Sakaar Microsolutions Pvt. Ltd. (An ISO 9001:2008 Certified Company)

Topics: List of Research Topics

Research Topics
Click on title to read topic description.
Now a days lots of recruitments take place in different companies which consumes lots of time and money. While designing this expert system the candidate can be recruited over a web based system remotely anywhere and anytime with applied security features. Like a real system all the basic rounds can be conducted using this expert system which includes mainly technical interview, group discussion and hr interview.
With continuous growth in mobile technology mobile devices are becoming replacement for laptops and personal computers. There are thousands of mobile device applications that you can download to your mobile devices and each one of them users memory space. Considering the high usability features of mobile devices there is a need to find solution for the limited storage of mobile devices. Presently, there are two existing ways to extend the memory storage of mobile devices: using SD cards, Remote access applications. Although these existing ways helps to extend storage of mobile devices to some extent but there are some drawbacks associated with these ways like data is not reliable and very hard use user interface. “Cloud based file system app” is proposed as a solution to extend limited storage of mobile devices with simple and easy to use user interfaces along with efficient data reliability. It allows user to configure his/her own laptop or personal computer as cloud server. This app facilitate users with unlimited storage space of cloud.
This is one of the popular software engineering model for development of software to be taken into account. To develop software fast and with higher quality the model can be used w. r. t. reusability of the components that are engineered project to project. The complete design can be simulated over a local area network for its better understanding.
In this research and expert system will be developed which will be based on fuzzy logic for soft computing where a patient can register online and enter symptoms and disease along with test reports then the system will search the results using its knowledge base prepared by an experts and diagnose the disease along with prescription of medicine to the patient.
Scheduling is a key concept in computer multitasking, multiprocessing operating system and real-time operating system designs. Scheduling refers to the way processes are assigned to run on the available CPUs, since there are typically many more processes running than there are available CPUs
Digital Signage is software that shows advertisements and information on a digital TV in Railway Stations, Bus stations, and other Public places. The user specifies the date, time, the video file, the image file and text to the software and shows the advertisements at the scheduled time.
Marketers today face critical challenges when it comes to managing, optimizing and integrating the delivery of content across many marketing channels, as well as throughout their distribution and social networks. More and more marketers are turning to a rising marketing technology known as a Distributed Marketing Platform (DMP) to solve these challenges and achieve measurable success.
In public key cryptography Elgamal is very secure technique for public networks which is an asymmetric encryption technique. Traditionally this algorithm is used to exchange keys and data over a public network. Using this algorithm the communication between multiple users with enhanced security can be implemented over a network. Further the implementation can be taken out over a simulated network environment.
In public key cryptography RSA is very popular and heavily used technique for public networks which is an asymmetric encryption technique. Traditionally in RSA the two prime numbers are to be chosen and in enhanced RSA there we can take more than two prime numbers which will increase the factorization to enhance complexity and security. Further the implementation can be taken out over a simulated network environment.
Fuzzy logic is currently highly researched and worked upon area where the soft computing principles based techniques are used. This area widely enhanced the scope of Artificial Intelligence so using the principles of this area the game can be developed using some programming language like JAVA, .NET etc.
This project can be implemented as a best security system device. In small scale commerce field such as in schools, colleges it can be used as an attendance system. As and when the student’s face is identified exactly as an authorized student he can enter into the laboratory otherwise if the student does not belong to that school or college and his permission is denied. In medium scale business such as in an organization it can be used as an attendance register of an employee. In large scale b
This software lets to embed important or private messages or files right into uncompressed format files like .BMP Bitmap images, MP3 files etc. There is no loss to the quality of the images or MP3 files as it uses the least significant bits of the file, which are not used by the Image viewer.
The load detection, i.e. detecting of the work load of a person interacting with the application has formed to be necessary. By knowing the work load, it will be helpful for scheduling of the work to the individuals, thus effectively using the resources. The tool which we are developing will be helpful to automatically detect the load and will give a clear visibility to schedule the work.
This project is aimed at developing a packet sniffer on HTTP protocol. This sniffer should be able to monitor and save files transiting over network. The practical purpose of the project is providing monitoring ability for the administrator of a network.
This software works as a windows analyzer and maintain system information like network status, drivers updates, running services, running drivers and handles information of every feature in windows, which will be useful for administrator to easily monitor system status.
Optimization for join queries over a distributed network is a great challenge for current scenario. The main purpose of this research is to optimize the query in such a way so that the records of multiple tables which are distributed over a network can be joined together with minimum effort applied.
Remote Network Administration” is a service offering a full function network, which provides its authorized users with the ability to monitor and manage the connected clients. This software will benefit the administrator in lab to manage the clients.
Scrum is an iterative and incremental Agile software development framework for managing software projects and product or application development. Its focus is on a flexible, holistic product development strategy where a development team works as a unit to reach a common goal as opposed to a traditional, sequential approach. Scrum enables the creation of self-organizing teams by encouraging co-location of all team members, and verbal communication among all team members and disciplines in the pro
This is an advance login system that can be designed in an interactive manner in which a session will take place between the computer and user. Like traditional login system every time we do login to system using username and password. But what if the password get hacked and thus everything can be stolen. To overcome this loophole every time when a user wants to enter into some kind of system then the session will take place between the computer and a set of questions will be asked to the user in a secure manner randomly and if user answers all those questions then the user will be permitted to enter into the system.
Service-oriented architecture (SOA) is a software design and software architecture design pattern based on discrete pieces of software providing application functionality as services to other applications. This is known as Service-orientation. It is independent of any vendor, product or technology. A service is a self-contained unit of functionality, such as retrieving an online bank statement. Services can be combined by other software applications to provide the complete functionality of a large software application. SOA makes it easy for computers connected over a network to cooperate. Every computer can run an arbitrary number of services, and each service is built in a way that ensures that the service can exchange information with any other service in the network without human interaction and without the need to make changes to the underlying program itself.
In this research work the TCP/IP protocol suite can be simulated using any programming language and layer by layer data encapsulation can be done with time analysis. Further the analyzed data can help for enhancing the scope of network models implementations.
A vehicular ad hoc network (VANET) uses cars as mobile nodes in a MANET to create a mobile network. A VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 metres of each other to connect and, in turn, create a network with a wide range. As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicles to one another so that a mobile Internet is created. It is estimated that the first systems that will integrate this technology are police and fire vehicles to communicate with each other for safety purposes. Automotive companies like General Motors, Toyota, Nissan, DaimlerChrysler, BMW and Ford promote this term. In this area for better understanding and analysis purpose the simulation can be designed using socket programming.
A wireless sensor network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The simulation can be developed using socket programming for analysis purpose.

Ask about Project/ Research Work?

Your name (required):

Your contact no. (required):

Your e-mail (required):

Project Title (required):

Your question: