The Block chain-Based Online Loan Management System (BOLMS) is an innovative web application that leverages block chain technology to revolutionize the process of loan management for financial institutions. By utilizing the decentralized and transparent nature of block chain, BOLMS aims to enhance security, trust, and efficiency in the loan manag...
 Credit card fraud is currently the most common problem in the modern world. This is because internet transactions and e-commerce sites are on the rise. Credit card fraud occurs when a credit card is stolen and used for unauthorized reasons, or when a fraudster exploits the credit card information for his own interests. In today's environment, we'...
 Online product review on shopping experience in social media has promoted user to provide feedback. Nowadays, many e-commerce sites allow the customer to write their review or opinion on the product which they have bought from that site. The review given by the customer can build the good name of the product or make the product famous. Due to thi...
 A smart voting system using face recognition is a technique to overcome the traditional voting and EVM i.e Electronic Voting Machines. The system uses an Androidbased application to cast their votes from anywhere in the world. The face recognition technology increase the accuracy and security of the voting process. The proposed system would work ...
 The Placement Management System is an advanced platform designed for the effective tracking and evaluation of student placements in various businesses [10]. ReactJS, a web-based tool, has been utilized to develop an advanced platform known as the Placement Management System [9]. The PMS enables the placement cell to securely store student data in...
 Owners of vehicles can avoid unforeseen car problems by maintaining their vehicles regularly. Early detection of vehicle concerns is crucial to preventing them from developing into serious difficulties. Owners of vehicles frequently inquire about service at auto shops. Vehicle technicians examine crucial parts of the vehicle and fix problems to m...
 One of the most important features of any online service is the quality of its customer care. However, with the development of NLP tools, businesses are considering automated chatbot solutions to keep up with the increasing demand for their products and services. In view of this, the chatbot was developed using AIML java interpreter library Progr...
 With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK matrix to address the need for enhancing cyber resilience, which is an organization’s ability to recover...
 Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. The scammers are making money through fraudulent job postings. Online recruitment fraud has emerged as an important is...
 This paper presents a Blockchain-based framework for providing Blockchain services for purposes of stability in terms of consensus protocol infrastructure and governance mechanisms and accessible auxiliary services suitable for the vast majority of current business needs, including fundamental factors such as digital identity with autonomous identi...
 Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of cloud storage for secure search over encrypted data. A DSSE client can issue update queries to an honest-but-curious server for adding or deleting his ciphertexts to or from the server and delegate keyword search over those ciphertexts to the server. Numerou...
 Vehicular edge computing (VEC) has emerged as a solution that places computing resources at the edge of the network to address resource management, service continuity, and scalability issues in dynamic vehicular environments. However, VEC faces challenges such as task offloading, varying communication conditions, and data security. To tackle thes...
 Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things (IoT) incorporates power systems, particularly smart grid features and the delivery of new services from the utility side to the end user over a two-way communication channel. ...
 Blockchain interoperability has become an essential requirement for the advancement of blockchain technology in numerous fields. Enterprise organizations are increasingly utilizing permissioned blockchains to manage and store their organizations’ data and transactions in a private immutable ledger. Interoperability enables permissioned blockchain...
  The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an encrypted form, but it affects usability and flexibility in terms of effective search. Attribute-based searc...
 Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and in...
 Background: Alumni associations play a pivotal role in fostering lifelong connections between graduates and their alma mater, facilitating networking, mentorship, and philanthropic support. However, many alumni associations face challenges in maintaining engagement, facilitating donations, and providing valuable services such as job networking and ...
 Problem Overview Innovation is a key driver of growth and success in educational institutions. Tracking and measuring innovation excellence is essential for fostering a culture of continuous improvement, recognizing achievements, and guiding strategic decisions. However, identifying, quantifying, and presenting innovation indicators can be challeng...
 Background: There are numerous engineering and polytechnic institutes in Rajasthan running under the Department of Technical Education, Government of Rajasthan. Notably, during the admission process, there is a significant increase in enquiries from various groups, including students, their parents, and other stakeholders. These enquiries cover a...
 Description: The world today has bought on a need to pay increased attention to safety and security issues, for example, search and rescue operations, surveillance, and protection of critical infrastructure. These tasks are often labour intensive and potentially dangerous. This provides an incentive to create systems that aid operators to gain situ...
 Background 1. Article 243G of the Constitution of India acknowledges Panchayats as institutions of local self-government and mandates them to prepare plans for economic development and social justice. As local government, Gram Panchayats (GPs) are responsible for delivery of basic services to local citizens and address the vulnerabilities of poor a...
 Enhancing Patient Care with Advanced Ventilation System intends to revolutionize mechanical ventilation by creating an automated ventilator that uses an Ambu bag and has complete monitoring features. The system precisely sets and controls respiratory parameters such as tidal volume, respiratory rate, minute ventilation, peak and plateau pressures...
 To help consumers enjoy healthy food, technology investigation for food freshness sensing is conducted. In this study meat is selected as the detection target based on a consumer survey CO2, TVOC, and MQ135 are investigated. The results showed that CO2 and TVOC could be a used for food freshness sensing in a closed space such as box. In today's w...
 Background: The rehabilitation institutes involved in this activity face high therapy cases load and more number of student therapists with less number of therapy supervisors. Following this system in manual mode impedes providing prompt services. Description: Clinical services with respect to speech language therapy begins with patient allocatio...
 Suitable technological module for testing and monitoring of quality of medicines and consumables being received in hospitals would be required so that the system ensures necessary compilance and rejection of low quality supplies without manual intervention ...
 Hospitals/Departments shall be able to enter and Update Data in the Mobile Application which can be viewed by the Super Admin dynamically for efficient Implementation of Health and Family Welfare Schemes, other Health programmes and provide key inputs for policy formulation and appropriate programme interventions. This Mobile Application will fac...
 Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
 With the aim to provide "Right Quantity of "Right Product" on "Right Place" on "Right Time" in "Right Condition" at "Right Cost" for "Right People" and also to streamline the distribution of drugs to institutions and ensure availability of drugs at all times, a new, innovative system named Drug Inventory and supply chain Tracking system is required...
 Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes. An efficient registration portal is crucial for fostering growth, facilitatin...
 Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes. An efficient registration portal is crucial for fostering growth, facilitatin...
 Background- Agricultural productivity and food security are heavily dependent on the health of crops and livestock. Farmers, especially in remote or resource-limited areas, often face challenges in diagnosing and reporting diseases that affect their livestock and crops. Early diagnosis and timely reporting are crucial for effective disease manage...
 since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions). Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
 Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers. This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
 Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time. There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
 Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
 Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine. Precursor chemicals are essentia...
 Background: Use of cryptocurrencies like bitcoin, USDT, Monero etc. for drug trafficking activities are increasingly becoming common. The relative anonymity and speed provided by cryptocurrencies are misused by drug traffickers as a mode of transaction for drug sales and also as an asset to amass the proceeds of crime. Description: Drug trafficke...
 Background: Fuzzing is an automated process of identifying software vulnerabilities by supplying unexpected and faulty inputs to the software. The main aim of fuzzing is to identify the crucial edge cases where a software might fail. Therefore, fuzzing provides a crucial insight into the stability and security of the software. The process of fuzzin...
 Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure. This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Na...
 Background: Dark web is being used for illegal purposes and number of market places are being operated by the underground operators which facilitate illegal buying/selling of drugs/weapons/data leaks/counterfeit moneys/documents etc. Platforms, being anonymise to the LEA, make it difficult to identify the market place running on dark web mainly TOR...
 Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
 Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
 To design and develop an innovative digital forensics and incident response tool with an intuitive and accessible interface for investigators, that streamlines the process of importing evidence, conducting automated analysis, and generating detailed reports. The tool should feature an interface with clear navigation & real-time data visualization a...
 Description: Develop an application firewall for end-points that can identity and restrict access of application to external network/hosts. The application firewall should provide further granular control of restricting domains, IP addresses and protocols for each application. The firewall should be manageable through a centralized web console wh...
 Location based services provide many value added features to their mobile clients for information retrieval about their current location which can be processed to get the related information about their locality. In the Emergency cases the doctors nearby (from the app) will fill the gap by providing the information of all the doctors present near...
 The purpose of Online Food Ordering System is to automate the existing manual system by the help of computerized equipment’s and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardwa...
 The covid-19 pandemic intensified the deployment of technology in Nigeria, particularly in the realm of public service delivery in Nigeria. While this has brought series of benefits, there are equally some factors undermining the utilisation of the full potential of new technologies. This study focused on the effects of the deployment of technolo...
