You are on page 1of 16

Final Year Project Topics for BSc (Hons) in Computing & BSc

(Hons) in Computer Networking and IT Security Students

Supervisor: Mr. Abhinav Dahal

1. Diagnosis of disease(s) using Naive Bayes classifier algorithm.


2. Real time sentiment analysis on social media.
3. Online product(s) suggestion using Apriori algorithm.
4. Wi-fi based indoor navigation system.
5. Resource(time) scheduling using adaptive algorithm.

Supervisor: Mr. Bikash Bhattarai


1. IP Telephony with Audio Conferencing
2. IP Telephony with Video Conferencing
3. Reverse Proxy Server for Web Servers
4. Network Automation Using Open Stack
5. Using Netflow/S-Flow for Network Monitoring
6. Software Define Networking using VMware NSX
7. Open Source TACACS server with GUI management and monitoring
8. Implementation of Server Load Balancing on Open Source Platforms
9. GUI based log server with web based searching based on time, source, severity etc.
10. Network Policy Implementation for Campus Network

Supervisor: Mr. Sandesh Prasai

1. Credit Card Fraud Detection Project


This project may require studying the pattern of transaction history and geographical location
of user. In case of pattern mismatch the system will divert to security page to test the validity
of user. I may also keep the track of Browser details.

2. Internet banking fraud detection system


This project may require studying the pattern of transaction history and geographical location
of user. In case of pattern mismatch the system will divert to security page to test the validity
of user. I may also keep the track of Browser details.

3. Secure Internet bank login system


It is very challenging to keep strong password and even important is to remember it. Most of
the password authentication is single step. This project focuses on 2 factors and multilevel
authentication of password.

4. Smart Mobile Attendance System Project


The mobile attendance system has been built to eliminate the time and effort wasted in taking
attendances in schools and colleges. It also greatly reduces the amount of paper resources
needed in attendance data management. It will be an android app connected with college
system in back end.

5. Secure online voting


The trend of online voting is increasing. It is important to make online voting system secure
and conflict free. This project focused on the android app on front end with taking care of
multiple/duplicate vote cast from same system.

6. Smart Phone Self Encryption Project


This projects allows users to store sensitive data on their mobile phones without having to
worry about is confidentiality even if the mobile is lost. This system is developed so that
employees and other mobile users can store and operate on sensitive data on their mobile
phones without having to worry of it being leaked. This software project concentrates on
securing data on mobile phones by storing it in an encrypted form. This data is encrypted with
a stream cipher whose key is stored on a server. When the mobile device is lost it sends a
report to the server and the server then destroys the respective key so that the data on that
mobile can never be encrypted and remains confidential.

7. Attacker tracing using packet marking


Marking concept for this purpose that establishes an efficient defense strategy that is capable
of finding out the real source behind the attack by analyzing the packets that travel on the
network. Well even though more such concepts are used for tracing attack sources yet this
project enables the user with a quite convenient way to find out the attacker with more
accurate details of the source. This project is developed as a strategy against ddos attacks.
Student has to focus on IP Trackback based on Packet Marking.

8. Criminal Investigation Record System


The system is proposed to help agencies like CIB, CID and other such bureaus to speed up
investigation process. The system keeps record of crimes and criminal of a case which
includes case summary, people involved, past criminal history of those involved, Items

recovered on scene and other details, finger prints and picture etc. The system allows admin
to update the status of investigation, and punishment to criminal.

9. Android Phone Theft Security With GPS Tracking


Anti Theft Mobile Security is an application which will notify you when you trigger it. This
application has registration module where user can register them self using their name, phone
no, email id, and password. And you will get access to web application as well as app access.
If one fine day your phone gets lost then you will have to login into web application and trigger
the lost phone button. And then app will take a picture first and then will send the GPS coordinated to the web application using which user can track the phone. And when user
changes sim card the application will automatically run itself and its phone no and it is not
available then sim no and send it via sms to the registered no and alternative number. And
this using web application user can track down the thief. Web application will contain login
form using which user can trigger the application. And it also allows user to view the location
and image of the thief.

