Vous êtes sur la page 1sur 47

Dept.

of CSE @JIET

List of Projects Offered to B. Tech. (IV year ) Batch 2007-11


Project Number-1 Name of Faculty Member- Neeraj Rathore

Project Title- To Explore the Efficient scheduling Algorithm which reduces the load balance in
suitable Environment.
Batch Size-3
Area/ Concept involved: Distributed System, OS, parallel system.
Language / Tools that may be used: Dot Net/JAVA /C#
Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Basic concepts on Computer Dot Net/JAVA /C#
Network, Distributed
System,OS etc

Brief Description about project:


The rapid development in computing resources has enhanced the performance of computers and
reduced their costs. This availability of low cost powerful computers coupled with the popularity
of the Internet and high-speed networks has led the computing environment .Distributed system
which supports the sharing and coordinated use of resources, independently from their physical
type and location, in dynamic virtual organizations that share the same goal. This technology
allows the use of geographically widely distributed and multi-owner resources to solve large
scale applications like meteorological simulations, data intensive applications. In order to fulfill
the user expectations in terms of performance and efficiency.

Expected Outcome at the End of 7th Semester-


Literature reviews of all scheduling algorithm and find out the efficient algorithm use for load
balancing.

Expected outcome at the End of 8th Semester-

Load Balancing simulator with the help of the scheduling algorithm

Project Number-2 Name of Faculty Member- Neeraj Rathore

Project Title- Develop an Efficient checkpoint algorithm as compare to existing checkpoint


schemes.
Batch Size- 3
Area/ Concept involved: Distributed System, Computer Network, OS etc…
Language / Tools that may be used: Dot Net/JAVA /C#
Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Basic concepts on Computer Network, Distributed Dot Net/JAVA /C#
System,OS etc

1
Dept. of CSE @JIET

Brief Description about project:-

Check pointing is a technique widely used in parallel/distributed computers for rollback error
recovery. Check pointing is defined as the coordinated saving of process state information at
specified time instances. Checkpoints help in restoring the computation from the latest saved
state, in case of failure. In addition to fault recovery, checkpointing has applications in fault
detection, distributed debugging and process migration. Checkpointing in uniprocessor systems
is easy due to the fact that there is a single clock and events occur with respect to this clock.
There is a clear demarcation of events that happens before a checkpoint and events that happens
after a checkpoint. In parallel computers a large number of computers coordinate to solve a
single problem. Since there might be multiple streams of execution, checkpoints have to be
introduced along all these streams simultaneously. Absence of a global clock necessitates
explicit coordination to obtain a consistent global state.

Expected Outcome at the End of 7th Semester-


Review all existing checkpoint algorithm and compare all of them with different parameters and
design an architecture of propose scheme.

Expected outcome at the End of 8th Semester-


Design a checkpoint model which will save more date as compare to existing check point
algorithm.

Project Number-3 Name of Faculty Member- Neeraj Rathore


Project Title- Compare all scheduling algorithm and find out the efficient algorithm on the basis
of complexity and make a simulator which work on real time system.
Batch Size- 3
Area/ Concept involved: Distributed System, Computer Network, OS etc…
Language / Tools that may be used: Dot Net/JAVA /C#
Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Basic concepts on Dot Net/JAVA /C#
Computer Network,
Distributed System,OS
etc

Brief Description about project:


Scheduling is a key concept in computer multitasking, multiprocessing operating system and
real-time operating system designs. Scheduling refers to the way processes are assigned to run on
the available CPUs, since there are typically many more processes running than there are
available CPUs. This assignment is carried out by softwares known as a scheduler and
dispatcher. Find out the best scheduling algorithm on the basis of complexity and use it any real
time system .

Expected Outcome at the End of 7th Semester-

2
Dept. of CSE @JIET

Review all existing scheduling algorithm and compare all of them with different parameters and
design an architecture of propose scheme.

Expected outcome at the End of 8th Semester-


Develop scheduling algorithm and make a simulator which will work same as a real time system.

Project Number-4 Name of Faculty Member- Jaytrilok Choudhary

Project Title- Personalization of Web Search results based on user profile

Batch Size- 3

Area/ Concept involved: Web Mining

Language / Tools that may be used: Java (JSP Servlet)/ Web Search API

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Web Mining Java
Search Engine Tomcat web server

Brief Description about project:


The main function of Search engine is to search Web for the documents that are related to the
given topic specified by the user. The Web pages available on WWW (World Wide Web)
increases day-by-day and it is very difficult to find relevant information for a particular user.
There are various approaches for personalization of web search but it is unclear whether
personalization is working efficiently and effectively for different user on different queries with
different search context. For example, a zoologist may use query “mouse” to get information
about rats, while computer programmer may use the same query to find information about
computer peripherals.

Expected Outcome at the End of 7th Semester-


• The analysis and designing must be completed with GUI.
• Access search results from the search engine.

Expected outcome at the End of 8th Semester-


• The results obtained from search engine must me personalized based on user profile.

Project Number-5 Name of Faculty Member- Jaytrilok Choudhary

Project Title- Document ranking system using Vector space model

Batch Size- 3

Area/ Concept involved: Data Mining


3
Dept. of CSE @JIET

Language / Tools that may be used: Java

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Data mining Java
Vector space model

Brief Description about project:


Document ranking is a concept in the field of information retrieval. In information retrieval
systems, documents should be ranked in order of decreasing probability of relevance. Most
existing text retrieval techniques rely on indexing keywords. Unfortunately, keywords or index
terms alone cannot adequately capture the document contents, resulting in poor retrieval
performance. There is a technique to rank the documents using vector space model. In this
technique, the documents ranked based on the cosine similarity measurement.

Expected Outcome at the End of 7th Semester-


• The analysis and designing must be completed with GUI.
• Vector space model should be prepared.

Expected outcome at the End of 8th Semester-


• The documents must be ranked.

Project Number-6 Name of Faculty Member- Jaytrilok Choudhary

Project Title- Implementation of ‘Page Rank Algorithm’

Batch Size- 3

Area/ Concept involved: Web mining

Language / Tools that may be used: Java

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Web mining Java
Page rank algorithm,
search engine

Brief Description about project:


PageRank is a link analysis algorithm used by the Google search engine that assigns a numerical
weighting to each element of a hyperlinked set of documents with the purpose of measuring its
relative importance within the set. The algorithm may be applied to any collection of entities.
The PageRank of a page is defined recursively and depends on the number and PageRank metric
of all pages that link in to it (incoming links) and out to it ( outgoing ).
4
Dept. of CSE @JIET

Expected Outcome at the End of 7th Semester-


• The analysis and designing must be completed.
• Prepare a virtual network to implement page rank algorithm.

Expected outcome at the End of 8th Semester-


• Page rank algorithm must be implemented and worked on World Wide Web.

Project Number-7 Name of Faculty Member-Abhishek Srivastava

Project Title-External Memory Algorithms for processing line segments in GIS.


Batch Size-3

Area/ Concept involved: Computational Geometry,Algorithm Analysis and complexity theory

Language / Tools that may be used:C++,TPIE on linux

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Computational
Geometry
External Memory TPIE
Algorithms

Brief Description about project: (Minimum 100 words)-


In the design of algorithms for large-scale applications it is essential to consider the problem of
minimizing I/O communication. Geographical information systems (GIS) are good examples of
such large-scale applications as they frequently handle huge amounts of spatial data. Typical
subproblems that need to be solved in GIS systems include point location, triangulating maps,
generating contours from triangulated elevation data, and producing map overlays, all of which
require manipulation of line segments. This project aims at designing an I/O efficient algorithm
having less I/O complexity than existing external memory algorithms.

Expected Outcome at the End of 7th Semester-


Data modeling for the given problem, Implementation of existing external memory algorithms
on TPIE. Performance comparison of existing external memory algorithms with existing incore
algorithms (Theoretical as well as Experimental)

Expected outcome at the End of 8th Semester-


An improved external memory algorithm. Proof of correctness of Algorithm. Performance
comparison of existing external memory algorithm with the proposed algorithm (Theoretical as
well as experimental)

Project Number-8 Name of Faculty Member-Abhishek Srivastava


5
Dept. of CSE @JIET

Project Title-Utility based scheduling using machine learning in resourse constrained systems.

Batch Size-3

Area/ Concept involved: Operating System, Artificial Intelligence

Language / Tools that may be used:C / C++

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Operating System
Artificial Intelligence

Brief Description about project:

The classical real-time scheduling problem is that of deciding on the order in which the currently
unscheduled jobs should be executed by a single processor, with no possibility of processor
sharing. In the case of hard real-time systems, each job is characterized by an execution time and
a deadline. A soft real-time system is the one where each job receives some utility as a function
of its completion time. Each job arriving into the system requires a certain number of CPU time
to be executed. The final job utility decays as its waiting + execution time increases.

The objective of project is to design an utility based scheduling algorithm where reinforcement
learning is used to update the value function for each machine based on the state of its resources,
the jobs it is executing and the jobs waiting to be scheduled. Once such a value function is
obtained, any kind of scheduling decisions can be considered on each machine, which can now
be driven by maximization of the machine’s state value following the scheduling decision.

