Stud Project List Selection

Published on November 2016 | Categories: Documents | Downloads: 29 | Comments: 0 | Views: 231
of 7
Download PDF   Embed   Report

Comments

Content

PSG College of Technology, Coimbatore-641 004 Department of Computer & nformation Science! "Sc #CT$ G1 & G% & Si'th Seme!ter P()*+CT D+T, -S Pro.ect /o 1. Pro.ect Title Software for softskill training ,rea of Speciali0ation Application Software ,b!tract A student can write exams online in C/ C++/ Java. A student can know the strength and weakness area. Software will have level numbers. nl! after clearing the level 1" then student can proceed to the subse#uent levels. $he results will be pro%ected in the form of bar chart. (t will be like e)book" but lot of animations can be included. Animations can be applied on images" programs and output areas. (t could be used as a laborator! manual. *ood scope for software designer and implementer. A domain has to be selected like 'ife insurance polic!" banking" and inventor!. $he task is to develop test cases to test the selected domain. $his process has to be automated. -./ of the software developed code has to be inspected. 0nowledge on white box testing and box testing will be gained. Client Server based model and S!stem oriented programming model ,ata and (nformation securit! ,evelop a s!stem to implement routing protocols such as 5(6" S67 and compare its performance. ,esign a tool to anal!9e the web access logs and interpret various information such as users" t!pe of ob%ect re#uested" si9e of ob%ects. :sing the information obtained" web sessions and user access patterns can be determined. ,evelop a s!stem to categori9e whether a received mail is a

&.

'earning material on C" C++ and Java.

Application Software

+.

,omain based testing

Application Software

1. 3. 4. 8.

2etworks Securit! (mplementation of 5outing 6rotocols 'og 7ile Anal!sis $ool

2etworks Securit! Computer 2etworks Application Software

-.

;)mail Classification S!stem

Application Software

<.

7inancial =anagement S!stem

Application Software

normal mail or spam mail based on ke!words extracted from the mail content. $he s!stem should cater to the needs of (ndividuals who want to personall! manage their financial information. (t should provide provisions for adding the re#uired details and also should make anal!sis of his income and expenditure and provide the results.

1..

11.

=aximal bicli#ue subgraphs > closed pattern pairs of the ad%acenc! matrix Semantic ?eb Search

,ata =ining

,ata =ining

1&. 1+.

Search ;ngine =odel Spatial ,ata @uer! ptimi9ation

(nformation 5etrieval ,A=S

11.

ptimi9ation of 'inear 5ecursive @ueries in S@'

,A=S

13.

S@' @uer! ptimi9ation =ethods ,A=S of 5elational ,atabase S!stem

14. 18.

@uer! ptimi9ation over ?eb Services 6roviding platform for $rusted Computing Services in 6ublic Cloud ;nvironment

,A=S Cloud Computing

(t is general techni#ue for promptl! detecting and discarding duplicate closed itemsets" without the need of keeping in the main memor! the whole set of closed patterns $o crawl the ?orld ?ide ?eb for a special class of web documents called Semantic ?eb documents" which are written in 5,7. $o model the working of a search engine using hardware and creating animation to show its functioning. Spatial data depicts the information about the location and shape of the spatial data" spatial #uer! optimi9ation to optimi9e #uer! handling algorithms" and improve #uer! handling efficienc!. 7ive #uer! optimi9ations are studiedB 1C Storage and indexingD &C earl! selectionD +C earl! evaluation of non recursive %oinsD 1C pushing duplicate eliminationD and 3C pushing aggregation. racle provides several options to aid performance" such as partitioning large tables" using materiali9ed views" storing plan outlines" and man! others how to use performance tuning to increase efficienc! of S@' code. @uer! optimi9ation for Select)6ro%ect)Join #ueries spanning multiple web services Clients of cloud computing services currentl! have no means of verif!ing the confidentialit! and integrit! of their data and computation. $his pro%ect provides a closed box

1-.

Source Code =anagement S!stem

Application Software

1<.

