforts
with the student management system
To provide the opportunity to students to provide his/her views
28 Student Feedback System
freely without fear disadvantaged.

29 Online Discussion Forum To provide an online platform for discussions.

To design a system for better patient care & provides MIS


30 Hospital Management System
(Management Information System)

31 Online Taxi Service To connect passengers with drivers who have a car.

1) To keep track of inventories so that customer’s demand


32 Inventory Management System should always be met.
2) To avoid both overstocking and under-stocking of inventory.

Temporal Information To identify the temporal expressions in the given natural


33
Recognition System language text.

To prepare different graphical representations of common data


34 Data Visualization
sets
p(8858)
To provide a platform to view the events carried out in an
35 Year Book
Amandeep(8858)
organization annually

To identify the first name and last name mentioned in the given
36 Person Name Classification
text

Marking up a word in a text as corresponding to a particular


37 Grammatical Tagging
part of speech, based on both its definition and context

To determine which meaning of word is activated by the use of


38 Word Sense Disambiguation
word in a particular context in a sentence.

(a) To design algorithms to classify text into organized groups


by using a set of handcrafted linguistic rules. (b) To assign tags
39 Text Classification
or categories to text according to its content. (c ) To compare
accuracy of various proposed algorithms.

(a) To design algorithms to recognize and understand spoken


words, by digitizing the sound and matching its pattern against
40 Speech Recognition
the stored patterns.
(b ) To compare accuracy of various proposed algorithms

(a) To design algorithms to automatically convert one natural


language into another, preserving the meaning of the input text,
41 Language Translation
and producing fluent text in the output language.
(b ) Comparing Performance of various proposed algorithms.
(a) To design algorithms to summarize text present in a
document into organized groups by using a set of handcrafted
42 Document Summarization
linguistic rules. (b ) Comparing Performance of various
proposed algorithms.

(a) To Design Algorithms to generate Captions for Various


43 Caption Generation Images. (b ) Comparing Performance of various proposed
algorithms

(a) To design algorithms to predict Stock Market Trends. (b )


44 Predicting Stock Market
Comparing Performance of various proposed algorithms.
Kanika (8485)

(a) Design models to predict a disease outbreak using social


45 Predicting Disease Outbreak media tags to prevent it in time. (b) Comparing Accuracy of
various models.

(a) To Design Algorithms to predict weather conditions in


46 Weather Forecasting advance. (b) To compare performance of various designed
algorithms.

(a) Design models to predict the voting outcome using social


47 Predicting Voting Outcome media trends. (b) To compare performance of various designed
models.

(a) Design Algorithms to perform language modelling. (b) To


48 Language Modelling
compare accuracy of various algorithms.
(a) To Design Models to perform clinical trial reports analysis
Intelligent Data Analysis of to understand the importance & effects of various new drugs
49
Clinical Trials available in the market. (b) To compare performance of various
models.

(a) To design various models to predict gadgets trends using


Predicting Gadgets Trends
50 social media data analysis. (b) To compare accuracy of various
through Social Media Analysis
designed models.
DESCRIPTION Tools

Sentiment analysis is an application of Natural language processing.


This project will help to identify comments as positive or negative RDF/OWL
based on the data set used for training.

Text summarization is a part of grammar of any language. The


proposed system will automatically summarize the important points RDF Sentence graph/OWL
of any document provided.

The proposed system will give ratings to movies based on user


RDF graphs/OWL
reviews and recommend movies to user as per their previous interest.

The proposed system will extract information from a set of


documents. The information can be offered for sale like price, model, RDF/OWL
profit etc

The project uses NLP techniques to classify literary works according


RDF/OWL
to the nationality of their work.

The proposed system will give answers to question of a user in natural


RDF/OWL
language as the topic selected.
The proposed system will predict the prices of stock of some
RDF/OWL and deep learning
organization on the basis of data set provided.

The system will convert a document or given set of sentences from


RDF/OWL
English to natural language or vice versa.

The proposed system will identify the writing pattern of the user and
values from data set provided. According to the writing style of user, RDF/OWL
next word is predicted.

The proposed model is application of information extraction. RDF/OWL

The proposed system will identify the quotes in the documents and
based on the data set will categorize the quotes for further RDF/OWL
applications like parapharasing.

The proposed system will help to transliterate the words of one


RDF/OWL and decision trees
language to the other and also retaining the meaning.

Hostel Management System is software developed for managing


HTML, CSS, JavaScript, PHP
various activities in the hostel.
A library management system, is an enterprise resource planning
system for a library, used to track items owned, orders made, bills HTML, CSS, JavaScript, PHP
paid, and patrons who have borrowed

Online Examination System provides an interface for conducting


HTML, CSS, JavaScript, PHP
online quiz.

Job portal is a web application developed for creating an interactive


HTML, CSS, JavaScript, PHP
job vacancy Portal for candidates.

Online notice board is web application developed to improve the


HTML, CSS, JavaScript, PHP
usage of notice board of the college by making it available online.

It’s a web application providing you facility for ordering your food
HTML, CSS, JavaScript, PHP
online.

The project is aimed at developing an online platform to handle entire


HTML, CSS, JavaScript, PHP
leave process.

A course management system (CMS) is a collection of software tools


HTML, CSS, JavaScript, PHP
providing an online environment for course interactions.
The Online Shopping System (OSS) is a web-based application. Its an
HTML, CSS, JavaScript, PHP
online store that delivers your products.

Bus Reservation System is designed to automate the online ticket


HTML, CSS, JavaScript, PHP
purchasing through an easy-to-use online bus booking system.

An electronic library is allows users, to read or refer any published


HTML, CSS, JavaScript, PHP
items from their residence or office or college via internet.

It’s a web application providing facility for online booking of hotels. HTML, CSS, JavaScript, PHP

Online Election System is a voting system by which any voter can use
HTML, CSS, JavaScript, PHP
his/her voting rights from anywhere in the country.

Time Table Generator is a web based application which is used to


HTML, CSS, JavaScript, PHP
manage the timetable

Effective student record systems use computer technology to maintain


longitudinal information about individual students served within an HTML, CSS, JavaScript, PHP
education system.
Student Feedback System provides a platform to students for posting
his/her feedback (views) and also receives information on results of HTML, CSS, JavaScript, PHP
the feedback provided.

Online discussion forum is a website places under which members


HTML, CSS, JavaScript, PHP
can start their discussions or posts online.

A hospital management system designed to manage all the areas of a


hospital such as medical, financial, administrative and the HTML, CSS, JavaScript, PHP
corresponding processing of services.

Online Taxi service provides a platform for passengers to book their


HTML, CSS, JavaScript, PHP
cabs, manage their bookings, cancel their bookings online.

Inventory management software is a software system for tracking


HTML, CSS, JavaScript, PHP
inventory levels, orders, sales and deliveries.

The problem of temporal information extraction refers to


identification of the temporal expressions from free format English
Any Classification NLP toolkit
document. Temporal expression can be very useful in the applications
like question answering, search exploration, text summarization etc.

Data Visualization has vast applications in the data science related


projects. It helps in the evaluation of data by creating different Java
representations.
Every year, for each institution it is a part of the curriculum to
showcase the tasks, achievements completed by students and teachers. Java
This project will keep the record of such events.

The problem of classifying person names in the given text is a


classification problem that has many applications in question Any Classification NLP toolkit
answering, information extraction and information retreival.

POS tags have been used for a variety of NLP tasks and are extremely
useful as they provide linguistic signal on how a word is being used Any Classification NLP toolkit
within the scope of a phrase, sentence, or document.

Word Sense Disambiguation (WSD) is a procedure of selecting the


precise sense or meaning for a word in a context. WSD is an essential
task in computational linguistics for language understanding Any Classification NLP toolkit
applications such as information retrieval, question answering,
machine translation, text summarization etc

Text classification is the task of assigning a set of predefined a. Rule-based systems


categories to free-text. Text classifiers can be used to organize, b. Machine Learning based systems
structure, and categorize pretty much anything. c. Hybrid systems

Speech recognition is the interdisciplinary subfield of computational


Various Deep Learning Models like RNN,
linguistics that develops methodologies and technologies that enables
CNN provide insights for performing
the recognition and translation of spoken language into text by
speech recognition task.
computers.

Language translation is a sub-field of computational linguistics that Various Deep Learning Models like RNN,
investigates the use of software to translate text or speech from one CNN provide insights for performing
language to another. Language Translation task.
Text summarization is the process of creating a short and coherent a. Neural Network b. LSTM c. Bag of
version of a longer document. Words Model

a. Weighted Training Models b. Reference-


Captioning an image involves generating a human readable textual
based LSTM model c. Neural Captioning
description given an image, such as a photograph.
Model

Predicting how the stock market will perform & potential to unearth
patterns and these can be used to make unerringly accurate a. RNN b. CNN + LSTM
predictions.

Prompt detection is a cornerstone in the control and prevention of


a. Google Geolocation API b. Scikit-learn
infectious diseases.

Weather forecasting involves predicting the conditions of the


a. Neural Network b. LSTM
atmosphere for a given location and time.

Understanding voters' behavior can explain how and why decisions


were made either by public decision-makers, which has been a central a. RNN b. CNN + LSTM
concern for political scientists.

The goal of a language model is to compute a probability of a token


(e.g. a sentence or a sequence of words).
a. Neural Network b. RNN
Language Model (LM) actually a grammar of a language as it gives
the probability of word that will follow
Clinical trials data management system has been used in the analysis
and reporting of drug trials, in a diversity of pathologies and study a. Neural Network b. LSTM
designs, with all types of outcome measures

Predicting Trends involved in Gadgets through social media tags and


a. Neural Network b. RNN
status analysis to understand customer's taste & needs.
(b ) Comparing Performance of various pro
(b ) Co

F# F_N Project Name Project Objectives (at least 3)


For maintaining an account of every direct tax transactions made
online. Making reports of payments and storing the receipts of the
Online Tax Information System direct taxes paid. To smoothen Tax Accounting procedures between
the authorized banks and their branches

The main objectives of query processing in a distributed


Query Redressal System environment is to form a high level query on a distributed database.
2. query optimization

1. Student can easily get any information or notification issue in


college which doesn’t require any room physically.
Sms based student intimation 2.Provides effective communication channel between the college
and the student. 3. Availability of information from a
single code.

1.Support multiple types of question papers


2.Generate individual language wise question paper.
question paper generator 3. At a time generate multiple copies with also type wise generate
like A, B... (Numeric, Alphabetic, Roman)and custom format also.
4. Question and option shuffle functionality.
(i) To assess the earning capacity or profitability of the firm.

(ii) To assess the operational efficiency and managerial


banking statement analysis effectiveness.
Gurmeet kaur saini

(iii) To assess the short term as well as long term solvency position
1 of the firm.
Gurmeet kaur saini
1

Maintain individual Student record.


Campus selection system Maintain Section wise Student details.
Evaluating Student performance.

To promote Indian Mathematics.


vedic mathematics learner To enhance computation skills in students.
Improve clarity on mathematical concepts.

1.Automatic Timetable manger is a Java based software used to


generate timetable automatically.
time table creator 2. Proposed system will help to generate it automatically also helps
save the time.
3. There is no need for Faculty to worry about their timetable.

This project is aimed at developing a Web application that depicts


Online Vehicle Showroom and booking vehicles through online.
Vehicle showroom Management
Customer can register to this site and he/she can book. vehicles by
system
entering his login information. Administrator is main user of this
system and he can add employees, and new vehicle details.

The system uses visual cryptography which enhances the security


level of the system.
Preventing Phishihng Attack on
The system will not allow the voter to vote two or more candidates.
Voting System
The system will allow the user to vote for one time for a particular
election

1. To perform simple tasks using simple operations like


multiplication and division.
Build a Scientific Calculator
2. To perform Scientific calculations.
1. A successful Rock, Paper, Scissors app can be created using
randomized parameters.
2. You
Build your own Tic Tac Toe
can even use the program as a Tic Tac Toe teacher of sorts,
expanding
1. Deliverythe amount
charges of teachable
cost’s similar tomoments you
the cost of canfood,
your achieve
it iswith
this project.
probably a bad deal. Thus, this app will help consumers to find a
suitable and cheap food delivery service which is affordable.

Online Food Delivery

2. The consumer can fill in the required information like


location preferences, choice of food and consumer’s detail to get
1. Application
their choice of idea
foodisdelivered
to alert the people
to their about any storm or disaster
doorsteps.
to avoid calamities.
Disaster alert 2. This app can work on GPS
and inform the user about the affected area of any storm or any
other activity.
Deepti

2 1. Most of the persons, mainly men do not know how to cook with
the right.
2. This intelligent
cooking app will help these people to cook for themselves even if
Intelligent cooking app
they don’t know how to.
3. This app will ask for
the availability of ingredients and shows an appropriate dish which
can be made using only those ingredients
1. The user will be able to set an alert which would immediately
inform the police about any theft activity around their location.
Anti-theft app 2. This
app can include a database in which users can provide the
information about criminal activity in their locations.
1. This app will give the user access to monitor over their security
systems via Wi-Fi.
2. This will also allow
Security control via Wi-fi them to answer the people at the door, monitor camera footage, or
any other activity to keep them and their house safe.
3. This can all be accessible
through their smartphones.
1. During rush hours the user can easily access parking spots which
are near to them.
Smart car parking
2. This parking app will enable users to find a
parking spot according to GPS which is not taken by any other
driver.

To create new accounts , Credit and Debit from an account,


Internet Banking System
suspending an account

Door to Door: A Courier service

Auto Responder

ShopITT-online gadget shopping

Online Blood Bank Website


Automatic question paper setter

Online Blood Bank Website

Online Auction site

JOpenIT

online mentoring solution

Cloud library
Machine learning methods for
span or ham e-mail

IFreeLancer

Remote Approach for effective


task execting and data accessing
tools

Android Community App

College Recomender System

restaurant recommender system


Intrusion Detection System

E-COPS

BARCODE GENERATION

Noise Reduction By Fuzzy


Image Filtering

Automated ballot vote

Company Mailer
QR Code Scanner

Placement Record Generator

Online Programing Evaluation


in various languages

Online Project Allocator

Implement BLOWFISH to
perform Encryption

Intranet Chatting
Vijay Kumar

3
Mobile Sampling of Sensor
Vijay Kumar Field Data

Data Leakage Detection

Multi-Lingual Website

Improving Utilization Of
Infrastructure Clouds

Digital Encryption System

Virtual Office Management


Personal Authentication Based
On Iris Recognition

Wireless Health Care System

Pre-paid Recharging System on


Banking

E-Filling ITR

Credit Score Evaluator

Online Word to PDF Converter


Online Programming
Accressment Tool

Share Trading Terminal

Medicine Recomender System

Twitter Analyzer

PPF Analyzer

SIP Analyzer
Web Enabled Automated
Manufacturing System

Citizen Card System

SMS Based Mobile Banking

UPI Payment Server with App

Jcoin using Blockchain

Ecurrency Invester
Unique Social Security Number
Manager

Content Management System

Youtube Analyzer

Search Engine over intranet

To Keep the records of employees working in a firm. To access their


Employee Record Manager
performance

E-Biller To register a biller. An Auto bill pay feature with scheduler.


8085 Compiler To create a simulator for 8085 programming assembler

.To coordinate interactions between employees and software


applications, ensuring that the flow of processes and work across
automated and human tasks are properly kept in sync.
Workflow Management System
• To prepare database to store information of employee.
for MNC
• To coordinates the operation of individual components that
constitute the workflow
• To help in creating and managing a data repository of the
inventory pertaining to the hardware and software of IT resources in
an organization.
Digital Asset Management
• To manage related documents of all employees which will be
System
saved with security and authenticity.
• To register employees, save all related infrastructure items
• To provide a solution to make payment of the Bills and
recharge the mobiles using a single window system
• To access the data at the server and retrieving the data from the
database.
Mobile Payment System
Gurmeet kaur saini

• If the customer is facing issues in Online payment or other


transactions he/she should able to register Complaint to the
Administrator to the system.
4
• Reduces the manual workload.
• Complete details of the student can be stored and retrieved.
• If the user is facing issues in payment or other transactions
Student Management System
he/she should able to register Complaint to the Administrator of the
system.
• To automate the process of project submission. Complete
details of the student can be stored and retrieved.
• To reduce the physical efforts of students meeting the head of
the department and also reduce the time frame period of completing
Online Project Approval System this part of project work.
• To update the project status of students weekly and provide in
for regarding the progress, which will be monitored by all relevant
professors and head of departments.
• To provide information to the students on time.
• To reduce the physical efforts of students meeting the head of
Information Pool System
the department and also reduce the time frame period

The project’s main objective is to control or manage the activities


and duties to be preformed by various event conductors such as
Event Management System attendees, organizers, event reviewers, and authors.This overall
increases management productivity, eliminate paper works, reduce
manpower, and prove to be very economical in the long run.
Online Rental House Web Portal is an internet portal dedicated to
meet every aspect of the consumers needs in the Real Estate
industry. It is a forum where Property Owners, Brokers, Tenants and
Investors can exchange information, quickly, effectively and
Online Rental House Web Portal
inexpensively. It features commercial and residential properties for
sale rent and lease the fore properties, rates, locations, property
news and also major events and happenings in the genre are the
highlights of this portal
eTutor is an online tutoring program ran by qualified live tutor's
online perfect for your children to enhance their education online.
E-Tutor
Online tutoring is an easy way to teach students and to let them
have fun while learning.

This project aims to build an Online Exam Suite that can be used to
conduct an exam and present results in the absence of an invigilator.
This system will eliminate the need for institutions to post
Exam Suite
invigilators, collect and grade answer sheets, and will keep the
whole process
Sometimes yousecure. There are
come across twoproblems
small mannerswhere
in which
youquestions
to need
can be posted:Fixed
consult doctors aboutquestion set and
your health Uniqueorquestion
problems sets ones
for the nearest
and follow their prescriptions. Online Doctor System will provide
you the power of direct interaction between doctors of your choice
as and when required for your small problems. Using this web
Doctor Online
Amrita Chaudhary

Online Doctor System applications, patients will able to fill online


form in just few seconds before entering to the virtual office room.
It will also enable you to upload your lab results such as x-ray
5 copies, health history etc which can be viewed by your referred
doctors.
Amrita Chaudhary
5
The system proving the real estate agencies, commercial
Online Real Estate Property contructions agencies, property management company.This helps
Management customer to save time and get right business solution for your
business.

The main aim of this project is to store the result scores of students,
process the scores in user-defined way and produce their results in
Grade Processing System the form of report cards or other analysis charts. In this web-based
software, both grading pattern and examination pattern are user
configurable.
Farmer’s buddy for farmers to know which season is better for
which crop and what soils are used for crops these are clearly
known in this application. In this application, the admin will log in,
Farmers Buddy add seasons, season time and what soil suitable for what crop also
admin add the all the necessary details. Admin can view the user
queries if any registered user sends the query to the admin and
admin sends the solution to the user.
This system provides online technical services to its customers on a
24×7 basis. The whole process involves writing large volume of
Online Customer Care and data in registers and preparing several reports daily. This ‘Call
Service Center Center cum Service Center’ manages all the online queries, all the
records of their customers, services details as well as provides
technical support.
The Blood Donors Symbiosis project is programmed in order to
help the humans or patients who are seeking blood at a particular
Blood Donors Symbiosis location. it also maintains a centralized database to store
information related to blood donors and blood providing
organizations.

· To Maintain individual student record,· To Maintain section wise


Campus Selection System
student details,· To evaluate student performance
• To help the patient seeking blood at particular location.
• To donor’s who are interested in donating blood can register
Blood donation agent system here.
• To maintain the database

• To assist people making purchase online


• To sell goods and services online
E-Gift Shoppe
• It provide high level of security with type of authentication..

• Creation of Online Fast Food is the slice unit which caters to


customers who want to avail of quick food service
• It provide high level of security with different level of
Online Fast Food authentication.
• User friendliness is provided in the application with various
controls.

