You are on page 1of 30

AADHITYAA INFOMEDIA

TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

IEEE PROJECTS IN JAVA / BLOCK CHAIN / ANDROID /


BIG DATA / CLOUD COMPUTING / SECURITY: 2022 – 23

JA 6001. INTEGRATION OF BLOCK CHAIN & BIG DATA


TOWARDS CREDIT CARD FRAUD DETECTION WITH USER
BEHAVIORAL ANALYSIS USING MACHINE LEARNING
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Credit card transactions have become common place
today and so is the frauds associated with it. In the proposed system, popular supervised and
unsupervised machine learning algorithms have been applied to detect credit card frauds in a highly
imbalanced dataset. In the modification process, we are developing this application for a Banking
sector particularly for a Debit / ATM \card section. User can create account and get the ATM card
from the bank. He can integrate all his accounts in other banks can be integrated in this single card
with unique PIN numbers accordingly. User behavior is monitored through HMM Model and he can
set up a formula based authentication. He can include all his family members’ accounts details also in
the same card. He can withdraw cash from their accounts after successful authentication of the
corresponding PIN numbers.

DOMAIN: Machine Learning, Big Data, Block chain, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6002. SECURED DATA TRANSFER WITH MULTI LAYERED


SECURED ENCRYPTION STANDARDS USING ONION
PROTOCOL

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING SYSTEM, DTN applications, there is not such of security in
message delivery and minimizing the forwarding cost important. In the PROPOSED SYSTEM, an
onion-based anonymous routing with multi-copy forwarding in which L copies of a message is
allowed. In the MODIFICATION, apart from the proposed system, we develop an effective system
which collects Feedback about neighboring nodes transmitting the packets. Every node’s review is
analyzed and best route is identified only the packets are transmitted

DOMAIN: Networking, Network Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6003. EFFECTIVE MULTI CLOUD AND MULTI LEVEL


SECURED DATA STORAGE AND RETRIEVAL SYSTEM

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, With more data storage needs turning over to the cloud,
finding a secure and efficient data access structure has become a major research issue. In the Proposed
system, a Privilege-based Multilevel Organizational Data-sharing scheme (P-MOD) is proposed that
incorporates a privilege-based access structure into an attribute based encryption mechanism to handle
the management and sharing of big data sets. In the Modification , of the project, is apart from
proposed system, Data is secured by encryption and stored in cloud. As per proposed system, we
implement High security with data encryption and the data is split into two parts and stored in two
parts. In medium secured, data is encryption and data is stored in single cloud. In the normal security
data is encrypted and stored.

DOMAIN: Cloud Computing, Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6004. Agri Check: MULTI FACTOR ANALYSIS TO PREDICT


BEST CROP USING RAINFALL, LOCATION AND SOIL TYPE
USING MACHINE LEARNING & BIG DATA

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Wind generation resources (WGRs) are the fastest
growing energy resources throughout the world. An accurate wind forecasting is critical to the
integration of a large amount of wind generation units into the grid operations. In the Proposed
system, machine learning based method to forecast wind power production, which uses both the wind
generation forecasted by a numerical weather prediction (NWP) model and the meteorological
observation data from weather stations. In the Modification process, we implement the application to
identify the types of soil, water source of that land whether that land is based on rain or bore
water .And suggest what of crop is suitable for that soil. So through this application we provide
application for the people to know about the agriculture. We predict the type of crop which one is
suitable for that particular soil, weather condition, temperature and so on. So for, we are using
machine learning with the set of dataset we are identify the crop for the corresponding soil.

DOMAIN: Machine Learning, Big Data, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6005. EFFECTIVE & SECURED MEDICAL DATA STORAGE IN


CLOUD ENVIRONMENT USING BLOCK CHAIN, CRYPTO &
STEAGANOGRAPHY
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing System, Electronic health record (EHR) has recorded the
process of occurrence, development, and treatment of diseases. So it has high medical value. Owing to
the private and sensitive nature of medical data for patients, the data sharing and privacy preservation
are critical issues in EHR. In the Proposed system, a medical data sharing and protection scheme
based on the hospital’s private block chain to improve the electronic health system of the hospital.
Firstly, the scheme can satisfy various security properties such as decentralization, openness, and
tamper resistance. A reliable mechanism is created for the doctors to store medical data or access the
historical data of patients while meeting privacy preservation. In the Modification process, we
improvise the security features of patient’s medical data by converting Image data into binary and
finally into cryptography and Medical Text data are encrypted and made steaganographed into an
image. Only authenticated people will retrieve the data others will get the duplicate / decoy file.