Expected Outcome at the End of 7th Semester-


Simulation of existing scheduling algorithm and their performance analysis.
Implementation of reinforcement learning.

Expected outcome at the End of 8th Semester-


Design and implementation of utility based scheduling.
Performance analysis of the proposed system

Project Number-9 Name of Faculty Member- Abhishek Srivastava

Project Title- Distributed Data Directories and Parallel Data Management System

Batch Size- 3

Area/ Concept involved: Dynamic Load Balancing


6
Dept. of CSE @JIET

Language / Tools that may be used: C/C++/UNIX

Prerequisite Knowledge Required-


Concepts / Subject Software / Tools
Distributed Computing GNU C/C++
Distributed Processing MPICH, Zoltan

Brief Description about Project:


The aim of this project is to design a general-purpose tool for parallel data management for
unstructured, dynamic applications. This system includes a suite of load-balancing algorithms,
an unstructured communication package, distributed data directories, and dynamic debugging
tools that can be used by a variety of applications. It simplifies the load-balancing, data
movement, unstructured communication, and memory usage difficulties that arise in dynamic
applications such as adaptive finite-element methods, particle methods, and crash simulations. Its
data-structure design also lets a wide range of applications use it without imposing restrictions on
application data structures. Its object-based interface provides a simple and inexpensive way for
application developers to use the library and researchers to make new capabilities available
under a common interface. This system provides tools that help developers of parallel
applications.

• A suite of parallel partitioning algorithms and data migration tools dynamically


redistribute data to reflect, say, changing processor workloads.
• Distributed data directories and unstructured communication services let applications
perform complication communication using only a few simple primitives.
• Dynamic memory management tools enhance common memory allocation functions to
simplify debugging of dynamic memory usage.

A parallel application has been already developed as Zoltan. Zoltan's data-structure neutral
design allows it to be used by a variety of applications without imposing restrictions on
application data structures. Its object-based interface provides a simple and inexpensive way for
application developers to use the library and researchers to make new capabilities available
under a common interface.

Expected outcome at the End of 7th Semester-

Design and architecture of the proposed system, proposed algorithm, modules for fulfillment of
the algorithm.

Expected outcome at the End of 8th Semester-


Experimental results should be achieved in the process of distributed data and data management
in heterogeneous environment of any LAN. These results must be verified on the basis of
suitable graphs and required tables.

Project Number-10 Name of Faculty Member-Deepshikha Tiwari

Project Title- A secure architecture for internet protocol


7
Dept. of CSE @JIET

Batch Size-3

Area/ Concept involved: Network

Language / Tools that may be used: Java, C, C++

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Network basics Java , C, C++
TCP/IP Protocol suit

Brief Description about project:

The Internet provides amazing opportunities, but not without some risk. Without the proper controls, your
data is subject to several types of attacks as follows: Loss of Privacy, Data Integrity, Identity Spoofing etc.
To provide solution for these problems we will use a mechanism called IPSec (IP Security Architecture).
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by
authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for
establishing mutual authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair
of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls),
or between a security gateway and a host. IPsec is a dual mode, end-to-end, security scheme operating
at the Internet Layer of the Internet Protocol Suite or OSI model Layer 3.

Expected Outcome at the End of 7th Semester-

Literature survey on IPSec, design document and development of client module

Expected outcome at the End of 8th Semester-

Development of server module, integration of other module and final report

Project Number-11 Name of Faculty Member-Deepshikha Tiwari

Project Title- Development of tool for Linux Network Administration

Batch Size- 3

Area/ Concept involved: Network


8
Dept. of CSE @JIET

Language / Tools that may be used: C, PHP, Red Hat Packages

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Computer Networks
OOPS, Operating C, RHEL5/CentOS 5
Systems

Brief Description about project:


In this project a Linux based well defined network of our college will be developed. We will
implement a Proxy server, DNS server, software firewall, FTP server, LDAP server, an attractive
website of our college and a mail server will be established. By using RHEL 5/CentOS 5 as the
platform, we will add some more functionality in the mail server other than just send or receive
mail. We will have a postfix SMTP server, Dovecot POP3 and IMAP server, mailboxes, quota
for mailboxes, a antivirus to scan mail, anti spam filter and mail scanner to integrate antivirus
and anti spam filter into postfix. We will also be having integrated active directory in our
mailboxes to turn Linux mail server into lean and mean exchange like machine and MySQL to
administer multiple domains and the users will be facilitated to have a vacation massage.

Expected Outcome at the End of 7th Semester-

High level design document for the all the modules and Development of mail server.

Expected outcome at the End of 8th Semester-

Development of rest of the rest of the modules and integration of all the modules.

Project Number-12 Name of Faculty Member- Deepshikha Tiwari

Project Title- Analysis and implementation of Q-learning Method

Batch Size- 3

Area/ Concept involved: Artificial intelligence and Machine learning

Language / Tools that may be used: JAVA, C/C++

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Machine learning JAVA , C/C++
Reinforcement
Learning
9
Dept. of CSE @JIET

Brief Description about project:

Reinforcement learning has received much attention in the past decade. The primary thrust of
this project has to explore the field of reinforcement learning from a computer science
perspective and analyze, implement Q-learning method. Reinforcement learning is the study of
how an autonomous agent (animals and artificial systems), the learner, can acquire and
improve skills within an environment without having an explicit teacher. One way in which
animals acquire complex behaviors is by learning to obtain rewards and to avoid punishments. It
is considered especially suitable for unpredictable environments, robot learning and goal
oriented learning. In these situations the goal is well known, but not how to achieve the goal.
Reinforcement learning is also called ‘learning with a critic’
In Q-learning method the role of an agent using is to set up a Q-function, which is an
estimate of the reward it can expect from performing the possible actions from its current state.
This Q-function can thus be utilized to select the most appropriate action. As with all
reinforcement learning strategies, an external reward is used to inform the agent when it has
correctly or incorrectly carried out an action, or set of actions. At the end of project, we will try to
suggest some improvement in Q-learning method.

Expected Outcome at the End of 7th Semester-

Study of Reinforcement learning, Q- learning, Design document, development of TD


method

Expected outcome at the End of 8th Semester-

Final simulator of Q-learning with some improvement suggestion.

Project Number-13 Name of Faculty Member- Punit Pandey

Project Title- Learning an agent through Relative Reward

Batch Size-3

Area/ Concept involved: Artificial Intelligence, Reinforcement Learning Algorithms, and


Swarm Intelligence

Language / Tools that may be used: Java, Eclipse

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Artificial Intelligence Java, Java Swing,
Applet

Brief Description about project:


10
Dept. of CSE @JIET

This project proposes an approach towards Actor-Critic Learning Algorithm to improve the
learning capability of an agent. Actor-Critic Algorithm is a model Based Reinforcement learning
method that used to learn the agents. The framework of this project is to develop learning and co-
operating agent which can interact with environment and provide the reward in the same context.
A new relative reward concept is introduced here to improve the learning capability of algorithm
by decreasing the number iteration required to learn. The reward module is responsible for
providing the reward for its previous action and Actor-Critic module is responsible for providing
a decision that will help an agent to take a particular action. In reinforcement learning agent
prefer to choose actions that it has tried in the past and found to be effective in producing
maximum reward. The reward module has to be designed in such a way so that it will provide a
better reward from its previous reward. The whole concept that is stated above has to simulate in
java by development of Autonomous Agents.

Expected Outcome at the End of 7th Semester-


1. Design phase has to be completed with all high level design deliverables
2. Development of Actor-Critic Learning Module in Java
3. Development of simulation to demonstrate the concept of Actor-Critic Learning
4. Development of pseudo code for Reward Module

Expected outcome at the End of 8th Semester-

1. Implementation of Relative Reward Module in Java


2. Simulating the concept of Relative Reward in Java
3. Final Report and all deliverables should related to project should be ready

Project Number-14 Name of Faculty Member- Punit Pandey

Project Title-Memory Leak Detection in Distributed System

Batch Size-3

Area/ Concept involved: Operating System, Distributed System

Language / Tools that may be used: Java, C, C++, Eclipse

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Operating System Java,C,C++

Brief Description about project:


Memory leak is one of the major application faults in the cluster computing. Memory leaks are
caused when some part of allocated memory is never accessed again. This can degrade program
performance and it may lead the program to exhaust systems resource eventually leading to
program crash. The above mentioned project deals with the development of Dynamic Memory
Monitoring tool that detects memory leak while application is in execution phase. The tool will
11
Dept. of CSE @JIET

provide the information to the end user whenever the memory leak is detected in any process of a
cluster. It will also provide the information to the user to take corrective action on affected
process. Current memory leak detection techniques for clusters are reactive and display the
memory leak information after the execution of the Process it means they detect memory leak
only after it occurs.