 The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research. This impact of modern digital computers as an irreplaceable tool for technological grow...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 Over the years students use manual ways to raise funds to support their election ambitions, help pay less privileged students school dues, sick friends and many other challenges which they face in the school. To overcome the problems of manual fund raising, the researcher has developed “an Online Campus Fund Raiser System”. The system which wil...
 Student attendance play significant role in order to justify academic outcome of a student and school as overall. Unfortunately, there is no automated attendance record keeping application available in Malaysia’s secondary schools. A preliminary study has been conducted in one of secondary schools in Selangor, Malaysia in order to understand the ...
 This application note addresses the design and implementation of a web-based RDBMS menu driven information system to provide the exhaustive information on existing farming systems prevailing in different Agro Climatic Zones in India (14) (29 centres across the country, India) . information system also recommends the required technological interve...
 Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed. The present paper aims to pro...
 Our society suffers a lot from the things that are thrown uselessly; these things may be beneficial to our society. On the other hand, communities suffer a lot of waste especially plastic waste; this has led to environmental pollution and depletion of natural resources. Therefore, this research aims to achieve sustainable development and achieve ...
 The Online Task Management System is designed from day to day working of department of a college. The project provides online platform to accomplish day to day department level task and provide information of the task to specified user. Admin can assign task, give notification and adds different users in this project. Important benefit of this pr...
 The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification. For student identification, a fingerprint recog...
 Online auction is a business model where the items are sold through price bidding. Bidding have the start price and ending time. Potential buyers in the auction and the winner is the one who bids the item for highest price within the stipulated time. For buying product online user must provide his personal details like email address, contact numb...
 Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions. Modernization will have both beneficial and negative effects. ...
 Cloud computing technology will bring to banks such advantages as cost savings, enhanced data processing capacity and improved quality of financial services. To further promote the application of cloud computing in the banking industry, the first and foremost task is to solve the security problem. Judging from the commercial banks, cloud computin...
 Now a day’s a mobile phone has become a necessary part of one’s life. There is a continuous rise in the number of mobile computing applications, centeredaroundpeoples daily life. In such applications, location dependent systems have been identified as an important application. Such application which presents the architecture and implementation of...
 This study aimed to identify the differences between state-of-the-art VPN solutions on different operating systems. It was done because a novel VPN protocol is in the early stages of release and a comparison of it, to other current VPN solutions is interesting. It is interesting because current VPN solutions are well established and have existed ...
 Online transactions have become a significant and crucial aspect of our lives in recent years. It's critical for credit card firms to be able to spot fraudulent credit card transactions so that customers aren't charged for things they didn't buy. The number of fraudulent transactions is rapidly increasing as the frequency of transactions increa...
 Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India. Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
 The main purpose of this project is to build a face recognition-based attendance monitoring system for educational institution to enhance and upgrade the current attendance system into more efficient and effective as compared to before. The current old system has a lot of ambiguity that caused inaccurate and inefficient of attendance taking. Ma...
 Face recognition based smart attendance system using IoT is a tool for recognizing the students face while taking attendance by using face biometrics based on monitor camera image capturing. In our face recognition based smart attendance project, a raspberry pi system will be able to find and recognize human faces fast and precisely in images. ...
 A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage. A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
 Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases. We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication. The primary step o...
 Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information. As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status. This article...
  Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper. The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
 Authenticating the students’ identity and authenticity of their work is increasingly important to reduce academic malpractices and for quality assurance purposes in Education. There is a growing body of research about technological innovations to combat cheating and plagiarism. However, the literature is very limited on the impact of e-authentica...
 As modern technology of human-computer interactions become important in our everyday lives, varieties of mouse of all kinds of shapes and sizes were invented, from a casual office mouse to hard-core gaming mouse. However, there are some limitations to this hardware as they are not as environmentally friendly as it seems. For example, the physical...
 Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status...
  IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryptio...
 Fingerprint authentication is one of the most popular and accurate technology. Our project is a fingerprint attendance system that records the attendance of students based on their fingerprint matches them against the database to mark their attendance. Fingerprint-based attendance system used for ensures that there is a minimal fault in gatheri...
 The utilization of cloud storage is increasingly prevalent as the field of cloud computing continues to expand. Several cloud data auditing schemes have been proposed within the academic community to guarantee the availability and integrity of cloud data. Nevertheless, several schemes rely on public key infrastructure and identity-based encrypt...
 Bus Pass Management System it is the web application that will manage all the records of pass which is issue by bus administrative. Bus Pass Management System which is a automatic system which delivering data processing in a very high speed in the systematic manner. This system helps bus administrative to keep records of bus passes. Before this...
 Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an a...
  As an emerging form of enabling technology, Web-based e-Health portals provide patients easier accesses to their healthcare information and services. We design and implement such an e-Health portal which can integrate many backend medical services effectively. A major challenge in designing such a system is to meet critical security requirement...
 Information security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users. Information Security can be achieved by using cryptographic techniques. It is now very much demanding to develop a system to ensure better long lasting security services for message transaction over the Intern...
 This paper centers around changing the process for having 'text' as secret word as individuals will generally frequently fail to remember their passwords and need to recuperate it. Proposing the procedure for having picture as a secret word which is kept encoded in a data set and unscrambled and matched to check for approval of client. It has been ...
 Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search.Recently, there has been a proliferating growth of the size of multi-dimensional datasets, the input-output space dimensionality, and data structures. Hence, the conventional machin...
 Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and testing phases are more precise. An important concept to analyze when defining ML algorithms co...
 Machine learning and its subfield deep learning techniques provide opportunities for the development of operator mental state monitoring, especially for cognitive workload recognition using electroencephalogram (EEG) signals. Although a variety of machine learning methods have been proposed for recognizing cognitive workload via EEG recently, there...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 The detection and prevention of a network intrusion is a major concern. Machine Learning and Deep Learning methods detect network intrusions by predicting the risk with the help of training the data. Various machine learning and deep learning methods have been proposed over the years which are shown to be more accurate when compared to other networ...
 The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learningbased key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medi...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 Drowsiness in driving causes the major road accidents. Now a day’s drowsiness due to drunken driving is increasing. If driver is found to be drowsiness in eyes more than 5 secs, then the eye blink sensor senses the blink rate. If the eyes are found to be closed, then the speed of the car slows down. In our proposed system, along with drowsiness, al...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 The detection and prevention of a network intrusion is a major concern. Machine Learning and Deep Learning methods detect network intrusions by predicting the risk with the help of training the data. Various machine learning and deep learning methods have been proposed over the years which are shown to be more accurate when compared to other networ...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 In India, Liquified Petroleum Gas Cylinder is used as the primary source for cooking. The level of Liquified Petroleum Gas (LPG) Cylinder decreases gradually on daily usage. Upon complete utilization of the LPG Cylinder, a new cylinder can be availed by booking with LPG vendors which may take up to two to three days. Users have no provision to view...
 The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...
 In modern world, the IoT is at its peak. The world is becoming smarter, the home automation is emerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation tec...
 One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...
 In this modern world, computer becomes more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our daily life. Computerized systems can be used for scheduling the jobs, update the stock details, for complex calculations, and also used for preparing bills to customers. Here we devel...
 Iris tumors, so called intraocular tumors are kind of tumors that start in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris tumor detection system since the available techniques used currently are still not efficient. The combination of the image processing different techniques ...
 Cables are put underground to stay away from pointless obstruction. These force cables convey electrical force and when these cables are put underground it is extremely hard to decide the specific area of the deficiency happened. There are numerous elements or purposes behind a deficiency to happen as, for example, burrowing, tremor, development wo...
 In three level graphical, text and color file security system the authentication is done by image representation password. Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce co...
 In this paper, we propose a system that takes the attendance of students for classroom lecture. Our system takes the attendance automatically using face recognition. However, it is difficult to estimate the attendance precisely using each result of face recognition independently because the face detection rate is not sufficiently high. In this pape...
 This paper focuses on changing the system of having ‘text’ as password as people tend to often forget their passwords and have to recover it. Proposing the system of having picture as a password which is kept encrypted in a database and decrypted and matched to check for authorization of user. It has been scientifically proven that it’s easier for ...
 The Internet of Things is most useful in communicating devices (things) with each other by using the internet nowadays. Most of sensor device is connected with IoT is more popular in recent times. In this paper a model based in IoT is proposed with aim to prevent accidents due to drink-driving and drowsiness of driver. It includes analysis of alcoh...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Sun drying is perhaps one of the oldest methods of food preservation that has been practiced for centuries. The direct usage of solar radiation which is renewable and abundant favours farmers that harvest and process at small quantity. As technology advances, an alternative to sun drying evolves to maximize the potential of solar radiation and this...