• It provide high level of security with different level of


authentication.
Student Record System • To provide useable and well defined interface
Harish Bedi

6
• It provide high level of security with different level of
authentication.
Document Manager
• To provide central repository for maintaining the documents

• It provide high level of security with different level of


authentication.
Career path • To develop online search portal for the placement details for
job seeker.
• It provide high level of security with different level of
authentication.
• To provide online training to employees of the company
Learning made Easy
• To generate question paper automatically by the server at run
time

• It provide high level of security with different level of


authentication.
Easy leave System • To save the time of employee
• A person see his/her eligibility details regarding leave

• It provide high level of security with different level of


authentication
Get a Coder • To find the coder of respective technology easily
• To solve the problem of various user at cheaper rate
Project Description (at least 25 words) Tools/Technology/Framework

Online Tax Accounting System is used for collecting information and


maintaining records of taxes paid online through a network of bank
branches.
ASP.Net

The Query Redressal System is designed for the customers of the Global
Bank. Through this system, the bank will manage the complaints from
the customers and provide the better services for their customers.J
ASP.Net

It is a real time monitoring system which allows parents to check


attendance and academics records of their ward. It also helps to college
administrative people to maintain student related information.
ASP.Net

A simplified and easy to use solution to create question papers. With


question Paper Generator Software entire tedious task of manual
question paper creation is eradicated swiftly and efficiently.
ASP.Net

ASP.Net
The Online Campus Selection System developed for HR Department
with including automate the functioning of HR Department. This system
is helpful for HR Department to make easy student selection process. We
can say this system similar to Human Resource Management System
ASP.Net

The basic of Vedic Mathematics is to make mathematics easy and


interesting. After attending the program, students become conceptually
strong inMathematics and able to solve complex mathematical problems
faster and easier.
ASP.Net
Timetable Generation System generates timetable for each class and
teacher, in keeping with the availability
calendar of teachers, availability and capacity of physical resources (such
as classrooms, laboratories and computer room) and rules applicable at
different classes, semesters, teachers and subjects level
ASP.Net

ASP.Net
Visual Cryptography (VC) aims at providing a facility to cast vote for
critical and confidential internal corporate decisions. It has the flexibility
to allow casting of vote from any remote place. The election is held in
full confidentiality by applying appropriate security measures to allow
the voter to vote for any participating candidate only if he logs into the
system by entering the correct password which is generated by merging
ASP.Net
the two shares using VC scheme
• Providing proper technical assistance to the user
• Automates the selection process activities that the HR Department
has to perform prior to and after the actual act of selecting the ASP.NET using c# or VB.net
employees.
it helps the needy person who r in need of blood of any group. ASP.NET using c# or VB.net

• It provide the user with a catalog of different types of gift available


ASP.NET using c# or VB.net
for purchase in the store

• This was conceptualized precisely for people on the go, individual


ASP.NET using c# or VB.net
who want to eat pizza without the usual waiting time.

It provide usTo maintain record of students, the courses and modules on


ASP.NET using c# or VB.net
which they are registered. To store the information at one place

It provide single file uploads & bulk file uploading, it provides us better
ASP.NET using c# or VB.net
place to store all documents together

It will help Job seekeers to upload their information in the form of cv,
Visitor /company representatives logging in may also access/search any ASP.NET using c# or VB.net
information put up by job aspirants
Any employee interested to undergo training should be able to register in
desired course.Employee is allotted fixed amount of timeduring which he
ASP.NET using c# or VB.net
is supposed to complete training.

it gives us better way to see the leaves ledger and apply leave online. ASP.NET using c# or VB.net

Get a coder is online easy way to find the best coder. it helps us in saving
ASP.NET using c# or VB.net
time and money.
Team Leader - Dr. Nishtha

F_N Sr.No. Project Name

1 Movie Recommendation using content


based filtering

Sentiment Analysis Using Semi-


2 Supervised Recursive Autoencoders and
Support Vector Machines
Sugandha

1 3 Identifying Gender From Facial Features.

4 Bird Species Identification from an Image

5 Weather forcasting
6 Higher Education Access Prediction

7 Heart Disease Prediction

8 Crime Prediction using ML

9 Stock Market Prediction


Raj Kumar

10 Weather Prediction using ML

Opinion Mining for Customer Restaurant


11
Reviews
Prediction of Product development cost in
manufacturing Industry

Students Result prediciton

12 Cervical Cancer Prediction

Food detection And Calorie estimation


13
Predictor

14 Depression Detection of Twitter Users

Prediction of Cardiac Arrhythmias disease


15
using ECG data
16 Crime Prediction

17 Object recognition

18 Weather forcasting

Stock prediction based recommendor


19
system using Twitter sentiment analysis
Nishtha Hooda

20 Air Quality prediction

21 Smart Filtering System


22 Recommendation engine on Netflix

23 Pneumonia detection

Predicting Customer Shopping Trends with


24
Market Basket Analysis

Social Media Sentiment Analysis using


25
Twitter /facebook/twitter Dataset. ..

Digital hospital Recommendation System


26

27 Dengue diseases spread prediction


Dectecting anomolies in usage in the term
28 of cyber security using Machine Learning
Techniques

Find the probability distribution matrix of


29
motif in genomic data.

Cluster the genomic data based on


30
occurence of motifs.

Cluster the documents based on the topics


31
they represents.

32 Detct the spam mails.


Ruchika Gupta

33 Onion price prediction Web Application


R
facial recognition with emotion & Age
34
identification of persons

35 Electricity load Forecasting in Home

36 Mood and Music Recommendation

37 Malaria Prediction

Human Activity Recognition using


38
Smartphone dataset

Social Media Sentimental analysis using


39
twitter dataset
40 Alexa Like Google Assistant using Python

Real-time face detection and


41 emotion/gender classification using CNN
model and openCV.

42 Cancer diagnosis using medical services

Human activity recognition using smart


43
phones

Facebook friend recommendation using


44
graph mining
Rohit Bajaj

Movie recommendation system using


45
Mood Analysis
Sales prediction using Machine learning
46
approaches

47 Voice Biometrics

48 Fake News segregation

Identify keywords from millions of text


49
questions

50 chat-bot

51 Siri Google Assistant in Hindi


Stock price Prediction using Machine
52
Learning

53 Spam detection using ML Algorithms

54 Diabetes prediction

55 Movie ticket pricing system

Social media recommendation using graph


mining
Jyoti Arora 1

Ebola virus diseases spread prediction


J
Siri Google Assistant in punjabi

Classification of Iris flowers using


supervised learning

Identify special symbols from millions of


text questions

56 prediction of climate change using ML

AUTOMATIC TEXT EXTRACTION


57
FROM CHEQUES/FORMS

BOTNET DETECTION USING


58
MACHINE LEARNING
SENSOR BASED HUMAN ACTIVITY
59
RECOGNITION

CROP DISEASE DETECTION USING


60
MACHINE LEARNING

CLASSIFICATION OF DISORDERs
61
USING ML

SOCIAL MEDIA SENTIMENT


62
ANALYSIS
GULBADAN KHEHRA

Face detection and recognition using deep


63
learning approaches

Stock market prediction by analysing the


64
news article.
GULB
65 Traffic estimation and prediction system

Real-time image-based parking occupancy


66
detection using deep learning

67 Credit Card fraud detection

68 Crime Prediction using face recogization

Malware classification using Deep


69
learning

70 Social networking site recommendations


stock trend prediction using machine
71
learning techniques

Analysis of the impact of training data size


72
based on market prediction accuracy

prediction based Risk and return analysis


73 of different market sectors of BSE and
NSE

prediction based portfolio optimization of


74
small cap and large cap companies.

Twitter sentiment analysis for stock


75
prediction.

Technical and fundamental analysis of


76
stocks to predict the future trend
Rashid
Predict the future market trend after
77
analyzing the highly correlated sectors.
Tousif Al Rashid

GDP growth prediction based on


8 78
commodity prices

prediction of future trend of sensex and


nifty after analyzing the trend of Nasdaq,
79
KSE, DSE, S&P 500,
Tehran Stock Exchange

movie recomendation system based on


80 new user's
details and movie rating

movie's rating prediction based


81
on user's mood and age

Group recommendation based on


82
movie genres, user's details
crop yield prediction based on weather
83
dataset

cancer prediction based on physician's


84
report

prediction of students performance using


85
educational data

Sales forecasting using e-commerce


websites datasets

Defect prediction using classification


algorithms

Social Media Sentiment Analysis


Amarpreet Kaur

9 77
Amarpreet Kaur
9 77 Credit Card fraud prediction

Churn Analysis for Modern Day Business


Leaders

Incentivize the Uber drivers based on


automative battery anlytics

Handwriting Recognition

83 Depression Detection of Twitter Users

Prediction of Cardiac Arrhythmias disease


84
using ECG data
85 Crime Prediction

vedio contant analysis and object


86
recognition

weather forcaste detection using time


87
series

stock prediction based recommendor


88
system using Twitter sentiment analysis

89 Air Quality prediction

90 Smart Filtering System


91 Recommendation engine on Netflix

92 Pneumonia detection
Yamini Singh

10

Predicting Customer Shopping Trends with


93
Market Basket Analysis

Social Media Sentiment Analysis using


94
Twitter /facebook/twitter Dataset. ..

digital hospital
95

96 dengue diseases spread prediction


Dectecting anomolies in usage in the term
97
of cyber security

Listen to Your Data: Turning Chemical


99
Dynamics Simulations into Music

Relationship Prediction for Scene Graph


100
Generation

GRAND DIGITAL PIANO: MULTI-


100
MODAL TRANSFER OF LEARNING

Heart Disease Prediction Using Adaptive


101 Network-Based Fuzzy Inference System
(ANFIS):

Structural Damage Classification for Post-


102
Disaster Recovery:
103 Sensex Analyzer

104 Player Analyzer

105 Fingerprint Recognition

Email Investigator(Text Anamoly


106
Detector)
Abhishek Sharma

11 107 Document Classifier

108 Social Media Sentimenter


109 Diagonistic Care

110 Speech based browser using NLP

111 Social Network Analyzer

112 Stock Price Predictor

113 Handwritten Text Recognition

114 Detecting Fake News


115 Predicting Wine Quality

116 Analyzing Movie Review Sentiments

Human Activity Recognition using


117
Smartphone Dataset

118 Spam Detection

119 Social Media sentiment analysis

Gender Identification using From various


120
features.
Geetika Sharma

12
Geetika Sharma
Recommendation engine on Amazon
12 121
Prime

HUMAN ACTIVITY RECOGNITION


122
BASED ON SENSORS

Vegetable price prediction Web


123
Application

Depression Detection of any Social


124
Networking Users

125 Bonemarow Cancer Prediction

126 Water load Forecasting in Farming


127 Prediction of stock market

Teach a Neural Network to Read


128
Handwriting

129 Mine Social Media Sentiment

130 Improve Health Care


132 Breast Cancer Prediction

133 SOCIAL MEDIA SENTIMENT ANALYSIS

134 Handwritten Text Recognition

135 Fingerprint Recognition


135 Fingerprint Recognition

136 NewsFeed Analysis

137 word cup Predictiom

138 chat bot


brain tumor prediction through eeg
139 images

environment prediction using time seires


140 analysis

human brian activity using machine


141 learning

142 hourse winnig bet prediction

143 loan credit card predition

Climate Classification Using


144 Landscape Images:
Machine Learning Techniques for
145 Distracted Drivers Detection:

Analyzing public companies in the life


sciences and designing an investment
146 portfolio
JASNEET KAUR

Detecting Credit Card Fraud with


147 Machine Learning:

Food detection And Calorie


148 estimation Predictor

Depression Detection of Twitter


149 Users

Prediction of Cardiac Arrhythmias


150 disease using ECG data
151 Crime Prediction

vedio contant analysis and object


152 recognition

weather forcaste detection using


153 time series

stock prediction based


recommendor system using Twitter
154 sentiment analysis

155 Air Quality prediction

156 Smart Filtering System


157 Recommendation engine on Netflix

158 Pneumonia detection

Predicting Customer Shopping


159 Trends with Market Basket Analysis

Social Media Sentiment Analysis


using Twitter /facebook/twitter
160 Dataset. ..

