http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'plant details'

Page  1 1

Updates found with 'plant details'

IEEE 2016 - 2017 Matlab Image Processing TitlesS.No Project Titles 1. Data-driven Soft Decoding of Compressed Images in Dual Transform-Pixel Domain 2. Double-Tip Arte fact Removal from Atomic Force Microscopy Images 3. Quaternion Collaborative and Sparse Representation With Application to Color Face Recognition 4. Multi-Level Canonical Correlation Analysis for Standard-Dose PET Image Estimation 5. Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation 6. Robust Visual Tracking via Convolutional Networks without Training 7. Context-based prediction filtering of impulse noise images 8. Predicting the Forest Fire Using Image Processing 9. A Review Paper on detection of Glaucoma using Retinal Fundus Images 10. Performance Analysis of Filters on Complex Images for Text Extraction through Binarization 11. Automated Malaria Detection from Blood Samples Using Image Processing 12. Learning Invariant Color Features for Person Re-Identification 13. A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes 14. Automatic Design of Color Filter Arrays in The Frequency Domain 15. Learning Iteration-wise Generalized Shrinkage-Thresholding Operators for Blind Deconvolution 16. Image Segmentation Using Parametric Contours With Free Endpoints 17. CASAIR: Content and Shape-Aware Image Retargeting and Its Applications 18. Texture classification using Dense Micro-block Difference 19. Statistical performance analysis of a fast super-resolution technique using noisy translations 20. Trees Leaves Extraction In Natural Images Based On Image segmentation and generating Its plant details
Send Enquiry
Read More
JAVA PROJECTS ABSTRACT 2016-2017: AN EXPLORATION OF GEOGRAPHIC AUTHENTICATION SCHEMES ABSTRACT: We design and explore the usability and security of two geographic authentication schemes: GeoPass and GeoPass- Notes. GeoPass requires users to choose a place on a digital map to authenticate with (a location password). GeoPassNotes—an extension of GeoPass—requires users to annotate their location password with a sequence of words that they can associate with the location (an annotated location password). In GeoPassNotes, users are authenticated by correctly entering both a location and an annotation. We conducted user studies to test the usability and assess the security of location passwords and annotated location passwords. The results indicate that both variants are highly memorable, and that annotated location passwords may be more advantageous than location passwords alone due to their increased security and the minimal usability impact introduced by the annotation.EXISTING SYSTEM: Passwords have well-known problems relating to their memorability and vulnerability to being easily guessed by an adversary. The security problems with passwords appear to be even worse than previously believed. To ensure security requirements are met, unusable password policies are implemented that cause an increasing burden on users. When passwords are forgotten, many systems rely on secondary authentication such as challenge (or “personal knowledge”) questions for resetting his or her password. Unfortunately, such methods also appear to offer questionable security. These issues motivate new user authentication strategies that have improved memorability and security.PROPOSED SYSTEM: People generally have better memory for images over words this has motivated many graphical password schemes that involve users remembering images (or parts of images) instead of words. We hypothesize that location passwords should be highly memorable under an appropriate system design; after all, map locations are visual, and represent places (which may be more “concrete” and easier to remember). A challenge that we tackle is designing location password interfaces that are memorable and provide security against guessing attacks. Therefore, we aim to enhance the security of location passwords by asking users to choose a note they can associate with their chosen location; we call this combination of the location password and its note an annotated location password. Users are authenticated by correctly entering both a location and an annotation. In essence, an annotated location password is using the location component to cue a user’s memory for text information; however, both components (location and text) are used together for stronger authentication. GeoPassNotes is our implementation of an annotated location password system.ADVANTAGE: stronger authentication The addition of the annotation is simple but purposeful Increase resistance to both online and offline attacks Reduce time for searching the route between the locations. Gives accurate details about the current location. User friendly. Reduces paper works. Easy communication between user and the admin.SYSTEM SPECIFICATION:HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb.SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate. Coding Language : Java. Front-End : Eclipse. Data Base : SQLite Manger.CONCLUSION:Passwords have well-known problems relating to their memorability and vulnerability to being easily guessed by an adversary. Passwords are forgotten. To overcome this type of problems we are using location as password. Thus we can overcome password forgotten problem because people have better memory over place than the passwords. Stronger authentication. The addition of the annotation is simple but purposeful. Increase resistance to both online and offline attacks. Reduce time for searching the route between the locations. Gives accurate details about the current location. User friendly. Reduces paper works. Easy communication between user and the admin. Thus geo authentication is explained.
