Project Ideas
Project Ideas
Sem: VIII
This defect tracking system helps to track bug. There are three modules in this tracking system,
Administrator, Staff and Customer. The Administrator can login to the app and can enter the
details of staff, project, view bugs send from the customers. The admin can also also assign
work to staffs, view bug case flow status details, send messages to customers using this bug
tracking application. The staff can login to the site using username and password. Then he/she
can view the bugs assigned to them. He can directly give solution message to customers or
he/she can assign the bugs to other staffs if the bug is related to them. The user may view bug
case flow details with which he/she is involved. The customer registers in to the applications
and login to the site using username and password. Whenever a bug is raised from his
software, he sends the bug details to the administrator with print screen of the bug generated.
He/she may see the bug case flow details and bug status along with remedy details at any
time using the ticket number generated during new bug entry. This is how bug tracking can
be done with this application.
University campus online automation system, is a recruitment system that is beneficial for a
college student, college placement faculty and Companies visiting the campus. This software
has three login portal, for students, placement faculty and companies visiting the campus.
Students will enter all their personal as well as professional while registering themselves into
the system. The faculty can register themselves by entering their details like, employee id,
subject and position. The Companies register with their company name, Job title, No. of
vacancy, Job description, Job profile, Criteria. The students can view and apply to the
companies. The companies can view the list of student profile who have applied to the
particular company. The admin of the system, has the access to all the portal. He handles all
the three logins credentials. The admin can add, delete or edit information when need be. He
collects all the details of the students and send to the faculty members. All the details are
1
stored in the cloud which is very easy to access for the admin any time. As, the project files
and a database file will be stored into the cloud, the project will be accessed in the web
browser through cloud link.
Raspberry Pi 3 B: This device can be used as a server which we are doing in this project.
Micro SD card: You will need a minimum of 8 gigabytes SD card for this project, this SD card is
used as the ROM of the raspberry pi.
Hard drive: You will need a hard drive to store the data, which acts as the cloud storage drive.
Project Implementation:
Download the Raspbian OS and install it in the micro SD card. Download ownCloud in your
raspberry pi 3 B. Mount and setup your hard drive. Enable SSI(Server side includes) for secure
access. Enable port forwarding in your WAN connection. Create a ownCloud account and save
your files from any part of the world. Once you install all the software and configure your
personal cloud you just need to login to your ownCloud account and upload the data which
you want to store in your cloud drive, now you can store and access the data from any part of
the world.
The objective of this project is to prevent SQL injection while firing queries to database and to
make the database secured. This system is online so no need of implementation. It can be
accessed through internet from anywhere. The system uses SQL Injection mechanism
prevention to keep the data safe and secure from sql injection attacks.
The highlighted part here is encryption of card data using AES (Advanced Encryption Standard)
technique. The Online Shop secures the card payment and won’t let the card data to get
hacked. While user doing a card payment, all the card data is encrypted and then stored into
database. System also keeps user details in an encryption form using AES encryption. The
system is built of handling SQL Injection capabilities which doubles the security of database
and prevents from injection hacking codes into the database. Here, the project files and a
database file will be stored into the cloud which will form a connection between application
and cloud server via internet. The project will be accessed in the web browser through cloud
link.
Cloud based student information Chatbot system is an artificial algorithm that analyzes the
student’s queries and messages. This system has a built artificial intelligence to answer the
2
query of the student. The answers are appropriate to the user’s queries, if the user find his
answer to be invalid, he may select the invalid answer option button which will notify the
admin. Admin can view invalid through portal via login. System allows admin to delete the
invalid answer or to add a specific answer of that equivalent question. To answer to the
student query, the Chatbot system retrieves the answer from the database which is stored in
the cloud. The Chatbot system uses a specific keyword to retrieve the answers from the
database. There is no format for the student to follow while asking any question in the
Chatbot. The students can put up any query related to college activities through the system.
