Knowledge Management System Project

Currently, Knowledge management is attaining an important notice from person’s related to educational jobs and field jobs as well and in a wider viewpoint, it is handled by educational hypothesis and popular media. Several articles are perceived while the inner things they allow into awareness regarding education and considerable Knowledge Management (KM) organizations in this media and actually, the media tries to attach to the supplementary access of Knowledge Management (KM) aims and goals. Five guiding arrangements are identified and studied in the Knowledge management comprehension. Yet, when the hypothesis is instructive in particular parts of Knowledge management (KM) intricacy requirements and a “different arrangement” and “different procedures” manner of thoughtfulness as it seems.

Since the period of the ancient Greeks, the exploration on data on humans is an internal topic of perspective and epistemology. Knowledge management (KM) is an old inquiry linked with both Eastern and Western research professionals, focused by an old perception of Knowledge management.

The Chinese and the Indian researchers from that era possess a same long and accurately composed custom of highlighting data and access for the conduct of religious and worldly manner of life. Actual data or data on how to do and what to do is constantly important although, Knowledge management has been a comprehensible task. In 3000 BC, the foremost trials at Knowledge management (KM), such as grabbing, keeping and getting back, began with the Cuneiform tongue.

The information was beautified with a fashionable in wet mud and then burnt. For hundreds of years, advanced technical procedures got their mechanisms in affecting Knowledge management methods. For example, the proficient growth mechanism custom of the thirteenth century inaugurated supplementary precise and systematic Knowledge management jobs.

Hacker Detection In Wireless Sensor Network Java Project Abstract

Introduction to Hacker Detection In Wireless Sensor Network Java Project:

The intruder detection in the wireless sensor network is an  area of interest in many types of network applications which is similar to identify an enemy in a war zone. The intruder detection is the procedure to identify the presence of wrong, inappropriate and inaccurate resting attackers in wireless sensor network. In our model, we prefer hacker detection as per the Heterogeneous WSN models. We proposed two types of Sensing detection models:

1) Single sensing detection

2) Multiple sensing detection. 

 Our simulation work concludes about the benefits of Multiple sensor heterogeneous WSN’s. 

Existing Model of Intruder Detection: Single Sensing Detection can detect only a single intruder at a time in the WSN.

 We had done our previous work which was based on the Homogenous and Heterogeneous single sensor in Wireless sensor network. 

Proposed Model: We are now proposing the Intruder detection under Heterogeneous wireless sensor network where intruder can be identified and clear out anywhere in the network. 

SYSTEM REQUIREMENTS 

HARDWARE

SOFTWARE

Processor- Pentium IV 2.6 GHz Front End- JAVA
RAM- 512 MB DD RAM Tool Used- JFlame builder
Monitor- 15” Color Operating System- Windows XP
Hard Disk- 20 GB  
CD Drive- LG 52X  
Keyboard- Standard 102 Keys  
Mouse- 3 Buttons  

 Download  Hacker Detection In Wireless Sensor Network Java Project Abstract .

Distributional Features for Text Categorization Asp.Net Project Abstract

Introduction to Distributional Features for Text Categorization Project:

Text categorization is known for providing a predefined category to natural language text. The “bag-of-word’” presentation was used on the values of the word that based on the existence of the word in the document and its repetition. Though the values mentioned for the Text categorization word was not able to clarify the information to be provided due to improper circulation of the word in the document.

The proposed project presents other kinds of values known for the word. The ideal values which is to be highlighted through word possesses a features called Distributional features that projects the clear expression of word and the proper place to start word as meaningful. The Distributional features presented through “tfidf style equation” and added with Ensemble learning techniques. The Distributional feature are advantageous for the text categorization projected on its appearance and meaning. 

Exiting System: 

The current system is based on the values to be presented along with its presence and appearances in the document. The system also includes the statistical way of presentation depends on number of words existed continuously in the text called n-gram. 