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 LOW-POWER SYSTEM FOR DETECTION OF SYMPTOMATIC PATTERNS IN AUDIO BIOLOGICAL SIGNALS ABSTRACT:In this paper, we present a low-power, efficacious, and scalable system for the detection of symptomatic patterns in biological audio signals. The digital audio recordings of various symptoms, such as cough, sneeze, and so on, are spectrally analyzed using a discrete wavelet transform. Subsequently, we use simple mathematical metrics, such as energy, quasi-average, and coastline parameter for various wavelet coefficients of interest depending on the type of pattern to be detected. Furthermore, a multi-frequency spectrum-based analysis is applied to distinguish between signals, such as cough and sneeze, which have a similar frequency response and, hence, occur in common wavelet coefficients. Algorithm-circuit codesign methodology is utilized in order to optimize the system at algorithm and circuit levels of design abstraction. This helps in implementing a low-power system as well as maintaining the efficacy of detection. The system is scalable in terms of user specificity as well as the type of signal to be analyzed for an audio symptomatic pattern. We utilize multiplierless implementation circuit strategies and the algorithmic modification of multi spectrum computation to implement low power system in the 65-nm bulk Si technology. It is observed that the pattern detection system achieves about 90% correct classification of five types of audio health symptoms. We also scale the supply voltage due to lower frequency of operation and report a total power consumption of ∼184 µW at 700 mV supply. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. EXISTING SYSTEM: In the past decade, rapid advancements in the development of low-power design methodologies have resulted in feasible designs for various wearable and implantable medical systems. Numerous wearable health monitoring systems have been proposed in order to deliver early warning of an impending health condition. These systems monitor various internal as well as external parameters related to the human health, such as temperature, heart rate, and so on. Apart from these parameters, it is well known that acoustic symptoms, such as cough, sneeze, belching, and so on, are early markers of serious health issues, such as influenza, diarrhea, and whooping cough, especially among children. If repetitive occurrence of these symptoms is detected in advance, it is possible for the patient or the healthcare personnel to commence remedial action prior to aggravation of the problem. In the literature, most of the developed systems detect a single acoustic symptom (cough or sneeze). The Kids Health Monitoring System (KiMS) proposed in uses wearable sensors and acoustic signal processing in order to provide health monitoring in children. Using the neural network-based processing, the KiMS classifies various symptoms and activities and, subsequently, transmits the record to a parent or doctor for further analysis.PROPOSED SYSTEM: We describe the proposed algorithm and the methodology used to modify the various computational tools in order to make it implementable into low-power hardware. In Section II, we had described the basics and justified the basis for selecting specific computational techniques used in developing this algorithm. The application of these computations is dependent on the characteristic property of the symptom to be detected. The algorithm methodology is shown in Fig. 1. We also describe the details along with the mapping of algorithm to specific signals as follows. ADVANTAGES:• efficient low-power health monitoring system DISADVANTAGES• High power for monitoring system.SOFTWARE IMPLEMENTATION:• Modelsim• Xilinx ISE
Send Enquiry
Read More
CLOUD COMPUTING PROJECT ABSTRACT 2016-2017 SDN-BASED APPLICATION FRAMEWORK FOR WIRELESS SENSOR AND ACTOR NETWORKS ABSTRACT:As a promising platform for implementing various applications, a wireless sensor and actor network (WSAN) consists of many sensor and actor nodes that can cooperatively handle complex tasks. However, many issues, including nodes’ mobility, the heterogeneity of capacity, topology, and energy consumption, may bring severe challenges to efficient WSAN operation. Currently, the Software Defined Network (SDN) appears as a novel approach that is effective to manage and optimize networks in a programmable and centralized pattern. This paper studies the application framework and relevant methods for applying the SDN approach in a WSAN, with the objective of improving network’s efficiency and scalability. The details of the framework include a three-layer structure, the relevant system entities, the enhanced protocol stack, and the programmable message types for cooperative communication and task execution among WSAN nodes. Based on this framework, this paper explores the relevant challenges and mechanisms for effective system management from many aspects, including mobility, energy saving, reliability maintenance and topology construction. This paper also proposes an optimization method for scheduling decomposed tasks to relevant nodes, with an example implemented by the Genetic Algorithm. Next, this paper demonstrates the typical application scenarios, including military, industry, transportation, and environmental disaster monitoring. Moreover, an indoor application scenario and an outdoor application scenario are presented to demonstrate the application of the SDN-assisted communication handoff. Last, the future trends and technical challenges for SDN in WSAN are discussed.
