admin

Data Duplication Removal Using File Checksum

Download Project Document/Synopsis Data duplication technology usually identifies redundant data quickly and correctly by using file checksum technique. A checksum can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks of data that have been …

Data Duplication Removal Using File Checksum Read More »

High Security Encryption Using AES & Visual Cryptography

Download Project Document/Synopsis A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need a system that automatically translates …

High Security Encryption Using AES & Visual Cryptography Read More »

A New Hybrid Technique For Data Encryption

Download Project Document/Synopsis Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and …

A New Hybrid Technique For Data Encryption Read More »

Zigbee Based Room Temperature Controller Project

Download Project Document/Synopsis As the outside temperature varies, it may affect our room temperature. So there is a need for technique to control the temperature of the room even if the outside temperature varies. Our project Zigbee based Room Temperature Controller Using Atmega Microcontroller overcomes this problem. In this project there are two board having …

Zigbee Based Room Temperature Controller Project Read More »