 Water harvesting is a traditional conservation technique, and there is general agreement that conserving water will promote agricultural production, especially in arid and semi-arid regions. The high competition for water and land has led to scarcity of water resources, and it has also threatened the world's food security. Recent technological deve...
 Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...
 A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...
 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...
 The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas...
 During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...
 Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...
 Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...
 Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continui...
 Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...
 This paper presents an effective approach for detecting abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classified as a 2-bit code. Subsequently, we introduce a framework to identify static foreground regions based on the temporal transi...
 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...
 Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from th...
 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...
 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...
 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...
 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...
 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...
 A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). The most common computer authentication method is to use alphanumerical usernames and p...
 Changes in consumer preference for safe food have led to innovations in packaging technologies. This article reviews about different smart packaging systems and their applications in food packaging, packaging research with latest innovations. Active and intelligent packing are such packaging technologies which offer to deliver safer and quality pro...
 The dairy industry generates excessive amounts of waste and by-products while it gives a wide range of dairy products. Alternative biotechnological uses of these wastes need to be determined to aerobic and anaerobic treatment systems due to their high chemical oxygen demand (COD) levels and rich nutrient (lactose, protein and fat) contents. This wo...
 This study provides a broad perspective on the main trends regarding the use of pesticides in developing countries and their impacts on human health and food security. Information is provided on the challenges of controlling these hazardous substances, along with the extent to which pesticides banned within the European Union (EU) are exported to t...
 In recent years, our insight into these shifts and their impact on water availability has increased. However, a similar detailed understanding of the seasonal pattern in water demand is surprisingly absent. This hampers a proper assessment of water stress and ways to cope and adapt. In this study, the seasonal pattern of irrigation-water demand res...
 Agriculture and climate change are internally correlated with each other in various aspects, as climate change is the main cause of biotic and abiotic stresses, which have adverse effects on the agriculture of a region. The land and its agriculture are being affected by climate changes in different ways, e.g., variations in annual rainfall, average...
 In this paper we are proposing an adaptive and real-time approach to resolve real-time fnancial data integration latency problems and semantic heterogeneity. Due to constraints that we have faced in some projects that requires real-time massive fnancial data integration and analysis, we decided to follow a new approach by combining a hybrid fnancia...
 Attendance management is the act of managing attendance or presence in a work setting, which maximizes and motivates employee attendance thereby minimizing loss. Not only does it affect productivity, it can cost the company profits or even additional contracts. For the industrial sector attendance management system can develop alacrity among the wo...
 India’s development trajectory is marked by growing economic prosperity but high inequality, which often exacerbates the existing rural– urban divide. One of the current policy instruments to address this divide is the National Rurban Mission, which aims to improve infrastructure and service provision, facilitate regional development and attract in...
 The National Social Assistance Programme consists of five social assistance transfers, which form the core of India’s fledgling minimum social protection floor. These transfers have been scaled up over the last decade and further steps will soon be taken towards their universalization with exclusion criteria. This paper provides a rigorous evaluati...
 With the development of cloud server, reversible data hiding in encrypted domain has received widespread attention for management of encrypted media. Most of existing reversible data hiding methods are based on stream ciphers, which are mainly concerned with data storage security. While homomorphic ciphers focus on data processing security, which i...
 Information security is a vital aspect of Intelligent Transportation Systems (ITS) involving public data collection. Road images captured for use as a basis of traffic manipulation in ITS should take all precautions for encrypting the wirelessly transferred image. This paper presents an Enhanced Cipher Block Chaining (ECBC) operation mode to ensu...
 The term Web 2.0 describes web-based applications such as social networking sites, wikis, and blogs that facilitate collaboration, creativity, and sharing among users. Web 2.0 applications are often enabled by reusing content from other web-based applications or web services. This trend is largely parallel to the principles of service-oriented arch...
 Slums have become an unavoidable reality in many countries of the world, particularly the developing world. Although there are various slums upgrading models and approaches to address the urban poverty in developing countries, the number of slum dwellers has actually grown and the problem is expected to become worse. Other public policies have to e...
 The price volatility and scarcity have been became a great problem in the distribution system of seasonal staple food produced by agro industry. It has salient supply disparity during the harvest and planting season. This condition could cause disadvantages to the stakeholders such as producer, wholesaler, consumer, and government. This paper propo...
 Design of fishing boat for Pelabuhanratu fisherman as one of effort to increase production of capture fisheries. The fishing boat should be proper for the characteristic of its service area, as ;capacity of fishing boat up to 60 GT, the fishing boat has minimum 6 fish holds and location of fish hold in the middle body, the fishing boat hull has the...
  The primary point of this paper is to talk about the utilization of cloud storage administrations, empowering people to store their data in the cloud and avoid the nearby information stockpiling and upkeep cost. Various information respectability inspecting frameworks have been executed to ensure the nature of the information put awa...
 This study aims to control charging and discharging the battery for hybrid energy systems. The control system works by selecting the right energy source to supply voltage to the load. And also this control system can regulate charging and discharging the battery automatically. The voltage source consists of two energy, namely from the battery and D...
 This paper presents the development and implementation of " bank locker security system basedon RFID and GSM technology" which can be organized in bank, secured offices and homes.In this system only authenticperson can be recovered money from bank locker. We have im plemented a bank locker security system based on RFID and GSM technology containing...
 This paper presents a novel approach to design obfuscated circuits for digital signal processing (DSP) applications using high-level transformations, a key-based obfuscating finite-state machine (FSM), and a reconfigurator. The goal is to design DSP circuits that are harder to reverse engineer. Highlevel transformations of iterative data-flow graph...
 Emerging nonvolatile memories (NVMs), such as MRAM, PRAM, and RRAM, have been widely investigated to replace SRAM as the configuration bits in field-programmable gate arrays (FPGAs) for high security and instant power ON. However, the variations inherent in NVMs and advanced logic process bring reliability issue to FPGAs. This brief introduces a lo...
 Ternary content-addressable memory (TCAM)-based search engines generally need a priority encoder (PE) to select the highest priority match entry for resolving the multiple match problem due to the don’t care (X) features of TCAM. In contemporary network security, TCAM-based search engines are widely used in regular expression matching across multip...
 In practical CCTV applications, there are problems of the camera with low resolution, camera fields of view, and lighting environments. These could degrade the image quality and it is difficult to extract useful information for further processing. Super-resolution techniques have been proposed widely by the researchers. However, many approaches are...
 Parallel matrix processing is a typical operation in many systems, and in particular matrix–vector multiplication (MVM) is one of the most common operations in the modern digital signal processing and digital communication systems. This paper proposes a faulttolerant design for integer parallel MVMs. The scheme combines ideas from error correction ...
 Stochastic computing (SC) is a digital computation approach that operates on random bit streams to perform complex tasks with much smaller hardware footprints compared with conventional binary radix approaches. SC works based on the assumption that input bit streams are independent random sequences of 1s and 0s. Previous SC efforts have avoided imp...
 Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD), uses data randomization to pr...
  This paper aims to develop a tool for predicting accurate and timely traffic flow Information. Traffic Environment involves everything that can affect the traffic flowing on the road, whether it’s traffic signals, accidents, rallies, even repairing of roads that can cause a jam. If we have prior information which is very near approximate about a...
 Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks or ...
 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
 Nowadays, we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. The most important of feature of any home security system is to detect the people who enter or leave th...
 With the rapid development of wireless communication technology, people's life has undergone great changes. In recent years, the comfort and safety of the building environment have become a universal concern. However, building fire is the greatest threat to building safety. In consideration of the current issues on building security, the design app...
 The RFID G Technology is the Tag Grid technology. One of the technical challenges for the modern society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with...
 This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is p...
 The application of embedded web technology in the remote monitoring system has given rise to the technological change in the field of industrial control. Nowadays the management of the domestic laboratories in the research institute and universities has issues of poor real time, high cost and low precision. This paper comes up...
 In 1930's, Mr. Luther G. Simijian initiated building first of kind and not so successful version of Tellering machine. He did register related patents. He initially came up with an idea of machine fixed in a wall called as "Hole in the wall machine." It would allow customer to make financial transaction without entering the bank. John S. Barron had...
 This paper deals with Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to a breach of security. This article explains access control and its relationship to other security services such as authentic...
 Security is a too much important thing to be concerned in our day-to-day life. Everyone wants to be secured as much as possible. Knowing our home or shop is secure provides us peace of mind. We know now a day’s theft has become a major issue. In this paper we design an advanced electronic security system by using small PIR and IR sensors...
 In automobile field, the security and theft prevention are one of the main areas in current scenario. The security goals are achieved by the GSM, GPS technology. But it is commonly used for the four wheeler and not in the two wheeler. Using these technologies, we can only track and monitor the vehicle. Previously, GPS is used to get the current pos...
 This paper deals with a novel sensor network system designed for gathering disaster information including physical environmental information and potential signals of survivers. The system consists of numerous sensor probes and a central database server. The sensor probes organize their own ZigBee network, which is managed by the central database se...
 Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient’s blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart d...
 This paper presents a smart home management system in which a community broker role is used for integrating community services, thereby reducing the workload of community management staff, providing electronic information services, and deepening the community’s integration with the surrounding environment. At the home end, a home intranet was creat...
 This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...
 Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. As security is becoming the primary concern of society and hence having a security system is becoming a big requirement. Video surveillance plays a vital role in securi...
 In recent times, role of women in all industries have increased. Simultaneously, crime against women is also increasing day by day and this is the high time to provide safety for all working women. This paper focuses on women tracking system for all working women. There is no powerful existing system to prevent the crime rates against women. This s...
 The main goal of this paper is to design a locker security system using RFID and GSM technology which can be organized in bank, secured offices and homes .In this system only authenticated person can recover money from locker. We can implement a locker security system based on RFID(Radio –frequency identification) and GSM technology containing door...
 A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
 This paper proposes a new ZigBee-based communication for multifunctional electronic current transformers (ECTs), which are used in overhead and underground line monitoring. To tackle ZigBee’s low transmission rate, the proposed method involving a transmission strategy can make the ZigBee-based communication satisfy both measurable and protective pu...
 Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among a group that counters insider threats of legitimat...
 Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum ...
 Data mining plays the key role in crime analysis. There are various number of different algorithm in previous research papers like virtual identifier, pruning strategy, support vector machines and apriori algorithms. “VID” (Virtual ID) is to find relationship between record. Then the “Apriori algorithm is used to around six hundred seconds to detec...
 Symmetric key cryptography is a common cryptographic technique using the same key at both the transmitter and receiver side. The main advantage of symmetric key encryption is its less computational cost compared to its counterpart-public key encryption. In this work a new symmetric key encryption scheme is proposed. Rather than using normal binary ...
 This paper deals with the design of Internet billing system, in which it is possible pay invoices electronically. This approach is implemented via virtual banks, in which the process of money transfer can be implemented. In other hand many applications can be realize such as; deposit e-money, withdrawal e-money and determine account balance. A Gate...
 These methods of paying fees have not been efficient enough especially during periods of tests and examinations when most of the students are paying fees to meet the requirements for entering examination rooms. The process of paying fees is characterized by long queues, too much waiting by students and congestion at banks where payments are made. T...
 In modern days, people are getting too busy in their works but still they need to spend time in shopping malls. In Shopping malls, customers face a difficulty to follow a queue for the process of billing, which takes a long time under huge crowd. Customer thought that, to avoid the standing time in the billing section at shopping malls. To overcome...
 E-Leave Management System and Payroll (E-LMSP) project is a web application and mobile application which can be used for all the organization or company that will ease the employees leave management. This is due to the problem in using manual system which can cause damage, missing and can be costly as well. In addition, it also will cause delay in ...
 Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
 This paper proposes a model Online Cashless Payment System which is based on Finger print in Aadhaar Card. Unique mark installment framework is utilized for different sorts of instalment framework as opposed to conveying cards and to remember the each card passwords and pin numbers. Todays current big issue in e-payment system is providing security...
 In this paper, we propose a real-time bus alert system which provides information about the bus arrived at the bus station travels to the desired destination of the blind or not. A blind unit is given to the blind person, in which keys are used for giving input for a destination. A bus unit is attached to the bus in which a unique RF-Id is encoded ...
 Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
 In many application areas mobile robots need the ability to interact with people. In order to be able to communicate with even untrained users, the interaction should be as natural as possible. One of the preconditions of a natural interaction is that the robot focuses the person it is interacting with. In this paper we present a technique that com...
 The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to ...
 Every cooperate organization, institution or government agency requires data and good quality information to function effectively. It is not an over statement to say that many organizations, institutions or government agencies have become critically dependent on the use of database system for their successes especially in the hospital. Data collect...
 Election is a process of selecting the right candidate to rule our nation. The voting system in India is insecure, because voters need to stand in a queue for a long time and the only security check is voter ID verification, which are fake nowadays. To overcome this we are introducing Online voting system which provides security, authentication, ac...
 Invoicing and billing application for different business purposes helps mainly the service providers and freelancers to manage, send professional invoices online, and track its status. Generally, all the small companies in Saudi Arabia facing a various issues for managing and tracking the invoice status of customers, which mostly back to the lacks ...
 The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a sec...
 As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
 This project is aimed at developing an online leave management system that is of importance to either an organization. The Leave Management System (LMS) is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the workflow of leave applications and their approva...
 Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. The process of hiding the information in other information without altering is known as Steganography. It is the art of hiding message inside a multimedia block. Attacks, misuse or ...
 As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
 The purpose of Medical Shop Management System is to automate the existing manual system by the help of computerized equipments and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardwa...
 Air transport industry has gradually increased its share of global passenger and freight traffic, and this trend has accelerated in the last 40 years. For the past decade, air-freight traffic growth has outpaced air passenger traffic growth by 1-2% each year. In the past, air-freight sector offered limited services, with heavy reliance on several i...
 This is a live project which was developed for a local Vehicle Agent. It is useful to the Agent to maintain the Customers details, Sales Details, Company items and services and also Vehicle Details. If any customer buy a vehicle in loan that persons vehicle will recognizes with the help of vehicle no. Vehicle Recognition System, which will cover th...
 Online assessments are a significant technique for assessing the achievement capability of understudies. This examination exertion the people viable were understudies who might be joining up with PC courses or Technologies Registrations. A model of an online arrangement assessment framework is depicted from the point of view of the examination exer...
 The Main Objective of this System is to plan a framework to keep up impressive data of the workers, offices, Customer points of interest for any BPO association. Call Center Executer is an undeniably vital ability as the utilization of call focuses turns into a well-known technique for concentrating data administrations, streamlining request taking...
 In today’s world, most of the people utilize Online Social Networks (OSN) to mingle with people of their interest. Various new and innovative photo sharing features attract many users and kindle them to post several photos. The user has the privilege of posting any photo on his/her profile and share it with a range of people. Unfortunately, it may ...
 The main aim of any canteen/mess is to provide clean and fresh food to the students/employees of the organization. In many organizations, entire mess management and billing calculations are done manually till date. It is very time consuming and increases the chances of performing calculation mistakes. It would be possible to do the same work within...
 One of the essential services on the internet is the Email Service. The Email server can be vulnerable to several types of cyber-attacks. This research aims to analyze and improve the Email service. This mail is the process of following the path and function performed by the receiver on the received mail. The development of this system serves as a ...
 The project is mainly aimed at providing a secured and user friendly Online Voting System. The problem of voting is still critical in terms of safety and security. This system deals with the design and development of a webbased voting system using fingerprint and aadhaar card in order to provide a high performance with high security to the voting s...
 Most monetary transactions on the world have a tendency to be electronic, in light of the fact that it gives effectiveness, security, precision and unwavering quality.in Sudan staffs at the ticket counter are using the manual system to sell tickets and manage the bus seat booking. Travelling companies spends a substantial cost to manage the reserva...
 Chat applications have become one of the most important and popular applications on smartphones. It has the capability of exchange text messages, images and files which it cost free for the users to communicate with each other. All messages must be protected. The aim of the paper is to propose chat application that provides End-to-End security that...
 Automation plays an important role in 21st century. The principal point of this project is to structure a framework which is prepared to do consequently deducting the measure of the petrol dispensed from user card dependent on RFID innovation and send the data of transaction of petrol and the sum to the proprietor through the Internet of Things (Io...
 Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access. Optical image watermarking techniques generally have advantages of parallel high-speed processing and multi-dimensional capabilities compared with digital approaches. This paper provides a comprehensive review o...
 The railway reservation system facilitates the passengers to enquiry about the trains available on the basis of source and destination, booking and cancellation of tickets, enquiry about the status of the booked ticket, etc. The aim of case study is to design and develop a data base maintaining records of different trains, train status and passenge...
 Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden camera, shoulder surfing, key loggers, spyware and...
 Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. Fingerprint Based ATM is a desktop application where fingerprint of the user is used as an authentication. The finger print minutiae ...