7ramework for E=' ?eb Services 5etrieval

?eb Services

execution environment that guarantees confidential execution of guest virtual machines. :sing open source software" the s!stem have features like storing different versions of the files" merging utilit!" bug tracking s!stem" tool for capturing #ualit! metrics able to plot various kinds of graphs etc provided with good *:(. $he designed framework s!stem is located on top of :,,( using :,,( data entries and ?S,' filesD it provides ranked #uer! result of ?eb services and finding alternate ?eb services b! using a similarit! measure. :sing open source tools" the s!stem should provides online task management to the emplo!ees of the organi9ation and paperless outward entries. Fideos are segmented into $in! images and retrieval is done using ,ata mining techni#ues. $o develop a librar! management s!stem for C>(S department Fideos are numbered using (ndexing Algorithms and retrieved using web =ining techni#ues $o develop a s!stem to maintain facult! details. Courses attended and organi9ed" leave details" sub%ect handled. $o develop a login entr! s!stem and students status information during their lab classes. $his pro%ect is aimed at developing a $ime $able *enerator for Colleges. ;ach teacher and Student is eligible for viewing his own timetable once the! are finali9ed for a given semester but the! canGt edit them. ,eveloping tool for encr!ption and decr!ption process using algorithms. :ser) friendl! package for education institutions with Aarcode facilit! and Aiometric machines for attendance registration. $he proposed concept" present a two)step procedure to

&..

?ork 'oad =anagement S!stem

Application Software

&1. &&. &+. &1. &3. &4.

Fideo Segmentation and 5etrieval (ntranet 'ibrar! portal Fideo 5etrieval and (ndexing

=ultimedia Application Software =ultimedia

?eb portal for 7acult! information Application Software 'ogin entr! and s!stem status information for laborator! 7eature rich" practical time table generation s!stem for college. Application Software Application Software

&8. &-.

$ool for c!ber securit! Automated tool for resource automation in college campus =ining Semantic 5elations from

Securit! in Computing Application Software

&<.

?eb mining

$extual ?eb Content :sing 5esource ,escription 7ramework

+.. +1. +&. ++. +1. +3. +4.

?eb)page Classification through Summari9ation Cr!ptographic techni#ues for privac! preserving ,ata mining ?eb 6ortal Securit! issues in web ?eb based Applications for (nsurance Services ,ocument =anagement S!stem ,etecting terror related activities on the web

?eb mining ,ata =ining pen Source > ?eb Soft Computing Cloud Computing ,A=S ,ata =ining

mine generali9ed associations of semantic relations conve!ed b! the textual content of ?eb documents. ne is 5,7 metadata representation and another is novel generali9ed association pattern. 6roposing a new ?ebpage classification algorithm based on ?eb summari9ation for improving the accurac! Secure computation of data mining algorithms. (mplementation for alumni websites and online database based application using various SS tools Appl!ing Soft computing techni#ues over web for ensuring securit! 6roviding a s!stem for online insurance services. nline maintenance of documents with securit! policies. Appl!ing data mining algorithm to the textual content of terror related web)sites.$he resulting profile is used b! the s!stem to perform real time detection of users suspected of being engaged in terrorist activities. A! prediction method of data mining the complete time of a pro%ect can be estimated during execution. A! different data mining methods and techni#ues for classif!ing students based on their marks obtained in their examinations (t defines the discover! of association rules for fu99! spatial data. (t represents the correlation of spatial data as soil t!pes" direction or geometric relationship. ,eveloping novel and effective detection methods for link spam target pages using page farms. $his pro%ect uses a simple algorithm for computing the 6age5ank Hstationar! distributionC of the stochastic *oogle matrix *. $he algorithm lumps all dangling nodes into a single node.

+8. +-.

6redicate complete time of a pro%ect ,ata mining algorithm to classif! students 7u99! set approaches to spatial data ming of association rules

,ata =ining ,ata =ining

+<.

,ata =ining

1.. 11.

'ink Spam ,etection 6age5ank Computation" with special attention to dangling nodes

?eb =ining ?eb =ining

1&.

1+. 11.