161 digital hospital

162 dengue diseases spread prediction


Dectecting anomolies in usage in
163 the term of cyber security
Project Objectives (at least 3)

1.Movie Recommendation based on Rating. 2.Filtering of movies based on different


categories. 3.Filtering on basis of Star-cast.

1. To evaluate the model’s ability to predict


sentiment distributions on a new dataset based
on confessions from the experience project.
2. To implement new algorithm for more accurate prediction of distributions over such labels compared to several
competitive baselines.
3.To propose a methodolgy for vector space
representations for multi-word phrases.

1. Gender prediction using face recognition .


2. Object detection based eyes and facial hair.
3.Prediction of gender using ML algorithms.

1. Identification of bird species based on feature extraction.


2. To understand the intricacies of different machine
learning algorithms and to learn which algorithm gives good results for which use case.

1. To analyze the dataset for Environment and Atmosphere.


2. To design and implement the prediction framework using a web application for Weather Forecast prediction.
1. Study of different higher education institues.
2. Prediciton of higher education access using ML algorithms

1. Study of different parameters for the hear diseases


2. Prediciton of heart diseaes using ML algorithms

1. Study of different types of crime


2. Study of the extisting techniqeus for the crime prediction
3. Crime prediciton using ML

1. Study of the history of different stocks.


2. Study of extisting techniques for the stock prediction
3. Pridiction of stocks using ML

1. To collect the data of weather forcasting


2. To study various existing ML Technique
3. Stock prediciton using ML

1. To collect and study data of cusotmer revievs.


2. Opinion mining using ML
1. To analyse the product development cost in manufacturing Industry
2. to predict the devlopment cost of the product using machine learning

1. To Analyse the previous result of the student


2. To pridict the students' resutl using machine learning

1. To analyze the dataset for Cervical Cancer.


2. To design and implement the prediction framework using a web application for cervical cancer prediction.

1. To analyze the dataset for Food and Diet Nutrition


2. To design and implement the prediction framework using a web application for calorie prediction.

1. To analyze the dataset for Twitter Users.


2. To design and implement the prediction framework using a web application for depression prediction.

1. To analyze the dataset for Cerdiac Arrhythmias.


2. To design and implement the prediction framework using a web application for disease prediction.
1. To analyze the dataset for Crime Detection.
2. To design and implement the prediction framework using a web application for crime rate prediction. to

1. To analyze the dataset for Object Movement.


2. To design and implement the object regognition framework using a web application for object recognition.

1. To analyze the dataset for Environment and Atmosphere.


2. To design and implement the prediction framework using a web application for Weather Forecast prediction.

1. To analyze the dataset for Stock Market.


2. To design and implement the prediction framework using a web application for stock Market Prediction.

1. To analyze the dataset for Environment and Atmosphere.


2. To design and implement the prediction framework using a web application for Air Quality Prediction.

To design and implement the prediction framework using a web application for Smart Filteration.
1. To analyze the dataset for Netflix Data.
2. To design and implement the Recommendation framework using a web application.

1. To analyze the dataset for Pneumonia.


2. To design and implement the prediction framework using a web application for Pneumonia Prediction.

1. To analyze the dataset for Market Basket.


2. To design and implement the prediction framework using a web application for stock Market Prediction.

1. To analyze the dataset for Social Website.


2. To design and implement the prediction framework using a web application for stock Market Prediction.

1. To analyze the dataset for Hospital.


2. To design and implement the prediction framework using a web application for Medical Diagnonis.

1. To analyze the dataset for Dengue Prediction.


2. To design and implement the prediction framework using a web application for Dengue Prediction.
1. To analyze the dataset for Cyber Crime.
2. To design and implement the prediction framework using a web application for Cyber Security.

To design and implement a framework for data analysis of genomic data

To build a clustering technique for detection of occurence of motifs in the genomic data.

To build a web application for clustering of documents on the basis of their similarity

To detect Spam mails using Ensemble Machine Learning Web Application

1. To analyze the dataset for Onion Price.


2. To design and implement the prediction framework using a web application for Onion Price Prediction
To build a web application for the prediction of the age of person using face recognition

1. To analyze the dataset for Load and Family members.


2. To design and implement the prediction framework using a web application for Electricity Load Forecasting

To design and implement a framework for prediction of mood of a person on the basis of facial expression and then
recommend musical songs

1. To analyze the dataset for Malaria Disease.


2. To design and implement the prediction framework using a web application for Malaria

To detect human activity using Python

To build an analytics application to analyze the twitter data


1. To analyze the dataset of google assistant.
2. To design and implement the Google Assistant framework using a web application

1. To analyze the dataset for Gender Detection.


2. To design and implement the prediction framework using a web application for Gender Classification

1. To analyze the dataset for Cancer.


2. To design and implement the prediction framework using a web application for Cancer Prediction

1. To analyze the dataset for Human Movement using Sensors.


2. To design and implement the prediction framework using a web application for detecting the activity of human

1. To analyze the dataset of Facebook.


2. To design and implement the recommendation framework using a web application by implementing Graph Mining

1. To analyze the dataset for Movies.


2. To design and implement the recommendation framework using a web application for referring movies accoriding to
the mood of the person.
1. To analyze the dataset for Sales of an organisation.
2. To design and implement the prediction framework using a web application for Sales

To build a biometric application using voice

To build a web application for Clustering the fake news on the website

To extract keywords using a web application from the text questions

To build a chat bot web application

To build a Siri-Like Google Assistant using Hindi Language


To analyze the dataset of stock marketing. To predict future stock rates

To analyze dataset and to analyze dynamic data amd detect the mail is spam or not according to positive and negative
values and words

to analyze the offline dataset from repositories. to predict the persons suffering from diabetes

to analyze movies related dataset and predict the prices of various categories of movie tickets

1. To analyze the dataset of any social media.


2. To design and implement the recommendation framework using a web application by implementing Graph Mining

1. To analyze the dataset for Ebola virus Prediction.


2. To design and implement the prediction framework using a web application for Ebola virus Prediction.
To build a Siri-Like Google Assistant using punjabi Language

to analyse the data set of Iris flowers and to apply different classification method under supervised learning.

To extract special symbols using a web application from the text questions

to analyze dataset of weather from previous years and predict tje future climate conditions

To analyze the dataset of cheques/forms and to extract the required text using Machine learning approaches.

To collect PCAP files dataset and detect DGA botnets by clustering the Non existent domains using ML.
To analyze the dataset of different activities collected using different sensors. To detect and recognize human activities
using ML approaches

To build disease detection model for crops using deep learning or machine learning.

To analyze the dataset of different disorders and classification of disabilities using ML approaches

To analyze the dataset of different social media applications .To build an analytics model using machine learning .

To detect and recognize faces by considering different facial features using Deep learning.

1.To analyze the dataset of news articles. 2. To predict the stock market based on the data analysis using Machine
leaning approaches.
To analyze data, especially real-time traffic data, from different sources. To estimate and predict traffic conditions using
Deep learning approaches.

To gather and analyze the dataset of Parking places.To reduce the congestion in crowded areas by providing real-time
indications of occupancy of parking spaces.

To collect and analyze the dataset of fraud customers by analysing their behavior, transactions, demographics data and
usage patterns. To build a model for credit card fraud detection.

1. To collect and analyze the dataset for Criminals.


2. To design and implement the prediction framework for criminal detection and crime rate prediction.

To collect and analyze different malware samples. To build a model that will classify and categorize different malwares.

1. To collect and anlayze data of cusotmer revievs and rankings.


2. To build a recommendation model for Opinion mining using various Machine learning approaches
To predict the future market trend (Bullish or Bearish) using various machine Learning Techniques

To analyse, how the chnaging of training data size can have impact on the market price prediction based on price
prediction accuracy

To analyse prediction based risk and return of invested money of various sectors of Bombay Stock Exchange and
National Stock Exchange

To choose best performing stocks which can return high profit in the future after analyzing small cap and large cap
companies.

To predict the stock price after analyzing the sentiment of twitter data.

To predict the future market trend after analyzing the market behaviour using various fumdamental and technical tools
To forecast the future trend after analyzing differnt companies of different sectors which are highly correlated

To predict the GDP growth of india based on the commodity prices

To predict the future trend of SENSEX and NIFTY after analyzing the stock exchanges of neighbour countries of India
And the U.S. stock exchange

To reccomend movies based on the data of user's details and movie rating

To predict , movie's overall rating based on user's mood and age

To recommend the types of movies users likely to watch after analyzing the movie genres and user's details
To predict the crop yeild based on weather dataset

To predict whether any patient do have cancer or not based on physician's report

To predict the student performance using the educational data

1. To analyze the data and data mining techniques.


2. To learn the machine learning by training and testing based on the datasets

To predict the defects in softwares from open source datasets library of NASA

To analyze the dataset based on various attributes and make recommendations


To predict the fraud customers based on the previous dataset.

Gather available customer behavior, transactions, demographics data and usage patterns Utilize these data points to
predict customer segments who are likely to churn Create a model to pattern the risk tolerance of the business with
respect to churn probability. Design an intervention model to consider how the level of intervention could affect the churn
percentages and customer lifetime value (CLV)

To recognise the handwriting of different users, based on the patterns to convert written text to a pdf or typed one.
Goal is to translate simulation data into a musical form in order to present a different way to interact with data.
Specifically, the goals are 1) to generate music, i.e. melodies that are indistinguishable from those composed by humans,
and 2) to have those melodies.

Scene graphs offer powerful representations of images, aimed at preserving information relating to semantic and spatial
relationships, as well as salient attributes of objects. We explore relationship prediction on dataset.

Aim to improve upon such methods by utilizing machine learning to train a physically-based model of an acoustic piano,
allowing for the generation of novel, more realistic sounds.