Expected Outcome at the End of 7th Semester-


1. Design phase has to be completed with all high level design
2. Development of Dynamic Memory Monitoring tool pseudo code
3. Development of pseudo code of all processes state in terms of memory leak like bad state
or good state

Expected outcome at the End of 8th Semester-

1. Implementation of tool with by using Java or C.


2. All deliverables related to Dynamic Memory Monitoring tool

Project Number-15 Name of Faculty Member- Punit Pandey

Project Title- Multi Agent Based Distributed Intrusion Detection System

Batch Size- 3

Area/ Concept involved: Network Security, Distributed System

Language / Tools that may be used: Java, Eclipse

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Socket Programming Java, Java Swing,
Applets

Brief Description about project:


The primary goal of this project is to provide intrusion detection and real-time prevention
capability against insider attacks in distributed and fully automated environments. IDS (Intrusion
Detection System) must analyze and correlate a large volume of data collected from different
critical network access points. This task requires IDS to be able to characterize distributed
patterns and to detect situations where a sequence of intrusion events occurs in multiple hosts.
Different type of Agents has to develop that work as entities to detect and take predefined actions
against malicious activity. The heart of this project is the Interpreter Agent. It collaborates with
the Analyzer Agent for detecting complex local attacks, and uses the Correlate agent with the
Mobile Agent for determining whether some suspicious activities in different node can be
combined to be a distributed intrusion.

12
Dept. of CSE @JIET

Expected Outcome at the End of 7th Semester-


1. Literature survey and design phase should be completed with all high level design
deliverables
2. Development of Interpreter agent, Analyzer agent and Filter agent module to detect
normal local attacks
3. Some specific rule should be specified to filter a malicious user

Expected outcome at the End of 8th Semester-

1. Implementation of correlate agent and Mobile Agent module to detect distributed


intrusion attacks
2. Final report and the other deliverable related to project

Project Number-16 Name of Faculty Member-Raksha Sharma

Project Title- Student Record Management System in Distributed Database

Batch Size- 3

Area/ Concept involved: Application of Distributed Database and Networking

Language / Tools that may be used: ASP.net, SQL server, VB.net, File server creation.

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


DBMS concepts SQL
Web designing ASP.net,VB.net

Brief Description about project: This entirely deals with the management of students record
scattered on various sites i. e. in distributed manner. Whole Distributed database should be
accessed through web page. Database retrieval, updating, insertion, deletion should be possible
from any location present in the distributed system graph. Administrator should be able to
execute update queries through the web page and students should be able to access their own
record through web page irrespective of which location he or she belongs.

Expected Outcome at the End of 7th Semester-


Distributed system graph must be ready; web pages required to access database should be
completed. Half of the database should be completed.

Expected outcome at the End of 8th Semester-

13
Dept. of CSE @JIET

Students must be able to able to access, update data from one site of another site through the
earlier designed web pages with the complete record of students in the database of at least three
sites.

Project Number-17 Name of Faculty Member- Raksha Sharma

Project Title- Retrieval of file using content based search


Batch Size-3

Area/ Concept involved: Networking, Soft Computing

Language / Tools that may be used: JAVA, Sql Server, ASP.net, JSP

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


DBMS SQL server
Soft Computing and .net frame work, java
Networking

Brief Description about project: - This project completely deals with the searching for the
whole data related to a particular word available on web. Search should be done through two
fields first is text field in which a user can enter the text and second one is name of domain
like entries “21” and “www.hindustantimes.com” respectively should fetch all the data
related to date 21 available on Hindustantime.com .there should be a provision like if we type
a character it should display possible searches related to that character like Google search
engine.
Web page should be able to search the images related to the entered text. For example if
user search for the word BOOK. Project should display all the images available on the web
related to word book.

Expected Outcome at the End of 7th Semester-


Decide on constraints that you have to force while searching. Complete database should be ready
with these constraints as attributes. All the web pages should be ready.

Expected outcome at the End of 8th Semester-


All the web pages should be in working condition. User must be able to search the data
according to his need.

Project Number-18 Name of Faculty Member-Raksha Sharma

Project Title- Development of a workflow based Complaint Management System

Batch Size-3

Area/ Concept involved: Operating System, Database/understanding of mailing system

14
Dept. of CSE @JIET

Language / Tools that may be used: Unix/Linux, Shell Scripting, C, Oracle, VB.net

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Operating System Unix/Linux
Database Oracle

Brief Description about project: This Project deals with the implementation of mailing system
to provide the customer a friendly environment to post his or her complaints.
With Every product will have an email id assigned to it. Customers, when they have a
complaint about the product, will send an email to the email id provided to them for that
product. these Emails should get logged into the database and a complaint number should be
generated. The customer should get an acknowledgement back saying that his/her complaint
is received. Administrators will be set up for each product and he/she should see all the
complaints received for that product. Groups of complaint handling executives should be set
up for each product. The administrator for a product should be able to assign the complaints
to specific members of the complaint handling team for that product. The complaint
management team member should see the complaints assigned to him/her in his inbox. He
should be able to send mail to the customer through the system with any clarification/solution
or asking for more information. These subsequent communications should be stored as a part
of the same complaint. The complaint should show all the communication that happened
between the customer and the organization. A complaint can be closed with some pre defined
statuses like: Open, Closed, Abandoned, In-progress, etc.Reference information should be
maintained in the system like complaint management team for different products, mail ids for
different products, default mail texts for products, default mail subjects for products, list of
users, list of products etc.

Expected Outcome at the End of 7th Semester-


Database with Product name and Email Id assigned to the customer for a particular product
should be ready. Conversation through mails should be displayed.

Expected outcome at the End of 8th Semester-


The whole description of the project should be in working condition.

Project Number-19 Name of Faculty Member- Dinesh Kumar Verma

Project Title- “Vehicle tracking system using GPS and GSM modem”

Batch Size- 3

Area/ Concept involved: Embedded systems/Microcontroller

15
Dept. of CSE @JIET

Language / Tools that may be used: Assembly language for microcontroller / C language / Kiel
or any assembler

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Microcontroller 8051 Kiel or any tool to
family program the EEPROM
Serial communication Port programming

Brief Description about project:


In this Project it is proposed to design an embedded system which is used for tracking and
positioning of any vehicle by using Global Positioning System (GPS) and Global system for
mobile communication (GSM).
In this project AT89S52 microcontroller is used for interfacing to various hardware peripherals.
The current design is an embedded application, which will continuously monitor a moving
Vehicle and report the status of the Vehicle on demand. For doing so an AT89S52
microcontroller is interfaced serially to a GSM Modem and GPS Receiver. A GSM modem is
used to send the position (Latitude and Longitude) of the vehicle from a remote place. The GPS
modem will continuously give the data i.e. the latitude and longitude indicating the position of
the vehicle. The GPS modem gives many parameters as the output, but only the NMEA data
coming out is read and displayed on to the LCD. The same data is sent to the mobile at the other
end from where the position of the vehicle is demanded. An EEPROM is used to store the mobile
number.

Expected Outcome at the End of 7th Semester- All the design should be prepared

Expected outcome at the End of 8th Semester- A hardware or any vehicle modules that can
be track by PC

Project Number-20 Name of Faculty Member- Dinesh Kumar Verma

Project Title- “Automatic plant Irrigation “

Batch Size- 3

Area/ Concept involved: Embedded systems/Microcontroller

Language / Tools that may be used: Assembly language for microcontroller / C language /
Kiel or any assembler

Prerequisite Knowledge Required-

16
Dept. of CSE @JIET

Concept/ Subject Software / Tools


Microcontroller 8051 Kiel or any tool to
family program the EEPROM
Power Electronics Op-Amp

Brief Description about project: -


The Project presented here waters your plants regularly when you are out for vocation. The
circuit comprises sensor parts built using op-amp IC LM324. Op-amp are configured here as a
comparator. Two stiff copper wires are inserted in the soil to sense the whether the Soil is wet or
dry.

The Microcontroller was used to control the whole system it monitors the sensors and when
more than two sensors sense the dry condition then the microcontroller will switch on the motor
and it will switch off the motor when all the sensors are in wet. The microcontroller does the
above job it receives the signals from the sensors, and this signals operated under the control of
software which is stored in ROM.

Expected Outcome at the End of 7th Semester- All the design should be prepared

Expected outcome at the End of 8th Semester- A hardware module that can be used to
ON/OFF the water supply motor under the condition of Soil

Project Number-21 Name of Faculty Member- Dinesh Kumar Verma

Project Title- Development of Routine for Improvement in various parameters of a Software


Architecture Models

Batch Size- 3

Area/ Concept involved: Software Engineering

Language / Tools that may be used: Matlab/ Java

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Software Reliability
Software Testing Any testing tool
Computer systems
organization

Brief Description about project: (Minimum 100 words)-

17
Dept. of CSE @JIET

Quantitative prediction of quality properties (i.e. extra functional properties such as performance,
reliability, and cost) of software architectures during design supports a systematic software
engineering approach. Designing architectures that exhibit a good trade-off between multiple
quality criteria is hard, because even after a functional design has been created, many remaining
degrees of freedom in the software architecture span a large, discontinuous design space. In
current practice, software architects try to find solutions manually, which is time-consuming, can
be error prone and can lead to suboptimal designs. This project is an automated approach to
search the design space for good solutions. Starting with a given initial architectural model, the
approach iteratively modifies and evaluates architectural models. The approach should apply a
multi-criteria genetic algorithm to software architectures modeled with the Palladio Component
Model. It supports quantitative performance, reliability, and cost prediction and can be extended
to other quantitative quality criteria of software architectures.