 Shopping is an activity of buying goods from the shop. Shop is a place where a customer can fulfil all their needs. Android based systems should be technically implemented in such a way that ensures adequate user requirements. The proposed methodology is implemented to allow the person to do shopping using fingerprint authentication of customer and...
 This Web Application helps user to register individual home or apartment to assist you in finding the perfect rental home or property. Also we can find your next rental from search view in your targeted area. This website is designed to attend to all our needs from buying property, selling property or renting/leasing of property in India. Here we f...
 In today’s age, education is the most important way of achieving success. When we discuss education, it is imperative to mention tests and examination. Examinations prepare students in their quest for knowledge. So, having a proper examination paper and format is quite necessary. Now the traditional method of generating question paper has been manu...
 Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalys...
 With the increase in the consumption of energy and population, there is a great need to conserve energy in every way possible. The inability to access and control the appliances from remote locations is one of the major reasons for energy wastage in Ghana. This project presents the development and implementation of a Global System for Mobile Commun...
 Sales enterprise in management appears fragmented and incoherent customer information make enterprise management or relevant personnel cannot view all of the data and related information, customer information that results could not keep consistent and complete, use the computer to car sales information management, has the crafts incomparable advant...
 Due to their tight schedule nobody is going to the polls these days. There are numerous causes, some need to go to the polls, many of us may have to wait for long periods because of their strict schedules. So we created a voting system on the Internet. But there are some disadvantages to this system. Attackers legally receive customer passwords and...
 Inventory constitutes a major component of working capital. To a large extent, the success and failure of a business depends upon its inventory management performance. The basic objective of inventory management is to optimize the size of inventory in a firm so that smooth performance of production and sales function may be possible at minimum cost...
 In this modern world everyting depends on technology. Without technology we can not do anything. Student Information is one of the important things of our School, Collage, & University life. Everybody purchases some thing. But our life is very busy. So we do not have enough time to total Information of a Student. So the Student Information system w...
 Speedy and efficient information processing is crucial to our socially and highly developed technology. Computer can help the intolerable burden of handling the ever increasing amount or information with government department, public services and business concerns expected to contain because of their ability to analyze information as well as to r...
 Browsing Centre Management System is a task which helps with keeping the Record of whatever the deals from a shop (entire vender), additionally it monitor remaining balance which due in the wake of offering the item. Through this undertaking, we keep up the warranty given on specific items alongside total data identified with that product. Computer...
 With the tremendous growth of the Internet and the expansion of the World Wide Web, more and more information is being put on the Internet. The Internet creates a global marketplace that breaks the barrier of time, place and distance, within which conducts Electronic Commerce. E-Comrnerce is a system that includes not only those transactions that c...
 Tendering processes are considered to be a suitable mechanism for governments to fairly assign contracts for construction projects and procurement. The demand for efficiencies to be created in the process has resulted in a significant number of governments implementing e-tendering systems. E-tendering systems generally involve the submission of ten...
 Now a days Attacker’s launch attack campaigns targeting the zero day vulnerability, compromising internet users on a large scale. The first response to such campaigns is to detect them and collect sufficient information regarding tools, techniques used to exploit the vulnerability. Hence effective capturing of the attack data and its timely dissemi...
 E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better in...
 Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of securit...
 This paper presents a proper solution for a medium enterprise or public institution that enables easier management of the digital documents library and eases the common document workflows. The main problem addressed by the proposed project is the complexity of document workflows in public administration. Documents that need to be filled out and sig...
 Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The...
 The purpose of developing this software project is to fully automate salary system for an organization sweden sports academy. This software is capable of calculating monthly salaries, tax and social security of employees of that organization. On the basis of certain formulas it will generate files as an output such as bank files and salary slips et...
 The purpose of this thesis was to show how to use Zend Framework to connect PHP applications to the cloud.To find out how easy it is for developers with basic knowledge of the Zend Framework, to incorporate cloud computing in their applications. In order to do this, a blog application was developed using the Zend Framework and the upload files func...
  Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks...
 Library management, its operation has never been easy to run effectively manually, lending of books, records of returned books, books in the library, its shift and many more. This research work will dwell more on developing and implementing a comprehensive library management system capable of handling the library operation, like book lending, retri...
 The Election Schedule for the conduct of General Elections as well as for the by-elections, as the case may be, is decided by the Chief Election Commissioner in Pakistan. The current system is being operated manually. Votes are polled manually. All the record of voters, candidates, polling stations, regions detail and parties’ information are store...
 There have been many applications oriented around controlling and tracing the lifecycle of project, tasks, and requirements. In the beginning of this work, the author provides an introduction into the problematic of the above-mentioned tracing, mentioning also software development methods and how they relate to this theme. In the second part of the...
 As an emerging form of enabling technology, Web-based e-Health portals provide patients easier accesses to their healthcare information and services. We design and implement such an e-Health portal which can integrate many backend medical services effectively. A major challenge in designing such a system is to meet critical security requirements, s...
  The Java Application World application world soft- ware is totally user oriented and only users access the software programs. The user can use multiple applications that re made with the help of java. In the J Appsor the Java application world, the user can use calculator, word count tool, ip finder etc java run software. Any particular IDE can...
 This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
 Currently there exist severe fragmentation, different development standards, lack of sufficient support and other problems in the development of college student information management system. Therefore accelerating the development of student information management system is of necessity to improve universities’ management and administration efficie...
 In any developing country democracy plays an important role where a leader for a country is elected by the citizen. One of the main issues in the conventional voting system is that it consumes lots of man-power as well as resources and the preparation have been started many days before the commencement of the election. During this preparation some ...
 This paper describes the importance of ERP in manufacturing industries and examines the various articles published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The report is about windows based application. The main idea of this pap...
 Management of leave and payroll are critical operations for each institution as it has effect on payment of staff memebers of any institution and also to complete it accurately and on time. The Current Leave and Payroll Manager both are paper based systems. Though the attendance is Biometric but still it is not that much efficient in terms of matte...
 In the present scenario, any type of communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. T...
 In today’sera a new generation of technology is transforming the world of computing. Advances in internet based data storage, processing and services collectively known as cloud computing have emerged to complement the traditional model of running software and storing data on personal devices or on premise networks. Today cloud computing provide hi...
 Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous associations are not prepared to execute distributed computing innovation since a...
 Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based bio...
 The purpose of this project is to develop an on-line banking system that provides customers with the facility to check their accounts and do transactions on-line. The system will provide all the banks facilities to its customers when their authentications [user id and password] match, including viewing account information, performing transfers, giv...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
 In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...
 Research efforts in trust evaluation has evolved to provide security in Wireless Sensor Networks (WSNs), while being dependent on external parameters and network topology. Existing node level trust evaluation in WSNs evaluate trust over 1-hop assuring trustworthiness of an immediate node. This paper proposes trust evaluation using the intrinsic pro...
 This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme ...
 Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being intercepted, interrupted or modified. However, for the last twenty years, the amount of informatio...
 Wireless Ad Hoc Networks are self-organizing networks deployed without any centralized infrastructure. Flooding based Denial-of-Service (DoS) attacks were targeting the constrained resources of mobile nodes as well as the network. Route Request (RREQ) flooding attack is one of the prominent DoS attacks launched from the network layer in which the a...
 Here were fabricating the charcoal mixing and grinding machine. It is used for mixing the charcoal finely for the several purposes. Here were developing this concept for the main reason is, reducing the manual effort and also increasing the productivity. This project is made done by these components, motor, belt, pulley, bearings and the hopper. Th...
 In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
 Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
 Wireless Sensors Networks (WSN) is the self-configured wireless network which consists of a huge measure of resource-restrained Sensor Nodes (SN). In WSN, the key parameters are effectual energy utilization and security. The adversary could send false information because of the Malicious Nodes' (MNs') presence. Thus, to shun security threats, it is...
 Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
 This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
 The proliferation of IoT devices in society demands a renewed focus on securing the use and maintenance of such systems. IoT-based systems have a significant impact on society and therefore such systems must have guaranteed resilience. We introduce a solution as a protocol that utilizes smart contracts on the Ethereum blockchain to enforce a securi...
 With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...
 5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
 The dual mode technology has been adopted to support smart devices to connect to both the NB-IoT and the LTE simultaneously. How to reduce the power consumption of a smart device with limited battery capacity has been treated as an important issue. In this paper, we propose the Module Switching Mechanism (MSM) that consists of the PS scheme and the...
 Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
 The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...
 There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infr...