Disadvantages: 

1.     The current system is unable to provide the information which are mentioned in the document completely.

2.     The current system is inefficient.  

Proposed System: 

The Distributional features of the proposed system are based on tfidf style equation and other features are assembled through Ensemble learning techniques. The distributional features are applied along with inverted index. The inverted index not only mentions the number of times of word presentation, also the places of presentation in the document. Depending on the word presented and size of document the features of word is structured and computed. 

Advantages: 

  1. The text categorization of Distributional feature can be made in less cost.
  2. The Distributional system has superior performance.
  3. The Distributional system features has shown its quality when documents are lengthy and have informal style.
Download  Distributional Features for Text Categorization Asp.Net Project Abstract .

Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project

Introduction to Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project:

Health care sector, hospitals, primary health care centers, doctor’s offices and dental care centers is capable of enhancing their efficiency to respond to patients with the help of automated and self replied phone system which can be used to answer the calls from the patients and injured persons that can give information exactly and in time. 

Medical business and organizations can be quick and advantageous by installing this automated telephone answering services. The phone responds to the caller in a very prominent way for 24 hours in a day and all 7 days a week. 

IVR systems and services would be recognized to provide excellent work for Clinical trials. The Clinical IVRS extracted data maintains a perfect, persistent and an error free patient record without any disputes. 

Features 

  1. Beneficiary would request for information regarding health care programs and costs.
  2. Customer can be informed about Policy information on phone easily.
  3. IVRS can instantly provide information to existing policy holders and receive the claim number or policy account number which can be processed and revert to customer with billing and claims information.
  4. The customer if not getting the proper solution, it can be transferred to concerned department to answer the customer requirements.

  Download  Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project.

Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR

Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR Abstract:

The main things that play role in IPFA in vehicular ad hoc networks is RDFR is the internet, wireless technology, computing power, communicating devices, network connectivity. In our early college days of computer we have learned about graph. We are well aware of the concept of nodes.

Vehicular AD HOC Network is also known as VANET. 

Thus VANET if a form of technology that uses moving cars as nodes in a network so that it can create a mobile network. VANET can be used by middle organization or large organization. In this time there is huge progress in GPS and navigation system this form of system is useful to traffic report as they can easily be integrated so that you can find the possible short path to reach the destination. There is nothing new in the concept we are learning it is simply the concept of graph applied in real life . GPS are now seen in most of mobile phone that comes in the market.

Also there is another factor taken into consideration is energy efficiency.

Dynamic Source Routing (DSR) plays important role on energy efficiency. 

VANET vehicle itself can provide continuous power to communication devices and computing devices. One of the best known routing protocols is GPS.GPS stands for Global Position System. How this system work may be an interest to us.

As we have voice output for our help for our GPS system. Gps is a special form of navigation, as it is not you who navigates, but it tells our computer software on how to travel to your destination. Thus it makes our job a quite better .This system is so simple that it can be used by anyone .The only requirement to create such a system is a good and strong network.

 Download  Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR .

Survey on Sensitive Data Storage and Deletion Methods Seminar Topic

Introduction to Survey on Sensitive Data Storage and Deletion Methods Seminar Topic:

This paper discussed about the survey which summarizes the methods of providing confidential storage of information in personal computing environments. Sensitive data is lost due to theft or improper disposal of storage media and there are many methods exist to protect the sensitive data from unauthorized storage or deletion. 

Overview:

Sensitive information is storing on electronic storage devices as the usage of paper is reduced gradually.  There are many incidences happened where the sensitive information has misused or deleted by an unauthorized users. The two components helps to safeguard the data privacy on electronic storage media are the data must be stored in a confidential manner without causing problem during normal use and at the time of disposal, confidential data must be removed from storage media in an irrecoverable manner.  This survey explains various confidential data storage and deletion techniques with the aim of find the best solution which provides protection to the sensitive data.

