Mini Project Notice for 5th Semester Students (CSE-Core and IT)

The following lists mini-project topics for the students of BTech-CSE(Core) and BTech(IT), 5th semester. Along with the project list name(s) of faculty member is(are) given who would act as the resource person for the topic. Note that you are required to understand, study and implement the topic on your own. The Resource person may only be contacted if you need advice on things like dataset, suitable tools etc. Resource persons will NOT advice you in any way in the coding part, they will also NOT evaluate your projects.

For IBM specializations students there is a separate notice.

Mini Projects will be done individually. No group work is allowed.

Expected Evaluation Date: First week of November. Exact dates of evaluation will be subsequently notified.

Evaluation Panel(s): Will be notified


Serial No 1 to 4 Resource person: Dr Manoj Diwakar

1.       Image tampering detection and analysis: One of the simplest ways of digital image forgery is a copy-move attack. The copy-move process consists of three stages: copy selected image fragment from one place, transform it using some image processing algorithm and paste it to another place of the same image. Two main approaches to copy-move detection exist nowadays: feature-based and hash-based. Most of the algorithms are developed according to the feature-based approach, whereas the hash-based approach is used only for plain copy-move detection (when the copied image fragment is not transformed).  Therefore, we can develop a method which can detect the copy move attack from the images.

2.       Edge preservation based Medical Image denoising: In today era, computed tomography (CT) is one of the exceptionally proficient crucial devices in medical science for the clinical reason. The consistent improvement and broad utilization of computed tomography in medical science has uplifted the harmfulness of higher dose to the patient. Low radiation dose may prompt expanded noise and artifacts, which can influence the radiologists’ judgment. Therefore, we can develop a new method based on new shrinkage function in wavelet domain.

3.       Image security using Reversible Watermarking:  In this project, we propose a novel reversible data hiding scheme, which can exactly recover the original cover image after the extraction of the watermark. The work is based on the histogram bin shifting technique. This work utilizes peak point (maximum point) but unlike the reported algorithms based on histogram bin shifting, we can utilize second peak point instead of zero point (minimum point) to minimize the distortion created by the shifting of pixels

4.       Image Enhancement using multimodality image fusion: As an effective way to integrate the information contained in multiple medical images with different modalities, medical image fusion has emerged as a powerful technique in various clinical applications such as disease diagnosis and treatment planning. In this project, a new multimodal medical image fusion method in wavelet is proposed.

Serial No 5 to 28 Resource person: Dr Preeti Mishra

5.       Design and implement an intrusion detection approach to detect network attacks in virtualization environment. (Only for Cloud and Cyber Security Students)

6.       Data deduplication has been widely used in cloud storage. Implement and analyze A Hybrid Cloud Approach for Secure Authorized Deduplication.

7.       Implement and analyze a security mechanism to ensure data security in Cloud environment (Only for Cloud and Cyber Security Students)

8.       Extract VM related information like number of processes running with their PID and name, address, CPU utilization, number of threads running etc. from hypervisor using LibVMI tool in Xen based system (Only for Cloud Students)

9.       Implement and analyze A Blockchain-Based Access Control System for Cloud Storage.

10.   Cloud-based Android Security System

11.   Implement and analyze Secure File Storage on Cloud Using Hybrid Cryptography.

12.   Develop a framework for automated offloading of the computation intensive applications of their smartphones over to the virtual processing over cloud through its smartphone image online.

13.   Crop disease detection using image processing, IoT and ML.

14.   Implement soft computing techniques like genetic algorithm/neuro-fuzzy to solve any real world problem.

15.   IoT Security: Malware Injection in Raspberry Pi, Detection and Prevention.

16.   Design a system for agriculture to improve the crop productivity.

17.   Web/Mobile based advisory for identification and management of insect pest in agriculture crops

18.   Android app for mobile security based on cloud based analysis and ML.

19.   Implement and analyze any cryptographic algorithm for improving data security.

20.   Use of Artificial Intelligence System for prediction of Highway Status for preventive maintenance.

21.   Centralized research related data management system for GEU.

22.   Malicious Website Detection Hosted in Cloud Environment

23.   Recommendation system for farmers for effective execution of best farming practices.

24.   Implement Intelligent rule-based phishing websites classification Based on URL Features using cloud.

25.   Design and implement algorithm to improve Hypervisor security.

26.   Design and implement algorithm for Docker Security.

27.   Set up Docker and create at least 5 different attack scenarios, implement solutions to at least handle one attack in container-based environment.

