Вы находитесь на странице: 1из 11

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

DEPARTMENT OF COMPUTER ENGINEERING PROJECT LIST

SL. NO 1 2 3 4 5 6 7

TOPIC OF PROJECT Fuzzy Keyword Search over Encrypted Data in Cloud Computing Effective Personalized Privacy reservation Credit Card Fraud Detection Using Hidden Markov Model Ensuring Data Storage Security in Cloud Computing Patient Management System Blogger-web-application Courier Information System

NO.OF. STUDENTS 5 5 6 5 6 5 5

HOD

PRINCIPAL

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering : Fuzzy Keyword Search over Encrypted Data in Cloud Computing 11501903 11501910 11501868 11501872 11501890

NAME OF THE PROJECT MEMBERS : 1. SRI HARI VARMA.B 2. VIGNESHWER.N 3. ARJUN.A 4. BALAKRISHNAN.M 5. PRAGADEESH.S

SYNOPSIS: As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. Fuzzy keyword search greatly enhances system usability by returning the matching files when users searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. In our solution, we exploit edit distance to quantify keywords similarity and develop two advanced techniques on constructing fuzzy keyword sets, which achieve optimized storage and representation overheads. We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. Through rigorous security analysis, we show that our proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution. PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mr.R.Sukumar M.E.,

Guide

HOD

Principal

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering : Effective Personalized Privacy Preservation 11501893 11501889 11501892 11501876 11501909

NAME OF THE PROJECT MEMBERS : 1. PREMKUMAR.D 2. PRADEESH.P 3. PRAVEENKUMAR.V 4. DIWAKAR.N 5. VIGNESH.S

SYNOPSIS: The k-anonymity privacy requirement for publishing micro data requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain identifying attributes) contains at least k records. Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure. The notion of l-diversity has been proposed to address this; l-diversity requires that each equivalence class has at least well-represented (in Section 2) values for each sensitive attribute. In this paper, we show that l-diversity has a number of limitations. In particular, it is neither necessary nor sufficient to prevent attribute disclosure. Motivated by these limitations, we propose a new notion of privacy called closeness. We first present the base model t-closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold t). t-closeness that offers higher utility. We describe our desiderata for designing a distance measure between two probability distributions and present two distance measures. We discuss the rationale for using closeness as a privacy measure and illustrate its advantages through examples and experiments. PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mrs.N.Kalpana B.E.,

Guide

HOD THIRU SEVEN HILLS POLYTECHNIC COLLEGE

Principal

MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering

: Credit Card Fraud Detection Using Hidden Markov Model NAME OF THE PROJECT MEMBERS : 1. JANETHA.N 11501877 2. MUTHULAKSHMI.B 11501886 3. MALATHY.A 11501883 4. DEEPAPRIYA.R 11501873 5. REFICELIN.E 11501897 6. MOWNICA.A 11501884 SYNOPSIS: Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. We present detailed experimental results to show the effectiveness of our approach and compare it with other techniques available in the literature.

PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mrs. G.Shalini B.E.,

Guide

HOD THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

Principal

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering

: Ensuring Data Storage Security in Cloud Computing NAME OF THE PROJECT MEMBERS : 1. SWATHY.A 11501906 2. NIVETHA.B 11512655 3. SATHYA.B 11501900 4. SEETHALAKSHMI.A 11501901 5. RAJA SINDUJA.T.S 11501894 SYNOPSIS: Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. PROGRAMMING PACKAGE: J2EE COST OF THE PROJECT: Rs.6000/GUIDENAME: Mrs.Vedavalli.S M.C.A.,M.B.A.,

Guide

HOD

Principal

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering : Patient Management System

NAME OF THE PROJECT MEMBERS : 1. RANJITH.K 2. RANJITH.R 3. SABARIGIRI.K 4. SABARINATHAN.R 5. JAYAKUMAR.G 6. ARUNKUMAR.A 11501895 11501896 11501898 11501899 11501878 11501869

