Online Banking Project | E-Banking Mini Projects

Introduction :

The main objective of the proposed solution is to be automated the various functions and activities of the bank through Internet. The solution will facilitate to the bank employees and the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and explore like never before. Using the solution the bankers and account holders can generate various kinds of reports.

EXISTING SYSTEM

Here the existing system is a manual one. When a customer wants a book a ticket for his journey then he needs to go to any booking branch office physically and book the ticket. In this case the branch people needs to check the available seats by making a call to main office and then only these people can book ticket which leads to improper synchronization between the branches. We can maintain all the booking details in a record at very branch  but finally checking the availability and allotting the seats may cause some human errors. It is very difficult to maintain the booking details of each bus and their status manually.

Disadvantages:

  • Difficulty in co-ordinating different branches and allotting the seats
  • Customer has to come and book the ticket physically which gives competitors to grab the market
  • Difficulty of maintaining each bus booking details in record.

PROPOSED SYSTEM

The main objective of the Existing system solution is to be automated the various functions and activities of the bank through Internet. The solution will facilitate to the bank employees and the account holders with the different modules. This solution is very much necessary for the private sector banks and the corporate sector. The banking industry will take a new shape and explore like never before. Using the solution the bankers and account holders can generate various kinds of reports.

Unique ID : SBW15040

Domain: Web Application

Book your project Now.  Checkout other projects here

Online Flight Reservation System : Airlines reservations

Introduction :

The project entitled “Online Flight Reservation System : Airlines reservations” is to provide the online Reservation of Domestic and International Flights and also provides the time schedule of all the flights.

The function booking ticket will accept the requirements of the customers and facilitates and then verifies whether the requested number of tickets for a flight can be booked or not using travel information function. If tickets are available then the requested services are provided. Eventually this function displays the appropriate flights information for selection.

When you run this project in the first page user can view the time schedules of the International and domestic flights with pairs.

In this system the user login and select the type of the flight like International or Domestic then they enters the reservation details like starting point to destination. If the seats are available for that category then it gives the conformation to the user. User can download the tickets.

Existing system:

Currently, whenever a person wants to travel by air, he has to go to the booking counter to book the ticket which was a very tedious task because the person needs to enquire booking or postponing of the ticket and for that the clerk has to search all the records present, manually one by one due to which other’s would be waiting for their turn for a long time.

Proposed system:

In order to eliminate the drawbacks of the existing system, a system has been developed due to which the person need not spend much time in booking, the ticket and instead server is built that takes care of every transaction thereby reducing the burden on customer and the clerk.

Unique ID :  SBW15002

Domain: Web Application

Book your project Now.  Checkout other projects here

Administration of Super Specialty Hospital

Introduction: 
This system can be used as an application for the hospitals with a Full-featured Web-based medical billing and hospital management software for solo or group practice.This project is aimed to develop a web based Hospital Administration System, which is used to handle all operations in hospitals, and can provide a better service to patients. The purpose of the Super Specialty Hospital is to provide better service to the administration, to automate all the activities of administration.

The entire project has been developed keeping in view of the distributed client server computing technology, in mind. The specification has been normalized up to 3NF to eliminate all the anomalies that may arise due to the database transaction that are executed by the general users and the organizational administration. The user interfaces are browser specific to give distributed accessibility for the overall system. The internal database has been selected as Oracle. The basic constructs of table spaces, clusters and indexes have been exploited to provide higher consistency and reliability for the data storage. The Oracle was a choice as it provides the constructs of high-level reliability and security. The total front end was dominated using the Java J2EE technologies. At all proper levels high care was taken to check that the system manages the data consistency with proper business rules or validations. The database connectivity was planned using the latest ”JDBC Connection” technology provided by Microsoft Corporation. The authentication and authorization was crosschecked at all the relevant stages.

Existing system

In the existing system all the details of the hospital and patients are maintained in the excel sheets. If the details of the hospital registered in one location the management working on the other location of same organization cannot access the information. It’s a time delay process. And maintaining all the records in Excel sheets is difficult. If they want any record they has to search all the records.

The whole process is now manually controlled. This requires maintaining the records of the queries coming from the employees in the paper.

Proposed system

The present system is an automated system which has more features than the existing manually controlled system. The administrator of the hospital can access the information of the hospital and patients at any time from any place. And also the administrator can access the information of abroad and branches of same organization through online. We provide security for the system by giving authentication to every user. The billing will be automatically generated based on the facilities used by the patient. This system has easy to easy interface to the user who can easily navigate through the system.