Expected Outcome at the End of 7th Semester- All the design should be prepared

Expected outcome at the End of 8th Semester complete project

Project Number-22 Name of Faculty Member- Prateek Pandey

Project Title- Building Processes, Applications and their integration in BPM technologies

Batch Size-3

Area/ Concept involved: Business Process Management

Language / Tools that may be used: Java/J2EE, DBMS, XML

Prerequisite Knowledge Required- Java/J2EE, DBMS, XML

Concepts / Subject Software / Tools


Programming Java
Language
BPM suite Savvion Business
Manager

Brief Description about project- Business Process Management (BPM) software and services
help organizations optimize business performance by discovering, documenting, automating, and
continuously improving business processes to increase efficiency and reduce costs. The area of
BPM is new and much scope lies beneath this. The project offers you to learn the Business
Process Management by taking any BPM product of your choice(Savvion Business Manager,
BEA Aqualogic, Red Hat’s jBPM etc.), creating processes, applications, reports, simulations and
integrating an application with your BPM suite. Working on BPM requires sound knowledge of

18
Dept. of CSE @JIET

Java/JSP/Servlets . Having equipped with this hot & vibrant technology, anyone can upstage
others even in cold & blunted job market.

Expected Outcome at the End of 7th Semester- A prototype application demonstrating various
features of your suite including some reports.

Expected outcome at the End of 8th Semester- A functional and meaningful application
with comprehensive reports and rules implemented .

Project Number-23 Name of Faculty Member-Prateek Pandey

Project Title- Fuzzy logic Based Inventory Control System & Interfacing with Weighing
Machine

Batch Size-3
Area/ Concept involved: Application development using Fuzzy Logic

Language / Tools that may be used: Java/J2EE, DBMS, XML

Prerequisite Knowledge Required- Java/J2EE, DBMS, XML

Concepts / Subject Software / Tools


Programming Java
Language

Brief Description about project: As the title suggests, the project is about making an inventory
control system but the concept of fuzzy sets is incorporated into it. Apart from it the project
includes interfacing of the fuzzy based Inventory system application and the digital weighing
machine that is commercially available in the market. Indeed, it sounds good to have the
appropriate quantity of a commodity deducted automatically from the database as and when the
same quantity is being weighted on the weighing machine and supplied to the customer .

Expected Outcome at the End of 7th Semester- A working application except reports and
some cosmetic features.

Expected outcome at the End of 8th Semester- Fully functional application with
comprehensive reports.

Project Number-24 Name of Faculty Member- Prateek Pandey

Project Title- Integration of Applications based on Java Messaging Service and SOA

Batch Size-3
19
Dept. of CSE @JIET

Area/ Concept involved: Messaging Services/ Integration

Language / Tools that may be used: Java/ J2EE/ Application Server

Prerequisite Knowledge Required- Java, J2EE, WebLogic/ WebSphere

Concepts / Subject Software / Tools


Programming Java
Language
Application Server Websphere/ Weblogic

Brief Description about project: If you are told to make an application that will process on
some task that is already been created by some other application and after processing it has to be
updated back into the first application then it becomes indispensable to make these applications
talk to each other, or in other words you have to use some methodology to integrate the two
applications. There are available so many ways to achieve this e.g Java Messaging Services,
WebServices & SOA etc depending upon the application in context and suitability. This project
offers learning various java technologies, XML , application servers, Service Oriented
Architecture, Web Services and also the comparison of different integration techniques. If you
successfully complete this project, you will be in a position to integrate your institute’s web
kiosk to some other application. Life embraces those who hug challenges and this is in no way
not a huge challenge.

Expected Outcome at the End of 7th Semester- Demonstration ready applications showing
integration using atleast one integration technique.

Expected outcome at the End of 8th Semester- Complete comprehensive report showing
comparative analysis of various integraton techniques with appropriate working examples

Project Number-25 Name of Faculty Member- Ratnesh Litoriya

Project Title- Analysis and Implementation of Software estimation tool for agile based project

Batch Size-3

Area/ Concept involved: Software Engineering

Language / Tools that may be used: .Net /JAVA

Prerequisite Knowledge Required- Softwae Engg

Concept/ Subject Software / Tools


Software Estimation .Net framework
Database Oracle 9i and above
20
Dept. of CSE @JIET

Brief Description about project: (Minimum 100 words)-

Agile software development methodologies are becoming important now a day. The movement
of Agile is now spread around the world. Adopting agile methods means incorporating new
dynamic approaches in terms of roles, management style, project monitoring and controlling.
This project work is supposed to focus on study and analysis of software cost estimation in an
Agile Project as well as implementation of the technique identified. It is mainly a research based
project aiming to identify the efficient Project estimation technique, Prograaming will be done in
.Net framework.

Expected Outcome at the End of 7th Semester-

Analysis and Thorough Study of existing Software Estimation Techniques in contrast with the
Agile Software practice.

Expected outcome at the End of 8th Semester-

An Integrated Software estimation tool that helps to overcome the difficulties of agile project
estimation

of 7th Semester-

Thorough Study and analysis of domain.


Demonstration of initial modules

Expected outcome at the End of 8th Semester-

Project Number-26 Name of Faculty Member- Ratnesh Litoriya

Project Title- Mobile based Path finder System

Batch Size-3

Area/ Concept involved: Mobile Application

Language / Tools that may be used: J2ME , J2EE

Prerequisite Knowledge Required- Core JAVA , J2ME

Concepts / Subject Software / Tools


Utilization of GSM J2ME and other software
packages that supports
Mobile device

21
Dept. of CSE @JIET

Brief Description about project:

This Project deals with the problem of finding out the distance and location between two
individual places within the globe or any geographically restricted area , Path finding is the vast
issue , but through this title one is supposed to address the problem off finding the correct
distance with the help of cellular device , because of the fact that almost every person is having
a mobile with them , and the feature of “Any where and Any time ” opens very interesting
opportunities in this regard .

Expected Outcome at the End of 7th Semester-

Study and analysis of Mobile technology and an efficient algorithm that effectively addresses the
problem of path finding

Expected outcome at the End of 8th Semester-


A Path finder system (working) which addresses the problem of finding of path through GSM
Mobile.

Project Number-27 Name of Faculty Member- Ratnesh Litoriya

Project Title- Content-Based Image Retrieval Using Multi resolution Color and Texture
Features
Batch Size-3

Area/ Concept involved: Graphics And Multimedia

Language / Tools that may be used: Java , Net Beans 5.5

Prerequisite Knowledge Required- .Net programming

Concepts / Subject Software / Tools


Pattern Recognition Java
Image retrieval Jdk 1.6

Brief Description about project:


In this project, a content-based image retrieval method based on an efficient combination of
multi-resolution color and texture features is proposed . We will extract the spatial distribution of
colours in an image. The dimension of the combined feature vector is determined at a point
where the retrieval accuracy becomes saturated. Especially, it demonstrates more excellent
retrieval accuracy for queries and target images of various resolutions. It is an automatic process
to search relevant images based on user input. The input could be parameters, sketches or
example images. This process first extracts the image features and store them efficiently. Then it
compares with images from the database and returns the results.

22
Dept. of CSE @JIET

Expected Outcome at the End of 7th Semester-

Take the features from the picture that will be used for matching with the database.

Expected outcome at the End of 8th Semester-

Matching of the extracted features with the database images

Project Number-28 Name of Faculty-Mahesh Kumar

Project Title- Improving Packet Delivery Performance

Batch Size-3

Area/ Concept involved: Internet, Computer Networks, Routers

Language / Tools that may be used: TCL/C++, JAVA, NS2, SSFnet

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Networks Network Simulators
internet Tcl/Otcl/C++/Java
Brief Description about project: Computer Networks are supporting huge amount IP traffic
and doing a great job,
but some time they take much longer time to transfer traffic on the network,
we need to find the causes of the delay and improve the performance by either eliminating those
factors or by introducing some additional features to it.

Expected Outcome at the End of 7th Semester-


The students will be able to understand the concept of networking, routing, ASes and applying
routing protocols on nodes in a network/AS using available network simulator, they will also
come up with design of their new model of delivering packets.

Expected outcome at the End of 8th Semester-

The students will implement their designed model and will display the outcome of their designed
approach in any of the network simulator.

Project Number-29 Name of Faculty-Mahesh Kumar

Project Title- Development of Novel Routing Information Protocol

Batch Size-3

23
Dept. of CSE @JIET

Area/ Concept involved: Internet, Computer Networks, Routers

Language / Tools that may be used: TCL/C, C++, JAVA etc

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Networks UNIX/Linux /
internet Tcl/Otcl/C/C++/Java

Brief Description about project: Computer Networks are supporting huge amount of traffic and
doing a great job, but some improvements are expected if we make certain changes to the
software use in decision making, we need to find the causes of the performance degradation and
improve the performance.