10. Smart Health Consulting Android System


It might have happened so many times that you or someone yours need doctors help
immediately, but they are not available due to some reason. The Health Prediction application
is an end user support and online consultation project. Here we propose an android
application that allows users to get instant guidance on their health issues through an
intelligent health care application online. The application is fed with various symptoms and the
disease/illness associated with those systems. The application allows user to share their
symptoms and issues. Doctors related to the system should be pre registered and the status
of availability should be marked. Based upon the status the patient will contact the emergency
help.

Supervisor: Mr. Rohit Panday


1. Notice Board System (Arrival and Departure Applicable for Airlines, Bus etc)
2. Online Visiting Card/Identity Card Creation Project
3. Multi Website/Location Specific Advertisement Handling System
4. Online Voting System (Android Integrated/Finger Print Based)
5. Cargo/Postal Management and Tracking System
6. Opinion Mining for Restaurant System
7. Weather Forecasting using Data Mining

Supervisor: Mr. Narayan Panta

1. Student ID card verification ( Mobile Android App) - Transportation


2. Catering Business (E- commerce Website)
3. Catering Business (Resource Allocation)
4. Nepal Million Dollar Home Page
5. Riya Canteen MIS system
6. Transport Cost Calculation Project (of specific local route)
7. SEO optimizer and suggester
8. Interactive Data Visualization
9. Government Normal Task (Citizenship/Passport/Company Registration/No Objection Letter)
Procedure
10. Hotel Mountain Mirror MIS System

Supervisor: Mr. Ravi Chandra Gurung

1. Network Virtualization for OpenCloud


The Projectis to implement a network virtualization infrastructure to allow the academic
community to explore the fundamental technical challenges that underlie the cloud.The cloud
is rapidly changing the face of Web infrastructure, enabling even small companies to quickly
create Web and mobile applications for millions of users by taking advantage of the scale and
flexibility of the shared physical infrastructures provided by cloud providers. Unfortunately, the
academic community is at risk of being left out of this exciting paradigm shift; while they can
use commercial cloud offerings, their opportunity to influence these offerings is shrinking. In
response, this project proposes the exploration of NSF OpenCloud, an infrastructure that
would allow researchers to explore the fundamental technical challenges that underlie the
cloud.
One of these technical challenges is that of network virtualization. The goal of network
virtualization is to "compile" a diverse set of tenant-specific requirements into a single
configuration of the underlying physical network, enabling multi-tenant datacenters to
automatically (that is, without manual configuration) simultaneously address a large and
diverse set of customer requirements. This proposal investigates a novel approach to
implementing network virtualization that places all nontrivial packet transformations at the
edge of the physical network. This project will produce an open-source implementation of this
approach. In addition, it will compare its performance to other approaches and then extend it
to more sophisticated network functionality.

2. Internet usage control using access control techniques.


On a network infrastructure, there are 200 users. All the users access internet through a
Cisco router. It was observed that the internet usage was very high which created problems

like slow internet, expensive internet bills etc. To solve the problem, the network has to be
redesigned which would allow only browsing traffic and all other traffic bound to the internet
should be blocked.

3. The Bro Network Security Monitor for Business enterprise


Bro is a powerful network analysis framework that is much different from the typical IDS you
may know.While focusing on network security monitoring, Bro provides a comprehensive
platform for more general network traffic analysis as well. Well-grounded in more than 15
years of research, Bro has successfully bridged the traditional gap between academia and
operations since its inception. Today, it is relied upon operationally in particular by many
scientific environments for securing their cyberinfrastructure. Bro's user community includes
major universities, research labs, supercomputing centers, and open-science communities.

4. Load balancing for Network and System services


Layer 4 load balancing uses information defined at the networking transport layer (Layer 4) as
the basis for deciding how to distribute client requests across a group of servers. For Internet
traffic specifically, a Layer 4 load balancer bases the load-balancing decision on the source
and destination IP addresses and ports recorded in the packet header, without considering
the con optimize and load balance HTTP connections, TCP connections to support high
availability for applications such as MySQL, LDAP, and Chat, and UDP traffic for applications
such as DNS, RADIUS, and syslog. You define settings for HTTP load balancing in the http
configuration context, and settings for both TCP and UDP load balancing in the stream
configuration context of the packet.