DOMAIN: Block chain, Cloud Computing, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6006. INTEGRATIVE MAPPING, TRACKING AND


IDENTIFICATION OF DEVICE ID, LOCATION AND USER INFO
USING FOG AND EGDE COMPUTING IN CLOUD

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, The distributed, dynamic characteristics and the
collaboration requirement make it face many new security and privacy issues that cannot be solved by
the traditional public key or symmetric cryptosystem. In the Proposed system, Encryption,
authentication and access control with privacy preserving can be realized on the basic operations of
AC-PKC, which can meet various security requirements of fog computing based digital
manufacturing. In the Modification process, project is we deploy RFID based sensor in all the vehicle
in case of vehicle theft. In every vehicle RFID sensor is fixed and in every area RFID reader is fixed.
When the vehicle is stolen, the reader sends an alert to the police station. The Complaint is send to the
local server then to the centralized server. We also install Id based communication in case any new
device is applied on home. So in this modification we also identify the theft instrument like A/c, fridge
like home appliances will be stolen by anyone and they can sale that to anyone. If the anyone fix that
theft machine on any place an alert will be send to the police station.

DOMAIN: Cloud Computing, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6007. Universal ID: INTEGRATION OF MULTI USER


IDENTITY, SOCIAL IDENTITY, ASSETS TRACKING &
BEHAVIOR CHECKING USING BLOCK CHAIN IN CLOUD
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, identity-managing solutions, blockchain-based concepts


and products have evolved in the context of verified claims and self-sovereign identities. In the
Proposed system, a systematic, criteria-driven survey of the solutions and technologies for this
growing field and their comparison with the capabilities of established solutions. In the Modification
process, All the IDs of the user are integrated which can be easily verified or identified by the
government so that this system will definitely track the user completely and all the activities of the
users are monitored. All the data are stored in cloud environment for security. We split the data into
multiple cloud environments for secured accessibility. All the data are secured using Blockchain
concept.

DOMAIN: Block Chain, Cloud computing, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6008. Green Resource: INTEGRATION OF RESOURCE


ASSIGNMENT AND MIGRATION FOR EFFECTIVE RESOURCE
OPTIMIZATION IN CLOUD UTILIZATION

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING system, The infrastructure resources in distributed green


cloud data centers (DGCDCs) are shared by multiple heterogeneous applications to provide flexible
services to global users in a high-performance and low-cost way. In the PROPOSED system, task
scheduling and resource optimization (STSRO) method to minimize the total cost of their provider by
cost-effectively scheduling all arriving tasks of heterogeneous applications to meet tasks’ delay-bound
constraints. In the MODIFICATION Process, We deploy two types of systems. 1. Hot Machines can
handle the current job. 2. Warm Machines are kept idle state until job is assigned. We deploy three
Virtual servers for every machine. 1st Job is assigned to the Hot machine 1st Virtual machine and same
way following jobs are assigned to other VMs. Now jobs are assigned to the Warm machines once all
the VMs of Hot category have occupied with the jobs. Automatic migration of job is implemented, so
as to transfer the load to the Hot VM from Warm VM once it has completed the job. We also
implemented cache mechanism.

DOMAIN: Cloud Computing, Green Computing

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6009. DEPLOYMENT OF RAT TRAP MODEL FOR CAPTURING


ONLINE HACKERS IN CLOUD BASED PURCHASE PORTALS
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING SYSTEM, system may be vulnerable to DDoS attacks


affecting the whole system. The passwords are easily hacked the hacker using online guessing attacks.
In the PROPOSED SYSTEM, Honey words are used to detect Hackers by inducing them for
attacking there by DDOS can be avoided. The user has to register with the server and it generates
Random set of Passwords to the user called Honey words. User’s Original password is hashed and
stored along with the Honey words. Attacker will fetch any one of the password so that intermediate
server will filter the wrong password based queries so that DDOS can be avoided. The
MODIFICATION is our implementation. Honey words are generated based on the user info provided
and the original password is converted into another format and stored along with the Honey words. We
deploy Intermediate server, Shopping server for purchase and Cloud server for maintaining user
account details. Attacker who knows the E mail account of original user can easily reset the password
of the cloud server. Attacker is invited to do attack in this Project, so as to find him out very easily.
Now attacker logins into the purchase portal, where he is been tracked unknowingly & he is allowed to
do purchase. Server identifies the attacker and sends the info to the Original owner and also it blocks
the attacker even doing transaction from his original account.