Expected Outcome at the End of 7th Semester-


The students will be able to understand the concept of networking, routing and implementing
networks by creating nodes/links/servers/clients and applying routing protocols using any of the
available network simulators, they will also come up with design of their new model of routing.

Expected outcome at the End of 8th Semester-


The students will implement their designed model and will display the outcome of their designed
approach in any of the network simulator.

Project Number-30 Name of Faculty-Mahesh Kumar

Project Title- Development of a Network Management System (NetMon)

Batch Size-3

Area/ Concept involved: Computer Networks, Network Management

Language / Tools that may be used: TCL/C, C++, JAVA etc

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Networks UNIX/Linux /Windows Svr
Network management Tcl/Otcl/C/C++/Java

Brief Description about project: Computer Networks are growing at a rapid speed and network
administrators are facing difficulties to monitor the status of each component of a network
without having a better management system for local area network.

24
Dept. of CSE @JIET

Expected Outcome at the End of 7th Semester-

The students will be able to understand the concept of networking, and management related
issues. They will also be able to understand the importance of network management. They will
also come up with design of their new model of network management system.

Expected outcome at the End of 8th Semester-

The students will implement their designed model and will display the outcome of their designed
approach in either Java or .Net.

Project Number-31 Name of Faculty Member- Vishnu Sharma

Project Title-Security Issues in VOIP Applications


Batch Size-3

Area/ Concept involved:computer networking

Language / Tools that may be used:ns-2/c++/java

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer networking NS-2/java/C++

Brief Description about project: (Minimum 100 words)-

Recent voice over Internet protocol (VoIP) technology is attracting more and more attention and
interest in the industry. VoIP applications such as IP telephony systems involve sending voice
transmissions as data packets over private or public IP networks as well as reassembled and
decoded on the receiving side. Security concerns are always the major barrier that prevents many
businesses from employing VoIP technologies. In this project, we discuss various VoIP security
threats and possible approaches to tackle the threats in VoIP applications

Expected Outcome at the End of 7th Semester-


Analysis and Study of voip tecnology

Expected outcome at the End of 8th Semester-

Implementaion of Routing security algorithms and data confidentiality for voip and results of
simulations.

25
Dept. of CSE @JIET

Project Number-32 Name of Faculty Member- Vishnu Sharma

Project Title- SOA BASED STOCK MARKET


Batch Size-3

Area/ Concept involved: client-sever computing

Language / Tools that may be used: asp. net,sql server

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


ASP.NET,SQL .NET,TOMCAT
SQL SERVER

Brief Description about project:

In computing, a service-oriented architecture (SOA) is a flexible set of design principles used


during the phases of systems development and integration. A deployed SOA-based architecture
will provide a loosely-integrated suite of services that can be used within multiple business
domains. SOA also generally provides a way for consumers of services, such as web-based
applications, to be aware of available SOA-based services. For example, several disparate
departments within a company may develop and deploy SOA services in different
implementation languages; their respective clients will benefit from a well understood, well
defined interface to access them. XML is commonly used for interfacing with SOA services,
though this is not required. SOA defines how to integrate widely disparate applications for a
world that is Web based and uses multiple implementation platforms. Rather than defining an
API, SOA defines the interface in terms of protocols and functionality. An endpoint is the entry
point for such an SOA implementation.

Expected Outcome at the End of 7th Semester-

DESIGN, CODE

Expected outcome at the End of 8th Semester-


Implementaion, Testing

Project Number-33 Name of Faculty Member- Vishnu Sharma

Project Title-Performance evaluation and simulations of routing protocols in ad hoc networks

Batch Size-3

Area/ Concept involved: Ad-hoc Networks


Language / Tools that may be used: NS-2/C++/Qualnet

Prerequisite Knowledge Required-

26
Dept. of CSE @JIET

Concepts / Subject Software / Tools


Adhoc networks NS-2/C++

Brief Description about project:


In this project, we describe the Optimized Link State Routing Protocol (OLSR) a proactive
routing protocol for Mobile Ad-hoc NET works (MANETs). We evaluate its performance
through exhaustive simulations using the Network Simulator 2 (ns2) and compare with other ad-
hoc protocols, specifically the Ad-hoc On-Demand Distance Vector (AODV) routing protocol
and the Dynamic Source Routing (DSR) protocol. We study the protocols under varying
conditions (node mobility, network density) and with varying traffic (TCP, UDP, different
number of connections/streams) to provide a qualitative assessment of the applicability of the
protocols in different scenarios.

Expected Outcome at the End of 7th Semester-


Analysis and Study of existing ad-hoc routing protocols Techniques

Expected outcome at the End of 8th Semester-

NS-2 tool that helps to overcome the difficulties of Ad-hoc routing protocols and results of
simulations.

Project Number-34 Name of Faculty Member- AJAY KUMAR

Project Title- Efficient Data Mining Using Intelligent Agents

Batch Size-3

Area/ Concept involved: Data Mining, Database, and AI

Language / Tools that may be used: Java/Matlab/.Net

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


DBMS NIL
OOPS NIL

Brief Description about project: Data Mining is the process of extraction of interesting (non-
trivial, implicit, previously unknown and potentially useful) information or patterns from data in
large databases. Agents are defined as software or hardware entities that perform some set of
tasks on behalf of users with some degree of autonomy. In order to work for somebody as an
assistant, an agent has to include a certain amount of intelligence, which is the ability to choose
among various courses of action, plan, communicate, adapt to changes in the environment, and
learn from experience.
27
Dept. of CSE @JIET

In general, an intelligent agent can be described as consisting of a sensing element that can
receive events, a recognizer or classifier that determines which event occurred, a set of logic
ranging from hard-coded programs to rule-based inference, and a mechanism for taking action.
In several steps through knowledge discovery, which include data preparation, mining model
selection and application, and output analysis, intelligent agent paradigm can be used to
automate the individual tasks. In the experiment setup, we discover association rules in a
distributed database using intelligent agents. We apply an original approach for effective
distributed mining association rules: loose-couple incremental methods. We compare the results
obtained with the similar work done in the field.

Expected Outcome at the End of 7th Semester- Students will able:


• To analyze the different format of data.
• To Learn Preprocessing Task for Data mining.
• To gain working knowledge of Weka.

Expected outcome at the End of 8th Semester-


Student will able to:
• Design its own model based upon the given data source.
• Analyze the outcome of the algorithm and present complete model in the form of tool.

Project Number-35 Name of Faculty Member-Ajay Kumar

Project Title-Data mining application in medical: a Case Study

Batch Size-3

Area/ Concept involved: Data Mining, Database, and AI

Language / Tools that may be used: Java/Matlab/.Net

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


DBMS NIL
OOPS NIL

Brief Description about project:


This is the case study on medical data in order to obtain some useful information or pattern from
the pool of database. The data used in this project was obtained from the UCI Machine Learning
Repository. The database has 5 attributes (columns in a database table), 24 instances (rows in the
table) of data and 3 classes.
The goal of data mining in this implementation is to classify each of the attributes like Patient
Age…etc into different class and predict the future outcome of incoming object. Data is a data

28
Dept. of CSE @JIET

file containing all possible numeric combinations of the attributes (columns in a database table)
values.

Expected Outcome at the End of 7th Semester-


Students will able:
• To analyze the different format of data.
• To Learn Preprocessing Task for Data mining.
• To gain working knowledge of Weka.

Expected outcome at the End of 8th Semester-


Student will able to:
• Present complete analysis of data set taken from UCI Repository.
• Anlaysis of result should be presented in the form of tool.

Project Number-36 Name of Faculty Member- Ajay Kumar

Project Title- Web Usage Mining Using Apriori Algorithm (Web Content Mining)

Batch Size-3

Area/ Concept involved: Data Mining, Database, and AI

Language / Tools that may be used: Java/Matlab/.Net

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


DBMS NIL
OOPS NIL

Brief Description about project:


The enormous content of information on the World Wide Web makes it obvious candidate for
data mining research. Application of data mining techniques to the World Wide Web referred as
Web mining where this term has been used in three distinct ways; Web Content Mining, Web
Structure Mining and Web Usage Mining. E Learning is one of the Web based application where
it will facing with large amount of data. In order to produce the JIET portal usage patterns and
user behaviors, this project implements the high level process of Web Usage Mining using basic
Association Rules algorithm call Apriori Algorithm. Web Usage Mining consists of three main
phases, namely Data Preprocessing, Pattern Discovering and Pattern Analysis. Server log files
become a set of raw data where it’s must go through with all the Web Usage Mining phases to
producing the final results. Here, Web Usage Mining, approach has been combining with the
basic Association Rules, Apriori Algorithm to optimize the content of the JIET portal. Finally,
this project will present an overview of results analysis and Web administrator can use the
findings for the suitable valuable actions.

Expected Outcome at the End of 7th Semester-


29
Dept. of CSE @JIET

Students will able:


1. To analyze the different format of data.
2. To learn working of Search engines, Web Spider (Crawlers).
3. To gain working knowledge of Weka.
Expected outcome at the End of 8th Semester-
Student will able:
1. Design its own model based upon the given data source.
2. Analyse the outcome of the algorithm and present complete model in the form of tool.

