Raspberry Pi Based Reader For Blind

This Project Kit is Available Click on “Buy Now” For Kit Price & Delivery Details This project has been built around Raspberry Pi processor board. It is controlling the peripherals like Camera, speaker and LCD which act as an interface between the system and the user. Optical Character Recognition or OCR is implemented in this […]

Continue reading


University Campus Online Automation Using Cloud Computing

University campus online automation system, is a recruitment system that is beneficial for a college student, college placement faculty and Companies visiting the campus. This software has three login portal, for students, placement faculty and companies visiting the campus. Students will enter all their personal as well as professional while registering themselves into the system. […]

Continue reading


Secure Text Transfer Using Diffie Hellman Key Exchange Based on Cloud

Encryption is the technique of hiding private or sensitive information within something that appears to be nothing be a usual. If a person views that cipher text, he or she will have no idea that there is any secret information. What encryption essentially does is exploit human perception, human senses are not trained to look […]

Continue reading


Intelligent rule-based phishing websites classification Based on URL Features

There are number of users who purchase products online and make payment through e- banking. There are e- banking websites who ask user to provide sensitive data such as username, password or credit card details etc. often for malicious reasons. This type of e-banking websites is known as phishing website. In order to detect and […]

Continue reading


Detecting Data Leaks via Sql Injection Prevention on an E-Commerce

The objective of this project is to prevent SQL injection while firing queries to database and to make the database secured. This system is online so no need of implementation. It can be accessed through internet from anywhere. The system uses SQL Injection mechanism prevention to keep the data safe and secure from sql injection […]

Continue reading