 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
 Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
 In this paper, we propose DRL Track, a framework for target tracking with a collaborative deep reinforcement learning (C-DRL) in Edge-IoT with the aim to obtain high quality of tracking (QoT) and resource-efficient performance. In DRLTrack, a huge number of IoT devices are employed to collect data about a mobile target. One or two edge devices coor...
 The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...
 Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...
 With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
 In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order t...
 In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of internet. This paper discloses the architecture of a multilayer, multimode security system for IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, dat...
 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
 The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...
 Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a ...
 This article analyzes the effectiveness of deploying the Blockchain technology in the implementation of the IoT ecosystem database. To this end, we assess the processing efficiency of transactions originated by smart devices and the storeddata integrity. The processing-efficiency evaluation is carried out through queue-theory-based analytical model...
 Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integr...
 Public Distribution System is an essential part of life for the under-privileged people of the society. The traditional ration distribution system involves various malpractices. Ration card is the proof of citizenship since many decades. Government's subsidized food commodities and fuel are purchased using ration card by the people categorized as B...
 Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...
 The ATM Fraudulence occurring in the society has become very common nowadays. Even though technology has boomed in various aspects it is being misused in different ways for stealing money through ATM’S. Skimming and Trapping of the ATM devices have been designed by many Burglars. Recognition based Verification system as been implemented for many AT...
 Cloud storage services allow data owners to outsource their potentially sensitive data (e.g., private genome data) to remote cloud servers in a ciphertext form. To enable data owners to further share the data encrypted in ciphertexts, many proxy re-encryption (PRE) schemes are proposed. However, most schemes only support single-recipient or coarse-...
 Edge computing, as a new computing paradigm that extends cloud computing, allows a service vendor to deploy its services on distributed edge servers to serve its service users in close geographic proximity to those edge servers. Caching edge data on edge servers can minimize service users data retrieval latency. However, such edge data are subject ...
 Attribute-based authentication is considered a cornerstone component to achieve scalable fine-grained access control in the fast growing market of cloud-based services. Unfortunately, it also poses a privacy concern. Users attributes should not be linked to the users identity and spread across different organizations. To tackle this issue, several ...
 Mobile edge computing (MEC), extending computing services from cloud to edge, is recognized as one of key pillars to facilitate real-time services and tackle backhaul bottleneck. However, it is not economically efficient to attach intensive security appliances to every MEC node to defend application-level DDoS attacks and ensure the availability of...
 In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a problem. Public key encryption with keyword search (PEKS) realizes the retrieval of ciphertexts in clouds without disclosing secret information. However, most PEKS pro...
 Searchable encryption (SE) is a powerful technology that enables keyword-based search over encrypted data becomes possible. However, most SE schemes focus on exact keyword search which can not tolerate misspellings and typos. Existing fuzzy keyword search schemes only support fuzzy search within a limited similarity threshold d, the storage cost wi...
 In the context of the global energy ecosystem transformation, we introduce a new approach to reduce the carbon emissions of the cloud-computing sector and, at the same time, foster the deployment of small-scale private photovoltaic plants. We consider the opportunity cost of moving some cloud services to private, distributed, solar-powered computin...
 In a public blockchain system applying Proof of Work (PoW), the participants need to compete with their computing resources for reward, which is challenging for resource-limited devices. Mobile blockchain is proposed to facilitate the application of blockchain for mobile service, in which the lightweight devices can participate mining by renting re...
 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
 In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...
 The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...
 Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as c...
 In recent years, with the rapid development of cloud computing industry, big data processing technology is also constantly mature. At the same time, the scale of domestic mobile Internet market continues to expand, with more than 500 million users, bringing huge mobile Internet business data. In this context, the method of large-scale network data ...
 Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
 Federated learning (FL) is a machine-learning setting, where multiple clients collaboratively train a model under the coordination of a central server. The clients' raw data are locally stored, and each client only uploads the trained weight to the server, which can mitigate the privacy risks from the centralized machine learning. However, most of ...
 Due to the development of convenient brain-machine interfaces (BMIs), the automatic selection of a minimum channel (electrode) set has attracted increasing interest because the decrease in the number of channels increases the efficiency of BMIs. This study proposes a deep-learning-based technique to automatically search for the minimum number of ch...
 In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients' privacy is a leading and promising work especially in future privacy-preserving intelligent medical period. In this paper, we investigate how t...
 IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption sc...
 Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
 Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...
  It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
 Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and one of key applications is intelligence data collection from billions of IoT devices. However, many AI based data collection approaches lack security considerations leading to availability restricted. In this paper, an Intelligent Trust Collaboration Netw...
 A sharded blockchain with the Proof-of-Stake (PoS) consensus protocol has advantages in increasing throughput and reducing energy consumption, enabling the resource-limited participants to manage transactions and in a decentralized way and obtain rewards at a lower cost, e.g., Internet-of-Things (IoT) users. However, the latest PoS (e.g., Casper) r...
 As 5G and mobile computing are growing rapidly, deep learning services in the Social Computing and Social Internet of Things (IoT) have enriched our lives over the past few years. Mobile devices and IoT devices with computing capabilities can join social computing anytime and anywhere. Federated learning allows for the full use of decentralized tra...
 An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...
 With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource management model based on the consortium chain. In order to solve the efficiency problem caused ...
 This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...
 Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...
 Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...
 The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...
 With more than 75 billions of objects connected by 2025, Internet of Things (IoT) is the catalyst for the digital revolution, contributing to the generation of big amounts of (transient) data, which calls into question the storage and processing performance of the conventional cloud. Moving storage resources at the edge can reduce the data retrieva...
 Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...
 Strongly quantized fixed-point arithmetic is now considered a well-established solution to deploy Convolutional Neural Networks (CNNs) on limited-memory low-power IoT endnodes. Such a trend is challenging due to the lack of support for low bitwidth fixed-point instructions in the Instruction Set Architecture (ISA) of state-of-the-art embedded Micro...
 In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
 Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...
 Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. ...
 This paper presents a distributed and decentralized architecture for the implementation of Distributed Artificial Intelligence (DAI) using hardware platforms provided by the Internet of Things (IoT). A trained DAI system has been implemented over the IoT, where each IoT device acts as one or more of the neurons within the DAI layers. This is accomp...
 In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
 The interest of Industry 4.0 in Smart Contracts and blockchain technologies is growing up day by day. Smart Contracts have enabled new kinds of interactions whereby contractors can even fully automate processes they agree on. This technology is really appealing in Internet of Things (IoT) domain because smart devices generate events for software ag...
 The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...
  We consider a distributed IoT edge network whose end nodes generate computation jobs that can be processed locally or be offloaded, in full or in part, to other IoT nodes and/or edge servers having the necessary computation and energy resources. That is, jobs can either be partitioned and executed at multiple nodes (including the originating no...
 Big-data frameworks such as MapReduce/Hadoop or Spark have many performance-critical configuration parameters which may interact with each other in a complex way. Their optimal values for an application on a given cluster are affected by not only the application itself but also its input data. This makes offline auto-configuration approaches hard t...
 The multi-tenancy in a cloud along with its dynamic and self-service nature could cause severe security concerns. To mitigate such concerns and ensure the accountability and transparency of the cloud providers towards their tenants, security auditing is a promising solution. However, the existing security auditing solutions for clouds suffer from s...
 Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. At the first sight, by merely storing the shared data as plaintext in the cloud storage and protect them using an appropriate access ...
 Most UAVs depend on realtime 3D point clouds to navigate through unknown environments. However, both point clouds processing and trajectory planning are computationally expensive and will deplete UAV's battery quickly. There are also inevitable uncertainties in point clouds, which further makes collision-free trajectory planning a very challenging ...
 Cloud-assisted Internet of Medical Things (IoMT) is becoming an emerging paradigm in the healthcare domain, which involves collection, storage and usage of the medical data. Considering the confidentiality and accessibility of the outsourced data, secure and fine-grained data sharing is a crucial requirement for the patients. Attribute-based encryp...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the secur...
 As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...
 In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...
 With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the k...
 Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access ...
 In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2016.2549004). Through designing two concrete attacks, we identify two serious security flaws in their scheme. 1) First, we show that their scheme is insecure bec...
 This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...
  Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...
 Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
 Cloud storage is a cost-effective platform to accommodate massive data at low cost. However, advances of cloud services propel data generation, which pushes storage servers to its limit. Deduplication is a popular technique enjoyed by most current cloud servers, which detects and deletes redundant data to save storage and bandwidth. For security co...
 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
 With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the security of stored data is ensured. That is, when stored shared data are subject to frequent ac...