5. Network/System monitoring and auditing through Nagios


Nagios is a powerful monitoring system that enables organizations to identify and resolve IT
infrastructure problems before they affect critical business processes.Designed with
scalability and flexibility in mind, Nagios gives you the peace of mind that comes from
knowing your organizations business processes wont be affected by unknown outages.
Nagios is a powerful tool that provides you with instant awareness of your organizations
mission-critical IT infrastructure. Nagios allows you to detect and repair problems and mitigate
future issues before they affect end-users and customers.
By using Nagios, you can:
Plan for infrastructure upgrades before outdated systems cause failures
Respond to issues at the first sign of a problem
Automatically fix problems when they are detected
Coordinate technical team responses
Ensure your organizations SLAs are being met
Ensure IT infrastructure outages have a minimal effect on your organizations bottom line
Monitor your entire infrastructure and business processes

6. Wireless Hotspots: Current Challenges and Future Directions


global hotspot infrastructure, and discussthe research problems that remain to realize this
vision. Weobserve that, although there is a demonstrated desire for highspeedwireless
connectivity in public areas, several technicaland deployment-related problems need to be
addressed beforesuch connectivity can be provided ubiquitously through WiFihotspots. These
problems include authentication, security,coverage, management, location services, billing,
and interoperability.We discuss existing research, the work of standardsbodies, and the
experience of commercial hotspot providersin these areas, and then describe compelling
open researchquestions that remain. We discuss these problems in the contextof the needs
of a typical business traveler, although theoverall vision is applicable to general consumers as
well.

7. Modern Voice communication in an organization through use of open source system


The purpose of this document is to describe in detail the final design and implementation of
our CSEE4840 semester project: a voice-over-IP (VOIP) soft-phone. The project is divided
into 3 main parts. The design and implementation of the industry standard network protocols
and applicationlogic that we will use to implement VOIP. The system software for the phone,
and finallypart covers the hardware implementation.
o

A way to pick up the phone, dial a number, and see who you are dialing

A way for the phone to ring

A way to speak into the phone

A way to transmit/receive voice data

A way to hear the person on the other end

A way to hang up

8. ICT infrastructure of Telemedicine for rural areas of Nepal


Nepal has too much shortage of doctors. Most of the specialist doctorsdont want to go to the
rural areas of Nepal due to the problems of physicalsecurity, transportation and living
standard facilities. In addition to this,most of the rural health workers who have been serving
the majority of thepopulation of Nepal are being deprived from the specialist support
andinformation regarding the invention of new technology in medical filed.Moreover, during
the emergency cases, patients of rural areas dont knowwhich doctor to consult, which
hospital to go and which doctor has thespecialized knowledge of particular diseases. Due to
the centralized
medically expert health workers and well equipped facilitated hospital inurban areas of Nepal,
create a lot of problems of rural people of Nepal. Theonly and only one solution to overcome
the above problems istelemedicine. Telemedicine service plays the vital and significant roles
in

cases of any kinds of emergency to save the patients living in the ruralareas. For the effective
implementation of telemedicine service, robust ICT(Information and Communication
Technology) infrastructure is required tomake this service run properly. The main objective of
this

project

isstudents

will

develop/design

the

necessary

ICT

infrastructure

as

newopportunities to address above problems and support to delivertelemedicine services


effectively.

9. IoT Home Automation Using Raspberry Pi


The Internet of Things (IoT) is the network of physicalobjects or "things" embedded with
electronics, software,sensors, and network connectivity, which enables theseobjects to collect
and exchange data [1]. In homeautomation smart devices and sensors that sense thephysical
experience and convert into stream of informationdata. The major element of home
automation based on IoTis sensor network and raspberry pi. Sensor networks areused for
sensing and monitoring while raspberry pi collectthe data monitor the data and depends on
collected mangethe device like fan, light, door motion and opening-closingof curtains.
Suppose the ambient light is less that I amgoing to feel darkness then according to ambient
light itsautomatically open the curtains.

10. IOT based Smart Roads Intelligent Highways with display information through mobile
application
An intelligent Highway is an innovative concept for smart roads of future smart cities. It is a
program ofinnovation that links a different way of looking at things with innovative ideas that
apply the opportunities offered bynew technologies in smart ways. Nowadays safety on road
has become an important factor in our life because there isan increasing amount of accidents
on the road and there are some places where accident occur frequently such ascrossings,
turns. Also there is a big problem of traffic jams on the road. Due to heavy rain fall, there is a
possibility ofwater overflow on the bridges and accident may occur. In hilly area there is a
possibility of landslide. so, there came aneed to design a system which can detect these
unexpected events. So we are designing a system that is An IntelligentHighway system with
(Weather Accidents Landslides and traffic) W.A.L.T. which is an innovative concept
tomaintain safety on roads. The system will make use of digital sensor to acquire data of
landslide, accidents traffic jamsand weather condition and that will be displayed on active
LED display on road, using XBee and GSM technologies.

