ieee cse mini projects


secure e transaction

Next Generation Secure Computing: Biometric in Secure E transaction free download To establish identity of an individual is becoming critical in our heavy interconnected society. The need for reliable user authentication techniques has increased heightened concerns about security and rapid developments in networking, communication, and mobility Biometrics in Secure e Transaction free download

verification of digital signature

Generation and verification of digital signature with two factor authenticationfree download This paper is intended to provide a cloud-based digital signature platform with biometric authentication and establishes an enhanced security solution in the field of cryptography. We proposed a new schema of digital signature where signature generation and verification Design Of Digital Signature Verification Algorithm

credit card fraud detection

Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection .free download Very large databases with skewed class distributions and non-unlform cost per error are not uncommon in real-world data mining tasks. We devised a multi-classifier meta-learning approach to address these three issues. Our empirical results from a

ip spoofing

IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP download The Distributed Denial of Services (DDoS) attack is

adaptive coaching

Evolving connection is systems for adaptive sports coaching free download Contemporary computer assisted coaching software operates either on a particular sub-space of the wider problem or requires expert (s) to operate and provide explanations and recommendations. This paper introduces a novel motion data processing Designing of adaptive coaching system to enhance the logical thinking model

voice based email

Voice Based E Mail (V-Mail) for blindfree download Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case Voice based E Mail Systemfree download

automatic teller machine

A Review Paper on Design of Highly Secured Automatic Teller Machine System by using Aadhaar card and Fingerprintfree download The primary aim of this project is to design a system that will improve the authentication of customers using Automatic Teller Machine . In most country existing ATM system use magnetic card reader. The customer is

intelligent shopping

Ma ive- An Intelligent Shopping download Our intelligent shopping assistant, , is a web application for mobile phones that aims to help users with their everyday grocery shopping by offering features such as natural language shopping lists, product recommendations, special offers, recipes and in-shop Intelligent based large scale multi agents resource management on shopping

advanced network bandwidth estimation

Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation free download Currently Open Shortest Path First (OSPF) is the most commonly used and promising intra- domain internet routing protocol where packets are routed along shortest paths to the destination. The shortest path computation is based on some static link costs and the

multicasting videos

In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication. A source-based algorithm for delay-constrained minimum-cost multicasting free download ABSTRACT A new heuristic algorithm is presented for constructing minimum-cost

network security implementation

Design and Implementation of a Network Security Model for Cooperative Network .free download In this paper a design and implementation of a network security model was presented, using routers and firewall. Also this paper was conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and