DOMAIN: Cloud Computing, Network Security, Society & Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6010. EFFECTIVE TRACKING OF FRAUDULENT ACTION


FROM MULTI FUND TRANSACTION USING BIG DATA & ML

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Money laundering is often associated with criminal
activities. Anti-money laundering is thus regarded as an important task in many countries. In the
Proposed system, a two-phase intelligent method based on machine learning and data analysis
techniques for identifying suspicious money laundering accounts from the transaction data. The first
phase emphasizes on identifying every suspicious money laundering account while the second phase
further retrieves highly suspicious ones so that both the recall and precision for the identification of
money laundering accounts. In the Modification process, Apart from the proposed work from the base
paper; we also improvise the concept by analyzing other purchase made by the user like land
Registrations and Gold purchase. We consider in 3 major ways user could do money laundering
proce4ss, 1. Bank Transactions, 2. Land purchase and 3. Gold purchase. We combine all these 3
activities of user transactions and analyze the money laundering concept.

DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6011. Find The Attacker: DYNAMIC DETECTION OF MULTI


ATTACKS IN CLOUD ENVIRONMENT USING BIG DATA
ANALYSIS TO ENSURE CYBER SECURITY

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING system, The data generated is a reflection of the environment
it is produced out of, thus we can use the data we get out of systems to figure out the inner workings of
that system. This has become an important feature in cybersecurity where the goal is to protect assets.
In the PROPOSED system, explore recent research works in cybersecurity in relation to big data. We
highlight how big data is protected and how big data can also be used as a tool for cybersecurity . In
the MODIFICATION process, we are implementing a Big Data based centralized log analysis system
to identify the network traffic occurred by attackers through DDOS, SQL Injection and Brute Force
attack. The log file is automatically transmitted to the centralized cloud server and bi g data is initiated
for analysis process.

DOMAIN: Cloud Computing, Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6012. EFFECTIVE DATA FRAGMENTATION AND


PARTITIONING USING BIG DATA FOR FASTER DATA
RETRIEVAL SYSTEM IN CLOUD ENVIRONMENT
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING SYSTEM, Data compression could ameliorate the I/O
pressure of data-intensive scientific applications. In the PROPOSED SYSTEM, Data is splitted and
stored using dynamic virtualization concept and we do not break the original file into physical chunks
or blocks, but append a small number of references to the end of file. Each of these references points
to a specific block that is considered as a boundary of the virtual chunk. In the MODIFICATION
which is our Implementation logic, we deploy 3 Layers of connectivity. Root, Stem and Leaf are the
layers in our project. Assuming a College Global Data which is entirely stored in the Root layer,
Country wise data are classified and stored in the Stem layer and finally State / region wise data are
stored in the Leaf layer. ABE based keys are distributed among the corresponding admin so that access
policy is applied. This system will store the entire file as such in the root layer and as well as the data
is splitted and stored in the other two layers. This process will surely reduce the time for the fetching
any results from the table.
DOMAIN: Big Data, Data Mining, Cloud

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
LEAF
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6013. IDENTIFICATION OF BEST NODE SELECTION WITH


MULTI FACTOR QOS SYSTEM FOR EFFECTIVE DATA
TRANSFER WITH DYNAMIC ROUTING

ARCHITECTURE DIAGRAM:

DESCRIPTON: In the Existing system, the secure communication in a two-hop cooperative


wireless network, where a buffer-aided relay helps forward data from the source to destination, and a
passive eavesdropper attempts to intercept data transmission from both the source and relay. In the
Proposed system, the system performance, we then derive the closed-form expressions of end to-end
secrecy outage probability, system throughput and secrecy throughput, respectively. In the
Modification process, ; we analyze best Route for data transfer to the destination in any network.
Source sends dummy packets to analyze the best available route that connect the destination. It
analyses Capacity, Cost, throughput, Battery level to transfer the packets to the destination. Based on
the nodes dynamic behavior Self Routing system is implemented.