Approximately 610,000 people die from heart disease each year, which is equivalent to 1 in every 4 deaths. This study
attempts to improve prediction performance past that of existing prediction systems to further improve and save lives.
The input will be 10-13 features of medical data that are easily obtainable and typically used for heart disease diagnosis
and the output will be the prediction of heart disease.

The objective of project is to classify the damage type (i.e. no/flexural/shear/combined damage) and the damage level
(i.e. no/minor/moderate/heavy damage) of the structures, which is mainly assessed by human experience traditionally.
The classes of images change based on different datasets including binary classification and softmax classification.
Create a software to perform analysis of news and keep a track of its impact on
sensex values
Use RSS feed of various news channels to ensure better results
· Use Data Sets for extracting news

Sports betting... Predict box scores given the data available at the time right before each new game.
Talent scouting... Use college statistics to predict which players would have the best professional careers.
General managing... Create clusters of players based on their strengths in order to build a well-rounded team

Create a software for recognizing fingerprint from images stored in database.


· Ability to reduce the search time for selecting the pattern
· Ability to highlight percentage of similarity

Create a software to perform analysis of email sent on hourly basis on server and keep a track of its impact on abnormal
behavior of email text. · Use text recognition of various server to ensure better results
· Use Data Sets for extracting texts in email.

Create a software to classify documents based on predefined classes like sports,education, technical etc.
· Ability to select multiple files
· Ability to cluster similar kind of files in one folder

Mining this rich data can prove unprecedented ways to keep a pulse on opinions, trends, and public sentiment. Facebook,
Twitter, YouTube, WeChat, WhatsApp Design API Data streaming
Create a software/tool that automatically detects and classify image data, such as scans, x-rays, etc to detect disease
Treatment automatically adopted mapped to disease detected

Create a software for recognizing text from audio signals · Text recognition usingNatural Language Processing

Create a software for analyzing data sets stored in database. · Ability to find key influencers among network designers ·
Ability to highlight percentage of similarity of networks

The challenge of this project is to accurately predict the future closing value of a given stock across a given period of
time in the future.
Built a model to accurately predict the future closing price of a given stock, using Long Short Term Memory Neural net
algorithm.
This project utilizes Deep Learning models, Long-Short Term Memory (LSTM) Neural Network algorithm, to predict
stock prices.

It recognizes the text contained in the images of segmented words As these word-images are smaller than images of
complete text-lines, the NN can be kept small and training on the CPU is feasible.

If you can find or agree upon a definition, then you must collect and properly label real and fake news Once collected,
you must then find useful features to determine fake from real news. fields of machine learning (ML), natural language
processing (NLP) and artificial intelligence (AI) that could help us fight this situation.
The main goal of this machine learning project is to build a machine learning model to predict the quality of wines by
exploring their various chemical properties. there are several factors other than age that go into wine quality certification
which include physiochemical tests like alcohol quantity, fixed acidity, volatile acidity, determination of density, pH and
more.

From Netflix to Hulu, the need to build an efficient movie recommender system has gain importance over time with
increasing demand from modern consumers for customized content. One of the most popular dataset available on the web
for beginners to learn building recommender systems is the Movielens Dataset

To build a classification model that can precisely identify human fitness activities. The smartphone dataset consists of
fitness activity recordings of 30 people captured through smartphone enabled with inertial sensors.

To detect various spam to provide security.

Social media data today has become relevant for branding, marketing, and business as a whole.
A sentiment analyser learns about various sentiments behind a “content piece” (could be IM, email, tweet or any other
social media post) through machine learning and predicts the same using AI.
Twitter data is considered as a definitive entry point for beginners to practice sentiment analysis machine learning
problems.

Gender prediction using face recognition . Object detection based eyes and facial hair. Prediction of gender using ML
algorithms.
Prediction of Movies using ML algorithms.

To analyze the dataset of different activities collected using different sensors. To detect and recognize human activities
using ML approaches

1. To analyze the dataset for Vegetable Price.


2. To design and implement the prediction framework using a web application for Vegetable Price Prediction

1. To analyze the dataset for any Social Networking Users.


2. To design and implement the prediction framework using a web application for depression prediction.

1. To analyze the dataset for Bonemarow Cancer.


2. To design and implement the prediction framework using a web application for Bonemarow cancer prediction.

1. To analyze the dataset for WaterLoad required for various crops


2. To design and implement the prediction framework using a web application for Water Load Forecasting.
Second, the data can be very granular. You can easily get time series data by day (or even minute) for each company,
which allows you think creatively about trading strategies.

Neural Networks and Deep Learning (Online Book) – Chapter 1 walks through how to write a neural network from
scratch in Python to classify digits from MNIST. The author also gives a very good explanation of the intuition behind
neural networks.

With Twitter data, you get an interesting blend of data (tweet contents) and meta-data (location, hashtags, users, re-
tweets, etc.) that open up nearly endless paths for analysis.

There has recently been significant effort to alleviate doctors’ workload and improve the overall efficiency of the health
care system with the help of machine learning.
1. To analyze the dataset for Breast Cancer.
2. To design and implement the prediction framework using a web application for Breast cancer prediction.

To analyze the dataset of different social media applications and build an analytics model.

to anallyze the hand written digit in different cursive forms

To analyize the bio metric of heena handed person after c omparing with normal hand

to analyize the bio metric on the basis different environment


To extract the 10 year of tweets /records of news feed.

to analysie the tweets the tweets/ records

to predict the polarity of the news feed

predict the next world cup winnwr

customer support excutive/ chandigarh university excutive


to analalyse the system behviour and recommend on the basis of contant base filtering

to analalyse the system behviour and recommend on the basis of contant base filtering

to analyse the human brain activity predict the state of emotions

predict the winning hourse in the compitition

predict the empirial college of london dataset of loan/ credit card deafault prediction

Given an photo of a natural landscape we trained models to predict the Koppen-Geiger climate type depicted
in the image. While similar studies have attempted to use satellite imagery for this, few have directly used
groundlevel photos.
Distracted driving is a main factor that cause severe car accidents. It has been suggested as a possible
contributor to the increase in fatal crashes from 2014 to 2018 and is a source of growing public concern. This
project focuses on driver distraction activities detection via images, which is useful for vehicle accident
precaution. Aim to build a high-accuracy classifiers to distinguish whether drivers is driving safely or
experiencing a type of distraction activity.

Stocks of public companies in the biotech sector tend to be extremely volatile and largely dissociated from
traditional fundamentals (e.g. EPS, P/E ratio). There are numerous obscure factors that drive the valuation of
companies in the life sciences. We propose a deep learning-based investment strategy, which includes
diversification through clustering and portfolio construction by selecting stocks in each cluster based on Sharpe
ratio.

: Payments fraud is a significant and growing issue • More than $8 billion in in 2015; up 37% from 2012 • Key
challenge with fraud data is class imbalance.
Tools/Technology/Framework Project Description (at least 25 words)
To help the users cope with this information explosion,
companies have deployed recommendation systems to guide
their users. The research in the area of recommendation
Python and Big Analysis systems has been going on for several decades now, but the
interest
Being able stilltoremains highidentify
accurately because of the abundance of
practical
sentiment from online textthe
applications and problem
allows rich domain.To
businesses help user
to better understand
to pick the best movies as per
their customers. It gives businesses their choice.
invaluable insight about what were the pain points
in their products and services, what potential improvements can
Python they make on their products and
services, and etc. Because of its potential to obtain
high-level insight from large amounts of data, sentiment analysis
has applications in various domains
.Automatic
Sentimentface analysis can be used
recognition aims to
to summarize
extract these meaningful
user reviews
Identification on
pieces of information review-related sites
and putisthem
of bird species together into
a challenging taska often
usefulresulting
Python representation
in ambiguous labels.in order to perform
Even a classification/identification
professional bird watchers sometimes
task on them.
disagree on the species given an image of a bird. It is a difficult
problem that pushes the limits of the visual abilities for both
humans and computers. Although different bird species share the
same basic set of parts, different bird species can vary
dramatically in
Python shape and appearance. Intraclass variance is high due to variation
in lighting and background and
extreme variation in pose (e.g., flying birds, swimming birds, and
perched birds that are partially
occluded by branches).
Our project aims to employ the power of machine learning to
Matlab help amateur bird watchers identify
bird species from the images they capture.
Weka/RapidMiner/Python

Weka/RapidMiner/Python

Weka/RapidMiner/Python

Weka/RapidMiner/Python

Weka/RapidMiner/Python

Weka/RapidMiner/Python
Weka/RapidMiner/Python

Weka/RapidMiner/Python

Python and Big Analysis

Python and Big Analysis

Python and Big Analysis

Python and Big Analysis


Python and Big Analysis

Python and Big Analysis

Python and Big Analysis

Python and Big Analysis

Python and Big Analysis

Python and Big Analysis


Python and Big Analysis

Python/R

Python/R

Python/R

Python/R

Python/R
Python/R

Python/R

Python/R

Python/R

Python/R

Python/R
Python/R

Python/R

Python/R

Python/R

Python/R

Python/R
Python/R

Python/R

Python/R

Python/R

Python/R

Python/R
Python/R

Python/R

Python/R

Python/R

Python/R

Python/R
Python/R

Weka/Python/Matlab

Weka/Python/Matlab

Weka/Python/Matlab

Weka/Python/Matlab

Weka/Python/Matlab
Weka/Python/Matlab

Weka/Python/Matlab

Weka/Python/Matlab

Weka/Python/Matlab

Python/Weka/Matlab/Tensorflow

Python/Weka/Tensorflow
Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow
Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow

Python/Weka/Matlab/Tensorflow
Python

Python

Python

Python

Python

Python
Python

Python

Python

Python

Python

Python
Python

Python

Python

This project will help forecast the sale trends based


on the previous patterns and associations among the AzureML
transanctions.

AzureML/Weka

Social networks like Twitter, Facebook, YouTube


generate huge amounts of big data that can be mined
in various ways to understand trends, public AzureML/Weka
sentiments and opinions for branding, marketing, and
business as a whole
Python/ Weka

To analyze the liklihood of customers going to churn


AzureML/Weka
the membership from the business.

