Professional Documents
Culture Documents
Java Project List Version 2022 23 V 3
Java Project List Version 2022 23 V 3
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing system, Credit card transactions have become common place
today and so is the frauds associated with it. In the proposed system, popular supervised and
unsupervised machine learning algorithms have been applied to detect credit card frauds in a highly
imbalanced dataset. In the modification process, we are developing this application for a Banking
sector particularly for a Debit / ATM \card section. User can create account and get the ATM card
from the bank. He can integrate all his accounts in other banks can be integrated in this single card
with unique PIN numbers accordingly. User behavior is monitored through HMM Model and he can
set up a formula based authentication. He can include all his family members’ accounts details also in
the same card. He can withdraw cash from their accounts after successful authentication of the
corresponding PIN numbers.
DOMAIN: Machine Learning, Big Data, Block chain, Society and Social Cause
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the EXISTING SYSTEM, DTN applications, there is not such of security in
message delivery and minimizing the forwarding cost important. In the PROPOSED SYSTEM, an
onion-based anonymous routing with multi-copy forwarding in which L copies of a message is
allowed. In the MODIFICATION, apart from the proposed system, we develop an effective system
which collects Feedback about neighboring nodes transmitting the packets. Every node’s review is
analyzed and best route is identified only the packets are transmitted
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, With more data storage needs turning over to the cloud,
finding a secure and efficient data access structure has become a major research issue. In the Proposed
system, a Privilege-based Multilevel Organizational Data-sharing scheme (P-MOD) is proposed that
incorporates a privilege-based access structure into an attribute based encryption mechanism to handle
the management and sharing of big data sets. In the Modification , of the project, is apart from
proposed system, Data is secured by encryption and stored in cloud. As per proposed system, we
implement High security with data encryption and the data is split into two parts and stored in two
parts. In medium secured, data is encryption and data is stored in single cloud. In the normal security
data is encrypted and stored.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Wind generation resources (WGRs) are the fastest
growing energy resources throughout the world. An accurate wind forecasting is critical to the
integration of a large amount of wind generation units into the grid operations. In the Proposed
system, machine learning based method to forecast wind power production, which uses both the wind
generation forecasted by a numerical weather prediction (NWP) model and the meteorological
observation data from weather stations. In the Modification process, we implement the application to
identify the types of soil, water source of that land whether that land is based on rain or bore
water .And suggest what of crop is suitable for that soil. So through this application we provide
application for the people to know about the agriculture. We predict the type of crop which one is
suitable for that particular soil, weather condition, temperature and so on. So for, we are using
machine learning with the set of dataset we are identify the crop for the corresponding soil.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing System, Electronic health record (EHR) has recorded the
process of occurrence, development, and treatment of diseases. So it has high medical value. Owing to
the private and sensitive nature of medical data for patients, the data sharing and privacy preservation
are critical issues in EHR. In the Proposed system, a medical data sharing and protection scheme
based on the hospital’s private block chain to improve the electronic health system of the hospital.
Firstly, the scheme can satisfy various security properties such as decentralization, openness, and
tamper resistance. A reliable mechanism is created for the doctors to store medical data or access the
historical data of patients while meeting privacy preservation. In the Modification process, we
improvise the security features of patient’s medical data by converting Image data into binary and
finally into cryptography and Medical Text data are encrypted and made steaganographed into an
image. Only authenticated people will retrieve the data others will get the duplicate / decoy file.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, The distributed, dynamic characteristics and the
collaboration requirement make it face many new security and privacy issues that cannot be solved by
the traditional public key or symmetric cryptosystem. In the Proposed system, Encryption,
authentication and access control with privacy preserving can be realized on the basic operations of
AC-PKC, which can meet various security requirements of fog computing based digital
manufacturing. In the Modification process, project is we deploy RFID based sensor in all the vehicle
in case of vehicle theft. In every vehicle RFID sensor is fixed and in every area RFID reader is fixed.