Send Enquiry
Read More
JAVA/DOT NET PROJECTS ABSTRACT 2016-2017 LOCATION PROOF ABSTRACT: Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial- Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad - hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Our prototype implementation on the android plat-form shows that STAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.EXISTING SYSTEM: In the existing system there is a lot of volunteers are needed and also consuming lot of time. Location privacy is an extremely important factor that needs to be taken into consideration when designing any location based systems. Revealing both identity and location information to an untreated party poses threats to a mobile users. Today's location-based services solely rely on users' devices to determine their location, e.g., using GPS. However, it allows malicious users to fake their STP information. Therefore, we need to involve third parties in the creation of STP proofs in order to achieve the integrity of the STP proofs. This, however, opens a number of security and privacy issues. First, involving multiple parties in the generation of STP proofs may jeopardize users' location privacy. Location information is highly sensitive personal data. Knowing where a person was at a particular time, one can infer his/her personal activities, political views, health status, and launch unsolicited advertising, physical attacks or harassment. Authenticity of STP proofs should be one of the main design goals in order to achieve integrity and non-transferability of STP proofs. Moreover, it is possible that multiple parties collude and create fake STP proofs. PROPOSED SYSTEM:In this paper, we propose an STP proof scheme named Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP). STAMP aims at ensuring the integrity and non-transferability of the STP proofs, with the capability of protecting users' privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications.ADVANTAGE:• A distributed STP proof generation (STAMP) is introduced to achieve integrity and non-transferability of STP proofs. • STAMP is designed to maximize users' anonymity and location privacy. Users are given the control over the location granularity of their STP proofs. • STAMP is collusion-resistant. The system is integrated into STAMP to prevent a user from collecting proofs on behalf of another user. An entropy-based trust model is proposed to detect users mutually generating fake proofs for each other.SYSTEM SPECIFICATION:HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb.SOFTWARE REQUIREMENTS: Operating system : Windows 7 Ultimate. Coding Language : Java. Front-End : Eclipse. Data Base : SQLite Manger.CONCLUSION:STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. Most of the existing STP proof schemes rely on wireless infrastructure to create proofs for mobile users. However, it may not be feasible for all types of applications. A security analysis is presented to prove STAMP achieves the security and privacy objectives. A prototype application is implemented on the Android platform. Experiments show that STAMP requires preferably low computational time and storage. Reduce time for searching the route between the locations. Gives accurate details about the current location. User friendly. Reduces paper works. Easy communication between user and the admin. Thus STAMP called the location proof is explained
Send Enquiry
Read More
JAVA /DOT NET PROJECT ABSTRACT 2016-2017 MITIGATING CROSS-SITE SCRIPTING ATTACKS WITH A CONTENT SECURITY POLICY ABSTRACT: A content security policy (CSP) can help Web application developers and server administrators better control website content and avoid vulnerabilities to cross site scripting (XSS). In experiments with a prototype website, the authors’ CSP implementation successfully mitigated all XSS attack types in four popular browsers. Among the many attacks on Web applications, cross site scripting (XSS) is one of the most common. An XSS attack involves injecting malicious script into a trusted website that executes on a visitor’s browser without the visitor’s knowledge and thereby enables the attacker to access sensitive user data, such as session tokens and cookies stored on the browser.1 With this data, attackers can execute several malicious acts, including identity theft, key logging, phishing, user impersonation, and webcam activation. Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP is designed to be fully backward compatible; browsers that don't support it still work with servers that implement it, and vice-versa. Browsers that don't support CSP simply ignore it, functioning as usual, defaulting to the standard same-origin policy for web content. If the site doesn't offer the CSP header, browsers likewise use the standard same-origin policy.Enabling CSP is as easy as configuring your web server to return the Content-Security-Policy HTTP header. (Prior to Firefox 23, the X-Content-Security-Policy header was used). See Using Content Security Policy for details on how to configure and enable CSP.INTRODUCTION A primary goal of CSP is to mitigate and report XSS attacks. XSS attacks exploit the browser's trust of the content received from the server. Malicious scripts are executed by the victim's browser because the browser trusts the source of the content, even when it's not coming from where it seems to be coming from. CSP makes it possible for server administrators to reduce or eliminate the vectors by which XSS can occur by specifying the domains that the browser should consider to be valid sources of executable scripts. A CSP compatible browser will then only execute scripts loaded in source files received from those whitelisted domains, ignoring all other script (including inline scripts and event-handling HTML attributes).PROPOSED SYSTEM: A client-side tool that acts as a Web proxy, disallows requests that do not belong to the website and thus thwarts