SYNOPSIS: In a given day, number of patients visits a hospital or a clinic. Many hospitals in India still manage the patient data manually. Hospitals will be able to save money and time if they have a good software program for managing patients data. The idea is to develop web based patient management software that can be used to keep track of the patients registering in a hospital or clinic. Doctors and the rooms available in a hospital can be managed using this system. Also, this system should support accessing the previous visit histories of any patient, search for patients by name etc. A few points to be noted about the system we are developing here A patient can be categorized as In patient or Out Patient. If patient type is "In Patient", a bed will be assigned to the patient. A doctor will be assigned to each patient before the patient meets the doctor. Only one doctor can be assigned to a patient at a given time. A patient can visit the hospital any number of times PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mr.P.Paulraj B.E.,

Guide

HOD

Principal

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Computer Engineering : Blogger-web-application

NAME OF THE PROJECT MEMBERS : 1.VENKATARAMAN.C 2.SIVAPRAKASH.C 3.MUTHUKUMAR.R 4.YOSUVA.P 5.DHARANI.S SYNOPSIS:

11501907 11501902 11501885 11501913 11501874

This is a website that allows users to read and post their blogs. Only registered users can post blogs. Blogs can be deleted and modified by users. Unregistered users are allowed to search, read and comment on the blogs. Users can post something as well as create pages also. Regular features related to users like login, change password, change profile etc. are provided.

PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mrs. B.Saraswathy B.C.A.,

Guide

HOD

Principal

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM

: Computer Engineering

NAME OF THE PROJECT : Courier Information System NAME OF THE PROJECT MEMBERS : 1.VINOTHKUMAR.D 2.KANNAN.V 3.KARTHICK.D 4.AVINASH.S.N 5.YUVARAJ.P SYNOPSIS: Description: This project deals with the Courier Information System. The system is used for daily activities such as booking a courier, maintain employee details, process payroll of employees, maintain hub details, maintain company details etc,.. PURPOSE OF PROJECT This project deals with the Courier management. The system is used for daily activities such as booking, non delivery, out return, company details, hub rates, and pickup centers. It is very difficult to do this process manually. Hence it is recommended to computerize the process by developing the relative software as the world is turning into information and technology; computerization becomes necessity in all walks of life. PROGRAMMING PACKAGE: Visual Studio.Net COST OF THE PROJECT: Rs.6000/GUIDENAME: Mr.P.Paulraj B.E., 11501912 11501879 11501880 11501871 11501914

Guide

HOD THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95. DEPARTMENT OF INFORMATION TECHNOLOGY

Principal

PROJECT LIST

SL. NO

TOPIC OF PROJECT

NO.OF. STUDENTS

1.

Online Attendance Management System

HOD

PRINCIPAL

THIRU SEVEN HILLS POLYTECHNIC COLLEGE MADURAVOYAL, CHENNAI-95.

BRANCH/SEM NAME OF THE PROJECT

: Information Technology : Online Attendance Management System

NAME OF THE PROJECT MEMBERS : 1. ANANDHI.V 2. PRABHU.M 3. SELVARAJ.S 4. SHANRAJ.A 5. SHARMILEERANI.S.M 6. SIVAKUMAR.R SYNOPSIS: This application is used by faculty in the class to take attendance of the students. A faculty logins into the system and gets his/her time table. He/she can take attendance for a period by clicking on the attendance link on the right of the period in the time table. This application also provides faculty the facility to search for student by name and get and modify attendance that he/she has already taken. If student has taken more than three days leave, separate report will be prepared to intimate parents. Monthly attendance report is prepared as per time period. E-form for shortage of attendance also prepared. Providing internal mark calculation may be considered as an extension for our project. PROGRAMMING PACKAGE: Open Source Softwares(PHP) 11501861 11501862 11501863 11501864 11501865 11501866

COST OF THE PROJECT: Rs.6000/-

GUIDENAME: Mrs.G.Mahalakshmi M.C.A.,

Guide

HOD

Principal

Вам также может понравиться