Drivers will be incentivized based on the cluster AzureML/Weka

This project is a classification problem. So, as a


beginner developer, it will help you to increase your AzureML/Weka
problem-solving skill.
F# F_N PROJECT NAME OBJECTIVES

Use Wireshark to sniff Network which is using


1 Network Sniffing and Analysing the traffic
HTTP Protocol

Use Packet Tracer to simulate Working of


2 Simulation of Networking Devices
Networking Devices like Hubs and Switches

Use Packet tracer to simulate Working of RIP using


3 Simulation of Networking Devices
different routers on different networks

4 implementation of dhcp using packet tracer Simulate how DHCP works

5 Implementation of EIGRP using Packet Tracer Simulate how EIGRP work

6 WiMax Implementation Using Opnet Wimax Implement


ur
7 Implement TCP using NS2 TCP IMPLEMENTATION
Navjyot Kaur

1 8 Implement UDP using NS2 UDP Implementation

9 Implement AODV using NS2 AODV Implementation

10 Calculate SNR of given signals using MATLAB SNR Calculation

11 Implement Flow control Protocols used in Networks Flow Control Mechanism

12 Analysing VANET Behaviour using NetSim VANET


Compare and Contrast behaviour of TCP and UDP
13 TCP and IP Behaviour
in WSN using NS2

Analyse the Network behaviour in presence and in


14 Blackhole Node Behaviour
absence of a blackhole node using NS2

15 Sinkhole Attack in WSN usig NS2 SinkHole behaviour

16 blackhole attack in WSN analysis of attack in WSN

17 Sybil attack in wsn analysis of sybil attack in WSN

use Qualnet simulator for checking various


18 simulaton of varios parameters
malicious activites on different parameters
behaviour of AODV routing protocol under
19 AODV implementation
blachole attack

20 Behaviour of ad-hoc network in Sybil attack simulation in wsn environment

Different types of attacks are vlunerable in


detection and prevention mechanism of network
21 wireless sensor networks, detecting them and
vulnerability
preventing them

22 Implement AODV using QualNet AODV implementation

implement network model over satellite


23 satellite mobility model in QualNet
communication.
Bindu Rani

mobile ad-hoc wireless network ZRP performance


24 attaing quality of service in Manet
evaluation usingQualNet
design and implementation of delay tolerant
25 design and evaluate DTN protocol
network in QualNet

Design of a software-defined resilient virtualized illustrate a preliminary autonomic setup of a


26
networking environment VNE on the GENI testbed.

NDN caching mechanisms in terms of data


27 Internet of Things Named Data Networking (NDN)
retrieval and network energy efficiency

Provisioning virtualized cloud services in IP/MPLS- minimize the total cost and obtain a better
28
over-EON Networks system performancethrough simulation

the deployment of coloring in a tie-set meta-


Distributed network flow optimization algorithm graph enables the distributed algorithm to
29
with tie-set control based on coloring for SDN avoid update conflicts in shared edges with
less communications among controllers.

Exploiting information centric networking to build considering a possible countermeasure, a


30 an attacker-controlled content delivery network The blacklist fed by a honeypot, which shown to
Information Centric Networking (ICN) be effective
Ethanol: Software defined networking for 802.11 implementing software-defined networking
31
Wireless Networks architecture for 802.11 dense WLANs.

Identify security weaknesses Finding


32 Penetration testing using Metasploit loopholes in security policy Check if and how
an organization can face a security breach

capture the packets and attack the network


Packet sniffing and network reconstruction using
33 using the information gathers from these
metasploit
packets

DHCP Exhaustion and DNS MiTM using A pair of modules to do DHCP exhaustion
34
Metaslpoit attack and then act as a DNS MiTM.

To get an adndroid device under your control,


35 Exploitation of an android device using metasploit
remotely

Exploiting a network using open and


36 Exploiting a network using port scanning
vulnerable ports
Ravinder Saini

3
Ravinder Saini
keylooger installation and gathering
3 37 Keylogging using metasploit
information from the device under attack

Intrusion detection system using Metasploit and


38 Creation of an IDS
Snort

39 Exploitation and gaining access of a remote PC Remote exploitation of a windows PC

using brute force attack to hack a network,


40 Brute force attack using metaslpoit
device or a site

attacking the network by by-passing the


41 Firewall bypassing
firewall rules of a network

Creation of awk, pdf, exe, or any other malicious use of malicious files to exploit remote
42
extension using metasploit devices
43 3 layer Hierarchical model Understanding the 3 layer hierarchical model

Understanding the concept of LAN/MAN and


44 Campus Area Network
connecting them

Understanding the concept of LAN/MAN and


45 Hospital Network
connecting them

46 NAT(static) configuring NAT

addresses the problem of on-line resource


Online virtual links resource allocation in Software- allocation of multiple virtual links on a
47
Defined Networks Software Defined Network (SDN)
infrastructure.

higher reliability with dynamic energy


An Optimal Information Centric Networking Model efficiency consumption and better cost-
48
for the Future Green Network effectiveness for the future ICN infrastructure
system to reduce electricity usage,
Q-Nerve exploits quantum network based
Q-Nerve: Propagating signal of a damaged nerve
49 artificial connection between brain and other
using quantum networking.
organs to bypass a damaged nerve.

configuring Virtual LAN. Understanding the


50 VLAN(Switch-1) concept of switches, hubs, bridges,
Inderjeet Singh

workstations and servers

Centralized ARP proxy server over SDN controller efficiently processes address resolution while
51 to cut down ARP broadcast in large-scale data reducing ARP broadcast traffic by dozens of
center networks times to hundreds of times.

52 Enterprise Network Connecting and securing networks

minimize the total round trip time for every


Workload-aware request routing in cloud data type of request by considering the congestion
53
center using software-defined networking in the network and the workload in virtual
machines (VMs).

Toward a privacy model for social networking A causal model that explains the relationships
54
services between the constructs is proposed.
Operate the Change Control Authority
effectively and efficiently to ensure control
55 Intercontinental Connectivity over network maintenance activity and
changes to service carrying network elements
are in place and work
Adhering to the principles of software-defined
networking paradigm from the design, xSDN
An Expressive Simulator for Dynamic Network focuses to be lean, light-weight, easy to learn
56
Flows and configure, and efficient, that can simulate
networks of a scale of million nodes within a
few seconds.

57 WAN Management Understanding the concept of WAN

studying communication and socio-technical


58 Organizational Network
networks within a formal organization

To study performance of Protocol on the basis


59 Implement and Analysis of AODV routing protocol
of various parameters

Implementation and Evaluation of OSPF routing To study performance of Protocol on the basis
60
Protocol of various parameters
To design an efficient automatic authorized
61 Vehicle Number Plate Recognition using Matlab vehicle identification system by using the
vehicle number plate.

62 Design Energy Efficient Protocol for WSN To improve the network performance.

63 Intrusion Detection System for Network To detect the malicious node from the network

To simulate the Vehicle to Vehicle


64 Simulate VANET communication
Communication

To design Application to exchange data using


65 Simulate TCP/IP communication in MATLAB
TCP/IP

To design Intrusion Prevention System to


66 Design Intrusion Prevention System for WSN
transfer data securly over the network
Prabhjot Kaur

5
Prabhjot Kaur
5

To recognize different kinds of DoS attacks


67 Simulate DDOS Attack
and then simulate them.

68 Simulation of DOS Attack Using MATLAB To detect the DOS attack on the network.

Securing Network Connected Applications with To Securing Network Connected Applications


69
Proposed Security Models with Proposed Security Models

70 Simulate Fire detection System To simulate the fire detection system

71 Implement and Analysis of DSR routing protocol To design DSR routing Protocol

To implement DSDV routing Protocol for


72 Implement the DSDV routing protocol
WSN
To design Cluster based routing protocol for
73 Design Cluster based routing protocol for WSN
WSN

Deployment of Wireless Sensor Network using To deploy WSN and separate the genuine
74
MATLAB nodes and malicious nodes.

75 implementation of elliptic curve cryptography To implement elliptic Curve Cryptography

Creation and packet transfer in Virtual Lan using


76 To implement packet transfer in Virtual Lan
Packet Tracer

77 Creation of IDS for insider attacks To Create IDS for insider attacks

Performance evaluation of various routing protocol To Evaluate performance metrics of routing


78
in MANET algorithms in MANETS
Nitika

6
Nitika
6 79 Isolation of sybil attack in VANET To isolate Sybil Attack in VANET

Performance evaluation of various cluster based To implement Cluster based routing in


80
routing protocol in VANET VANET

Securing VANET through Lightweight To secure VANET through Lightweight


81
Authentication and Key Agreement Protocol Authentication and Key Agreement Protocol

Authentication Scheme for VANET by applying


82 Implementing HMAC algorithm
HMAC Algorithm

Comparative Performance Analysis of AODV, DSR


83 Implementing AODV,DSR and GSR protocols
and GSR Routing Protocols in VANET

84 OSI and TCP/IP models Implementation OSI and TCP/IP models


Configure, verify, and troubleshoot IPv4
85 IPv4 addressing and sub netting
addressing and sub netting

Implementation Routing Information protocol


86 Routing Information protocol
RIP on IP Network
Parneet Kaur

Implementation dynamic and static Routing


7 87 Routing on a network
on a network

88 Implementation of Cloud network Cloud network in packet tracer

89 Frame Relay Configure Frame Relay for the Cisco CCNA

90 IGRP protocol Implementation IGRP protocol on IP network


Maintain individual record.
91 network selection system Maintain Section wise details.
Evaluating performance.

1.To secure messages using the technique of


92 Bank networkig
caesar cipher

work that aims to evaluate the TCP, UDP and


A network evaluation for lan and wan grid
93 Sendfile (a POSIX-defined zero-copy TCP
environments
access technique) protocols on LAN

94 accessing multiple routers using routing techniques

Maintain confidentiality, integrity and


95 Network Design for Airport Proposal
availability

we present off-line signature recognition and


Artificial neural network based verifivation of
96 verification system which is based on image
digital signature
processing
The purpose is how to protect our data in
97 Intrusion prevention system on SDN between the serves only or we can se from
any stranger like hacker

Make communication among various office


98 WAN design for multiple office connectivity
via WAN
Gurpreet Singh

8 propose a radio resource allocation scheme in


the context of Cloud-based Radio Access
Networks (C-RAN) run by a single operator.
On efficient radio resource calendaring in cloud specifically leverage bandwidth calendaring, a
99 radio access network
technique that allows shifting bulk data
transfers, typically of large size with less
stringent real-time constraints, to future
epochs when the
first formulate thenetwork is lessproblem
calendaring congested.
using
Integer Linear Programming (ILP) and the
Multipath transport and packet spraying for pricing problem using the Vickrey Clarke
100 efficient data delivery in data centres
Groves (VCG) pricing scheme. further make
use of the Bayesian settings to compute the
optimal revenue.

