ieee cse mini projects
ONLINE COURSE REGISTRATION
SCHOOL MANAGEMENT
FEES MANAGEMENT
Next Generation Secure Computing: Biometric in Secure E transaction free download To establish identity of an individual is becoming critical in our heavy interconnected society. The need for reliable user authentication techniques has increased heightened concerns about security and rapid developments in networking, communication, and mobility Biometrics in Secure e Transaction free download
verification of digital signature
Generation and verification of digital signature with two factor authenticationfree download This paper is intended to provide a cloud-based digital signature platform with biometric authentication and establishes an enhanced security solution in the field of cryptography. We proposed a new schema of digital signature where signature generation and verification Design Of Digital Signature Verification Algorithm
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection .free download Very large databases with skewed class distributions and non-unlform cost per error are not uncommon in real-world data mining tasks. We devised a multi-classifier meta-learning approach to address these three issues. Our empirical results from a
IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates.free download The Distributed Denial of Services (DDoS) attack is
Evolving connection is systems for adaptive sports coaching free download Contemporary computer assisted coaching software operates either on a particular sub-space of the wider problem or requires expert (s) to operate and provide explanations and recommendations. This paper introduces a novel motion data processing Designing of adaptive coaching system to enhance the logical thinking model
Voice Based E Mail (V-Mail) for blindfree download Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case Voice based E Mail Systemfree download
A Review Paper on Design of Highly Secured Automatic Teller Machine System by using Aadhaar card and Fingerprintfree download The primary aim of this project is to design a system that will improve the authentication of customers using Automatic Teller Machine . In most country existing ATM system use magnetic card reader. The customer is
Ma ive- An Intelligent Shopping Assistant.free download Our intelligent shopping assistant, , is a web application for mobile phones that aims to help users with their everyday grocery shopping by offering features such as natural language shopping lists, product recommendations, special offers, recipes and in-shop Intelligent based large scale multi agents resource management on shopping
advanced network bandwidth estimation
Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation free download Currently Open Shortest Path First (OSPF) is the most commonly used and promising intra- domain internet routing protocol where packets are routed along shortest paths to the destination. The shortest path computation is based on some static link costs and the
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication. A source-based algorithm for delay-constrained minimum-cost multicasting free download ABSTRACT A new heuristic algorithm is presented for constructing minimum-cost
network security implementation
Design and Implementation of a Network Security Model for Cooperative Network .free download In this paper a design and implementation of a network security model was presented, using routers and firewall. Also this paper was conducted the network security weakness in router and firewall network devices, type of threats and responses to those threats, and
CSE PROJECTS