Project Number-37 Name of Faculty Member -Babita Tiwari

Project Title- Optimizing Compiler of JAVA SCRIPT

Batch Size- 3

Area/ Concept involved: Compiler design, Object Oriented Programming

Language / Tools that may be used: Java

Prerequisite Knowledge Required-

Concept/ Subject Software /


Tools
Compiler design, Object Oriented Programming Java

Brief Description about project:

The Optimizing Compiler is a tool for making JavaScript download and run faster. It is a true
compiler for JavaScript. Instead of compiling from a source language to machine code, it
compiles from JavaScript to better JavaScript. Optimizing Compiler is a JavaScript optimizing
compiler. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes
what's left. It also checks syntax, variable references, and types, and warns about common
JavaScript pitfalls. This Compiler reduces the size of your JavaScript files and makes them more
efficient, helping your application to load faster and reducing your bandwidth needs. The
Optimizing Compiler provides warnings for illegal JavaScript and warnings for potentially
dangerous operations, helping you to produce JavaScript that is less buggy and easier to
maintain.

Expected out come at the end of 7th Sem-


Coding of compiler with its Designing parts

Expected out come at the end of 8th Sem-


Code optimization and fully functional closure compiler
30
Dept. of CSE @JIET

Project Number-38 Name of Faculty Member -Babita Tiwari

Project Title- Debugger with profiling in Java

Batch Size- 3

Area/ Concept involved: Algorithm, Compiler design, Object Oriented Language

Language / Tools that may be used: Net beans, Abstract window tool kit

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Algorithm ,Compiler design, Net beans, Abstract
Object Oriented Language window tool kit

Brief Description about project:

The project aims at providing graphic user interface (GUI) for a debugger. Facilities like creating
new file, running and saving the file in java language will be provided. The debugger will
provide errors at exact locations with an additional advantage of saving an error log file for
future reference. Moreover the debugger will be able to correct frequently occurring errors.

Expected out come at the end of 7th Sem-


Requirement analysis
Designing
Coding for the same

Expected out come at the end of 8th Sem-


Code integration
Testing and validation

Project Number-39 Name of Faculty Member -Babita Tiwari

Project Title- Distributed Data mining in Credit Card Fraud Detection Analysis

Batch Size- 3

Area/ Concept involved: Data Mining, Distributed System

Language / Tools that may be used: Java

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools

31
Dept. of CSE @JIET

Data Mining, Distributed System Java

Brief Description about project:


Credit card transactions continue to grow in number, taking a larger share of the payment
system, and have led to a higher rate of stolen account numbers and subsequent losses by banks.
Hence, improved fraud detection has become essential to maintain the viability of the payment
system. Banks have been fielding early fraud warning systems for some years. We seek to
improve upon the state-of-the-art in commercial practice via large scale data mining. Scalable
techniques to analyze massive amounts of transaction data to compute efficient fraud detectors in
a timely manner are an important problem, especially for e-commerce. Besides scalability and
efficiency, the fraud detection task exhibits technical problems that include skewed distributions
of training data and non-uniform cost per error, both of which have not been widely studied in
the knowledge discovery and data mining community. In this Project we survey and evaluate a
number of techniques that we have proposed and implemented that address these three main
issues concurrently. Our proposed methods of combining multiple learned fraud detectors under
a "cost model" are general and demonstrably useful; our empirical results demonstrate that we
can significantly reduce loss due to fraud through distributed data mining of fraud models.

Expected out come at the end of 7th Sem-


Requirement analysis
Designing
Coding for the same

Expected out come at the end of 8th Sem-


Code integration
Testing and validation

Project Number-40 Name of Faculty Member- Harikesh Singh

Project Title- Dispatcher based Dynamic Load Balancing on Web Server

Batch Size- 3

Area/ Concept involved: Distributed Computing

Language / Tools that may be used: C++ / JAVA

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Computer Network LAN Trainer
Distributed System Telnet, C++ / Java

Brief Description about Project:

32
Dept. of CSE @JIET

In computer networking, dynamic load balancing is a technique to distribute workload evenly


across two or more computers, network links, CPUs, hard drives, or other resources, in order to
get optimal resource utilization, maximize throughput, minimize response time, and avoid
overload. Using multiple components with load balancing, instead of a single component, may
increase reliability through redundancy. The load balancing service is usually provided by a
dedicated program or hardware device (such as a multilayer switch or a DNS server).

A distributed Web-server system is any architecture consisting of multiple Web-server hosts,


distributed on LANs and WANs, with a mechanism to spread incoming client requests among
the servers. Each server in the system can respond to any client request. Information can be
distributed among server nodes in two ways: content tree replication on a server’s local disk, or
information sharing by means of a distributed file system. In this project we can classify four
distributed Web server architectures according to the entity that distributes the incoming requests
among the servers. The client-based solution requires software modification on the client side;
the other three (DNS-based, dispatcher-based, and server-based) affect one or more components
of the Web-server system. We then evaluate the trade-offs among the alternative approaches and
techniques.

Expected outcome at the End of 7th Semester-


Design and architecture of the proposed system must be complete along with the functionality of
client to web server packet distribution.

Expected outcome at the End of 8th Semester-


Experimental results should be achieved in the process of dynamic load balancing in
heterogeneous environment of any LAN. These results must be verified on the basis of suitable
graphs and required tables.

Project Number-41 Name of Faculty Member- Harikesh Singh

Project Title- Development of a Distributed Monitoring Framework

Batch Size- 3

Area/ Concept involved: Distributed Processing

Language / Tools that may be used: C++ / Java / NetLogger Toolkit

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Network LAN Trainer, NetLogger
Distributed System Telnet, Globus

Brief Description about Project:


The goal of the Distributed Monitoring Framework is to improve end-to-end data throughput for
data intensive applications in a high-speed WAN environments, and to provide the ability to do
performance analysis and fault detection in a Grid computing environment. This monitoring
33
Dept. of CSE @JIET

framework will provide accurate, detailed, and adaptive monitoring of all of distributed
computing components, including the network. Analysis tools will be able to use this monitoring
data for real-time analysis, anomaly identification, and response. Services for network-aware
applications will use this monitoring infrastructure in order to provide past, present, and future
predictions of the network conditions, which the applications can then use to adapt their
behavior. Applications such as widely distributed workflow management systems can then use
the DMF as a generalized real-time event service. This system must have the following
objectives:
• Integration and enhancement of existing monitoring tools and technologies into a Grid
environment
• Development of non-intrusive methods for network capacity monitoring and estimation
• Determination of what network metrics are needed by network-aware DOE
(Department of Energy) Science Grid applications

Expected outcome at the End of 7th Semester-


Design and architecture of the proposed system must be complete along with the functionality of
integration and enhancement of existing monitoring tools.

Expected outcome at the End of 8th Semester-


Experimental results should be achieved in the process of distributed monitoring in
heterogeneous environment of any LAN. These results must be verified on the basis of suitable
graphs and required tables.

Project Number-42 Name of Faculty Member- Harikesh Singh

Project Title- Development of a Grid Service Provider

Batch Size- 3

Area/ Concept involved: Distributed Processing/Grid Computing

Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX

Prerequisite Knowledge Required-


Concepts / Subject Software / Tools
Computer Network C++/ UNIX
Distributed System Telnet, Globus

Brief Description about Project:

The aim of the project is to allow for interoperability between the Globus Toolkit and the
Shibboleth Identity Federation system. In the first phase of this project basic interoperability
should be achieve in that a deployment of the Globus Toolkit can query and receive attributes
from a Shibboleth service regarding a Grid user, and then make an access control decision based
on those attributes. In the second phase, we will turn our attention to refining this capability as
well as addressing higher-level management issues such as management of the federation of
34
Dept. of CSE @JIET

name spaces between the Grid and campus worlds and the management of the trust
configuration/metadata between the Grid and Shibboleth components. We distinguish two basic
modes of operation, which we can call "pull" and "push". In the pull mode of operation, after the
client has been authenticated, the Grid Service Provider requests attributes from the client's own
administrative domain via a back-channel exchange. In the push mode of operation, the client
provides the attributes up front, obtaining and pushing those attributes to the Grid Service
Provider at the time of initial request. In both cases, the Grid Service Provider obtains the user
attributes it needs to make an informed access control decision (authorization).

A parallel application, GridShib has been developed for Globus Toolkit is an add on package for
Globus Toolkit (GT). GridShib for GT is an implementation of a Grid Service Provider, a
software component analogous in function to the Shibboleth Service Provider but for X.509-
based Grids.

Expected outcome at the End of 7th Semester-


Design and architecture of the proposed system must be complete along with integration of
“pull” and “push” modes of operation between the Grid and Shibboleth components.

Expected outcome at the End of 8th Semester-


Experimental results should be achieved through Grid services in heterogeneous environment of
any LAN. These results must be verified on the basis of suitable graphs and required tables.

Project Number-43 Name of Faculty Member- P. S. Banerjee

Project Title- Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP
Updates.