DOMAIN: Network Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6014. Location Mapping: LOCATION BASED SERVICES


DETECTION WITH ENHANCED SECURITY MECHANISM
INTEGRATION USING ANDROID
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, the widespread use of GPS-equipped smartphones and
Internet of Things devices, a huge amount of data with location information is being generated at an
unprecedented rate. In the Proposed system, we propose lightweight and scalable indexing and
querying services for big spatial data stored in distributed storage systems or graph-based systems. In
the Modification process, We deploy Mapping the services. As a part of User’s location privacy,
exact location is hidden & obfuscation is achieved based on the user’s policy status. User’s query is
compared with the related / synonyms keywords also. This system will help users to get services
nearby also. It will find the best services based on the feedbacks of the previous users.

DOMAIN: Android, Machine Learning, Security, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6015. DYNAMIC IDENTIFICATION OF SPAM WORDS,


PHISHING URLS, MISLEADING PRODUCTS & AGENCIES &
CATEGORIZATION OF MESSAGE SYSTEM

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Spam has become the platform of choice used by cyber-
criminals to spread malicious payloads such as viruses and trojans . In the Proposed system, the
problem of early detection of spam campaigns. Collaborative spam detection techniques can deal with
large scale e-mail data contributed by multiple sources; however, they have the well-known problem
of requiring disclosure of e-mail content. Distance-preserving hashes are one of the common solutions
used for preserving the privacy of e-mail content while enabling message classification for spam
detection. In the Modification process, use can create an android based application which principally
categories all the messages based on the keyword fileration like banking category based on the
keywords like OTP, Bank ID and so on. So apart from spam filtering we can also implement overall
filtering based concept also in this project.

DOMAIN : Machine Learning, Big Data, Block chain, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6016. Secure and Retrieve: EFFECTIVE AND ENHANCED


DATA SECURITY WITH ENCRYPTING, HASHING AND
CHUNKING USING MHT AND DATA RETEREVAL SYSTEM IN
CLOUD
ARCHITCETURE DIAGRAM:

DESCRIPTION: In the Existing system, Identity-based remote data auditing schemes can verify
data integrity and provide a simple identity authentication and management for multiple users. In the
Proposed system, an identity-based dynamic data auditing scheme which supports dynamic data
operations, including modification, insertion and deletion. As far as we know, there is still no other
identity-based data auditing scheme that supports dynamic operations. In particular, to achieve
efficient dynamic operations, we use the data structure of Merkle hash tree for block tag
authentication, which helps update data with integrity assurance. Analyses of security and
performance show that the proposed scheme is efficient and secure. In the Modification process, we
are implementing a system to recover the crashed files automatically. For that we are having TPA
Third Party Auditing to monitor the file crashes TPA will intimate the user that filer crashed . After
that we are using the concept Erasure code , it will recover the file from replica.

DOMAIN: Cloud Computing, Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6017. Sequence Check: REALTIME GENETIC SEQUENCE


VERIFICATION WITH DISEASE MAPPING AND
POLYMORPHISM

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Gene dependency networks often undergo changes with
respect to different disease states. Understanding how these networks rewire between two different
disease states is an important task in genomic research. In the Proposed system, a new differential
network inference model which identifies gene network rewiring by combining gene expression and
gene mutation data. Similarities and differences between different data types are learned via a group
bridge penalty function. In the Modification process, project is to recommend Diet pattern or any
other natural drugs which can be recommended to those people who is expected to get into the disease
in a course of time by verifying the mutated Genes.

DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6018. Track the Fruit: EFFECTIVE FARMING MONITORING,


QUALITY CHECKING, COST VERIFICATION OF FRUIT
TRACKING WITH AUTHENTICATION USING BLOCK CHAIN

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, The growing number of issues related to food safety and
contamination risks has established an immense need for effective traceability solution that acts as an
essential quality management tool ensuring adequate safety of products in the agricultural supply
chain. In the Proposed system, the utilization of smart contracts to govern and control all interactions
and transactions among all the participants involved within the supply chain ecosystem. All
transactions are recorded and stored in the blockchain's immutable ledger with links to a decentralized
file system (IPFS) and thus providing to all a high level of transparency and traceability into the
supply chain ecosystem in a secure, trusted, reliable, and efficient manner. In the Modification
process, apart from the proposed system, particular Product can be sold to the consumer directly and
the amount can be transferred directly to the provider. So that maximum cost can be given to the
farmer / producer. Cost estimation is always analysed by the server.