When the vehicle is stolen, the reader sends an alert to the police station. The Complaint is send to the
local server then to the centralized server. We also install Id based communication in case any new
device is applied on home. So in this modification we also identify the theft instrument like A/c, fridge
like home appliances will be stolen by anyone and they can sale that to anyone. If the anyone fix that
theft machine on any place an alert will be send to the police station.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Money laundering is often associated with criminal
activities. Anti-money laundering is thus regarded as an important task in many countries. In the
Proposed system, a two-phase intelligent method based on machine learning and data analysis
techniques for identifying suspicious money laundering accounts from the transaction data. The first
phase emphasizes on identifying every suspicious money laundering account while the second phase
further retrieves highly suspicious ones so that both the recall and precision for the identification of
money laundering accounts. In the Modification process, Apart from the proposed work from the base
paper; we also improvise the concept by analyzing other purchase made by the user like land
Registrations and Gold purchase. We consider in 3 major ways user could do money laundering
proce4ss, 1. Bank Transactions, 2. Land purchase and 3. Gold purchase. We combine all these 3
activities of user transactions and analyze the money laundering concept.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the EXISTING system, The data generated is a reflection of the environment
it is produced out of, thus we can use the data we get out of systems to figure out the inner workings of
that system. This has become an important feature in cybersecurity where the goal is to protect assets.
In the PROPOSED system, explore recent research works in cybersecurity in relation to big data. We
highlight how big data is protected and how big data can also be used as a tool for cybersecurity . In
the MODIFICATION process, we are implementing a Big Data based centralized log analysis system
to identify the network traffic occurred by attackers through DDOS, SQL Injection and Brute Force
attack. The log file is automatically transmitted to the centralized cloud server and bi g data is initiated
for analysis process.
DOMAIN: Cloud Computing, Big Data, Machine Learning, Society and Social Cause
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the EXISTING SYSTEM, Data compression could ameliorate the I/O
pressure of data-intensive scientific applications. In the PROPOSED SYSTEM, Data is splitted and
stored using dynamic virtualization concept and we do not break the original file into physical chunks
or blocks, but append a small number of references to the end of file. Each of these references points
to a specific block that is considered as a boundary of the virtual chunk. In the MODIFICATION
which is our Implementation logic, we deploy 3 Layers of connectivity. Root, Stem and Leaf are the
layers in our project. Assuming a College Global Data which is entirely stored in the Root layer,
Country wise data are classified and stored in the Stem layer and finally State / region wise data are
stored in the Leaf layer. ABE based keys are distributed among the corresponding admin so that access
policy is applied. This system will store the entire file as such in the root layer and as well as the data
is splitted and stored in the other two layers. This process will surely reduce the time for the fetching
any results from the table.
DOMAIN: Big Data, Data Mining, Cloud
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
LEAF
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing system, the widespread use of GPS-equipped smartphones and
Internet of Things devices, a huge amount of data with location information is being generated at an
unprecedented rate. In the Proposed system, we propose lightweight and scalable indexing and
querying services for big spatial data stored in distributed storage systems or graph-based systems. In
the Modification process, We deploy Mapping the services. As a part of User’s location privacy,
exact location is hidden & obfuscation is achieved based on the user’s policy status. User’s query is
compared with the related / synonyms keywords also. This system will help users to get services
nearby also. It will find the best services based on the feedbacks of the previous users.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Spam has become the platform of choice used by cyber-
criminals to spread malicious payloads such as viruses and trojans . In the Proposed system, the
problem of early detection of spam campaigns. Collaborative spam detection techniques can deal with
large scale e-mail data contributed by multiple sources; however, they have the well-known problem
of requiring disclosure of e-mail content. Distance-preserving hashes are one of the common solutions
used for preserving the privacy of e-mail content while enabling message classification for spam
detection. In the Modification process, use can create an android based application which principally
categories all the messages based on the keyword fileration like banking category based on the
keywords like OTP, Bank ID and so on. So apart from spam filtering we can also implement overall
filtering based concept also in this project.