Unique ID:  SBW15001

Domain : Web Application

Book your project Now.  Checkout other projects here

A Credibility Analysis System for Assessing Information on Twitter

Introduction :

Information credibility on Twitter has been a topic of interest among researchers in the fields of both computer and social sciences, primarily because of the recent growth of this platform as a tool for information dissemination. Twitter has made it increasingly possible to offer near-real-time transfer of information in a very cost-effective manner. It is now being used as a source of news among a wide array of users around the globe. The beauty of this platform is that it delivers timely content in a tailored manner that makes it possible for users to obtain news regarding their topics of interest. Consequently, the development of techniques that can verify information obtained from Twitter has become a challenging and necessary task. In this paper, we propose a new credibility analysis system for assessing information credibility on Twitter to prevent the proliferation of fake or malicious information. The proposed system consists of four integrated components: a reputation-based component, a credibility classifier engine, a user experience component, and a feature-ranking algorithm. The components operate together in an algorithmic form to analyze and assess the credibility of Twitter tweets and users. We tested the performance of our system on two different datasets from 489,330 unique Twitter accounts. We applied 10-fold cross-validation over four machine learning algorithms. The results reveal that a significant balance between recall and precision was achieved for the tested dataset.

Reference IEEE paper:

“A Credibility Analysis System for Assessing Information on Twitter”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017.

Unique ID – SBI1066

Domain – SECURE COMPUTING

Book your project Now.  Checkout other projects here

Mining Competitors from Large Unstructured Datasets

Introduction:
In any competitive business, success is based on the ability to make an item more appealing to customers than the competition. A number of questions arise in the context of this task: how do we formalize and quantify the competitiveness between two items? Who are the main competitors of a given item? What are the features of an item that most affect its competitiveness? Despite the impact and relevance of this problem to many domains, only a limited amount of work has been devoted toward an effective solution. In this paper, we present a formal definition of the competitiveness between two items, based on the market segments that they can both cover. Our evaluation of competitiveness utilizes customer reviews, an abundant source of information that is available in a wide range of domains. We present efficient methods for evaluating competitiveness in large review datasets and address the natural problem of finding the top-k competitors of a given item. Finally, we evaluate the quality of our results and the scalability of our approach using multiple datasets from different domains.

Reference IEEE paper:

“Mining Competitors from Large Unstructured Datasets”, IEEE Transactions on Knowledge and Data Engineering, 2017.

Unique ID -SBI1040

DomainDATA MINING

Book your project Now.  Checkout other projects here

Efficient and Privacy preserving Polygons Spatial Query Framework for Location-based Services

Introduction

With the pervasiveness of mobile devices and the development of wireless communication technique, location-based services (LBS) have made our life more convenient, and the polygons spatial query, which can provide more flexible LBS, has attracted considerable interest recently. However, the flourish of polygons spatial query still faces many challenges including the query information privacy. In this paper, we present an efficient and privacy-preserving polygons spatial query framework for location-based services, called Polaris. With Polaris, the LBS provider outsources the encrypted LBS data to cloud server, and the registered user can query any polygon range to get accurate LBS results without divulging his/her query information to the LBS provider and cloud server. Specifically, an efficient special polygons spatial query algorithm (SPSQ) over ciphertext is constructed, based on an improved homomorphic encryption technology over composite order group. With SPSQ, Polaris can search outsourced encrypted LBS data in cloud server by the encrypted request, and respond the encrypted polygons spatial query results accurately. Detailed security analysis shows that the proposed Polaris can resist various known security threats. In addition, performance evaluations via implementing Polaris on smartphone and workstation with real LBS dataset demonstrate Polaris’ effectiveness in term of real environment.

Reference IEEE paper:

“Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services”, IEEE INTERNET OF THINGS JOURNAL, 2017.

Unique ID – SBI1079

Domain – INTERNET OF THINGS (IoT)

Book your project Now.  Checkout other projects here

A robust reputation management mechanism in the federated
cloud.

Introduction:
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent. Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources prevents users from using it. To reduce the cost, computational resources are shared, i.e., there exists multi-tenancy. As the communication channels and other computational resources are shared, it creates security and privacy issues. A user may not identify a trustworthy co-tenant as the users are anonymous. The user depends on the Cloud Provider (CP) to assign trustworthy co-tenants. But, it is in the CP’s interest that it gets maximum utilization of its resources. Hence, it allows maximum co-tenancy irrespective of the behaviours of users. In this paper, we propose a robust reputation management mechanism that encourages the CPs in a federated cloud to differentiate between good and malicious users and assign resources in such a way that they do not share resources. We show the correctness and the efficiency of the proposed reputation management system using analytical and experimental analysis.