 Nowadays, more and more computation-intensive scientific applications with diverse needs are migrating to cloud computing systems. However, the cloud systems alone cannot meet applications' requirements at all times with the increasing demands from users. Therefore, the multi-cloud systems that can provide scalable storage and computing resources b...
 Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public auditing schemes to verify the integrity of outsourced data on behalf of users. To resist malicious TPAs, many blockchain-based public verification schemes have been p...
 Inappropriate service migrations can lead to undesirable situations, such as high traffic overhead, long service latency, and service disruption. In this paper, we propose an application-aware migration algorithm (AMA) with prefetching. In AMA, a mobile device sends a service offloading request to the controller. After receiving this request, the c...
 With the widespread use of cloud emails and frequent reports on large-scale email leakage events, a security property so-called forward secrecy becomes desirable and indispensable for both individuals and cloud email service providers to strengthen the security of cloud email systems. However, due to the failure to meet the security and practicalit...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...
 Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
 The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless networks assume reliable communications and do not consider the jamming behavior of byzantine nodes. Such jamming, however, is a very critical and realistic behavior to be considered in modern wireless net...
 Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...
 Node identification based on unique hardware features like clock skews has been considered an efficient technique in wireless sensors networks (WSNs). Spoofing attacks imitating unique hardware features, however, could significantly impair or break down conventional clock-skew-based node identification due to exposed clock information through broad...
 Modern mobile OSes support to display Web pages in the native apps, which we call embedded Web pages. In this paper, we conduct, to the best of our knowledge, the first measurement study on browsing embedded Web pages on Android. Our study on 22,521 popular Android apps shows that 57.9% and 73.8% of apps embed Web pages on two popular app markets: ...
 This paper presents a comprehensive analysis of the impact that supplementary power control of an HVDC link has on the electromechanical dynamics of power systems. The presented work addresses an interesting phenomenon that may occur when an HVDC power controller is installed to support frequency stability. In specific cases, a high gain HVDC frequ...
 Providing sufficient damping over the full frequency range of low-frequency oscillation (LFO) is a challenge in modern power systems. The flexible excitation system with two damping channels, controlled by the power system stabilizer (PSS) and the reactive power damping controller (RPDC), respectively, provides a new way to solve this problem. The ...
 Due to the energy linkage between electricity and gas networks, assessing the voltage security of the electricity system without considering the practical constraints of both systems, may lead to unrealistic values of loading margins (LM). This work proposes a model for investigating the impact of gas networks on the voltage security of electric tr...
  The problem of effective use of Phasor Measurement Units (PMUs) to enhance power systems awareness and security is a topic of key interest. The central question to solve is how to use this new measurements to reconstruct the state of the system. In this paper we provide the first solution to the problem of (globally convergent) state estimation...
 Distributed Series Reactances are devices that dynamically increase the impedance of a line to reduce the power ow it carries. This work explores whether widely deploying these devices enhances a power system's robustness against line overload cascading failures. The presence of Distributed Series Reactances may make it less likely that equipped li...
  Urban power grids are facing many operational and expansion challenges to meet further demand growth and increased reliability requirements. Advanced transmission technologies have been considered by the electric utilities to effectively increase the utilization of existing infrastructure and operational flexibility. The focus of this paper is ...
 Power electronic devices are important in the modern power system. Control functions and operational characteristics of power electronic devices bring higher nonlinearity and heavier calculation burden for power system analysis, especially in optimization problems. In this paper, a general steady-state model of power electronic devices in the AC-DC...
 Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The communication among various areas under the DoS attack is deteriorated to switching residual topologies whose time characteristic is modeled by model-dependent ave...
 Power utility allocates defense resources to prevent unscheduled load shedding due to transmission line failure caused by the malicious physical attacks. Game theory explains the interaction between the defender and the attacker, overcoming the shortage of unilateral vulnerability analysis. Different from previous researches typically assuming the ...
 Power system cascading failures become more time variant and complex because of the increasing network interconnection and higher renewable energy penetration. High computational cost is the main obstacle for a more frequent online cascading failure search, which is essential to improve system security. We propose a more efficient search framework ...
 Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel ...
 Reversible data hiding in encrypted images (RDHEI) is an effective technique of data security. Most state-of-theart RDHEI methods do not achieve desirable payload yet. To address this problem, we propose a new RDHEI method with hierarchical embedding. Our contributions are twofold. (1) A novel technique of hierarchical label map generation is propo...
 With the fast growth in network-connected vehicular devices, the Internet of Vehicles (IoV) has many advances in terms of size and speed for Intelligent Transportation System (ITS) applications. As a result, the amount of produced data and computational loads has increased intensely. A solution to handle the vast volume of workload has been traditi...
 The development of vehicular Internet of Things (IoT) applications, such as E-Transport, Augmented Reality, and Virtual Reality are growing progressively. The mobility aware services and network-based security are fundamental requirements of these applications. However, multiside offloading enabling blockchain and cost-efficient scheduling in heter...
 Ciphertext-policy attribute-based encryption (CPABE) is a promising encryption technology for secure data sharing in cloud computing, in which data owner can fully control access structure associated with a ciphertext. However, it brings a major drawback which is known as key escrow problem, since the decryption users’ secret keys are issued by an ...
  Cross-Cloud Federation (CCF) enables resource exchange among multiple, heterogeneous Cloud Service Providers (CSPs) to support the composition of services (workflow) hosted by different providers. CCF participation can either be fixed, or the types of services that can be used are limited to reduce the potential risk of service failure or secur...
 A methodology for automating the identification of single-event transients (SETs) through Ionizing Radiation Effects Spectroscopy (IRES) and machine learning (ML) is provided. IRES enhances the identification of SETs through statistical analysis of waveform behavior, allowing for the capture of subtle circuit dynamics changes.Automated identificati...
 Wide-area protection scheme (WAPS) provides system-wide protection by detecting and mitigating small and large-scale disturbances that are difficult to resolve using local protection schemes. As this protection scheme is evolving from a substation-based distributed remedial action scheme (DRAS) to the control center-based centralized RAS (CRAS), it...
 IP Networks serve a variety of connected network entities (NEs) such as personal computers, servers, mobile devices, virtual machines, hosted containers, etc. The growth in the number of NEs and technical considerations has led to a reality where a single IP address is used by multiple NEs. A typical example is a home router using Network Address T...
 Dynamic Security Assessment for the future power system is expected to be increasingly complicated with the higher level penetration of renewable energy sources and the widespread deployment of power electronic devices, which drive new dynamic phenomena. As a result, the increasing complexity and the severe computational bottleneck in real time ope...
 The communication-based train control (CBTC) system is a typical cyber physical system in urban rail transit.The train-ground communication system is a very important subsystem of the CBTC system and uses the wireless communication protocols to transmit control commands.However, it faces some potential information security risks.To ensure informati...
 Stochastic unit commitment is an efficient method for grid operation in the presence of significant uncertainties.An example is an operation during a predicted hurricane with uncertain line out-ages.However, the solution quality comes at the cost of substantial computational burden, which makes its adoption challenging.This paper evaluates some pos...
 With the wide deployment of public clouds, owners of big graphs want to use the cloud to handle the scalability issues. However, the privacy and ownership of the graphs in the cloud has become a major concern. In this paper, we study privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in the cloud. We consider a ...
 In this paper, a design is proposed using IR and LDR sensor for automation of lights and fans using PIC with Internet of Things for smart homes. Nowadays we’re having automation of every little electrical device in our homes. Internet of Things is the concept of basically connecting any device with an on and off switch to the internet. IOT is mo...
 Using various sensors like the accelerometer, GPS module, 3 Axis gyroscope, compass and an ultrasonic range finder, the primary guidance and navigation functions of the UAV can be automated. Additional stabilization controls should be programmed into the Raspberry Pi which is serving as the heart of the System which will provide additional security...
 A key aspect of Multiple fire protection is to identify a developing multiple fire emergency in a timely manner, and to alert the industry Depending on the anticipated multiple fire scenario in industry, this project alert industry employees to a multiple fire condition and the need to evacuate. Another common function is the transmission of an ala...
 Library management system will allow fast transaction flow for the library It also provide immediate and long term benefits to library in traceability and security The barcode technology is slowly getting replaced by the RFID technology The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
 Library management system will allow fast transaction flow for the library It also provide immediate and long term benefits to library in traceability and security The barcode technology is slowly getting replaced by the RFID technology The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
 Library management system will allow fast transaction flow for the library It also provide immediate and long term benefits to library in traceability and security The barcode technology is slowly getting replaced by the RFID technology The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
 It is an accepted fact that brutal crimes against women are occurring in India daily. Now many Indians do not deny, or shy away from conversations relating to eve-teasing, sexual assaults or rape. What should women do in the wake of continuous attacks? This paper presents analysis review on the principles in the intelligent security systems with...