Cyber crime refers to all unlawful activities


that involve a computer and a network. The
101 Internet Traffic Sharing in Networking
computer may have been used in the
commission of a crime or it may be the

Computer Networking: Curriculum Designs


and Educational Challenges." The goal of the
102 Curriculum Designs and Educational Challenges
project to bring together faculty from a broad
spectrum of four-year colleges
simulation experience to teach signal
modulation and demodulation concepts in
Content-Based Computer Simulation of a
103 communication and computer networks to
Networking
computer science and computer engineering
students
in the presence of an arbitrary mix of unicast,
broadcast, multicast, and anycast traffic, in an
arbitrary wireless network. We propose an
104 Optimal Control foNetwork-Flow
online dynamic policy, called Universal Max-
Weight (UMW), which solves the problem
efficiently
The Received Signal Strength Indicator
(RSSI)values of the anchor node beacons are
WIRELESS SENSOR NETWORKS: A NEURAL
105 used. The number of anchor nodes and their
NETWORK APPROACH
configurations has animpact on the accuracy
of the localization system,
he idea of using WiFi to offload data traffic
from cellularnetwork has proposed for many
years. However, the interoperability issue
ENHANCE CELLULAR AND WIFI
106 between the two networks needsto be
INTERWORKING
enhanced so that WiFi can efficiently
supplement for the cellular network in case of
congestion oroutage.

107 Detecting node failures in mobile wireless networks To achive high failure detection rate

code based neighbor discovery protocol in mobile To achive better perfprmance in neighbour
108
wireless networks discovery
Bandwidth estimation technique for end to end To estimate the bandwidth with good accuracy
109
network path and less intrusively

Mitigating denial of services attack in OLSR To defend the OLSR protocol from node
110
algorithm isolation attack

Analysis AODV and DSR routing protocol based on


To analyse AODV and DSR routing protocols
111 different performance metrics in a real world
based on different perfomance metrics
environment

Measure the performance and security of TCP and


112 To find which is more secure
UDP

113 TCP and UDP packet delay for file transfer To show which has more delay in file transfer

which version provide accurate information


114 Working of different version of RIP protocol
about no resources used
115 TCP Performance in an EGPRS system To Find TCP performane in EGPRS

An Optimized Hidden Node Detection Paradigm for


116 To improve coverage and network efficiency
Improving the Coverage and Network Efficiency in
Wireless Sensor Networks

117 Compare AODV and DSR protocol To find which has better efficiency

Compare error control by CRC and hamming


118 to find which has better capacity to find error
distance

119 Compare different congestion control techniques To find which is better

120 Rogue DHCP Server Detection To find Rogue DHCP Server


Guljar Singh

9
121 Campus network design A campus network design for a college
Guljar Singh

122 Enterprise Network Design using IP Subnetting How to do subnetting networking

Flooding attack detection using anomaly techniques


123 to detect Flooding attack
with wireshark

Securing router using multiple access control


124 to secure the router
techniques

125 Brute force attack detection using wireshark to detect Brute force using wireshark

Employee Website Monitoring using Packet


126 To Website Monitoring using Packet Analysis
Analysis
This project understands the basics of dhcp
DHCP Infrastructure security threats, mitigation and
127 communication, and the security
assessment
vulnerabilities in the generic dhcp protocol

Small Business Network Design with Guest to make Small Business Network Design with
128
Network Guest Network

To develop a network intrusion detection


Network Intrusion Detection based on pattern program with Python and tshark, which would
129
matching. detect patterns in packet payload and logs the
IP address from which the packet originated.

130 Packet Loss Testing Tool to developPacket Loss Testing Tool

131 LAN Speed testing tool to make LAN Speed testing tool

132 IP Spoofing demonstration IP Spoofing demonstration


133 STP Design and Attacks to Design STP and Attacks

ARP Spoofing and cache poison attack


134 to understand ARP Spoofing
demonstration

demonstration to demonstrate Mac-flooding


135 Mac-flooding Attack demonstration
Attack

Real-Time QoS Routing Protocols in Wireless To Find real time QOS in wireless sensor
136
Multimedia Sensor Networks networks

secure protocol to avoid phishing in voting system


137 Network phishing and Analysing the traffic
using virtual cryptography

Secure MANET from SYBIL attack for high using optimization techniques to detect
138
network lifetime attacks
139 Smart Attendance System using smart card Simulation of Networking Devices

filter the network activities and to decide


140 Detection of malicious Network activity
which are illigal of them
Reetu Kumari

10

141 youtube playlist downloader timeefficient and secure downloading system

142 Access your phone without help of internet personal offline digital assistant

classifier to distinguish different stages of


143 Image classifier using CNN for diseases detection
deseases

Securing VANET through Lightweight To create authentication in VANET


144
Authentication and 2 way Protocol enviornment
Network design and implementation of entire
145 University Network
university or college.

Configure VoIP Phone with CISCO Router &


146 Configuration of VoIP
Switch in Packet Tracer

Implementation of vpn (virtual private


147 Virtual Private Network
network)
Harvinder Kaur

11

148 Routing Internet Protocol Configure rip ipv6 in packet tracer

Configure cisco Wi-Fi Router using packet


149 Wi-Fi Router configuration
tracer on a network.

BGP (Border Gateway Protocol ) working


150 Border Gateway Protocol
with two or more than two networks .
An efficient flow classification algorithm in
151 manage flows with network-wide view
software-defined networking

present a systematic framework for joint


dynamic interest request forwarding and
sharadh

VIP: Joint traffic engineering and caching in Named


12 152 dynamic cache placement and eviction, within
Data Networks
the context of the Named DataNetworking
(NDN) architecture.

Open Networking Operating System (ONOS)


153 ICONA: Inter Cluster Onos Network application and designed to meet the aforementioned
Service Providers requirements.
DESCRIPTION TOOLS USED

Wireshark is a Network Protocol Analyzer that can capture and


analyze the packets transmitted/received via a Network Interface Wireshark
Card (NIC)

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Opnet is a tool to implement and simulate network devices and


Opnet
study their behaviour
NS2 is network simulator which simuates various protocols NS2

NS2 is network simulator which simuates various protocols NS2

NS2 is network simulator which simuates various protocols NS2

MATLAB is the tool used to analyse the performance and


Matlab
behaviour

Use C/C++ Matlab

NetSim is a discrete event simulator covering a broad range of


NetSim
wired, wireless, mobile and sensor networks
NS2 is network simulator which simuates various protocols NS2

NS2 is network simulator which simuates various protocols NS2

NS2 is network simulator which simuates various protocols NS2

analyzing the AODV routing protocol under the influence of


QualNet
blackhole attack in wireless sensor network.

analyzing the AODV routing protocol under the influence of sybil


QualNet
attack in wireless sensor network.

parameter such as no of packets drop, jitters etc are analyse under


QualNet
malicious environment
QualNet simulator used for simulation QualNet

QualNet tool is used for simulation. QualNet

QualNet simulator is used in wireless sensor network for various


QualNet
network vulnerabilites.

QualNet simulator for various parameters in AODV is used for


QualNet
simulation

implement network model over satellite communication which is


an difficult task in other simulator tool. Qualnet combine satellite
QualNet
mobility model to simulate satellite footprints, low, medium
satellite earth orbit models.
We adopt zone routing protocol which is the category of hybrid
routing protocol model. Attaining quality of service in MANET is
an challenging task. By ZRP, we can easily identify route failure in
MANET and quickly reconstruct route during link failure. By QualNet
qualnet we can estimate route acquisition delay and route
reconfiguration parameter. We use qualnet to compare ZRP
performance with other network routing protocols
We adopt this algorithm to reduce traffic load, path loss in DTN
and congestion control. We use qualnet to design and evaluate QualNet
DTN protocol.

Design of a software-defined resilient virtualized networking


environment Network virtualization enables programmability to
NS 2.35
the substrate network provider who provisions and manages
virtual networks (VNs) for service providers.

solution has been evaluated through simulations with ndnSIM and


results show that it outperforms traditional NDN caching
NS 2.35
mechanisms in terms of data retrieval and network energy
efficiency.

rovisioning virtualized cloud services in IP/MPLS-over-EON


Networks Cloud computing enables the provisioning of resources NS 2.35
in a reliable and on-demand manner.

distributed algorithm that aims for congestion control in Software


DefinedNetworking with distributed controllers by exploiting loop
structures in a network and coloring.

model relies on the ubiquitous use of caching to improve


NS 2.35
performance and reduce bandwidth requirements.
To improve the performance of these networks, new approaches
are required, such as context and service aware control algorithms,
which are not possible on today’s closed proprietary WLAN NS 2.35
controllers.here we implementing software-defined networking
architecture for 802.11 dense WLANs

a Penetration Test aims at going as deep as possible inside the IT


infrastructure and get to the electronic asset of the company. The
main objective is not to hit the target hard in the first try, is to hit
even harder in the following tries.

a packet sniffer is essentially a tool that aids in monitoring


network traffic and troubleshooting a network. It works by
capturing and analyzing packets of data that flow through a
particular network.
network attack which is targeted to DHCP servers is known as
DHCP starvation attack. In a DHCP starvation attack, an attacker
broadcasts large number of DHCP REQUEST messages with
spoofed source MAC addresses. If the legitimate DHCP Server in
the network start responding to all these bogus DHCP REQUEST
messages, available IP Addresses in the DHCP server scope will
be depleted within a very short span of time.

The Android platform can be attacked either by creating a simple


APK file or by injecting the payload into the existing APK

A port scan is an attack that sends client requests to a range of


server port addresses on a host, with the goal of finding an active
port and exploiting a known vulnerability of that service.
Scanning, as a method for discovering exploitable communication
channels

Metasploit, Snort and wireshark


Meterpreter in the Metasploit Framework has a great utility for
capturing keys pressed on a target machine. We will start with a
system that we have already run an exploit on and were successful
Metasploit, Snort and wireshark
in creating a remote session with Metasploit. We connected to the
session with the session command and are now sitting at a
Meterpreter prompt.

An intrusion detection system is to be created using metasploit


which would help to detect attacks in the network

Compromise a windows PC with metasploit and perform


illegitimate methods on the PC

Use of metasploit to crack the passwors usng brtue force attacks

Bypassing the rules of firewall by using metasploit and entering


the system to compromise it.

Creation of various file that would be installes in remote systems


in order to compromise those system
three-layer model helps us to design, implement, and maintain a
scalable, reliable, and cost-effective network. Three layers: Core,
Distribution and Access layers.

CANs are comprised of several LANs connected via switches and


routers that combine to create a single network.