This system replies to the user with Graphical user interface which implies that as if a real
person is talking to the student. The system helps the student not only to get their queries
answered but also to be updated with the college activities.
Arduino Uno: Arduino Uno is a microcontroller which can take both analog and digital inputs
and you can use this to acquire the data from all the sensors. There are six analog I/O pins and
fourteen digital I/O pins which you can use to interface your sensors.Raspberry Pi 3 B: You can
use Raspberry pi as a server, program raspberry pi to take the data from Arduino, and
depending on the data acquired you can actuate the camera, exhaust and also turn of the
machines. Program the raspberry pi such that the data that is acquired from sensors is
uploaded to the cloud and when an intruder is found in the restricted area then click a picture
and mail it to the email ID given in the program. MQ 6 sensor: MQ 6 sensor can detect iso-
butane, propane, LPG with high sensitivity and it also detects alcohol and smoke with small
sensitivity. The response of the sensor is very fast and this sensor is durable you can use this
sensor in any environment condition. SW-420 vibration sensor: This vibration sensor module
detects if there is any vibration that is beyond the threshold. You can set this threshold using
the potentiometer provided in the module. Relay Module Use relay module to actuae the
exhaust and the machines.
Project Implementation:
Program Arduino to sense the data from all the three sensors and; send these data to
raspberry pi through serial communication. The data acquired; can be stored in cloud,; you
can create a MySQL database and store the data. The project can; also be monitored from
the; mobile through an android app,; you can use MIT app inventor to create an app. This
project can send and receive the data within the WI-FI network,; in order to access the data
and actuate from any part of the world you need to do port forwarding in your network.
Software requirements:
Arduino IDE Version 1.8.5 : You will be needing Arduino IDE software for writing and;
uploading the program into the Arduino Uno board. Raspbian OS(Debian Linux)
MySQL: MySQL is a platform where you can create a database and upload data using IoT.
MIT app inventor 2:: This software is an online based android app development; platform you
can use MIT app inventor 2 to create your app. Python IDE 3: Python IDE 3 is compiler where
you can write and compile python program. Programing Language: Linux (terminal
commands)
Python
3
8. Online Bookstore System On Cloud Infrastructure
An online bookstore software projects that acts as a central database containing various books
in stock along with their title, author and cost. This project is a website that acts as a central
book store. This web project is developed using asp.net C# as the front end and sql as a back-
end. Such online bookstores tend to get a large amount of online visitors. In order to provide
optimal performance and avoid site crash the system needs to be hosted on a cloud
infrastructure. The sql database stores various book related details. A user visiting the website
can see a wide range of books arranged in respective categories. The user may select desired
book and view its price. The user may even search for specific books on the website. Once the
user selects a book , he then has to fill in a form and the book is booked for the user. The
system thus handles a large amount of users with ease using azure based cloud infrastructure.
Features:
• Online Registration/Login.
• User registration.
• Book Inventory management.
• Book booking & availability check.
• Admin area.
Customer can buy the bus ticket over the Internet, 24 hours a day throughout the week, this
solves the issue of bus ticket being misplaced or stolen. Users can recharge through cc or debit
car.
The site may get overloaded due to huge number of users visiting at once. Thus this system is
built up using cloud infrastructure for improved performance.
In addition, the online system lets the customers check the availability of the bus ticket before
they buy bus ticket. Furthermore, customers no need to pay cash to buy bus ticket because
they can pay the bus ticket by using Credit Card (e.g. Master Card, Visa Card).
Hence, there is a need of reformation of the system with more advantages and flexibility. The
Bus Scheduling and Booking System eliminate most of the limitations of the existing software.
Bus pass web system to put it simply, means system can provide pass identification using BAR
code, Pass renewal, cancellation, updating, Student discount etc.
• Using this website we can check all details related Bus pass and instruction like how to renew
pass how to update it, and also provide details of student discount.
• This website keeps all information of all Bus passes.
• Passengers first need to verify themselves the system using various through registration.
Once verified the system allows them to book passes for any route online.