Batch Size- 3

Area/ Concept involved: Computer Networks and Security

Language / Tools that may be used: Java and Network Simulator

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Computer Networks Network simulator
Programming java

Brief Description about project: In this project we will propose an inter-domain packet filter
(IDPF) architecture that can mitigate the level of IP spoofing on the Internet. IDPFs are
constructed from the information implicit in BGP route updates and are deployed in network
border routers. A key feature of the scheme is that it does not require global routing
information. Based on extensive simulation studies, we will show that even with partial
deployment on the Internet, IDPFs can proactively limit the spoofing capability of
attackers. In addition, they can help localize the origin of an attack packet to a small number of
candidate networks.
35
Dept. of CSE @JIET

Project Number-44 Name of Faculty Member- P. S. Banerjee

Project Title- Artificial intelligence based approach for mobility prediction in wireless networks

Batch Size- 3

Area/ Concept involved: AI and Computer Networks

Language / Tools that may be used: H/W base to be developed

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


AI
Computer Networks

Brief Description about project: Wireless networks are required to support nomadic computing
providing seamless mobility without call drops. The number of mobile users must be known for
allocating the channel bandwidth. This part is most essential for predicting the next step that is
predicting the move which we will try to optimize out here.

Project Number-45 Name of Faculty Member- P. S. Banerjee

Project Title- Wearable Computing Systems

Batch Size- 3

Area/ Concept involved: AI and Expert System

Language / Tools that may be used: Simulation Enviornment

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Algorithms
AI

Brief Description about project: The purpose of this project is to review various miniature
computing architectures and evaluate the role of wearable computers in road accidents
prevention. Wearable computers can help to monitor state of alertness and reflexes of drivers by
36
Dept. of CSE @JIET

means of non-invasive sensors and can therefore be exploited for saving human lives through
prevention and recovery mechanisms.

Project Number-46 Name of Faculty Member- U.S.Rawat

Project Title- Implementation of Elliptic Curve Cryptography Algorithms

Batch Size- 3

Area/ Concept involved: Cryptography

Language / Tools that may be used: Java

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Cryptography Java

Brief Description about project:


A major requirement for e-commerce applications is the provision of security. In this work we
consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides
with small key sizes. ECC is ideal for use on constrained environments such as pagers, personal
digital assistants, cellular phones and smart cards. We implement the ECC algorithms approved
by the National Institute of Standards and Technology (NIST) in Java. The speed of the various
ECC algorithms has to be measured & comparison with RSA algorithm has to be made.

Expected Outcome at the End of 7th Semester-


• Study of NIST approved ECC algorithms.
• Minimum one NIST approved ECC algorithm has to be implemented.

Expected outcome at the End of 8th Semester-


• Implementation of various NIST approved ECC algorithms & performance comparison
with RSA algorithm.

Project Number-47 Name of Faculty Member- U.S.Rawat

Project Title- Design and Implementation of Real Time Operating System

Batch Size- 3

Area/ Concept involved: Real Time Operating System

Language / Tools that may be used: C/C++


37
Dept. of CSE @JIET

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Data structures C/C++
Operating Systems

Brief Description about project:


A real-time operating system (RTOS) is an operating system (OS) intended for real-time
applications. Such operating systems serve application requests nearly real-time. A real-time OS
that can usually or generally meet a deadline is a soft real-time OS.
The main objective includes designing the kernel with its basic modules such as Memory
management, Process management, File System, security, Drivers that meets the requirements of
a soft real time operating system.

Expected Outcome at the End of 7th Semester-


Memory Management and I\O request handling.

Expected outcome at the End of 8th Semester-


Scheduling, Job Synchronization and Swapping

Project Number-48 Name of Faculty Member- U.S.Rawat

Project Title- Design and Implementation of Encrypted File System (EFS) in Hybrid Space

Batch Size- 3

Area/ Concept involved: System and Network Programming, Cryptography

Language / Tools that may be used: C on Linux Platform

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


System and Network C
Programming

Brief Description about project: Encrypted file system secures user’s data with maximum
comfort and minimum additional requirements on their part. It is a security system that can
protect any files used by any of the applications, without resorting to application-specific
encryption methods. Performance is an important factor to users since encryption can be time
consuming. So, main issues that should be considered while designing EFS are Security,
Performance and Portability. Also, It should be as transparent as possible.

38
Dept. of CSE @JIET

In this project, design and implementation of encrypted file system in hybrid space has to be
done using stackable Vnode layer loadable kernel module. It will be more portable than existing
kernel space EFS and more secure, transparent and efficient than user space EFS.

Expected Outcome at the End of 7th Semester-


• Study and Analysis of various existing EFS in user space, kernel space and hybrid space.
• Study of concepts for hybrid space EFS design.
• Design and implementation of hybrid space EFS that should incorporate all features of
existing hybrid space EFS and few new features like keys should be based on process
session IDs as well as user IDs for providing more security, selection of cipher for better
performance etc.
• Comparison with the existing EFS designs.

Expected outcome at the End of 8th Semester-


Design and implementation of hybrid space EFS for optimum performance when used for
network attached storage (NAS).

Project Number- 49 Name of Faculty member-AMIT KUMAR

Project Title- Artificial Immune Classifier

Batch Size-3

Area/ Concept involved: Artificial Intelligence, Soft Computing.

Language / Tools that may be used: C, C++

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Artificial Intelligence , C, C++
Soft Computing,

Brief Description about project:


In this project student will develop a new supervised learning paradigm, resource limited
artificial immune classifiers which will be inspired by mechanism exhibited in natural and
artificial immune system. This project will include recourses competition, clone selection,
affinity maturation, and memory cell retention. The main work in this project is the ability to
recognize previously encountered substances and to generalize beyond recognition in order to
provide appropriate responses to pathogens not seen before. In this project students will make
software based artificial immune system by using latest feature of AI.

Expected out come at the end of 7th Sem-

Design of the project should be completed.

Expected out come at the end of 8th Sem-


39
Dept. of CSE @JIET

Full Implementation

Project Number-50 Name of Faculty member-AMIT KUMAR

Project Title- A Sense of Self and Non-self for Operating System Processes

Batch Size-3

Area/ Concept involved: Artificial Intelligence, Soft Computing, UNIX and Computer Security.

Language / Tools that may be used: C, C++

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Artificial Intelligence , UNIX C, C++

Brief Description about project:

In this project student will develop a tool aimed at building computer security systems that
incorporate the mechanisms and algorithms used by natural immune systems. This tool will have
richer notions of identity and protection than those afforded by current operating systems, and
they could provide a layer of general-purpose protection to augment current computer security
systems. An important feature of this tool is to appropriate identification of self and non-self
which is the subject of this project.

Expected out come at the end of 7th Sem-

Design of the project should be completed.

Expected out come at the end of 8th Sem-

Full Implementation

Project Number-51 Name of Faculty member-AMIT KUMAR

Project Title- The Computer Defense Immune System

Batch Size-3

Area/ Concept involved: Artificial Intelligence, Soft Computing and Computer Security.

Language / Tools that may be used: C, C++, C# (.net)

Prerequisite Knowledge Required-

40
Dept. of CSE @JIET

Concept/ Subject Software / Tools


Artificial Intelligence C, C++

Brief Description about project:

In this project student will develop software that will work as a Computer Defense Immune
System. This software is an artificial immune system for detecting computer viruses and network
intrusions. This project will describe the system architecture, presents current research and
results in enhancing the system. This project will be used to improve the system's capabilities to
provide the better defense for a computer system or network.

Expected out come at the end of 7th Sem. -

Design of the project should be completed.

Expected out come at the end of 8th Sem. -

Full Implementation

Project Number-52 Name of Faculty Member- Dr Vipin Tyagi

Project Title- Development of a Face Recognition System

Batch Size- 03

Area/ Concept involved: Pattern Recognition, Image Processing

Language / Tools that may be used: JAVA/C ++, MATLAB

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Image Processing MATLAB
Data Structures JAVA, C ++

Brief Description about project:

A face recognition system is used for identifying or verifying a person from a digital image. In
the present project we will take a set of images of a group of people and the software will
determine whether this matches with a known individual or not. This will be achieved by
comparing the selected features of the face and by comparing with those of stored in the
database.

Expected Outcome at the End of 7th Semester-

Identification of required features in an image


41
Dept. of CSE @JIET

Expected outcome at the End of 8th Semester-

Software that can recognize faces

Project Number-53 Name of Faculty Member- Dr Vipin Tyagi

Project Title- Hand-Gesture Recognition

Batch Size- 03

Area/ Concept involved: Pattern Recognition, Image Processing

Language / Tools that may be used: MATLAB, JAVA/ C++

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Image Processing MATLAB
Data Structures JAVA, C ++

Brief Description about project:

Gestures are a powerful means of communication among humans, so a natural interaction


between humans and computing device can be achieved by using hand-gesture for
communication. In the project we will try to study the movement of hands and try to recognize
the meaning of these movements.