Supervisor: Mr. Mukesh Regmi

1. Face Detection and Recognition System


The product should be able to draw rectangle covering a group of individuals and should
recognize a particular individual among number of faces on face database against a given an
input face.

2. Student Performance Calculation using Artificial Neural Network


Develop an application that calculates performance of prospective student that are about to
enroll in an academic institution. You have to use ANN and Java

3. Student Performance Calculation using Fuzzy Logic


The system should predict the CGPA of students using the Fuzzy Inference System (FIS) and
use the predicted CGPA as a yardstick for student performance evaluation.

4. All In One Android App


Should incorporate many day to day useful apps in one place. Develop 5 Android Apps(
Example: LoadSheiding, Torch Light, Camera,Calendar,Alarm, SMS or Telephone
Notification etc)

5. Animating CPU Scheduling Algorithms and Data Structure


Should Develop a simulation model to demonstrate 5 different CPU Scheduling Algorithms(
FCFS, SRT, SRTN,Round Robin, Multi Level Feedback) and Data Structure( Doubly Circular
Linked List and Stack)

6. An e-Commerce Portal
The portal should have product posting including product images by Admin, Product
Catalogue Search, Shopping Cart and Payment Service Facility. This App should be
developed using Java Spring Framework.

7. Baghchal
Use Java Programming to develop popular Nepali Game "Baghchal"

8. File Sharing-App
This program on installed on users PC should sync all files on users computer and when
installed on mobile devices should sync all files across the mobile device.

9. Call Recorder-APP
Will record and allow to listen all incoming calls when installed on mobile device.

10. Securing Home and Neighbours


Will develop an application based on embeeded devices that will send SMS or speak out
alarm on detection of suspicious activity across the community.

Supervisor: Mr. Saroj Lamichhane

1. Session initiation protocols (SIP) implementation for VOIP


2. Securing web services
3. DDoS Detection Method and Solutions
4. Risk assessment framework
5. Implementation of Network Admission Control (NAC)
6. Effective implementation of Security information and event management
7. Managed Web Application Firewall
8. Effective implementation if IDS/IPS
9. Open Source Network Backup solutions
10. Mobile application penetration testing

Supervisor: Mr. Sanjiv Udash

1. Student Performance Tracking System


The teacher should be able to record students attendance and performance that is input by
him/his. This data then can be used by other departments of the school/college for different
follow purposes.

2. Android app for a particular shopping mall


Through the app users should be able to search for particular items that the shops will handle
from the backend. The shop owners should be able to handle basic inventory management.

3. CodeBook
Mobile App to Teach Children Basic Scratch Programming Skills and Concepts
https://www.youtube.com/watch?v=5cFjtU0C5JI&feature=youtu.be

4. Employee Performance Evaluation and Appraisal System


Decision Support System can be a key integral part of Human Resource Management in an
organization. In this project, the student will develop a system that would keep track of the
performance details of employee input by the supervisor when performance evaluations are
carried out. The system in return would provide various indicator-driven appraisal reports, with
the help of which the management will make decisions in terms of rewards or reprimands.

5. Alumni Management System


The focus of the system is to look into the storage and manipulation of Alumni Database with
some key features like Forum, Event Management and some aspects of recruitment to be
added in it.

6. Development of a Trial e-procurement System for the Nepali Government


Develop a trial e-procurement platform for the Nepali Government. Naturally, a full-fledged eProcurement platform can take man-years to complete. Hence the scope of this trial platform
will be limited to user management, service provision registration, category of bid posting (for
line items) and bid results posting.
http://www.gebiz.gov.sg/

7. College Time Table Management System


Develop a college time table management system that allow administrator to easily schedule
classes with some criteria that the administrator inputs
Supervisor: Mr. Akchayat Bikram Joshi

1. Network Administration Tool Development:


Administrators have the most important tasks, and this is why to make their jobs easy,
network administrative tool has been introduced, which is a software package. It is with the
help of this tool, the administrator will be able to gain a full control of the software and also
oversee the softwares entry to network resources.
Other than this, the tool will also handle various files and will also be able to help during the
process of execution and maintain software on the computers of clients. This network
administrative toll will further make things easy by minimizing the provision of direct support to
all its network users with the aid of its unique features.
The unique features of the network administrative tool are as follows:
This feature can be used by the administrator very easily, because of the fact that it is made
up with a GUI that is considered very user friendly.