• Users can recharge through cc debit cards.
A project based on Cloud computing to facilitate rural banking. This Project is uses cloud
computing concepts to develop a banking system for rural areas. It considers various factors
such as lack of devices and amenities in rural areas and provides efficient functionality to fulfill
those gaps. It uses the latest variations of cloud computing technology for filling in the various
4
technological gaps in village amenities. Get this software engineering project
now.
Additional Benifits:
1. Blue book (basic introduction as per university format)
2. Powerpoint Presentation
3. Project Black book (complete guide of the project)
There are number of users who purchase products online and make payment through e-
banking. There are e- banking websites who ask user to provide sensitive data such as
username, password or credit card details etc. often for malicious reasons. This type of e-
banking websites is known as phishing website. In order to detect and predict e-banking
phishing website, we proposed an intelligent, flexible and effective system that is based on
using classification Data mining algorithm. We implemented classification algorithm and
techniques to extract the phishing data sets criteria to classify their legitimacy. The e-banking
phishing website can be detected based on some important characteristics like URL and
5
Domain Identity, and security and encryption criteria in the final phishing detection rate. Once
user makes transaction through online when he makes payment through e-banking website
our system will use data mining algorithm to detect whether the e-banking website is phishing
website or not. As, the project files and a database file will be stored into the cloud, the project
will be accessed in the web browser through cloud link.
An attendance system allows to add the attendance of the employee/student who is present
on that day. The user has to login and scan their identity card to mark their attendance. As the
card has been scanned, the details like id number, date, in-time, out-time are saved in the
database. The database will be stored into the azure cloud which will form a dedicated
connection between application and cloud server via internet. With the in-time and out-time
data stored in cloud, the admin can calculate the working hours of the employees. The
employees can view his personal details, attendance, in-time or out-time, total working hours
after he/she logs into the system. This data is retrieved from the cloud database and can be
accessed any time by the employee and the admin. The admin of the system can add new
employee by registering the new employee and filling up their registration details. The admin
is authorized to view the records of all the employees. This system allows to keep up to date
record of the employee. As, the project files and a database file will be stored into the cloud,
the project will be accessed in the web browser through cloud link.
The proposed software product is liable to meet the required security needs of data center of
cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum
throughput for encryption and decryption from other symmetric algorithms. The idea of
splitting and merging adds on to meet the principle of data security. The hybrid approach
when deployed in cloud environment makes the remote server more secure and thus, helps
the cloud providers to fetch more trust of their users. For data security and privacy protection
issues, the fundamental challenge of separation of sensitive data and access control is fulfilled.
Cryptography technique translates original data into unreadable form. Cryptography
technique is divided into symmetric key cryptography and public key cryptography. This
technique uses keys for translate data into unreadable form. So only authorized person can
access data from cloud server. Cipher text data is visible for all people.
The software system is an online blood bank management system that helps in managing
various blood bank operations effectively. The project consists of a central repository
containing various blood deposits available along with associated details hosted on windows
based cloud server. These details include blood type, storage area and date of storage. These
details help in maintaining and monitoring the blood deposits. The project is an online system
that allows to check whether required blood deposits of a particular group are available in the
blood bank efficiently using cloud server. Moreover the system also has added features such
as patient name and contacts, blood booking and even need for certain blood group is posted
on the website to find available donors for a blood emergency. This online system is developed
6
on .net with azure cloud platform and supported by an Sql database to store blood and user
specific details. Or it can be coded in Python or java and deployed on google app engine.