This survey focused on single-user and non-distributed computing environments. Always, the threat model assumes that attacks to recover confidential data when the computer is powered off.  But attacks occurred after the users logged in are out of scope of this survey.  Confidential storage methods are difficult to implement as these methods are very complex to implement on sensitive data.  Software-based solutions to confidential storage of data do not require any specialized hardware and these solutions are widely available in market today.  Bit locker encrypts a specific volume sector-by-sector with the help of a diffuser.

Conclusions:

This survey summarizes the benefits and limitation of confidential storage and deletion methods. Comparison of confidential data handling methods also takes place in this suvey, while comparing it considers the characteristics like confidentiality, limitations, performance and ease-of-use.  Also discussed the overall trends of various approaches and issues faced in the data lifetime problem. 

 Download  Survey on Sensitive Data Storage and Deletion Methods Seminar Topic.

Solution to Privacy Issues in RFID Item-level Applications

Introduction to Solution to Privacy Issues in RFID Item-level Applications Project:

This paper discussed about a solution that addresses the privacy issues of Radio Frequency Identification item-level applications and also demonstrates a solution which provides high security with low manufacturing and management cost. 

Overview: 

Automated identification is possible in RFID without the knowledge of tag bearer and it is one of the major privacy concerns of RFID.  In RFID item-level applications this unauthorized read can be prevented with the help of traditional cryptographic operations like authentication and encryption but these operations are too costly in RFID. Automated identification also raises privacy concerns like inventorying and clandestine tracking.

Many researches has been carried out to provide consumer privacy in the RFID world. Physical approaches such as peeling off tags antennas or physical triggers do not provide protection from clandestine inventorying. The trade-off between cryptographic operations and low-cost has become a major challenge in designing RFID tags.  With the new proposed RFID structure, the tags need not store more information. Tags need to carry only the ID numbers to avoid clandestine and eavesdropping tracking.  Information security, integrity and non-repudiation are protected by the database in the new RFID structure. 

Conclusions 

This paper proposed a solution to the privacy concerns in RFID in item-level applications at low manufacturing and maintenance cost. In this system, RFID tags do not need a PIN or a secret key authentication which in turn reduces the costly key distribution and management.  Tags carry only ID numbers and uses hash function to prevent clandestine tracking.  This eliminates eavesdropping attacks because no reader will get meaningful information from tag responses.  Information related to tags is so secured and stored in a back-end database.

This information will send to end-users along the supply chains through cryptographic operations. Burden of using cryptographic operations shifts from tags to database so tags are easy to manufacture and maintain.  Tags carry only ID numbers, which are divided into segments, which will helps to reduce computational complexity of database management. 

Smart Gateway Design for WSN Health Care System Project Report

Introduction to Smart Gateway Design for WSN Health Care System Project:

This paper discussed about a smart gateway design which designed especially for WSN health care systems at home environments by building a bridge between different networks to get faster response time during emergencies. The communication protocols are also designed between WSN, gateway and remote servers.  Researches has been carried out on this smart gateway with a wireless home e-health care sensor network in order to show that this gateway is reliable and has low power consumption and latency. 

Overview: 

Wireless Sensor Networks (WSN) have been used in many areas because of its numerous advantages. WSNs are also using in health care systems by integrating health care, sensor network and wireless communications together.  Smart gateway designed by following embedded system development processes and this resultant designed gateway is used in WSN health care systems.

 In a health care system, time required detecting patient’s health state and informing the same to care givers is very important.  In WSN, sensor nodes always must be in working mode and less interfere channel. Data from WSN is analyzed by the proposed gateway or by any central server.  With the help of WSN, the data about health state of patient’s must reach health care takers on time.  Health care takers must get notice when patient’s health is in danger. 

            Smart gateway is classified into simple and intelligent models. In simple model, connection exists between WSN and smart gateway, and between smart gateway and health care takers. Communication protocol exists between WSN and PCN in transport layers and it should exist between WSN and HCC in application layer. 

Data transfers to HCC from WSN and commands received from HCC which need to be implemented. In intelligent model, connection exists between WSN and smart gateway, and between smart gateway and remote server.  Onboard database plays an important role in receiving and storing data from WSN and informing the same to HCC.  Reporting of patient’s health state to remote server takes place periodically. 

 Download  Smart Gateway Design for WSN Health Care System Project Report.

Shape Based Voting Algorithm for Pedestrian Detection and Tracking

Introduction:

This paper discussed about how shape-based object detection and tracking takes place using the MOUGH Transform. The shape-based voting algorithm proposed in this paper is mainly addressed one of the challenging problem, pedestrian tracking.

Shape-based detection and tracking:

MOUGH (Mixture of Union and Gaussians Hough) Transform is a new shape model designed and it designed based on a Gaussian Mixture model (GMM).  As this method is shape-based, it is used to detect stationary objects and does not depend on movement. Shape-based algorithms use the object typical shape to perform tracking.  Register complex 3d models and constraint optic flow methods are the part of shape based methods.  This paper focused on edge-based methods for edge-based shape tracking. Active shape models are used in pedestrian tracking.  But ASM has its own limitations which overcome by level set methods.

Generalized Hough Transform suggested an alternative approach to shape-based detection. GHT detects arbitrary shapes by using a single template image with a marked centroid. Since GHT has lot of drawbacks. Leibe’s implicit shape model uses a voting approach and has been applied to pedestrian tracking.  MOUGH voting can be made up to sixteen times faster by an outlier distribution in training and using centroid adjustments.

Conclusion:

MOUGH is a new shape-based model for shape-based detection and tracking. Voting from edges takes place in MOUGH using mixture of Gaussians. An analysis of noise characteristics given images of rigid objects gives this algorithm.  Semi-parametric shape template from sample images has been learnt by this algorithm. 

This algorithm uses silhouette shape, so it is very effective in detecting pedestrians. This algorithm shows high performance when compared to that of other Hough variants and also provides more advantages than other shape based tracking algorithms like active shape models. The shape-based model using this algorithm helps to locate and track objects accurately against complex backgrounds.  This algorithm is more efficient in tracking pedestrians from a side view.

Secure Routing Protocol for Mobile ADHOC Network CSE Project

Introduction:

This paper discussed about the challenges in Mobile Adhoc Network and proposed a secure algorithm to defend attacks on routing protocols.

Overview:

The main challenge in MANET is that a mobile link is most susceptible to attacks. There are both external and internal attacks acts against routing protocols.  An external attack generates by a router which pretends as a trusted router and not participates in the actual routing process.  These routers may cause Denial of Service attack or can advertise false routing information.  An internal attack generates by a malicious or faulty router inside a network domain. There is a need to design and develop secure routing protocols for MANET. These secure protocols are divided into two categories. 1. Protocols adding security mechanisms to the existing routing protocols, 2. Protocols are designed to detect and defect specific attacks.

Key management mechanism, Route discovery and attack detection are the three major tasks involved in designing a secure network protocol over MANET.  Attacks can be done using Modification and Impersonation. If the contents of routing packet are modified by including some incorrect information in the network leads to an attack in the network.  If a malicious node tries to impersonate a node and send data on its behalf, then we can consider such attach as attack using impersonation. This attack will combines with modification attack and then comes as an attack in a network.

Conclusion:

One of the challenging problems in network is how to detect and defend attacks on routing protocols.  This paper proposed an algorithm which can detects the internal attacks with the help of message and route redundancy. This paper also proposed an optimal routing algorithm with specific routing metric which based on a node’s performance and trustworthiness. These two proposed algorithms are integrated with existing AODV and DSR routing protocols for MANETs (Mobile Adhoc Networks) 

 Download  Secure Routing Protocol for Mobile ADHOC Network CSE Project.