:sing *enetic Algorithms for ,ata =ining ptimi9ation in an ;ducational ?eb)based S!stem ptimi9ation methods to data mining Chat Server

,ata =ining

,ata =ining Computer 2etworks

$his paper presents an approach for classif!ing students in order to predict their final grade based on features extracted from logged data in an education web)based s!stem. (ntroducing optimi9ed methods in data mining. ,eveloping a new chat server that could be eas! for users and which could teach a new user how to involve in fluent chat and get well e#uipped with Chat server and main goal the package is communication Cookie authentication makes use of functionalit! at the scripting level to provide user authentication. A uni#ue" d!namic cr!ptographic algorithm to provide securit! to the wireless sensor network b! securing the individual nodes of the network" has been proposed. (n examination" we give the schedule face more problems in the clash the date and session. (n stipulated time complete the exam for between the dates. ptimi9e the sending and receiving message of sensor nodes and of the transmitted data. 2ow da!s" saving the mone! are more vital part of life. Currentl! offered more compan!Gs give huge amount in ver! less !ear such as '(C" Aa%a% Alliance etc. ?e consider our monthl! income and which one investment is best. ?orkflow is an ($ s!stem which uses electronic s!stems to manage and monitor business processes. $his pro%ect is to provide an alternate wa! of securit! b! comparing the hand drawn signature of a person with the hand drawn signature of the same person that is alread! stored in database. Consider vulnerabilities of networked s!stems and develop a multiple intrusion detection s!stem H=(,SC which operates b! running belief propagation on an appropriatel!

13. 14.

Cookie Authentication A d!namic cr!ptographic algorithm to provide nodal level securit! in wireless sensor network ;xamination Schedule for :niversit! level ;fficient self organi9ation of ?ireless sensor networks n =essage ?eb site creation for (nvestment planning

?eb $echnolog! ?ireless Sensor 2etworks

18.

Application Software

1-.

?ireless Sensor 2etworks Application Software

1<.

3.. 31.

?orkflow =anagement S!stem Signature verification using direction based algorithm

Application Software Application Software

3&.

*raphical (nference for =ultiple (ntrusion ,etection

2etwork Securit!

3+.

6robabilistic =odels for (nference about (dentit!

Aiometric

31.

,evelopment of an auto) summari9ation tool A 2etwork Coding Approach to Secret 0e! ,istribution nline Shopping 6ortal

Application Software

33.

2etwork Securit!

34.

Application Software

38.

3-.

An (mplementation of ?eb 6ersonali9ation using ?eb =ining $echni#ues ?eighted Association 5ule =ining for Fideo Semantic ,etection Compact ?eighted Associative Classification using transaction weight ,evelopment of a practical nline Ielp ,esk H I,C for the facilities in the campus Student 6ro%ect Allocation and =anagement *raphical 6assword Authentication :sing Cued Click

?eb =ining

constructed weighted bipartite graph. $he algorithm allows explicit comparison of faces across different viewing condition. $he proposed model produces results that are comparable to or better than the state of art for both frontal face recognition and face recognition under var!ing pose. (t is a techni#ue used to generate summaries of electronic documents. $he techni#ues involve finding the fre#uenc! of words" scoring the sentences" ranking the sentences etc. $he problem of secret ke! distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network is considered. An online shopping s!stem that permits a customer to submit online orders for items and/or services from a store that serves both walk)in customers and online customers. (mplementing how ?eb mining techni#ues can be applied for the Customi9ation i.e ?eb personali9ation. $he association rules mining HA5=C techni#ue has been shown to be an efficient and accurate approach for content) based multimedia retrieval and semantic concept detection. $his paper proposes compact weighted associative classification method" which integrates weighted association rule mining and classification for constructing an efficient weighted associative classifier. Aimed at developing an nline Ielp ,esk H I,C for the facilities in the campus. $his is an (ntranet based application that can be accessed throughout the campus. $his pro%ect is aimed at developing a web)based s!stem" which manages the activit! of JStudent 6ro%ect =anagementK. ?e propose and examine the usabilit! and securit! of Cued Click 6oints HCC6C" a cued)recall graphical password

,ata =ining

3<.

,ata =ining

4..

Application Software

41.

Application Software

4&.

(nformation Securit!

6oints

techni#ue.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close