16. Secure Text Transfer Using Diffie Hellman Key Exchange Based on Cloud
Encryption is the technique of hiding private or sensitive information within something that
appears to be nothing be a usual. If a person views that cipher text, he or she will have no idea
that there is any secret information. What encryption essentially does is exploit human
perception, human senses are not trained to look for files that have information inside of
them. What this system does is, it lets user to send text as secrete message and gives a key or
a password to lock the text, what this key does is, it encrypts the text, so that even if it is
hacked by hacker it will not be able to read the text. Receiver will need the key to decrypt the
hidden text. User then sends the key to the receiver and then he enters the key or password
for decryption of text, he then presses decrypt key to get secret text from the sender. Diffie-
Hellman key exchange offers the best of both as it uses public key techniques to allow the
exchange of a private encryption key. By using this method, you can double ensure that your
secret message is sent secretly without outside interference of hackers or crackers. If sender
sends this cipher text in public others will not know what is it, and it will be received by
receiver. The system uses online database to store all related information. As, the project files
and a database file will be stored into the cloud, the project will be accessed in the web
browser through link.
17. Customized AES using Pad and Chaff Technique And Diffie Hellman Key Exchange
Computer Systems offer great flexibility and improved productivity for users. However, they
can also create added risk and potential targets for data loss. Considering the risk factors with
data stored in database, developing a windows application with data encryption mechanism
will avoid misuse of user’s data. Also to avoid data replication into database which will be
efficient and will give effective results. The window application will keep the mobile phone
data secured in encrypted form. User need to encrypt all the data such as medical and
insurance and then no need to worry about stored data getting hacked.
System allows admin to add the medical as well as insurance data of a person. After adding
the similar data of medical and insurance, the system will allow to merge the data which will
be stored into separate database. The merged data in the separate database will be stored in
encrypted format i.e. Cipher Text. Admin can also decrypt the data which were encrypted.
Also can view all the added data of medical as well as insurance. As, the project files and a
database file will be stored into the cloud, the project will be accessed in the web browser
through link.
18. Cloud Based Improved File Handling and Duplication Removal Using MD5
Data duplication technology usually identifies redundant data quickly and correctly by using
file checksum technique. A checksum can determine whether there is redundant data.
However, there are the presences of false positives. In order to avoid false positives, we need
to compare a new chunk with chunks of data that have been stored. In order to reduce the
time to exclude the false positives, current research uses extraction of file data checksum.
However, the target file stores multiple attributes such as user id, filename, size, extension,
7
checksum and date-time table. Whenever user uploads a particular file, the system then first
calculates the checksum and that checksum is cross verified with the checksum data stored in
database. If the file already exists, then it will update the entry else it will make a new entry
into the database. The database will be stored into the Azure cloud which will form a
connection between application and cloud server via internet. Data de-duplication has an
important role in reducing storage consumption to make it affordable to manage in today’s
explosive data growth. The main goals of this project is, to maximally reduce the amount of
duplicates in one type of NoSQL DBs, namely the key-value store, to maximally increase the
process performance such that the backup window is marginally affected, and to design with
horizontal scaling in mind such that it would run on a Cloud Platform competitively. As, the
project files and a database file will be stored into the cloud, the project will be accessed in
the web browser through link.
The proposed software product is liable to meet the required security needs of data center of
cloud. Blowfish used for the encryption of file slices takes minimum time and has maximum
throughput for encryption and decryption from other symmetric algorithms. The idea of
splitting and merging adds on to meet the principle of data security. The hybrid approach
when deployed in cloud environment makes the remote server more secure and thus, helps
the cloud providers to fetch more trust of their users. For data security and privacy protection
issues, the fundamental challenge of separation of sensitive data and access control is fulfilled.
Cryptography technique translates original data into unreadable form. Cryptography
technique is divided into symmetric key cryptography and public key cryptography. This
technique uses keys for translate data into unreadable form. So only authorized person can
access data from cloud server. Cipher text data is visible for all people.
The software system is an online blood bank management system that helps in managing
various blood bank operations effectively. The project consists of a central repository
containing various blood deposits available along with associated details hosted on windows
based cloud server. These details include blood type, storage area and date of storage. These
details help in maintaining and monitoring the blood deposits. The project is an online system
that allows to check whether required blood deposits of a particular group are available in the
blood bank efficiently using cloud server. Moreover the system also has added features such
as patient name and contacts, blood booking and even need for certain blood group is posted
on the website to find available donors for a blood emergency. This online system is developed
on .net/python with azure/google appengine cloud platform and supported by an Sql
database to store blood and user specific details.
In basic cloud computing systems the available storage space and resources are not
economically utilized. As all the cloud users are not active at a time so overall computing
power and storage is not efficiently utilized. This project aims to solve such issues related to
cloud computing by proving an enhanced cloud computing system. This project delivers an
8
improved cloud computing system that solves many of the storage and processing anomalies
related to cloud networks. It can be efficiently used to get a good overview of all the cloud
system features and limitations and used as an It project for students.
Additional Benifits:
Blue book (basic introduction as per university format)
Powerpoint Presentation
Project Black book (complete guide of the project)
22. Open Source Cloud Apps Solution with Saas, PaaS, IaaS
23. Investigate usage of BitTorrent protocol (or other standardized p2p protocols) for data
movement within a grid.
24. Monitoring and alerting for large scale Hadoop clusters
25. Explore parallel processing paradigms for COTS-based, Commercial Clouds.
26. Compare Map/Reduce, PIG, SCALA, and ERLANG.
27. Compare Data intensive applications versus scientific and other codes: NLP algorithms, graph
algorithms, spatial computations, data mining, data base manipulation
28. Compare/contrast emerging distributed streaming technologies: S4, Storm, etc.
29. A Profile-based Approach to Just-in-time Scalability for Cloud Applications
30. EnaCloud: An Energy-saving Application Live Placement Approach for Cloud Computing
Environments
31. From Service Clouds to User-centric Personal Clouds
32. Semantic Modeling for Cloud Computing, Part 1
33. Deployment of Services in a Cloud Subject to Memory and License Constraints
34. Activity-aware chat system based on a study of distributed collaborative learning
35. Application Performance Isolation in Virtualization
36. Optimistic Synchronization of Parallel Simulations in Cloud Computing Environments
37. SOA’s Last Mile Connecting Smartphones to the Service Cloud
38. Intelligent Management of Remote Facilities through a Ubiquitous Cloud Middleware
39. An Efficient Resource Management System for On-line Virtual Cluster Provision
40. The Method and Tool of Cost Analysis for Cloud Computing
41. Using Clouds to Elastically Extend Site Resources
42. On Technical Security Issues in Cloud Computing
43. Cloud Computing for Satellite Data Processing on High End Compute Clusters
44. Policy-based Event-driven Services-oriented Architecture for Cloud Services Operation &
Management
45. A RESTful Approach to the Management of Cloud Infrastructure
46. Architecture-Driven Variation Analysis for Designing Cloud Applications
47. Service Oriented Architecture for Cloud based Travel Reservation Software as a Service
48. Improving Scalability of Software Cloud for Composite Web Services
49. Ranking Mortgage Origination Applications using Customer, Product, Environment and
Workflow Attributes
50. Understand Collaborative Authorization Policies: Models and Specifications
51. MONGOOSE: MONitoring Global Online Opinions via Semantic Extraction
52. Rule-based Problem Classification in IT Service Management
53. Unibus-managed Execution of Scientific Applications on Aggregated Clouds
9
54. Design and Implementation of an efficient Two-level Scheduler for Cloud Computing
Environment
55. Dynamic Auction Mechanism for Cloud Resource Allocation
56. Profit-driven Service Request Scheduling in Clouds
57. Expanding the Cloud: A component-based architecture to application deployment on the
Internet
58. Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds
59. SLA-Driven Dynamic Resource Management for Multi-tier Web Applications in a Cloud
60. Multi-cloud based disaster recovery service.
61. Proactive Workload Management in Hybrid Cloud Computing.
62. Designing an Energy-Efficient Cloud Messaging Service for Smartphones.
63. Projects tagged which can be under "virtualization"
64. Benchmarking I/O performance with virtualization or nested virtualization.
65. Profiling Virtual machines from the host.
10