DOMAIN: Block Chain, Security, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6019. Find the Duplicate: DYNAMIC DETECTION OF


DUPLICATE CONTENT IN CLOUD USING MERKLE HASH TREE
AND PARALLEL VIDEO DOWNLOAD AND CHUNKING SYSTEM
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Traditional deduplication schemes always focus on


specific application scenarios, in which the deduplication is completely controlled by either data
owners or cloud servers. In the Proposed system, a heterogeneous data storage management scheme,
which flexibly offers both deduplication management and access control at the same time across
multiple Cloud Service Providers (CSPs). In the Modification process, , is apart from the proposed
system, We will be storing both Data & the videos in the server. For Data Bucketization, Data is split
into smaller Parts, Encrypted and stored along with the Index file. Requested Data is compared with
the Index file and Data is retrieved. The Videos are Split into smaller Chunks based on the time
Frames. User will request a Video along with the time Frame. Server will Stream the Video from the
Requested Time Frame of the User.

DOMAIN: Cloud Computing

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6020. Vote Block chain: COMBINATION OF BLOCK CHAIN &


MOBILE APPLICATION FOR EFFECTIVE VOTE FROM HOME
WITH POLLING MONITORING WITH ID INTEGRATION

ARCHITECTURE DIAGRAM

DESCRIPTION: In the Existing system, The electronic voting has emerged over time as a
replacement to the paper-based voting to reduce the redundancies and inconsistencies. In the proposed
system, This paper suggests a framework by using effective hashing techniques to ensure the security
of the data. The concept of block creation and block sealing is introduced in this paper. The
introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of
the polling process. In the Modification, part of the project, we integrate Aadhaar card linked Mobile
number is used for OTP Generation, only then the voter can cast the vote, This system will avoid
Proxy casting and Recasting.

DOMAIN: Blockchain, Android, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6021. Check Impersonate: DETECTION OF MISBEHAVIORAL


ACTIVITY AS COPY CAT NODES IN WIRELESS SENSOR
NETWORKS TO ENHANCE THE NETWORK SECURITY
ARCHITETURE DIAGRAM:

DESCSRIPTION: In the Existing system, wireless sensor networks are engaged in hazardous
and unreachable environments. In the proposed system, proposes a centralized system for replica
identification. We divide the network into segments and chose an inspection node for each segment.
Inspection node identifies a clone node by checking the node’s ID and cryptographic key. In the
Modification Process, The first one is based on a distributed hash table (DHT) in which Chord
algorithm is used to detect the cloned node, every node is assigned with the random key, before it
transmits the data it has to give its key which would be verified by the witness node. If same key is
given by another Node then the witness node identifies the cloned Node. Here every node only needs
to know the neighbor-list containing all neighbor IDs and its locations. We are implementing Chord
Algorithm, by location based nodes identification, where every region/location will have a group
leader. The Group leader will generate a random number with time stamp to the available nodes in that
location. Witness nodes verify the random number and time stamp to detect the cloned node. The
message is also encrypted for security purpose.

DOMAIN: Network, Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6022. My Sign: NEURAL NETWORK CONCEPT OF DYNAMIC


SIGNATURE VERIFICATION FOR USER CHECK SYSTEM

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Offline Signature Verification (OSV) remains a challenging
pattern recognition task, especially in the presence of skilled forgeries that are not available during the
training. In the Proposed System, OSV includes three steps: feature learning, active learning, and final
verification. We benefit from transfer learning using a pre-trained CNN for feature learning. We also
propose SVM-based active learning for each user to separate his genuine signatures from the random
forgeries. We finally used the SVMs to verify the authenticity of the questioned signature. In the
Modification process, We are implementing Multimodal based user verification system. Neural
network & Back Propagation Algorithm is used for signature Verification. After successful
authentication of signature verification, user will be login into their account.

