Services

Our Latest Projects:

With the ever-changing technical aspects and shifts in the IT scapes, it is vital to keep ourselves on toes. Keeping this in mind, our latest projects dealt with leading technologies like AI, Python, IoT, PHP, Software Testing, etc.

Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.

  • Food Waste Management
  • Mobile Application Development
  • Sustainable Technology

Rail accidents are a major safety concern worldwide, with the U.S. witnessing over 40,000 incidents from 2001 to 2012, costing $45 million. About 5,200 accidents exceeded $141,500 in damages. The Federal Railroad Administration mandated reports with fixed fields and narratives to analyze these accidents. It utilizes text mining techniques to uncover accident characteristics, improving predictive accuracy for extreme accident costs. Results demonstrate significant enhancement in predictive accuracy, especially when using ensemble methods. Text mining provides unique insights,complementing fixed field analysis in understanding accident contributors.

  • Federal Railroad Administration
  • Rail Safety
  • Text Mining Techniques
V

The App eases the entry process into the  Campus/ IT hub or an organisation ensuring a higher level of security. The whole long queue in front of the Visitors area can be reduced to an extent. Since the authorised officials are approving the entry status, the system becomes more secure. The visitors can request for a pass to attend interviews and Walk-ins. Meetings can also be scheduled. You can also view the passes already requested and the status of approval. The walk-ins published can be viewed on a single click. The invitations from various companies can also be viewed.  

  • Access Management
  • Corporate Security
  • Visitor Control

We introduce CaRP, a novel security approach using hard AI problems, merging Captcha and graphical passwords. CaRP combats various attacks, including online guessing, relay, and shoulder-surfing. It also addresses image hotspot issues in graphical passwords. Additionally, we employ Rabin's Cryptosystem for robust password authentication in real-time systems.

  • AI-based Security
  • Authentication
  • Cybersecurity

It aims to review past work in vehicle tracking, monitoring, and alerting systems, categorize methodologies, and identify trends. Challenges arise from real-time location accuracy and alerting issues. GPS is widely used for tracking and monitoring, while RFID and GSM are common technologies for bus monitoring and alerting systems, essential for conveying vehicle information to users.

  • GPS Technology
  • Real-Time Monitoring
  • Vehicle Tracking Systems

Computers facilitate various crimes, including hacking, drug trafficking, and child pornography. Over 75% of criminals store plans on their PCs or laptops. Investigative officers extract evidence from suspects' machines, but the rise in computer-related crimes necessitates specialized forensic tools. These tools streamline the process, making it more efficient than manual searches. Inspired by the Sûreté du Québec (SQ) forensic process, we introduce a unique subject-based semantic document clustering model. It helps investigators group documents on a suspect's computer into overlapping clusters, each corresponding to an investigator-defined subject of interest. Our system stands out in the crowded field of forensic tools.

Module Description
Registration
  Our 'Subject Based Forensic Investigation' project comprises four modules. 'Registration' is the initial module, akin to standard user registration. In our system, multiple users, serving as investigators, must register to access all its features.  
Login
After the user registration, the investigator should login to our proposed  system with the registered user id and the password. After login to our proposed system.  We can do our next processes after login to the account.  
Subject Vector Expansion  The module's primary goal is to expand input vectors by suggesting nouns and verbs related to the subject. Using the 'Subject Vector Expansion' algorithm, we generate expansion vectors using WordNet for synonyms. These vectors serve as synonym lists for document clustering and are stored in a database. They facilitate data mining on the criminal's machine, enabling file inspections.
Document Clustering
This module uses a 'Clustering Algorithm' to analyze suspect files. Keywords in files are compared to synonyms. Matching files are moved to a new folder. This central module enhances our investigation strategy by creating evidence from the clustered folder.

  • Computer Crimes
  • Digital Forensics
  • Law Enforcement

Security stats reveal a surge in data leaks, often due to human errors. To combat this, a privacy-preserving data-leak detection method is proposed. It allows secure delegation of detection operations without disclosing sensitive data, offering a privacy-focused add-on service for Internet providers, with effective results in real-world scenarios.

  • Data Security
  • Data-Leak Detection
  • Privacy Protection

In a two-server PAKE protocol, a client divides its password into two shares, enabling secure authentication without revealing the password. This paper introduces compilers that transform two-party PAKE protocols into two-server ID2S PAKE protocols with implicit authentication. These ID2S PAKE protocols maintain security without random oracles, offering a computational efficiency advantage over Katz et al.'s two-server PAKE protocol with similar security guarantees.

  • Information Security
  • Password Authentication
  • Two-Server Authentication

Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage's widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.

Module Description
Trusted Authority
The authority verifies user details. An algorithm with basic CP-ABE generates a public parameter and master key. It creates ciphertext for specific users based on access policies.
Apache Server
Apache server send the file to the requested user  save user details ,Here re encrypt the file name
Group Manager
Upload the video file and encrypt send the file to the APACHE  server.
Data User
User sends the request for file and secret key and can  download the file by using encryption

  • Cloud Computing
  • Data Security
  • Fog Computing
E

The "Electronic Tollbooth Monitoring System" modernizes toll collection. Traditional manual tolls slow vehicles, increasing costs. Electronic Toll Collection technology enables normal-speed passage through toll gates, reducing congestion, and automating fee collection via RFID technology. Drivers' accounts are debited automatically, and low balances are managed during account updates. This efficient system benefits both drivers and traffic management.

  • Electronic Toll Collection
  • Toll Booth Automation
  • Toll Booth Management