28.   Ransomware classification and approach to detect this attack.

Serial No 29 to 30 Resource person: Kireet Joshi

29.   PDF viewer and editor with offline dictionary

30.   Sentimental analysis (twitter/facebook)

Serial No 31 to 32 Resource person: Vishu Tyagi

31.   Online College Voting System: This system provides an online tool for the students to vote on different questions posted by admin. In this system, there will be two main pages to be able to access: Admin page and user Page.

From the Admin, page administrator will be able to design the voting application and upload new questions on different topics which are relevant to college students. From the Voting page, the user will be able to view all questions and vote for the interesting question.

According to the login credentials, the system will determine if the user is Administrator or the user and open the pages given access to the user credentials.

Operating system: Windows

Tool: Netbeans

Language: Java

Database: MYSQL

32.   Stock Management System Android App: Stock Management System is software which is helpful for the businesses operate stores, where   store owner keeps the records of purchase. This project eliminates the paperwork, human faults, manual delay and speed up the process.

Stock Management System will have the ability to track overall worth and available
stock. This is simple, fast and intelligent Stock management that can be used by anyone who has a smartphone.


“Stock Management System” can be used in small stores for keeping track of stock easily and save the time.

Tool/Language:  Android SDK 2.3  and above

Serial No 33 to 34 Resource person: Vikas Tomar

33.   Data on maximum & minimum performing public health facilities on selected data items across sub districts of Uttarakhand (Nainital and Hardwar) is available in Use the CSV files available for all the different months of  a particular year (say 2015-16) and create a visualization dashboard.

34.   Take any dataset related to Covid-19 and create a Visualization dashboard

Serial No 35 to 161 Resource person: Dr Sachin Sharma

35.   Design and implement an intrusion detection approach to detect network attacks in a virtualization environment. (Only for Cloud and Cyber Security Students)

36.   Data deduplication has been widely used in cloud storage. Implement and analyze A Hybrid Cloud Approach for Secure Authorized Deduplication.

37.   Design and implement an IoT based Smart Water Monitoring System. The data used in the system is sent to the cloud for storage and analysis.

38.   Implement and analyze a security mechanism to ensure data security in the Cloud environment (Only for Cloud and Cyber Security Students)

39.   Extract VM related information like number of processes running with their PID and name, address, CPU utilization, number of threads running etc.from hypervisor using LibVMI tool in Xen based system.

40.   Implement and analyze any two cloud resource scheduling algorithms using CloudSim tool.

41.   Implement and analyze A Blockchain-Based Access Control System for Cloud Storage.

42.   Implement and analyze a blockchain technology in Java.

43.   Implement and analyze Secure File Storage on Cloud Using Hybrid Cryptography.

44.   Develop a framework for automated offloading of the computation intensive applications of their smartphones over to the virtual processing over cloud through its smartphone image online.

45.   Implement Secure Text Transfer Using Diffie Hellman Key Exchange Based on Cloud.

46.   Implement Intelligent rule-based phishing websites classification Based on URL Features using the Azure cloud.

47.   Design and implement a DDoS detection mechanism in the cloud environment. (Only for Cloud and Cyber Security Students)

48.   Develop Android Offloading Computation Over Cloud

49.   Design Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud

50.   Develop the Optimization of Tasks in Cloud Computing Based on MAX-MIN, MIN-MIN and Priority

51.   Develop the Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

52.   Develop the Efficient Client-side Deduplication of Encrypted Data with Public Auditing in Cloud Storage

53.   Develop Adaptive Encrypted Cloud Storage Model

54.   Develop Access control by signature - the key to providing privacy for cloud and Big Data

55.   Implementation of Secure and Efficient Cloud Computing Framework

56.   Implementation of Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing (Only for Cloud and Cyber Security Students)

57.   Implementation of IFCaaS: Information Flow Control as a Service for Cloud Security (Only for Cloud and Cyber Security Students)

58.   Implementation of Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

59.   Implementation OF DNA cryptography in cloud computing and using socket programming

60.   Implementation of Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control

61.   Implementation of Performance-Oriented Deployment of Streaming Applications on Cloud

62.   Implementation of Smart Grid Solution for Charging and Discharging Services Based on Cloud Computing Scheduling

63.   Implementation Towards Approximating the Mean Time to Failure in Vehicular Clouds

64.   Implementation of Linked Semantic Model for Information Resource Service towards Cloud Manufacturing

65.   Development of Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing

66.   Implementation of Strategic Trust in Cloud-Enabled Cyber-Physical Systems with an Application to Glucose Control

67.   Implementation of Online Learning for Offloading and Autoscaling in Energy Harvesting Mobile Edge Computing

68.   Implementation of Flexible Container-Based Computing Platform on Cloud for Scientific Workflows

69.   Implementation of Machine Learning with Sensitivity Analysis to Determine Key Factors Contributing to Energy Consumption in Cloud Data Centers