Reference IEEE paper :
“A robust reputation management mechanism in the federated cloud”, IEEE Transactions on Cloud Computing, 2017.

Unique ID -SBI1006

DomainCLOUD COMPUTING

Book your project Now.  Checkout other projects here

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

Introduction:

Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on demand. Its an emerging but promising paradigm to integrating mobile devices into cloud computing, and the integration performs in the cloud based hierarchical multi-user data-shared environment. With integrating into cloud computing, security issues such as data confidentiality and user authority may arise in the mobile cloud computing system, and it is concerned as the main constraints to the developments of mobile cloud computing. In order to provide safe and secure operation, a hierarchical access control method using modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed in this paper. In a specific mobile cloud computing model, enormous data which may be from all kinds of mobile devices, such as smart phones, functioned phones and PDAs and so on can be controlled and monitored by the system, and the data can be sensitive to unauthorized third party and constraint to legal users as well. The novel scheme mainly focuses on the data processing, storing and accessing, which is designed to ensure the users with legal authorities to get corresponding classified data and to restrict illegal users and unauthorized legal users get access to the data, which makes it extremely suitable for the mobile cloud computing paradigms.

Reference IEEE paper :

“A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing”, IEEE Transactions on Cloud Computing, 2017.

Unique ID – SBI1003

Domain – CLOUD COMPUTING

Book your project Now.  Checkout other projects here

A New Service Mechanism for Profit Optimizations of a Cloud
Provider and Its Users

Introduction:
In this paper, we try to design a service mechanism for profit optimizations of both a cloud provider and its multiple users. We consider the problem from a game theoretic perspective and characterize the relationship between the cloud provider and its multiple users as a Stackelberg game, in which the strategies of all users are subject to that of the cloud provider. The cloud provider tries to select and provision appropriate servers and configure a proper request allocation strategy to reduce energy cost while satisfying its cloud users at the same time. We approximate its servers selection space by adding a controlling parameter and configure an optimal request allocation strategy. For each user, we design a utility function which combines the net profit with time efficiency and try to maximize its value under the strategy of the cloud provider. We formulate the competitions among all users as a generalized Nash equilibrium problem (GNEP). We solve the problem by employing variational inequality (VI) theory and prove that there exists a generalized Nash equilibrium solution set for the formulated GNEP. Finally, we propose an iterative algorithm (IA), which characterizes the whole process of our proposed service mechanism. We conduct some numerical calculations to verify our theoretical analyses. The experimental results show that our IA algorithm can benefit both of a cloud provider and its multiple users by configuring proper strategies.

Reference IEEE paper :
“A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users”, IEEE Transactions on Cloud Computing, 2017.

Unique ID -SBI1004

DomainCLOUD COMPUTING

Book your project Now.  Checkout other projects here

Image Reranking based on Topic Diversity

INTRODUCTION:

Social media sharing websites allow users to annotate images with free tags, which significantly contribute to the development of the web image retrieval. Tag-based image search is an important method to find images shared by users in social networks. However, how to make the top ranked result relevant and with diversity is challenging. In this paper, we propose a topic diverse ranking approach for tag-based image retrieval with the consideration of promoting the topic coverage performance. First, we construct a tag graph based on the similarity between each tag. Then community detection method is conducted to mine the topic community of each tag. After that, inter-community and intra-community ranking are introduced to obtain the final retrieved results. In the inter-community ranking process, an adaptive random walk model is employed to rank the community based on the multi-information of each topic community. Besides, we build an inverted index structure for images to accelerate the searching process. Experimental results on Flickr dataset and NUS-Wide datasets show the effectiveness of the proposed approach.

REFERENCE IEEE PAPER:

Image Re-ranking based on Topic Diversity”,  IEEE Transactions on Image Processing, 2017

Unique ID -SBI1085

DomainIMAGE PROCESSING

Book your project Now.  Checkout other projects here

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Introduction :

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud. Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical data in order to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages the storage. Compared with the prior data deduplication systems, our system has two advantages. Firstly, it can be used to confidentially share data with users by specifying access policies rather than sharing decryption keys. Secondly, it achieves the standard notion of semantic security for data confidentiality while existing systems only achieve it by defining a weaker security notion. In addition, we put forth a methodology to modify a ciphertext over one access policy into ciphertexts of the same plaintext but under other access policies without revealing the underlying plaintext.

Reference IEEE paper:

“Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud”, IEEE Transactions on Big Data, 2017.

Unique ID – SBI1082

DomainBIG DATA

Book your project Now.  Checkout other projects here