Cloud Based Improved File Handling and Duplication Removal Using MD5

Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been stored. In order to reduce the time to […]

Continue reading »

Cloud Based Student Information Chatbot Project

Cloud based student information Chatbot system is an artificial algorithm that analyzes the student’s queries and messages. This system has a built artificial intelligence to answer the query of the student. The answers are appropriate to the user’s queries, if the user find his answer to be invalid, he may select the invalid answer option button which will notify the […]

Continue reading »

Customized AES using Pad and Chaff Technique And Diffie Hellman Key Exchange

Computer Systems offer great flexibility and improved productivity for users. However, they can also create added risk and potential targets for data loss. Considering the risk factors with data stored in database, developing a windows application with data encryption mechanism will avoid misuse of user’s data. Also to avoid data replication into database which will […]

Continue reading »

Detecting Data Leaks via Sql Injection Prevention on an E-Commerce

The objective of this project is to prevent SQL injection while firing queries to database and to make the database secured. This system is online so no need of implementation. It can be accessed through internet from anywhere. The system uses SQL Injection mechanism prevention to keep the data safe and secure from sql injection attacks.The highlighted part here is […]

Continue reading »

Intelligent rule-based phishing websites classification Based on URL Features

There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and predict e-banking phishing website, we […]

Continue reading »

Secure Text Transfer Using Diffie Hellman Key Exchange Based on Cloud

Encryption is the technique of hiding private or sensitive information within something that appears to be nothing be a usual. If a person views that cipher text, he or she will have no idea that there is any secret information. What encryption essentially does is exploit human perception, human senses are not trained to look for files that have information […]

Continue reading »

University Campus Online Automation Using Cloud Computing

University campus online automation system, is a recruitment system that is beneficial for a college student, college placement faculty and Companies visiting the campus. This software has three login portal, for students, placement faculty and companies visiting the campus. Students will enter all their personal as well as professional while registering themselves into the system. The faculty can register themselves […]

Continue reading »
1 2 3 9