Expected Outcome at the End of 7th Semester-


Identification of features required for recognition

Expected outcome at the End of 8th Semester-

Software that can recognize hand gestures

Project Number-54 Name of Faculty Member- Dr. Vipin Tyagi

Project Title- Context Based- Image Search

Batch Size- 03

Area/ Concept involved: Pattern Recognition, Image Processing

Language / Tools that may be used: MATLAB, JAVA/C++

42
Dept. of CSE @JIET

Prerequisite Knowledge Required-


Concept/ Subject Software / Tools
Image Processing MATLAB
Data Structures JAVA, C ++

Brief Description about project:


In our routine search on internet, if we want to retrieve information about a particular topic, we
key-in the title of the object to be searched for. The result contains irrelevant data in addition to
actual requirement, thus increasing overhead. In the present project a software will be developed
that will analyze the actual contents of the image which may be colour, shape, texture or some
other information derived from the image and give result of search accordingly.

Expected Outcome at the End of 7th Semester-

Analysis of contents from the image to be used for search.

Expected Outcome at the End of 8th Semester-


Software that can search the images based on the contents

Project Number-55 Name of Faculty Member- Dr. Shishir Kumar

Project Title- Smart Card Development & Implementation

Area/ Concept involved:


Embedded systems & Database Connectivity

Language / Tools that may be used:


Java Swing, Java Servlet Programming, DB2-IBM

Prerequisite Knowledge Required-


Concept/ Subject Software / Tools
Database Connectivity DB2-IBM
Front End Software Java Swing
Smart Card Programming Embedded Systems
Smart Card Reader Interfacing

Brief Description about project:


The project intend to develop a Smart Card Development Kit, which takes care of all the needs and
requirements of a student studying in a college, including the attendance system, library book
issuing, and many more. Every individual will be provided with a (Magnetic Strip Based) /
(Microprocessor Based) Smart Card Tag, which will contain all his/her personal information. A
Smart Card is any pocket-sized card with embedded integrated circuits which can process
data. Contact smart cards have a contact area, comprising several gold-plated contact pads, that
is about 1 cm square. When inserted into a reader, the chip makes contact with electrical
connectors that can read information from the chip and write information back. Smart Card
Reader, Contact smart card readers are used as a communications medium between the smart

43
Dept. of CSE @JIET

card and a host, e.g. a computer or a point of sale terminal. SMART CARD DATABASE: This
database contains a list of known smart cards, the interfaces and the primary service provider of
each card, and any known smart card readers and reader groups.

Expected out come at the end of 7th Sem-


• Completion of the Smart Card Reader with the Smart Card Tags and Front end software
designing.
• The database connectivity
Expected out come at the end of 8th Sem-
Testing & Validation
Implementation of the Smart Card system

Project Number-56 Name of Faculty Member- Dr. Shishir Kumar

Project Title- Traffic Control System

Area/ Concept involved:


Image Processing
Language / Tools that may be used:
Java , MATLAB
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Image Processing Java/ MATLAB
Brief Description about project:
Vehicular traffic is a major problem in modern cities. We collectively waste huge amounts of
time and resources while traveling through traffic congestion and waiting for green signal of
traffic lights. Significant savings of fuel and time could be achieved if traffic control mechanism
could be effectively discovered which could reduce the waiting time of a vehicle on the crossing
. With the help of tools available in image processing we could estimate traffic density and
assign appropriate time to the lane keeping all constraints of the traffic laws intact and avoiding
deadlock of any lane .We shall give higher priority to special vehicles like school buses , fire
brigade and ambulance. The method will work on real time traffic data.
To achieve this method we are using digital image processing to calculate the number of cars in a
lane and using logical technique for edge detection and background removal. The priority to lane
will be set according to the traffic density in it and the lanes will be opened in a circular queue
fashion. Further cars can be attached with devices for shorter route discovery and route
maintenance to decrease trip time and save fuel.

Expected out come at the end of 7th Sem-


• Study on : Problem Definition, Research Papers, Congestion Control Algorithm,
Mathematical Transforms ,Edge Detection , Homography, Counting objects technique,
Integration of Algorithm in a single unit.
• Implementation Congestion Control Algorithm, Using Matlab for Mathematical
Transform, Edge Detection and object(vehicle) counting on test image.
• Priority Algorithm for special vehicles, Lane.

44
Dept. of CSE @JIET

• Forming a shortest path algorithm used in later stage for making user interface so that
they could find a least congested path to save time.

Expected out come at the end of 8th Sem.-


• Implementing Homography and deciding camera angles.
• Working with real scenario. Day and night condition and weather dependency.
• How to take real time input in our software.
• Storage of data and processing it in real time by our software.
• Making an interface for the users who want to find the least congested part on the
road map and the connectivity to user (Internet etc.) .

Project Number-57 Name of Faculty Member- Dr. Shishir Kumar


Co Guide-

Project Title- Development of Intrusion Detection system Using Honeypot

Area/ Concept involved: Network Security

Language / Tools that may be used: C & Linux Shell Programming

Prerequisite Knowledge Required-

Concept/ Subject Software / Tools


Socket Programming C
Java

Brief Description about project:


The project using Honeypots is a multifaceted attempt to take honeypots out of the shadows of
the network security model and to make them an active participant in system defense. To do this,
a system will be developed that reacts to hostile intrusion attempts by redirecting all hostile
traffic to a honeypot that is partially mirroring your production system. Once switched, the
expected hacker is unknowingly attacking the honeypot instead of the real data and clients and/or
users still safely accessing the real system. In this stage the data will remain safe and the Intruder
will be identified as an added benefit. A better way to think of a honeypot is an internet attached
server which acts as a decoy, luring in potential hackers in order to study their activities.

Expected out come at the end of 7th Sem-

Following modules will be completed in the 7th Semester-


• MODULE 1: Detecting the packets
• MODULE 2: Identity whether the packet has been tampered or belongs to the
right source or not.

45
Dept. of CSE @JIET

Expected out come at the end of 8th Sem-

Following modules will be completed in the 8th Semester-


• MODULE 3: Fully working intrusion detection system USING HONEYPOTS
• MODULE 4: Along with system protection this module will provider additional
information about hackers.

Project Number-58 Name of Faculty Member- Dr. Shishir Kumar


Co Guide-

Project Title- Development of GRID infrastructure for Image Transformation

Batch Size- 3

Area/ Concept involved: Distributed Processing/Grid Computing

Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX

Prerequisite Knowledge Required-

Concepts / Subject Software / Tools


Computer Network C++/ UNIX
Distributed System Telnet, Globus

Brief Description about Project:


The grid infrastructure forms the core foundation for successful grid applications. This
infrastructure is a complex combination of a number of capabilities and resources identified for
the specific problem and environment being addressed. In initial stages of delivering any Grid
Computing application infrastructure, the developers/service providers must consider the
following aspects in order to identify the core infrastructure support required for that
environment:
1. What problem(s) are we trying to solve for the user? How do we address grid enablement
simpler, while addressing the user's application simpler? How does the developer
(programmatically) help the user to be able to quickly gain access and utilize the
application to best fit their problem resolution needs?
2. How difficult is it to use the grid tool? Are grid developers providing a flexible
environment for the intended user community?
3. Is there anything not yet considered that would make it easier for grid service providers
to create tools for the grid, suitable for the problem domain?
4. What are the open standards, environments, and regulations grid service providers must
address?
In general, a Grid Computing infrastructure component must address several potentially
complicated areas in many stages of the implementation. These areas are: Security, Resource
management, Information services, and Data management.

46
Dept. of CSE @JIET

Expected outcome at the End of 7th Semester-


Design and architecture of the proposed system must be complete along with functionality of any
Grid application that will be useful for providing any Grid service.

Expected outcome at the End of 8th Semester-


Experimental results should be achieved through the Grid Infrastructure using Globus toolkit in
any LAN. These results must be verified on the basis of suitable graphs and required tables.

Project Number-59 Name of Faculty Member- Dr. Shishir Kumar

Project Title- Image Restoration


Area/ Concept involved: Image Processing
Language / Tools that may be used: C++ / .NET / MATLAB
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Digital Image MATLAB
Processing
Computer Graphics Turbo C++
OOP NETBEANS / ECLIPSE
Brief Description about project:
The goal of this project is to remove the noise from the image in such a way that the "original"
image is discernible. Nonetheless, one approach is to decide that features that exist on a very
small scale in the image are noise, and that removing these while maintaining larger features
might help "clean things up". One well-traveled approach is to smooth the image. The simplest
such version is replace each pixel it by the average of the neighboring pixel values. In other
words Noise Reduction of Images is the mechanical or electronic translation of scanned images
of handwritten, typewritten or printed text into machine-encoded text. It is widely used to
computerize a record-keeping system in an office, or to publish the text on a website. It makes
possible to edit the text, search for a word or phrase, store it more compactly, display or print a
copy free of scanning artifacts. It is a field of research in pattern recognition, artificial
intelligence and computer vision.
Expected out come at the end of 7th Sem-
• By the end of 7th sem, the project should be able to extract the characters from the
scanned/digital image.
Expected out come at the end of 8th Sem-
• By the end of 8th sem, our project should be complete having noise reduction technique
with enhancement of image.

47