DOMAIN: Machine Learning, Security, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6023. Categorize Easy: IMPROVISED DEPLOYMENT OF


CATEGORY SEGMENTATION WITH KEYWORD FILTERING IN
NEWS AND SOCIAL MEDIA USING BIG DATA
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, When a significant event occurs, many news articles from
different newsagents often report it. Moreover, these newsagents also provide platforms for their
readers to write comments expressing their views or understanding. Through digesting these reader
comments, we can gain insights into the reactions, suggestions, personal experiences, or public
opinions with respect to the emerging event. In the Proposed system, unsupervised model called
EFNS which is capable of capturing the intricate fine-grained associations among events, news, and
comments. We also develop a multiplicative-update method to infer the parameters and prove the
convergence of our algorithm. In the Modification, News are classified with respect to the category
classified based on the set of keywords assigned to the centralized server. We use Machine Learning
algorithm to principally classify the news according to the category. We assign the keywords like Ball,
Bat, Dhoni, Virat Kohli, Ground and other related words to the Sports Category, same way rest of the
keywords are assigned to the corresponding categories. We assign synonyms into this category We
also add Automatic Alert system in this Application about a particular Keyword or its synonyms so
that automatic notification is intimated to the customer even he / she misses out to view the News.
DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6024. Spot the Disease: DYNAMIC SYMPTOMS BASED


DISEASE DETECTION WITH DRUG PREDICTION USING BIG
DATA AND MACHINE LEARNING
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Big data mining-driven disease risk prediction has
become one of the important topics in the field of e-healthcare. However, without the security and
privacy assurances, disease risk prediction cannot continue to flourish. In the Proposed system, an
efficient and privacy-preserving disease risk prediction scheme for e-healthcare is proposed, hereafter
referred to as EPDP. Compared with the up-to-date works, the proposed EPDP comprehensively
achieves two phases of disease risk prediction, i.e., disease model training and disease prediction,
while ensuring the privacy preservation. In the Modification process, which is our Implementation
Our goal is to provide a tool to assist professionals and consumers in finding and choosing drugs. To
achieve this goal, we develop an approach that allows a user to query for drugs that satisfy a set of
conditions based on drug properties, such as drug indications, side effects, and drug interactions, and
also takes into account patient profiles, We also analyze the disease and best drug advised to that
specific patient through Big Data analysis. User can post the query through system or through Android
Application also. We also arrange appointment to the Best Doctor for the consultation.

DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6025. Find The Best File: EFFECTIVE BEST FILES


RETRIEVAL SYSTEM IN CLOUD ENVIRONMENT USING
STEMMING AND TOP K QUERY
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, cloud computing system, searchable encryption is


deemed as a core technology to realize data confidentiality protection and information retrieval
functions. However, the online payment problem and mutual distrust between cloud platforms and
users may hinder the wide adoption of cloud service. In the Proposed system, a blockchain based
multi-keyword ranked search with fair payment (BMFP) system, which leverages smart contracts to
verify the correctness and completeness of the search result, and automatically execute the fair
payment operations. In the Modification process, best files are identified using proposed system
methodology or using users preferences given during registration phase along with the search history.

DOMAIN: Block Chain, Cloud Computing, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6026. Find the Faulty: SENTIMENT ANALYTIC APPROACH


OF CONTENT CLASSIFICATION, USER AUTHENTICATION
WITH PRODUCT PURCHASE RECOMMENDATION

ARCHITECTURE DIAGRAM:

DESCRIPTION: In the Existing system, Online reviews have great impact on today’s business
and commerce. Decision making for purchase of online products mostly depends on reviews given by
the users. In the Proposed system, semi-supervised and supervised text mining models to detect fake
online reviews as well as compares the efficiency of both techniques on dataset containing hotel
reviews. In the Modification process, we are implementing an application to show the product based
on keyword. In this a set of keywords related to the product will stored on a dataset. While user search
for product using the keyword, system will analyze the keyword as well as the review which is given
as a content and suggest the best product. After purchase user can give review for that product using
transaction Id and OTP. And group the users who are all purchasing the product using collaborative
filtering, if any user purchase a new in a group that product will be send as a notification other people
on that group.

DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6027. Find the Truth: DYNAMIC DETECTION OF DATA


TRUTHFULNESS WITH VULGARITY REMOVAL AND
SOCIAL MEDIA ANALYSIS USING BIG DATA
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING SYSTEM, Misinformation or rumor also spreads through the
network, which may lead to serious public panic or economic consequence. Therefore, rumor control
has become one of the important issues in social networks research. In the PROPOSED SYSTEM,
Identifying trustworthy information in the presence of noisy data contributed by numerous unvetted
sources from online social media (e.g., Twitter, Facebook, and Instagram) has been a crucial task in
the era of big data. This task, referred to as truth discovery, targets at identifying the reliability of the
sources and the truthfulness of claims they make without knowing either a priori. In the
MODIFICATION Phase, we also implement removal of Vulgar words while posting the data in the
social media. We also analyze the people frustration / agitation / protest content posted by the public in
the social media. This is much more helpful for unwanted / criminal data input in the social media.

DOMAIN: Big Data, Machine Learning, Society and Social Cause

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6028. MULTI SECURED DYNAMIC DATA SHARING WITH


MULTI KEY VERIFICATION & USER BEHAVIOUR ANALYSIS
ARCHITECTURE DIAGRAM:

DESCRIPTION: In the EXISTING SYSTEM, Unfortunately, because of the frequent change


of the membership, sharing data while providing privacy-preserving is still a challenging issue. In the
PROPOSED SYSTEM, Our scheme can achieve fine-grained access control, any user in the group
can use the source in the cloud and revoked users cannot access the cloud again after they are revoked.
When a new user joins in the group or a user is revoked from the group, the private keys of the other
users do not need to be recomputed and updated. The MODIFICATION is our implementation. Both
Data owner & user registers in the cloud Primary & Secondary Keys are generated. Data Owner will
specify the set of permitted users to access the data s well as sets the Access Privilege limits (Read &
Write Policy). Mutual Key is generated by concatenating Primary & Secondary keys of both Data
Owner & User. Set of passwords are generated and mailed to the Data User based on Challenge Key
(CK) & Challenge Response Key System (CRK). After mutual key Authentication, CK is encrypted
and mailed to the user. CRK is verified for Data access. Cloud server will verify the Revocation list
before allowing. We also implement DDOS Attack detection based on same file request; Read / Write
Permission violation for data access.

DOMAIN: Cloud Computing and Network Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6029. INTEGRATION OF BLOCK CHAIN TECHNOLOGY FOR


EFFECTIVE TRACKING OF FUND TRANSFER AMONG THE
GROUP

ARCHITECTURE DIAGRAM:

DESCRIPTION : In the Existing System, We do all the banking transactions either we go directly
to the bank or it is all done through online banking system, but still lots of hacking is happening in the
online banking process. In the Proposed System, Group based Fund transaction is achieved. Effective
amount transfer is processed among the people in the group. We also improvise the concept by adding
Single card based Transactions in Block chain Technology. In the Modification, Single ID based
transaction is deployed to avoid illegal cash transaction. As it involves Block chain technology, all the
transaction cannot be traceable and that is the problem of the Indian Government. So our Application
is traceable secured cash Transaction among the group members.

DOMAIN: Block chain and Network Security

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST

JA 6030. DYNAMIC DATA ANALYSIS WITH MACHINE


LEARNING APPROACH FOR DATA POLARITY USING
SENTIMENT ANALYSIS
ARCHITECTURE DIAGRAM:

Big Data Training Set Polarity


User Post
Analysis Comparison Identification
Analysis

Negative Positive
Polarity Polarity

DESCRIPTION: In the Existing system, Sentimental analysis is an area in text mining where
opinion of people can be analyzed and classified into positive, negative or neutral. In the Proposed
system, The sentiments of the tweets that are tweeted on a twitter evaluated based on feature selection
of each score words. In order to select the best features Naive Bayes Classifier (NBC) is used for
training and testing the features of a words and also evaluating the sentiment polarity of each tweets.
In the Modification process, Twitter like Application is created and users Tweets are processed. Big
data is used in this project. Tweets are clustered and classified based on Keywords extracted. Tweets
are analyzed using Sentiment Analysis and Positive & Negative Tweets are classified.

DOMAIN: Machine Learning, Big Data, Society and Social Cause

YOUR OWN TOPICS / IDEAS / IEEE PAPERS


ALSO

BHARTIYA UDYOG BITS PILANI


ISO / IEC 20000 CERTIFIED RATAN - AWARDED PRACTICE SCHOOL ISO 9001 : 2008 CERTIFIED

2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370

You might also like