stored XSS attacks. Browser-enforced embedded policies (BEEPs) let the Web application developer embed a policy in the website by specifying which scripts are allowed to run.With a BEEP, the developer can put genuine source scripts in a white list and disable source scripts in certain website regions. Document Structure Integrity (DSI) is a client-server architecture that restricts the interpretation of untrusted content. DSI uses parser-level isolation to isolate inline untrusted data and separates dynamic content from static content. However, this approach requires both servers and clients to cooperatively upgrade to enable protection.System ConfigurationH/W System Configuration:Processor - Pentium –IIISpeed - 1.1 GhzRAM - 256 MB(min)Hard Disk - 20 GBFloppy Drive - 1.44 MBKey Board - Standard Windows KeyboardMouse - Two or Three Button MouseMonitor - SVGAS/W System Configuration: Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp Scripts : JavaScript. Server side Script : Java Server Pages. Database : Mysql Database Connectivity : JDBC.CONCLUSION: Although our CSP has many benefits, it is not intended as a primary defense mechanism against XSS attacks. Rather, it would best serve as a defensein- depth mitigation mechanism. A primary defense involves tailored security schemes that validate user inputs and encode user outputs.Cross site scripting has been a major threat for web applications and its users from past few years. Lot of work has been done to handle XSS attacks which include: • Client side approaches• Server side approaches• Testing based approaches• Static and dynamic analysis based approaches
Send Enquiry
Read More
VLSI PROJECT ABSTRACT 2016-2017: LOW-POWER FPGA DESIGN USING MEMOIZATION-BASED APPROXIMATE COMPUTING ABSTRACT: Field-programmable gate arrays (FPGAs) are increasingly used as the computing platform for fast and energy efficient execution of recognition, mining, and search applications. Approximate computing is one promising method for achieving energy efficiency. Compared with most prior works on approximate computing, which target approximate processors and arithmetic blocks, this paper presents an approximate computing methodology for FPGA-based design. It studies memoization as a method for approximation on FPGA and analyzes different architectural and design parameters that should be considered. The proposed design flow leverages on high-level synthesis to enable memoization-based micro-architecture generation, thus also facilitating a C-to-register-transfer-level synthesis. When compared with the previous approaches of bit-width truncation and approximate multipliers, memoization-based approximate computation on FPGA achieves a significant dynamic power saving (around 20%) with very small area overhead (< 5%) and better power-to-signal noise ratio values for the studied image processing benchmarks. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2.EXISTING SYSTEM: APPROXIMATE computing has been proposed as an alternative to exact computing for power reduction in embedded computing systems. It assumes that the applications under investigation can tolerate approximate results, and hence, exact computation becomes unnecessary. Some application examples are data-mining, search, analytics, and media processing (audio and video), which are collectively referred to as the class of recognition, mining, and search (RMS) applications. Approximation can help to reduce the computation efforts, resulting in lower power consumption. In fact, energy efficiency is one of the main driving forces behind approximate computing. The reported power saving is normally within 5%–40% depending on the application, the approximation technique, and the acceptable error tolerance. Approximate computing has been studied at different levels, including processors, language design, and ASIC-style computational blocks, such as imprecise adders. However, there has been only a few previous works that investigate approximate computing on field programmable gate array (FPGA) as the computing substrate, although it is widely used to accelerate RMS applications.PROPOSED SYSTEM: We assume an iterative design flow for memoization based approximate computing. The details of this iterative design flow are shown in Fig. 2. Here, P1 and P2 refer to the power values obtained without memoization and with memoization, respectively; R1 and R2 refer to the computed values obtained without memoization and with memoization, respectively; P and T are the power and result accuracy thresholds, respectively. Fig. 2 shows not only the memoization architecture generation flow but also the considerations related to power and accuracy of results that must be considered. The red block shows that an application or task described in C/C++ language is synthesized using an HLS tool. The blue block shows memoization architecture generator, which generates the RTL wrapper module to wrap the HLS synthesized block with memoization related circuit blocks. As a result of this wrapping, the RTL design of memoized architecture is generated (purple block), i.e., the top-level module which contains the RTL wrapper and the HLS synthesized block. After placement and routing on target FPGA using a vendor specific placement and routing tool (such as Xilinx ISE), the simulation-based dynamic power analysis of both the HLS synthesized design and the memoized architecture is performed separately to evaluate the potential power saving (green block). The power analysis is performed using the data set corresponding to the application (strong or weak). The percentage difference between P1 and P2 should be greater than user-defined threshold P compared with the area overhead due to the wrapper.ADVANTAGES:• Save the dynamic power dissipation• Reduce the areaDISADVANTAGES:• dynamic power dissipation is high• area of coverage is highSOFTWARE IMPLEMENTATION• Modelsim• Xilinx ISE
Send Enquiry
Read More
Page 1 1