This tool can support deployment of software on the computer of the client, remotely.

The addition of the client machines to the network can now be done easily and simply,
with its help

The task performed by the tool on the computer of the client is done silently and quietly
The installation or un-installation of this software can be done with ease.

This software also aims to minimize the support of the direct user.

It also has the ability to control, only from a single console the system operations

It has the power to maintain and look after other software installed in the computer

Also adding other new features to the tool can be done simply

The main aim is to try and organize the systems, only from one server, that is centrally
located, which is in turn connected to a network, so that it can perform its daily activities.

2. Dynamic Load-balancing in distributed systems in presence of Delays:


Dynamic load balancing in distributed systems in the presence of delays project is a project
which is implemented in java platform. In this project we analyze processing rates at each
nodes and there performance as well as delay in transition at each node is studied accurately

and provide solution with dynamic load balancing method. Initially we work on developing one
shot load balancing policy and extend its features to distributed load balancing policy which
will handle both incoming external loads at each node.

Performance of dynamic load balancing methods are compared with existing methods by
considering the average completion time per task and process rate of each system based on
random arrivals of the external loads.

3. Congestion Control using Network based Protocol:


Congestion Control Using NETWORK BASED PROTOCOL project is a networking project
which is implemented in java platform. Main aim of this project is to implement a new model
called congestion avoidance mechanism called CRF for controlling congestion in network and
improve efficiency of communication without any time delay.

In present network congestion is important factor where researches are working to reduce
congestion and increase scalability and robustness in network communication. CRF will
control and restrict unwanted traffic before they enter the network and communicate with
routers which are located at borders and restrict unwanted traffic.

4. Data Transmission using Multi-Tasking Socket:


Data Transmission Using Multi-Tasking-Socket project is implemented in java platform. Main
aim of this project is to explain importance of multitasking socket programming in network
communication when dealing with large amount of data from different sources. In this paper
we propose a new model in which feedback system is created. When there is any break in
socket connection users is informed with connection loss information and similarly packet
delay and packet loss information is send to user in the form of feedback message.

5. Secure Multi-signature generation for group communication:


Secure Multi signature generation for group communication project explains about providing
solution of secure data transmission compare to existing individual signature method. In this
project we explain about group signature schemes where more than one member needs to
collectively sign an arbitrary message. This method will reduce attacks on network compare to
other similar schemes available. Multi signature scheme is based on distributed key
management infrastructure which works on DKG and DKRU protocol.

6. Network Vulnerability Measurement, Assessment and Notification:


Vulnerability in networks costs organizations a lot of money. This project seeks to reduce the
impact of such security vulnerabilities in computer networks and inter connected systems by
developing measurement driven techniques and applying them for vulnerability detection,
assessment and mitigation.

7. Network Virtualization:
The cloud is rapidly changing the face of web infrastructure by taking advantage of scale and
flexibility of the shared physical infrastructures. The goal of network virtualization is to compile
a diverse set of requirements into a single configuration of the underlying physical network,
enabling datacenters and such establishments to automatically and simultaneously address a
large and diverse set of customer requirements. This project will produce an open source
implementation of this approach. In addition, this will compare its performance to other
approaches and then extend it to more functionality.

8. Network Management System:


It is such kind of system by which anyone can handle all the data and it is very easy to store
all the information in it. By using this system company administration and anyone can analyze
all kind of data faults, performance etc. So, NMS can give all kind data information and it has
a brought application. This projects gives the idea about it and as well as implementation.
Steps to begin-off the undertaking:
Idealize the distinctive mechanisms (overlook the heap uniting orders to the units) to be
dumping the information at specified (configurable) catalogs in the manifestation of indexes.
The document information will have better organizes, (XML, CSV and so forth) index naming
will be unexpected; document pivot could be at contrasting sizes. The indexes should be
progressively developing, and index turn will happen at particular sizes.