70.   Implementation of Cost-Efficient Provisioning Strategy for Multiple Services in Distributed Clouds

71.   Implementation of An Anomalous Behavior Detection Model in Cloud Computing

72.   Implementation of Cryptographic Public Verification of Data Integrity for Cloud Storage Systems

73.   Implementation of Deleting Secret Data with Public Verifiability

74.   Development of Secure Cloud Storage Which Meets with Secure Network Coding

75.   Implementation of Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization

76.   Implementation of Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

77.   Implementation of A Hybrid Cloud Approach for Secure Authorized Deduplication

78.   Implementation of the Security of Data Access Control for Multi authority cloud storage systems

79.   Implementation of Cost-Effective Authentic and Anonymous Data Sharing with forwarding Security

80.   Implementation of Task Scheduling in Cloud Computing

81.   Implementation of An Optimized Task Scheduling Algorithm in Cloud Computing

82.   Implementation of Attribute-Based Access Control for Multi-Authority with constant size ciphertext in Cloud Computing

83.   A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack

84.   Implementation of Privacy-Preserving Detection of Sensitive Data Exposure

85.   Implementation of A Secure Client Side Deduplication Scheme in Cloud Storage Environments

86.   Implementation of Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

87.   Implementation of On the Security of a Public Auditing Mechanism for Shared Cloud Data Service

88.   Implementation of Secure Auditing and Deduplicating Data in Cloud

89.   Implementation of An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

90.   Implementation of Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds

91.   DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

92.   Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

93.   EasySMS: A Protocol for End-to-End Secure Transmission of SMS

94.   Implementation of Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

95.   CloudMoV: Cloud-based Mobile Social TV

96.   Implementation of A packet marking the approach to protect cloud environment against DDoS attacks

97.   Implementation of Load Balancing for Privacy-Preserving Access to Big Data in Cloud

98.   KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data

99.   Implementation of Cost Minimization for Big Data Processing in Geo-Distributed Data Centers

100.                       Implementation of Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework

101.                       Implementation of ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application

102.                       Implementation of A Load Balancing Model Based on Cloud Partitioning

103.                       Implementation of Identity-Based Encryption with Outsourced Revocation in Cloud Computing

104.                       Implementation of An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments

105.                       Implementation of Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification

106.                       Implementation of Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates

107.                       Implementation of Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

108.                       Implementation of Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud

109.                       Implementation of Toward Efficient and Privacy-Preserving Computing in Big Data Era

110.                       Implementation of Privacy Preserving Data Analytics for Smart Homes

111.                       Implementation of Load Rebalancing for Distributed File Systems in Clouds

112.                       Implementation of Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

113.                       Implementation of A Secure Client Side Deduplication Scheme in Cloud Storage Environments

114.                       Implementation of Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

115.                       Implementation of Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

116.                       Implementation of CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

117.                       Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing

118.                       Implementation of An Improved Mutual Authentication Framework for Cloud Computing

119.                       Implementation of Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

120.                       Implementation of NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds

121.                       Implementation of Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

122.                       Using Location-Based Encryption to Improve the Security of Data Access in Cloud Computing

123.                       Implementation of C-MART: Benchmarking the Cloud Parallel and Distributed Systems

124.                       Implementation of Pre-emptive scheduling of online real-time services with task migration for cloud computing

125.                       Toward Secure Multi keyword Top-k Retrieval over Encrypted Cloud Data

126.                       Implementation of Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

127.                       Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization

128.                       Implementation of HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

129.                       Implementation of Secure Logging As a Service—Delegating Log Management to the Cloud

130.                       Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing

131.                       Development of Privacy-Preserving Public Auditing for Secure Cloud Storage

132.                       Cloud-IoT Based Smart Camera using AI

133.                       Cloud based Air Pollution Meter using AI

134.                       Cloud based Home Automation using AI

135.                       Cloud based Wireless Video Surveillance Robot using AI

136.                       Cloud based Smart Garage Door using AI

137.                       Cloud based Automated Blinds using AI

138.                       Cloud based Humidity and Temperature monitoring using AI

139.                       Cloud based Baggage Tracker using AI

140.                       Cloud based Smart Trash Collector using AI

141.                       Cloud based Sign To Speech Using Internet of Things and AI

142.                       Cloud based IoT Home with Hindi Voice Commands using Google Assistant & ESP32

143.                       Cloud based IoT and Touch-Based Home Automation using AI

144.                       Cloud based Smart Alarm Clock using AI

145.                       Cloud based Liquid Level Monitor using AI

146.                       Cloud based Smart Office System using AI

147.                       Cloud based Facial Recognition Door using AI

148.                       Cloud based Temperature logging system using AI

149.                       Cloud based Industry Automation using AI

150.                       Cloud based IoT Pet Feeder using AI

151.                       Alexa Based Smart Home Monitoring using AI

152.                       Cloud based Traffic Light Information System using AI

153.                       Cloud based Plant Communicator using AI

154.                       Cloud based Smart Compost System using AI

155.                       Cloud based Finite state machine using AI

156.                       Cloud based autonomous GPS tracker using AI

157.                       Cloud based Indoor Self Watering Planter using AI

158.                       Cloud based Trash Can Talker using AI

159.                       Cloud based IoT Water Leakage Indicator using AI

160.                       Cloud based Smart Lock Box using AI

161.                       Cloud based Smart Greetings using AI

Serial No 162 to 165 Resource person: Ankit Tomar

162.                       Urban Growth Analysis using machine learning in remote sensing

163.                       Object Counting from unseen images using machine learning algorithms

164.                       Recognition of Hand Movement for Paralytic Persons Based on a Neural Network

165.                       High-Speed Face Recognition Based on RBF Neural Networks and Discrete Cosine Transform.

Serial No 166 Resource person: Manish Mahajan

166.                       Topic : Outlier analysis using metaheuristics

Involves detection of outliers from datasets and optimization of the process by using metaheuristics. The datasets can cover a wide variety of areas like medicine, finance, pollution etc.

Broad Area : Data Mining

Language : Python/R/Matlab

Serial No 167 to 170 Resource person: Dr Santosh Kumar

167.                       Overview: Postman is currently one of the most popular tools used in API testing. Accessibility, Use of Collections, Collaboration, Continuous Integration, are some of the Key features to learn in Postman. It's recommended you create an account in Postman, so your collections are available online. You can create Tests to verify a postman request. Collections can be run using Newman or Collection Runner.

Problem: Design an API to view the Network request details for API calls using POSTMAN Tools.

168.                       Overview: A graph database is a database designed to treat the relationships between data as equally important to the data itself. It is intended to hold data without constricting it to a pre-defined model.

Problem: Visualization of personal data and analysis for privacy and risk compliance with graph data model.

Prerequisites: Familiar with the relational database model and understand the basics of the property-graph model

Tool: Neo4j

Language: Cypher Query Language, NoSQL

169.                       Problem: Unlocking Complex data for fraud investigation using Neo4j tool Prerequisites: Familiar with the relational database model and understand the basics of the property-graph model

Tool: Neo4j

Language: Cypher Query Language, NoSQL

170.                       Problem: Fraud Detection and analysis using graph data model

Prerequisites: Familiar with the relational database model and understand the basics of the property-graph model

Tool: Neo4j

Language: Cypher Query Language, NoSQL

Serial No 171 to 173 Resource person: Hemant Pokhriya

171.                       Land cover classification of satellite data by developing optimized machine learning algorithm.

172.                       Effect of urbanization on other land cover classes such as agriculture, forest, water bodies etc.

173.                       To forecast future pattern of land cover classes by using time series analysis of digital image.

Sl no 174 is a website redesign project for the Departmental site.  Resource person: Manish Sharma

174.                       Department Website( Redesign Project:

Redesign Goals:

i)                    Improve the website user experience so that visitors can find information quickly and easily. Implement a robust search engine for the site.

ii)                   Improve design consistency. This includes providing multiple template options.

iii)                 Migrate current passive websites to a more active and engaging web environment. This includes the ability to create communities, integrate social media content into the website content, utilize more HTML5, etc

iv)                 Implement a section with registration, login and interactive features for various technical clubs.

v)                   Improve the web editing capabilities so that web editors can create and maintain websites with less effort.

vi)                 Create a more robust and scalable mobile web environment using responsive web design.

vii)               Leverage website as a marketing tool.


Sl no 175 and 176 Resource person: Akshay Rajput

175.           Heart Disease Prediction System

176.           Smart Healthcare System