Connection of various PCs at different level in a hospital using


Switches, Routers etc.

Configuring and Verifying Static –NAT

Considering an SDN physical infrastructure allows a complete


freedom in choosing the optimal physical paths and the associated
resources that support the virtual links with no interference from
any other network function (such as routing).

An Optimal Information Centric Networking Model for the Future


Green Network In order to address the energy flaw and enhance
the energy efficiency of Information CentricNetworking
(ICN).higher reliability with dynamic energy efficiency
consumption and better cost-effectiveness for the future ICN
infrastructure system to reduce electricity usage.
Q-Nerve: Propagating signal of a damaged nerve using quantum
networking Aiding paralyzed people through using technology to
transmit signals from brain to paralized part of a body has been a
matter of great interest in recent times.

configuration of VLAN(Switch-1) as virtual defined networks

packet tracer
Centralized ARP proxy server over SDN controller to cut down
ARP broadcast in large-scale data center networks Today’s cloud
services are driving the wide-spread deployment of multi-tenant
large-scale data centers. These data centers must have agility in
order to provide diverse services to users in an efficient way, via
dynamic allocation of the virtual machines (VMs) to the servers.

Design of ISP and then connecting and linking through VPN

provides the evaluation of the proposed algorithms in a simulated


prototype. The simulation results show that the proposed
methodology is efficient compared with the existing approaches.

Users’ willingness to engage in sharing personal identifiable


information (PII) via social networkingservices (SNS) is impacted
by a set of formative factors that structure the personal value
system.
Network performance assurance, monitoring and benchmarking,
Capacity forecasting & Traffic Management

n Expressive Simulator for Dynamic Network Flows Software-


defined networking (SDN) increases the network programmability,
promoting an effective development of networked systems of
cloud scale.

Design of a wan network using PCs, routers etc

A group of legally independent companies or subsidiary business


units that use various methods of coordinating and controlling
their interaction in order to appear like a larger entity.

Read more:
http://www.businessdictionary.com/definition/network-
organization.html
VNPR is used by municipalities to keep track of incoming and
outgoing traffic. Since a number plate is unique, it can be used for
signaling suspect cars, (blacklist matching) or regulating access to
a private area (whitelist matching).

Energy is most important factor for Wireless sensor networks. A


node is connected to the base station through a singlehop or a
multihop. Here sleeping and wake-up schemes of different nodes
are very important to achieve energy efficiency of the system.

Protect the data communication of the network from the outside


intuder and alert the system if any abnormal activity detected in
the network.

Vehicular Adhoc network is used to provide communication


among vehicles in road side unit to avoid accident and other
applications.

Use the properties to set up the TCP/IP communication

An Intrusion Prevention System (IPS) is a network security/threat


prevention technology that examines network traffic flows to
detect and prevent vulnerability exploits.

MATLAB
MATLAB

A Denial-Of-Service attack (DoS attack) or distributed denial-of-


service attack (DDoS attack) is an attempt to make a machine or
network resource unavailable to its intended users.

A Denial-Of-Service attack (DoS attack) is an attempt to make a


machine or network resource unavailable to its intended users.

The organizations need protection against both internal and


external attacks. There are many different technologies available
that organizations can incorporate into their organization in order
to enhance security for their networking applications.

Fire detection system is the most important component in the


surveillance system. Fire has been one of the major disasters, even
though it is so important to fulfill certain activities in day-to-day
life.

Dynamic Source Routing (DSR) is a routing protocol for wireless


mesh networks. It is similar to AODV in that it forms a route on-
demand when a transmitting node requests one. However, it uses
source routing instead of relying on the routing table at each
intermediate device.

Destination-Sequenced Distance-Vector Routing (DSDV) is a


table-driven routing algorithm for ad-hoc mobile networks based
on the Bellman–Ford algorithm.
The cluster based routing protocol for mobile ad hoc network uses
clustering's structure to decrease average end-to-end delay and
improve the average packet delivery ratio.

Wireless sensor network (WSN) refers to a group of spatially


dispersed and dedicated sensors for monitoring and recording the
physical conditions of the environment and organizing the
collected data at a central location.

Elliptic curves are applicable for encryption, digital signatures,


pseudo-random generators and other tasks. They are also used in
several integer factorization algorithms that have applications in
cryptography

Implementing packet transfer in Virtual LAN using Packet tracer

Packet tracer will be used to implement

NS2 will be used


SUMO simulator will be used

SUMO simulator will be used

SUMO simulator will be used

SUMO simulator will be used

SUMO simulator will be used

Packet Tracer is a tool used to simulate various Network Scenarios


Packet Tracer is a tool used to simulate various Network Scenarios

Packet Tracer is a tool used to simulate various Network Scenarios

Packet Tracer is a tool used to simulate various Network Scenarios Packet tracer

Packet Tracer is a tool used to simulate various Network Scenarios

Packet Tracer is a tool used to simulate various Network Scenarios

Packet Tracer is a tool used to simulate various Network Scenarios


The Selection System developed with including automate the
Packet tracer
functioning. This system is helpful for selection process.

(i) To assess capacity of the network

(ii) To assess the operational efficiency and managerial


effectiveness. Packet tracer

(iii) To assess the short term as well as long term position of the
network.

Packet tracer

Identification of challenging task Although different bird species


share the same basic set of parts, Intraclass variance is high due to Packet tracer
variation in system

uses visual cryptography which enhances the security level of the


system.
Packet tracer
The system will not allow two or more candidates.
The system will allow the user.

Packet tracer
The purpose is how to protect our data in between the serves only
Packet tracer
or we can se from any stranger like hacker

Packet tracer

Packet tracer

Packet tracer

Packet tracer

Packet tracer
Packet tracer

Packet tracer

Packet tracer

Packet tracer

A two node failure detection scheme are proposed. NS 2.35

Asynchronous neighbour discovery NS 2.35


Two algorithms rate : rate adjustment algorithm and excursion
NS 2.35
detection algorithm

The proposed protection prevents more percentage of attacks and


NS 2.35
reduces overhead also

we can compare tw protocols here for measuring there


NS 2.35
performance

we have to find which is more secure then other Pcket tracer

These are popular protocol which are used for reliability and data
Packet tracer
transfer

RIP stands for resource information protocol. its has different


Packet tracer
version
The most widely used protocol for providing reliable service and
congestion control in the Internet is the Transmission Control NS 2.35
Protocol (TCP)

Successful transmission of online multimedia streams in wireless


multimedia sensor networks (WMSNs) is a big challenge due to NS 2.35
their limited bandwidth and power resources

AODV is adhoc on demand routing protocol NS 2.35

both are error detection techniques NS 2.35

we have different congestion control techniques Packet tracer

The project understands the security issues of a rogue dhcp server


and develops a technique by which rogue dhcp servers can be packet tracer
detected on a network using port scanning.
There are 100 users in the college. 30 users in the main building,
30 users in bldg 1, and 40 users in bldg 2. Every building has a
lobby which is 200 sqft open space, where wireless access to the different networking tool
network is required. Only authorized personal should have access
to the wireless network.

The network 172.16.0.0/16 is to be subnetted for the required


networking tool
number of networks and used in the network design.

Flooding is a type of attack, in which the attacker sends numerous


floods of packets to the victim or associated service in an attempt
wireshark
to bring down the system. There are different types of flooding
attacks like ping flood, Syn floods, UDP floods etc

The project aims to assess the security issues related to access


control configuration on a Cisco router on the network and to
wireshark
design an upgraded secure configuration using multiple access
control techniques

Brute force attacks are used for detecting login credentials using
random combinations of username and passwords. The project
wireshark
demonstrates a technique by which brute force attacks on FTP
servers can be detected using Wireshark Analysis.

This project understands and demonstrates the technique which


can be used to monitor the websites accessed by employees based
on IP and mac-address on a LAN network by analyzing wireshark
appropriate packets. Wireshark is combined with port mirroring
feature on a switch to achieve the solution.
Security issues related to DHCP infrastructure and how it can be
wireshark
mitigated using appropriate features on switches are understood.

A small business network has to be designed for an organization.


The organization has occasional guest users (Max 10) visiting the different networking tools
office

To develop a network intrusion detection program with Python and


tshark, which would detect patterns in packet payload and logs the Wireshark – Free download
IP address from which the packet originated.

The projects develops a packet loss testing tool which would send
required number of ping packets to a destination and returns the O/S –Linux (Tested on Ubuntu),
number of packets sent and lost packets.

The goal of the project is to identify the time it takes for a data
packet to travel between two computers on a LAN. For this Python / Scapy ( Free download)
purpose, a ping request packet is crafted and sent to the destination

IP spoofing is a type of security attack in which the attacker spoofs


wireshark
the source address in the IP header to a fake IP address.
The project understands the design and architecture of the
spanning tree protocol with a packet analysis of STP protocol with Wireshark
wireshark.

ARP spoofing is a type of security attack in which the attacker


spoofs the ARP reply packet sent to a destination with its own Scapy and Python
mac-address.

Mac-flooding is an attack by which the attacker attempts to fill the


mac-address table of the switch, by simulating random mac- scapy and python
addresses.

QOS is main issues in networks Packet Tracer

providing authentication, creting connectivity using AES algo MATLAB

Moth-Flame optimization or Fire-fly algocan be used to prevent


MATLAB, NS2
attacks
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

MATLAB, OCTAVE tool

automation tool written in JAVA to download errorfree videos Selenium lib., JAVA JDK

offline packet of Android App Android Studio,SDK, SQLliteDB

Implement ML and CNN Classifier to detect and distinguish


ML, Tensor-flow, CNN Classifier
stages of diseases

Implement secure VANET network using algo and 2 way


SUMO. NS2, NS2.5
authentication protocol
Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer

Packet Tracer is a tool used to simulate various Network Scenarios Packet Tracer
An efficient flow classification algorithm in Software-Defined
Networking In Software-Defined Network environment, operator
can see the global view of network. So it can be manage flows
with network-wide view, but legacy flow classification method
cannot satisfy the integrated tables of all switches because of out
of memory and long compilation time.
The framework employs a virtual control plane which operates on
the user demand rate for data objects in the network, and an actual
plane which handles Interest Packets and Data Packets. We
develop distributed algorithms within the virtual plane to achieve NS 2.35
network load balancing through dynamic forwarding and caching,
thereby maximizing the user demand rate that the NDN network
can satisfy
CONA: Inter Cluster Onos Network application Several Network
Operating Systems have been proposed in the last few years for
Software Defined Networks; however, only few of them are
offering resiliency, scalability and high availability required for
production environments.

You might also like