9. Data Security using Honey Pot System:


In order to provide a support to the defensive network security posture the recent concept of
data security using honey pot system is implemented and it is widely accepted by people.
This project has various features that along with data gathering of the intelligence enable to
understand the attacker more profoundly. It also helps to know about the kind of ammunitions
being used by the attackers well as the results of the unauthorized attacks for the measures
of the prosecution.
The already existing systems need the intrusion signatures as well as brief information about
the abnormal and normal activities. Using machine learning techniques it is quite difficult to
identify the abnormalities. These system activity based on general riles and models that can
be used by the system to detect intrusions, compromising the systems reliability. The earlier
works of intrusion detections aim on single source generated activities. It results in various
undetected intrusions. In the existing system intruder can enter and access the network
easily. In order to secure the system it is important to prevent the entry of the intruder.

The ticketing authority is the new concept of the proposed plan and according to this plan the
clients will have to get tickets from the ticketing authority to access the network resources.
This method is proposed in order to keep a check on the vulnerable activities. It will keep a
check on the unauthenticated clients and will also secure the networking system. In this

method the back end server will compare the clients permission and the requested operation,
whether it should be allowed or not. If they find any kind of discrepancy between the requests
operations and the permission then they will transfer it to the honey pot for filtration. This new
method can protect the system and also prevent unscrupulous activities.

10. Domain Name Service System With Secured Manner:


Domain name service system with secured manner project is implemented in java
platform. This project is used in mapping of ip address to host names and provide secure data
transfer between sender and receiver. Existing system works on RSA algorithm which is a
manually generated security key.

This method uses two prime numbers for creating new key pair which is not an effective
method. In this method there are chances of mathematical and brute force attacks. Here
private key is available on network.

Considering these issues we implement a secured cryptography method where both private
key and public key are used for encryption and decryption. While sending data messages are
encrypted with public key and on receiving site private key is used for decryption.

Supervisor: Mr. Monil Adhikari

1. Layman Packet Sniffer (Generalized)


Let us imagine a scenario in any kind of a personal home network, where nowadays it is very
much viable for a member to have a device with which s/He uses to access the internet, since
the dawn of the internet which has brought about a revolution has its drawbacks specially in
the current scenario seen in Nepal the parents really dont have specific control or information
about usage of internet in their own respective homes. Now, this is where the technology
kicks off what if there was a system where the usage of internet is presented to the parents so
that they can know and protect their respective families from the different kinds of the threats
that are present in the current internet scenario.

2. Wi-Fi AP Tracking and Troubleshooting


This tool is intended for system administrators for determining wireless access points location
through triangulation and their status (either off or on) this application should also be able to
provide various attributes of the Wi-Fi Signal such as channel, encryption, authentication etc.

3. Hotspot Based Notice System


A student setup a preferred hotspot system with any technology at his disposal and creates a
layman friendly interface for the admin to upload important notices through the hotspot
management.
4. Smart Crawler Crawl over the internet to find links about a topic.
Within the 1st stage, Smart Crawler performs site based sorting out center pages with the
assistance of search engine, avoiding visiting an outsized variety of pages.

5. Passive IP Traceback to detect location of spoofers


The system proposes a singular answer, named Passive information processing traceback, to
bypass challenges in preparation. Routers may fail to forward associate information
processing spoofing packet attributed to various reasons e.g. TTL surpassing.

6. Hop by Hop File Transfer Suite


The focus is to develop a hop by hop message authentication system such that message
receiver should be able to verify whether a received message is sent by an authorized code
or not.

7. Preventing Private information inference attacks on Social Networks.


By the use of existing learning algorithms, we try to predict the personal information of any
social networking account and in the first phase learn the use and launch of inference attack
and lastly use 3 sanitization techniques to prevent the attacks.
8. Security Implications of Software as a Service
Web services are loosely coupled computing services that can reduce the complexity of
building business applications, save costs, and enable new business models. They are the
next wave, fuelling e-commerce, application integration, and business-to-business (B2B)
ecommerce. This is mainly because the driving force behind web services is cooperation and
mutual benefit for a win-win situation. An important characteristic of web services is that the
interaction will be instantaneous, since interaction will be more from application to application
(business to business) rather than from humans to applications. So, while enterprises are
interested in bringing web services into the mainstream of their service-oriented architectures
(SOA), security might be the driving force that is holding many enterprises from using them.
Security is important for any enterprise-level web service, and of major concern as
businesses will perform some transactions over the Internet with their trading partners using
web services. Securing web services is crucial for financial, legislative, trust, and privacy
reasons. Existing security standards such as the Secure Sockets Layer (SSL), which is the
most commonly used mechanism for securing ecommerce transactions, is not adequate for

securing web services simply because web services require end-to-end security rather than
point-to-point security as provided by SSL.
The objective of this project is to research the security implications of the software as a
service model, develop scenarios to demonstrate the security issues, and design and
evaluate an architecture for securing services.

9. NFC based event contact information dumper


In this project we can setup a NFC station where all the attendees of the event can register
their contact information for newsletter and networking objectives. No paper no manpower
involved contingent upon NFC based mobile phones.

Supervisor: Mr. Dhruba Sen

1. Shopping Mall indoor Navigation Android app


2. Mobile POS App for a Restaurant for taking order.
3. Task Management System Web and Android App - System use for task management.

Supervisor: Mr. Rabin Regmi


1. Title: Development of a Multi-player strategy game: Connect Four
Description: Connect Four is a two-player game in which each player has a set of 21 discs of
same colour. The players take turn dropping the discs into a vertical grid i.e. the disc is placed
in one of the columns, which then falls into the lowest unoccupied square in the column. The
objective of the game is to try to connect four discs of same color horizontally, vertically or
diagonally. The game board should be 7x6 (row x column), and for this project, the student
should design the games graphical UI preferably based on OpenGL.
2. Title: College management system
Description: It is an integrated web application that handles various academic and nonacademic activities of a College/Academic Institute.
The system can access by every
students/faculties/employees of the institution through internet connected computers or
internet enabled mobile devices with the aid of his user name and password. Every user will
have a customized home page with his/her profile management facilities.
3. Title: Payroll Solution
Description: This software can be used in any office for maintaining employee payment
system, performance, appraisals, leaves and other benefits in a very comprehensive way.
4. Title: Online exam and assessment software
Description: This software is used for assessment of students. Students can give exam and
as well as see there result at that time. The software could also be used by recruiters for
online recruitment processes and performance comparison.

5. Title: Point-of-sale application


Description: This software, to be used in retail shops or malls has three modules, the front
end is used at the billing counter which enters the billing details, the middle tier performs
business logic, calculates amount, performs inventory management and the third layer
performs database storage and retrieval.

6. Title: An end-to-end vehicle management system


Description: This automates the process of vehicle management, it enables the tracking of
vehicle and driver performances. Vehicle insurance, service due and fuel consumption can
be tracked. The software to be deployed over the corporate intranet, allows for easy
scheduling of vehicles. The users of the system will be the employees of the company using
the application. Access to the various modules of the application will be based on the roles
assigned.
7. Title: Stock analysis and prediction application
Description: This software is a web-based application, which collects data of
various
selected stocks over a period of time, and produces statistics of the performance of these
shares and also provides trends for the future. This software processes stream data, - the
stream data is coming continuously, quickly, changing with time, and may be unpredictable
and unlimited in the way. The software updates the database continuously and performs
data mining dynamically. The software extracts potential information and knowledge hidden in
the stream data, which is useful but people do not know in advance.
The data to be
processed is on the continuous arrival of large or even unlimited data. The data thus mined is
used for stock prediction over the conceivable future.

8. Title: Virtual Class Room


Description: This software is used for students who can read & download the lectures of
faculties and faculties can upload their class lectures.

9. Title: Logic circuit builder.


Description: The aim is to develop a software environment for building computer logic circuits
from simpler circuits. At the lowest level the simplest circuits are NAND, NOR, NOT, AND,
OR, and XOR gates. The environment must include a graphical user interface allowing
circuits to be dragged, dropped, and connected to build more complex circuits. These circuits
can then be stored and subsequently used to build yet more complex circuits. The
environment should also be able to generate truth tables for circuits that are constructed.

10. Title: Image recognition software.


Description: This software is used for analyzing an image file and matching it with other image
data. Such applications are required in passport control and other security
installations.

You might also like