DOMAIN : Machine Learning, Big Data, Block chain, Society and Social Cause
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing system, Identity-based remote data auditing schemes can verify
data integrity and provide a simple identity authentication and management for multiple users. In the
Proposed system, an identity-based dynamic data auditing scheme which supports dynamic data
operations, including modification, insertion and deletion. As far as we know, there is still no other
identity-based data auditing scheme that supports dynamic operations. In particular, to achieve
efficient dynamic operations, we use the data structure of Merkle hash tree for block tag
authentication, which helps update data with integrity assurance. Analyses of security and
performance show that the proposed scheme is efficient and secure. In the Modification process, we
are implementing a system to recover the crashed files automatically. For that we are having TPA
Third Party Auditing to monitor the file crashes TPA will intimate the user that filer crashed . After
that we are using the concept Erasure code , it will recover the file from replica.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Gene dependency networks often undergo changes with
respect to different disease states. Understanding how these networks rewire between two different
disease states is an important task in genomic research. In the Proposed system, a new differential
network inference model which identifies gene network rewiring by combining gene expression and
gene mutation data. Similarities and differences between different data types are learned via a group
bridge penalty function. In the Modification process, project is to recommend Diet pattern or any
other natural drugs which can be recommended to those people who is expected to get into the disease
in a course of time by verifying the mutated Genes.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, The growing number of issues related to food safety and
contamination risks has established an immense need for effective traceability solution that acts as an
essential quality management tool ensuring adequate safety of products in the agricultural supply
chain. In the Proposed system, the utilization of smart contracts to govern and control all interactions
and transactions among all the participants involved within the supply chain ecosystem. All
transactions are recorded and stored in the blockchain's immutable ledger with links to a decentralized
file system (IPFS) and thus providing to all a high level of transparency and traceability into the
supply chain ecosystem in a secure, trusted, reliable, and efficient manner. In the Modification
process, apart from the proposed system, particular Product can be sold to the consumer directly and
the amount can be transferred directly to the provider. So that maximum cost can be given to the
farmer / producer. Cost estimation is always analysed by the server.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM
DESCRIPTION: In the Existing system, The electronic voting has emerged over time as a
replacement to the paper-based voting to reduce the redundancies and inconsistencies. In the proposed
system, This paper suggests a framework by using effective hashing techniques to ensure the security
of the data. The concept of block creation and block sealing is introduced in this paper. The
introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of
the polling process. In the Modification, part of the project, we integrate Aadhaar card linked Mobile
number is used for OTP Generation, only then the voter can cast the vote, This system will avoid
Proxy casting and Recasting.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCSRIPTION: In the Existing system, wireless sensor networks are engaged in hazardous
and unreachable environments. In the proposed system, proposes a centralized system for replica
identification. We divide the network into segments and chose an inspection node for each segment.
Inspection node identifies a clone node by checking the node’s ID and cryptographic key. In the
Modification Process, The first one is based on a distributed hash table (DHT) in which Chord
algorithm is used to detect the cloned node, every node is assigned with the random key, before it
transmits the data it has to give its key which would be verified by the witness node. If same key is
given by another Node then the witness node identifies the cloned Node. Here every node only needs
to know the neighbor-list containing all neighbor IDs and its locations. We are implementing Chord
Algorithm, by location based nodes identification, where every region/location will have a group
leader. The Group leader will generate a random number with time stamp to the available nodes in that
location. Witness nodes verify the random number and time stamp to detect the cloned node. The
message is also encrypted for security purpose.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Offline Signature Verification (OSV) remains a challenging
pattern recognition task, especially in the presence of skilled forgeries that are not available during the
training. In the Proposed System, OSV includes three steps: feature learning, active learning, and final
verification. We benefit from transfer learning using a pre-trained CNN for feature learning. We also
propose SVM-based active learning for each user to separate his genuine signatures from the random
forgeries. We finally used the SVMs to verify the authenticity of the questioned signature. In the
Modification process, We are implementing Multimodal based user verification system. Neural
network & Back Propagation Algorithm is used for signature Verification. After successful
authentication of signature verification, user will be login into their account.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing system, When a significant event occurs, many news articles from
different newsagents often report it. Moreover, these newsagents also provide platforms for their
readers to write comments expressing their views or understanding. Through digesting these reader
comments, we can gain insights into the reactions, suggestions, personal experiences, or public
opinions with respect to the emerging event. In the Proposed system, unsupervised model called
EFNS which is capable of capturing the intricate fine-grained associations among events, news, and
comments. We also develop a multiplicative-update method to infer the parameters and prove the
convergence of our algorithm. In the Modification, News are classified with respect to the category
classified based on the set of keywords assigned to the centralized server. We use Machine Learning
algorithm to principally classify the news according to the category. We assign the keywords like Ball,
Bat, Dhoni, Virat Kohli, Ground and other related words to the Sports Category, same way rest of the
keywords are assigned to the corresponding categories. We assign synonyms into this category We
also add Automatic Alert system in this Application about a particular Keyword or its synonyms so
that automatic notification is intimated to the customer even he / she misses out to view the News.
DOMAIN: Big Data, Machine Learning, Society and Social Cause
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the Existing system, Big data mining-driven disease risk prediction has
become one of the important topics in the field of e-healthcare. However, without the security and
privacy assurances, disease risk prediction cannot continue to flourish. In the Proposed system, an
efficient and privacy-preserving disease risk prediction scheme for e-healthcare is proposed, hereafter
referred to as EPDP. Compared with the up-to-date works, the proposed EPDP comprehensively
achieves two phases of disease risk prediction, i.e., disease model training and disease prediction,
while ensuring the privacy preservation. In the Modification process, which is our Implementation
Our goal is to provide a tool to assist professionals and consumers in finding and choosing drugs. To
achieve this goal, we develop an approach that allows a user to query for drugs that satisfy a set of
conditions based on drug properties, such as drug indications, side effects, and drug interactions, and
also takes into account patient profiles, We also analyze the disease and best drug advised to that
specific patient through Big Data analysis. User can post the query through system or through Android
Application also. We also arrange appointment to the Best Doctor for the consultation.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION: In the Existing system, Online reviews have great impact on today’s business
and commerce. Decision making for purchase of online products mostly depends on reviews given by
the users. In the Proposed system, semi-supervised and supervised text mining models to detect fake
online reviews as well as compares the efficiency of both techniques on dataset containing hotel
reviews. In the Modification process, we are implementing an application to show the product based
on keyword. In this a set of keywords related to the product will stored on a dataset. While user search
for product using the keyword, system will analyze the keyword as well as the review which is given
as a content and suggest the best product. After purchase user can give review for that product using
transaction Id and OTP. And group the users who are all purchasing the product using collaborative
filtering, if any user purchase a new in a group that product will be send as a notification other people
on that group.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
DESCRIPTION: In the EXISTING SYSTEM, Misinformation or rumor also spreads through the
network, which may lead to serious public panic or economic consequence. Therefore, rumor control
has become one of the important issues in social networks research. In the PROPOSED SYSTEM,
Identifying trustworthy information in the presence of noisy data contributed by numerous unvetted
sources from online social media (e.g., Twitter, Facebook, and Instagram) has been a crucial task in
the era of big data. This task, referred to as truth discovery, targets at identifying the reliability of the
sources and the truthfulness of claims they make without knowing either a priori. In the
MODIFICATION Phase, we also implement removal of Vulgar words while posting the data in the
social media. We also analyze the people frustration / agitation / protest content posted by the public in
the social media. This is much more helpful for unwanted / criminal data input in the social media.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
ARCHITECTURE DIAGRAM:
DESCRIPTION : In the Existing System, We do all the banking transactions either we go directly
to the bank or it is all done through online banking system, but still lots of hacking is happening in the
online banking process. In the Proposed System, Group based Fund transaction is achieved. Effective
amount transfer is processed among the people in the group. We also improvise the concept by adding
Single card based Transactions in Block chain Technology. In the Modification, Single ID based
transaction is deployed to avoid illegal cash transaction. As it involves Block chain technology, all the
transaction cannot be traceable and that is the problem of the Indian Government. So our Application
is traceable secured cash Transaction among the group members.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370
AADHITYAA INFOMEDIA
TECHNOLOGIES
(FIRST (1ST) ISO 20000, SEI CMMI LEVEL 3
COMPLIANCE & ISO 9001 : 2008 CERTIFIED 20 YEARS
SOFTWARE DEVELOPMENT COMPANY) of TRUST
Negative Positive
Polarity Polarity
DESCRIPTION: In the Existing system, Sentimental analysis is an area in text mining where
opinion of people can be analyzed and classified into positive, negative or neutral. In the Proposed
system, The sentiments of the tweets that are tweeted on a twitter evaluated based on feature selection
of each score words. In order to select the best features Naive Bayes Classifier (NBC) is used for
training and testing the features of a words and also evaluating the sentiment polarity of each tweets.
In the Modification process, Twitter like Application is created and users Tweets are processed. Big
data is used in this project. Tweets are clustered and classified based on Keywords extracted. Tweets
are analyzed using Sentiment Analysis and Positive & Negative Tweets are classified.
2nd Floor, No: 39 / 20, North Usman Road, T.Nagar, Ch – 17, (Above Reliance Fresh & ACE Academy), Mobile : 9840947370