 Home automation or smart home is building automation for the home. It involves the control and automation of lighting, heating, ventilation, air conditioning, and security, as well as home appliances such as washer/dryers, ovens or refrigerators/freezers. Wi-Fi is often used for remote monitoring and control Home devices, when remotely monitored an...
 Our project proposes a secured ATM (Automated Teller Machine) system using a card scanning system along with LINK system for improved security. Usual ATM systems do not contain the LINK feature for money withdrawal. If an attacker manages to get hold of ATM card and the pin number, he may easily use it to withdraw money fraudulent. So our propose...
 The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Things Speak, Amazon Web Services, on which captured d...
 The disasters in underground coal mine are very serious issues to day. So the safe production of coal in the mine is an important factor to be considered. To improve the safety system in the mines, a reliable communication system must be there, between the workers of the mine, and the control base station. Wired communication system was used inside...
 The Blind person navigation system can be used in house, hospitals where the blind people are living. The system consists of indoor transmitter section and blind person receiver section. The transmitter section is kept in the indoor and receiver section given to blind person. Whenever the Li-Fi receiver receives the data from transmitter section, i...
 In today’s technically advanced world, autonomous systems are gaining rapid popularity. As the social computerization and automation has been increased and the ATM and credit card has been installed and spread out to simplify the activity for financial activity, the banking activity has been simplified, however the crime related with financial orga...
 A crowd is something beyond a simple sum of individuals. It has collective characteristics which could be described in general terms such as ‘angry crowd’, ‘peaceful crowd’. A crowd can assume different and complex behaviors as those expected by their individuals. Understanding crowd behavior helps in designing pedestrian facilities, for major la...
 Internet is a worldwide publicly accessible system of interconnected computer networks. Currently, two versions of the Internet Protocol (IP) are in use on the Internet namely IPv4 and IPv6. In some sense, there is a competition going on between these protocols, as they are not directly compatible, the aim of this project is to show the compatibili...
 Price comparison sites and comparison –shopping engines gives ecommerce traders a good opportunity to boost their sales, attract new customers and go ahead against their competitors. Even Shoppers often look for best deals and offers for a particular product which they are looking for. It is difficult to visit each and every website for comparing t...
 The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a complex problem which presents a diverse number of challenges. Many attacks currently remain undetected, while newer ones emerge due to the proliferation of connected devices...
 The existing models of reversible data hiding in encrypted images (RDH-EI) are based on single data-hider, where the original image cannot be reconstructed when the data-hider is damaged. To address this issue, this paper proposes a novel model with multiple data-hiders for RDH-EI based on secret sharing. It divides the original image into multiple...
 The traditional single minimum support data mining algorithm has some problems, such as too much space occupied by data, resulting in insufficient accuracy of the algorithm, which is difficult to meet the needs of the development of the times. Therefore, an intrusion data mining algorithm based on multiple minimum support is proposed. First, the fe...
 The reversible data hiding in encrypted images by MSB prediction of P. Puteaux and W. Puesch not only provides high embedding bit-rates, but also entails a very low mathematical complexity.This correspondence investigates its security and shows flaws in embedding imperceptibility, unauthorized detection/removal of embedded data and unauthorized a...
 Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years.With the integration of block chain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicle sat any time.Specifically, the block chain technology...
 The main aim of our project is to protect the crops from damage caused by animal as well as divert the animal without any harm. Animal detection system is designed to detect the presence of animal and offer a warning. In this project we used PIR and ultrasonic sensors to detect the movement of the animal and send signal to the controller .It divert...
 In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increas...
 This paper we propose a security patrolling robot that uses night vision camera for securing any premises. The robotic vehicle moves at particular intervals and is equipped with night vision camera and sound sensors. It uses a predefined line to follow its path while patrolling. It stops at particular points and moves to next points if sound are de...
 With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately c...
  In this era of rapid growth of vehicles, the ratio of road accident increases day by day. Nowadays, Traffic incidents are persistent problems in both developed and developing countries which result in huge loss of life and property. No one in this world is ready to gaze what’s happening around them. Nobody cares even when an accident occurs. This ...
 ? The health care services industry is always showing signs of change and supporting new advancements and advances. One of the predominant requirements in today's health care systems is to protect the patient's medical report against potential attackers. Hence, it is basic to have secure information that can just approve people can get to the patie...
 In WSN network there is Cyber Attack occurs are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this s...
 This Android application (stand alone too), where one can set the question for different technology i.e. Android, Java etc and one can register them self for test as a student, he can choose the choice of technology (Android, Java), and simultaneously he can get the exam result. After submit or End of the Test the form will be submitted and evaluat...
 The main goal of this project is to implement an auto-intensity control of the LED based street light system that uses solar energy to conserve the electrical power on the streetlight busing Raspberry Pi board. As the traffic decreases slowly in late night hours, the intensity is reduced progressively till morning to save energy, and thus, the stre...
 In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc net-works (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numb...
 Cloud computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are security and privacy of data on the cloud, check availability of data on the cloud. For these problems, data storage security refers to the security of data on the storage media. Security is an importan...
 The workload of the static security guards has doubled due to the Covid-19 outbreak. In addition to their regular duties, they undertake some additional tasks to evaluate each individual’s body temperature and welcome them with a hand sanitizer. In this scenario, their situational awareness is hugely desirable to perform these activities for the en...
 Hostel Management is an application developed to manage the various activities in hostel. The particular project is deal with the problems on managing the a hostel and avoids the problem occurs when carried out manually. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible t...
 The problem about checking attendant is the main problem of teacher in nowadays. In order to solve this problem, Many systems have been completely changed due to this evolve to achieve more accurate results. However, in my study, these study still lack of the efficiency about correct the face and students cannot verify or pose to edit the data when...
 Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
 Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user p...
 Potato is one of the prominent food crops all over the world. In Bangladesh, potato cultivation has been getting remarkable popularity over the last decades. Many diseases affect the proper growth of potato plants. Noticeable diseases are seen in the leaf region of this plant. Two common and popular leaf diseases of the potato plants are Early Blig...
 With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile user...
 Today, the growth of technology is rapid and provides all necessary and effective solutions for the requirements. One of the most important areas of concern is security. In this scenario, IOT Asset tracking system is developed to increase the safety of women, children, people with mental disorder and any valuable items through the technology of Rad...
 Potato is one of the prominent food crops all over the world. In Bangladesh, potato cultivation has been getting remarkable popularity over the last decades. Many diseases affect the proper growth of potato plants. Noticeable diseases are seen in the leaf region of this plant. Two common and popular leaf diseases of the potato plants are Early Blig...
 Potato is one of the prominent food crops all over the world. In Bangladesh, potato cultivation has been getting remarkable popularity over the last decades. Many diseases affect the proper growth of potato plants. Noticeable diseases are seen in the leaf region of this plant. Two common and popular leaf diseases of the potato plants are Early Blig...
 The main aim of our project is to make the rental charges and monthly bills to pay automatically without any fail. The user management system will be deployed and it will be shown as a banking interface. The digital money will be taken and the deduction for House Rent, Corporation Tax, Telephone Bill and Gas Bill. The virtual money will tend to ded...
 Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the origina...
 In this digital world, transferring sensitive data electronically has become inevitable. The objective of this work is to hide and retrieve confidential information in image mosaics. The photo mosaic approach has been used for the creation of the mosaic and the least significant bit (LSB) technique has been adopted for the embedding of the hidden i...
 This paper presents a technique for secret communication using Cryptography and Steganography. In this paper, the secret message of different size is hidden into an image for making the system more secure. The only authorized users can hide and extract the secret message. The secret messages of different size are used to test the system and the sys...
 Cloud computing enables users to remove the necessity of the need of local hardware architecture, which removes the burden of the users from high computation costs. Therefore, it has attracted much attention and research has been conducted heavily on it. To protect users’ privacy, data is usually encrypted prior to being sent to the cloud server. A...
 Powered by virtualization, the cloud computing has brought good merits of cost effective and on-demand resource sharing among many users. On the other hand, cloud users face security risks from co-residence attacks when using this virtualized platform. Particularly, a malicious attacker may create side channels to steal data from a target user’s vi...
 Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Cloud computing offers on-demand availability of computing resources over the Internet. To attract users, cloud providers offer their resources as services at reasonable prices and provide various price models to reflect higher level of quality of service (QoS), which are referred as pricing schemes. k-times anonymous authentication (k-TAA) is an a...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp