Академический Документы
Профессиональный Документы
Культура Документы
Java Projects
KNOWLEDGE AND DATA ENGINEERING / DATA MINING
Sno
TITLE
2009
2009
2008
2008
Query
Processing
Year
for
Video
Subsequence
2010
2009
2009
2008
2008
Image Processing
1
0
1
1
2003
2004
Mobile Computing
1
2
1
3
2009
2008
14
2008
2008
2008
2008
1
5
1
6
1
7
1
8
2006
1
9
An
2007
2
0
Acknowledgment-Based
Misbehavior In Mantes
Approach
For
The
Detection
Of
Routing
2007
NETWORKING
21
2010
2
2
2009
2
3
2009
2
4
2
5
2
6
For
Node
Id
Assignment
In
2009
2009
2008
27
2008
28
2008
29
2008
30
2008
31
2008
32
2008
33
2008
34
2008
35
2004
36
2008
SOFTWARE ENGINEERING
3
7
2008
2009
3
9
2009
2009
2008
2008
2008
2007
4
0
4
1
4
2
4
3
4
4
4
5
4
6
2007
2005
2009
4
8
2009
4
9
2009
5
0
2008
5
1
Over
2007
5
2
2004
Precise Termination
Algorithm
Condition
Of
The
Weighted
Probalastic
Signature
Packet
Marking
Generation
Fashion Studios
Smart City
Web Crawler
10
11
12
Adxpress
13
Boardwalk
14
Cotelligent
15
Ezeemerchant
16
Loan Amortizer
17
Transport Plus
18
21
E-School
22
23
Web Shop
24
Web Forum
25
E-Talk
27
28
29
31
E-Banking
32
34
Tutelage Imprinter
35
Easy Journey
36
Protocol Scrubbing
2.
3.
4.
Hop By Hop
5.
6.
Network Analyzer
Visual Cryptography
10
11
JBrowser
12
13
Webs Eye
14.
Web Extractor
15
16.
Visual Editor
17.
Stegohider
18.
Embedding Data Into Video File With Less Distortion Using Lsb Technique
19.
20.
Http Server
21.
22.
Image Compression
23.
24.
25.
26.
Bank System
27.
28.
29
30
Web Importer
31
Atm Simulator
32
33
Extreme Pc
34
1.
2.
3.
4.
MEASUREMENT
A PRECISE TERMINATION CONDITION OF THE PROBALASTIC PACKET
MARKING ALGORITHM
5.
6.
7.
8.
SHORTEST PATH
USING THE CONCEPTUAL COHESION OF CLASSES FOR FAULT
9.
10.
PROVIDERS ON WEB
LOCATION BASED SPATIAL QUERY PROCESSING IN WIRELESS
11.
12.
13.
14.
BROADCAST ENVIRONMENTS
BANDWIDTH ESTIMATION FOR IEEE 802.11 BASED ADHOC NETWORK
MODELING & AUTOMATED CONTAINMENT OF WORMS
BENEFIT-BASED DATA CACHING IN AD HOC NETWORKS
CONSTRUCTING INTER-DOMAIN PACKET FILTERS TO CONTROL IP
15.
16.
APPROACH
PROTECTION OF DATABASE SECURITY VIA COLLABORATIVE
17.
INFERENCE DETECTION
DUAL-LINK FAILURE RESILIENCY THROUGH BACKUP LINK MUTUAL
18.
19.
20.
EXCLUSION
ACTIVE LEARNING METHODS FOR INTERACTIVE IMAGE RETRIEVAL
SECURITY IN LARGE MEDIATOR PROTOCOLS
A SIGNATURE BASED INDEXING METHOD FOR EFFICIENT CONTENT
21.
22.
23.
24.
25.
26.
27.
view
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Distributed cache updating for the Dynamic source routing protocol
An Adaptive Programming Model for Fault-Tolerant Distributed Computing
Face Recognition Using Laplacian faces
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic
28.
Algorithm
A Distributed Database Architecture for Global Roaming in Next-Generation
29.
30.
31.
Mobile Networks
Noise Reduction by Fuzzy Image Filtering
A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous
32.
Internet Episodes(HIDS)
Network border patrol: preventing congestion collapse and promoting fairness in
33.
34.
the Internet
Application of BPCS steganography to wavelet compressed video
An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior
35.
36.
37.
38.
39.
40.
In Mantes
Homogenous Network Control and Implementation
Neural Networks for Unicode Optical Character recognition
A BGP based mechanism for lowest cost routing
Training based numeric character reorganization using neural networks
An Algorithmic approach to identify network link failures
Detection of misbehavior in MANATES
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
135.
136.
137.
138.
139.
140.
141.
142.
143.
144.
145.
146.
147.
148.
149.
150.
Web Importer
Work Flow Management System
Performance Evolution of RMI
Network Management Tool
Courier Information System*
ATM Simulator
High Speed Download Manager
SECURE COMMUNICATION USING IDEA
Integrating Speech Engine With Web Navigator
ATM Networks and Intelligent Packet Filtering
Voice Doc
Net Banking
Video Library
Distributed File Editor Project
Student Project Allocation and Management with Online Testing
Elliptic curve Cryptography
AdXpress
Boardwalk
Cotelligent
Ezeemerchant
Loan Amortizer
Transport Plus
E-School
Organizational internal survey
Web Forum
RSFS
E-talk
Project Automation System
Hotel Management System*
Extreme PC
Customer Flow Management*
Transportation System on IDS
Electronic Care
Web Traffic Analyzer*
Mega Mart Ad Release Management*
Cricket Game in java
E-Banking
Bus Scheduling and Dispatching
Vertical Search Engine
Existing System:
Proposed System:
HARDWARE SPECIFICATION
Processor
Ram
Hard Disk
Input device
Output device
SOFTWARE SPECIFICATION
Operating System
Pages developed using
Techniques
Web Browser
Data Bases
Client Side Scripting
: Windows Family.
: Java Server Pages and HTML.
: Apache Tomcat Web Server 5.0, JDK 1.5 or higher
: Microsoft Internet Explorer.
: SQlServer 2000
: Java Script
HARDWARE SPECIFICATION
Processor
Ram
Hard Disk
Input device
Output device
SOFTWARE SPECIFICATION
Operating System
Pages developed using
Techniques
Web Browser
Data Bases
Client Side Scripting
: Windows Family.
: Java Server Pages and HTML.
: Apache Tomcat Web Server 5.0, JDK 1.5 or higher
: Microsoft Internet Explorer.
: SQlServer 2000
: Java Script
short query clip from a long video sequence, has not been well
addressed.
It is often undesirable to manually check whether a video is part
of a long stream by browsing its entire length.
Proposed System:
Video subsequence identification involves locating the position of
the most similar part with respect to a user-specified query clip Q from
a long pre stored video sequence S. Ideally; it can identify relevant
video, even if there exists some transformation distortion, partial
content reordering, insertion, deletion, or replacement. Sub sequence
identification task aims at finding if there exists any subsequence of a
long database video that shares similar content to a query clip.
Modules:
1. Video Copy Detection
2. Video Similarity Search
Module Descriptions:
Video Copy Detection
Extensive research efforts have been made on extracting and
matching content-based signatures to detect copies of videos. In their
work, query sequence slides frame by frame on database video with a
fixed length window. Since the process of video transformation could
give rise to several distortions, techniques circumventing these
variations by globe signatures have been considered. They tend to
depict a video globally rather than focusing on its sequential details.
Some properties that are likely to be preserved even with these
variations (e.g., shot length information) were suggested to be
generated as compact signatures and string matching technique could
be used to report such a copy. However, this method is only applicable
for queries which consist of multiple shots.
Video Similarity Search
The methods mentioned above only have been designed to
detect videos of the same temporal order and length. To further search
videos with changes from query due to content editing, a number of
algorithms have been proposed to evaluate video similarity. To deal
with inserting in or cutting out partial content, here used dynamic
programming based on ordinal measure of re sampled frames at a
uniform sampling rate to find the best match for different length video
sequences.
We investigate sub sampled frame-based matching and take
average inter frame similarity into account as well as the factors of
temporal order, frame alignment, gap, and noise for accurate
identification. An efficient heuristic method is devised to aggregate the
scores of different factors for directly deriving the most similar
subsequence according to this overall video similarity measure,
without enumerating all combinations.
Software Requirements
Microsoft Windows XP Professional
JDK 6.0
JMF 2.0.1
Hardware Requirements
Pentium 4 processor
1 GB RAM
80 GB Hard Disk Space
the index part of the next item in the same sequence segment, and the physical
address in the row of the next item in the same sequence segment. The entries of the
sequence segments with items are done as follows: the given sequence is read, the
location of the first item in the sequence is sought and an entry to its sequence array is
added that holds the location of the next item in this sequence. For the second time
the same process occurs, in which an entry in the inverted matrix of the second item
is added to hold the location of the third item in the sequence. Table 1 shows the
inverted matrix of the sample sequence ABCDBDACDBACBDCDABCD.
ABSTRACT
E-commerce is a related concept of data mining technologies and the realization
process of data mining techniques are described. Combine data mining and guide features
of e-shopping site, study intelligent shopping guide system based on data mining. Use
data mining technology to guide customers to buy goods or to provide recommendations
in order to provide higher quality services. We take the specific case as study object, we
use data mining techniques to analyze and propose solutions.
The use of data mining provide users with intelligent guide and make users easy
in the range of goods which not only save user browsing net and considering time, but
also provide users with a good proposal to allow the user to get the appropriate selection
of goods, is a kind of high-quality services.
Existing System
Ecommerce can be achieved by a variety of electronic means of communication
such as phone or fax. But now people are exploring e-commerce based on EDI
(electronic data interchange) and the internet. Particularly as internet technology has
become more sophisticated, real development of ecommerce will be built on the
internet technology. So there were some people who take e-commerce as IC (internet
commerce).E-commerce refers to the network as the carrier, the use of digital
electronic means to carry out business activities. With the developing of internet
technology and the Web technology, various types of e-commerce sites are coming
out. It is not difficult to establish e-commerce sites, but to obtain economic and social
benefits. On the e-commerce web site, there may be millions of on-line transactions,
generating a large number of documents and records of the registration form every
day. Ecommerce companies are faced with a wealth of data, lack of knowledge of
embarrassment.
Proposed System
E-commerce has changed people's consumption style, there have been a variety of
online stores and Web sites devoted to business, consumers can also buy desirable
commodity in homes, but a growing number of similar sites, and also to choose more and
more, the face of online shopping, people often will fall into the plight of choice,
especially choice of gifts, it is more difficult to select one satisfaction and newer. In real
life, when I do not know how to choose, friends or other people as a guide, advise, but
not on the Internet. Are there any web site can provide a service as user's guide this
election?
Smart guide realization of the program: the gift network establish a specialized
section help you to choose gift, set up a number of multi-issue election, according to
prompt the user answer, such as human sex, love, what kind of gifts they had received,
and so on, these data will be connected to the database, using data mining to analyze the
data, be able to find what kind of gifts send more appropriately, and then return a result to
the user, help users make a decision. To achieve this function is to establish a model:
study relationship between all information and gifts user chosen.
Software requirements:
Operating System: Windows 2000/XP
Front end: Dot net
Documentation: MS - Word XP
Designing: Star UML
Backend: SQL
Hardware requirements:
CPU: Pentium IV
RAM: 512MB.
Hard Disk: 40GB.
Monitor: SVGA Color Monitor.
Keyboard: 108 Standards.
Mouse: Logitech scroll mouse.
Existing System:
These two approaches identifying important web pages that users are
interested in, Unfortunately, the popularity of web pages does not
necessarily lead to accuracy of information
We formulate the Veracity problem about how to discover true facts from
conflicting information.
5.4.3. Disadvantage:
5.4.4. Advantage:
6. System Requirements:
6.1. Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CDDRIVE
KEYBOARD
MOUSE
:
:
:
:
:
:
:
6.2. Software:
FRONT END
TOOL USED
OPERATING SYSTEM
BACK END
Existing System
Proposed System
we develop a model for evaluating collaborative inference based on the query
sequences of collaborators and their task-sensitive collaboration levels.
A mechanism that propagates update to the user history files to ensure that no
query is rejected based on the outdated information.
To reduce the time in examining the entire history login computation inference.
System Requirements:
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CD-DRIVE
KEYBOARD
MOUSE
:
:
:
:
:
:
:
Software:
FRONT END
Back End
OS
IDE
: JAVA(SWING)
: SQL Server
: Windows Xp SP2
: NetBeans 6.5, JFrameBuilder
Existing System:
Query response does not perform well if query
patterns change.
Because it uses static query workload.
Its performance may degrade if the database size
gets increased.
Tradition feature selection technique may offer less
or no data pruning capability given query attributes.
Proposed System:
We develop a flexible index selection frame work to
achieve static index selection and dynamic index
selection for high dimensional data.
A control feedback technique is introduced for
measuring the performance.
Through this a database could benefit from an index
change.
Software requirements:
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
FLOPPY DRIVE
CDDRIVE
:
:
:
:
:
:
PENTIUM IV 2.6 GHz
512 MB DD RAM
15 COLOR
20 GB
1.44 MB
LG 52X
Software:
Front End
:
Back End
:
Tools Used
:
Operating System
J2EE(JSP)
MS SQL 2000
JFrameBuilder
:
WindowsXP
EXISTING SYSTEM:
Categorization based Network monitoring (Auto Focus) techniques.
Traffic matrix: The aim of traffic matrix measurement is to estimate the volume of
traffic between origin and destination points in the network for capacity planning.
Traffic volume: The aim of traffic volume measurement is to determine the total
traffic sent or received in a network. Of particular interest is the problem of
measuring network usage of customers.
Traffic dynamics: The aim of monitoring traffic dynamics is to measure the temporal
variation in Internet traffic.
Traffic mixture: when traffic volume data is aggregated over time, it can reveal
important features of network usage for performance and security management.
Deficiency of an Existing System:
It does not has Hierarchical Classification
DOS Attacker cannot be Found
No Intimation for any violation
PROPOSED SYSTEM:
Processor
Hard Disk
Ram
:
:
:
:
:
:
Windows XP Professional.
Java 1.6 (Swings ,AWT ,Sockets)
SQL Server 2000
Software Requirements:
Operating system
Language Used
Database
Hardware specifications:
Processor
:
RAM
Hard disk
CD drive
Floppy drive
Monitor
Keyboard
Mouse
Intel Processor IV
:
:
:
:
:
:
:
Software Specification
Operating System
Language used
128 MB
20 GB
40 x Samsung
1.44 MB
15 Samtron color
108 mercurykeyboard
Logitech mouse
:
:
Windows XP/2000
J2sdk1.4.0
video
Abstract
Hardware specifications:
Processor
:
RAM
Hard disk
CD drive
Floppy drive
Monitor
Keyboard
Mouse
Intel Processor IV
:
:
:
:
:
:
:
Software Specification
Operating System
Language used
128 MB
20 GB
40 x Samsung
1.44 MB
15 Samtron color
108 mercurykeyboard
Logitech mouse
:
:
Windows XP/2000
J2sdk1.4.0
We show that even though mobile networks are highly unpredictable when
viewed at the individual node scale, the end-to-end quality-of-service (QoS) metrics can
be stationary when the mobile network is viewed in the aggregate. We define the
coherence time as the maximum duration for which the end-to-end QoS metric remains
roughly constant, and the spreading period as the minimum duration required to spread
QoS information to all the nodes.
We show that if the coherence time is greater than the spreading period, the endto-end QoS metric can be tracked. We focus on the energy consumption as the end-to-end
QoS metric, and describe a novel method by which an energy map can be constructed and
refined in the joint memory of the mobile nodes.
Finally, we show how energy maps can be utilized by an application that aims to
minimize a node's total energy consumption over its near-future trajectory.
MODULES:
In this project we concentrated on main three modules these are
1. Node Module
2. Energy Calculation
3. Time Calculation
1. Node Module
Here we have taken totally five nodes called node A, Node B, Node C,
Node D from these nodes we can transfer data to destination node whish one is
six node after receiving the data in that node data will be displayed
2. Energy calculator
In this module we can calculate the energy values which is used by nodes to
receive the data this is the main important thing for our project which is going to
calculate the energy.
3. Time calculation
In this Module we are going to calculate time duration which is related to data
receiver
EXISTING SYSTEM:
In mobile networking previously if we want to transfer some information
from one place to fixed base station it will taking lot of energy. For this till now
we are using proactive and reactive routing. We can send limited information only
that to using a huge energy and one more important thing is still now we are not
using end-to-end metrics.
Deficiency of an Existing System:
PROPOSED SYSTEM:
Application that aims to minimize a nodes total energy consumption over its
near-future trajectory. our aim is to transfer information from location to a fixed base
station BS with minimum energy through a mobile network in which the node buffers are
not congested. we focus on paths through space, and the nodes are taken to be
interchangeable, and we aim to associate a QoS metric with the physical path through
space. Our aim will be to minimize the total energy consumption.
Processor
Hard Disk
Ram
:
:
:
:
:
Windows XP Professional.
Java 1.6 (Swings ,AWT ,Sockets)
Software Requirements:
Operating system
Language Used
Intrusion Detection in
Homogeneous and Heterogeneous
Wireless Sensor Networks
Abstract:
Existing System:
1 In single-sensing detection, At a time only one intruder detected
by the wsn.
2 Our Previous work was according to homogeneous and
heterogeneous single sensor in wireless sensor network
.
Proposed System:
1 In Heterogeneous wireless sensor ,Intruder detected anywhere in
the network.
2. We are detecting the intruder in multiple sensor heterogeneous
wireless sensor network.
Disadvantage:
1 The sensed information provided by a single sensor might
be inadequate for recognizing the intruder.
2 So that there is no guarantee for our information has been
sent securely.
3. Data will not routed if primary detector fails.
Advantage:
1 If primary detector fails another detector detect the intruder.
2 By finding the intruders we can send our information in a secured
manner.
System Requirements:
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CDDRIVE
KEYBOARD
MOUSE
Software:
FRONT END
: Java
TOOL USED
: JFrameBuilder
OPERATING SYSTEM : Windows Xp
path protocol extension that uses threshold cryptography to implement the key
management system. It requires some nodes to function as servers and an authority to
initialize these servers. Zapata and Asokan propose SAODV a secure version of AODV,
which uses digital signatures and hash chains to secure the routing messages. Pissinou et
al. propose a trust-based version of AODV using static trust levels. The same authors
then extend this protocol to thwart multiple colluding nodes. Neither of these address
securing the trust exchanges, or the overhead involved. Li et al. introduce a trust-based
variant of AODV] that secures the trust information. However, their protocol requires an
intrusion detection system in the network. Finally, Meka et al. propose a third trusted
AODV with a simple method of evaluating trust even without source routing. Our work
in this paper considers the asymmetric cryptography and trust-based extensions to AODV
presented and shows a real world comparison of the performance of the two protocols.
Our results suggest that new protocols can be developed which take advantage of the best
features of both types of protocols, and which share aspects of each security model.
Hardware Interface
Hard disk
: 40 GB
RAM
: 512 MB
Processor Speed : 3.00GHz
Processor
: Pentium IV Processor
Lan set up for 4 systems (min)
Software Interface
JDK 1.5
Java Swing
Existing System
Proposed System
Hardware Interface
PROCESSOR
RAM
:
MONITOR
:
HARD DISK
KEYBOARD
MOUSE
:
:
PENTIUM IV 2.6 GHz
512 MB DD RAM
15 COLOR
: 40 GB
: STANDARD 102 KEYS
3 BUTTON
Existing System:
The ad hoc networking community assumes that the underlying
wireless technology is the IEEE 802.11 standard due to the broad
availability of interface cards and simulation models.
This standard has not been targeted especially for multihop ad
hoc operation, and it is therefore not perfectly suited to this type.
Proposed System:
In this system they are using 802.11 MAC layer to evaluate the
correct bandwidth.
This method combines channel monitoring to estimate each
nodes medium occupancy.
Probabilistic combination of the values is to account for
synchronization between nodes, estimation of the collision
probability between each couple of nodes, and variable
overheads impact estimation.
This
mechanism
only
requires
one-hop
information
communication and may be applied without generating a too
high additional overhead.
We show the accuracy of the available bandwidth measurement
through NS-2 simulations.
These results show that single-hop flows and multihop flows are
admitted more accurately, resulting in a better stability and
overall performance.
System Requirements
Hardware:
PROCESSOR
: PENTIUM IV 2.6 GHz
RAM
: 512 MB DD RAM
MONITOR
: 15 COLOR
HARD DISK
: 20 GB
FLOPPY DRIVE : 1.44 MB
CDDRIVE
: LG 52X
KEYBOARD
: STANDARD 102 KEYS
MOUSE
: 3 BUTTONS
Software:
Front End
Back End
Tools Used
: Java, Swing
: MS Access
: JFrameBuilder
ABSTRACT
Data caching can significantly improve the efficiency of information
access in a wireless ad hoc twork by reducing theaccess latency and
bandwidth usage. wever, designing efficient distributed caching
algorithms is ontrivial when network nodeshave limited memory. In
this article, we consider the cache placement problem of nimizing total
data access cost in ad hoc networkswith multiple data items and nodes
with limited memory pacity. The above optimization problem is known
to be NP-hard. Definingbenefit as the reduction in total access cost, we
present a polynomial-time centralized approximation algorithm that
provably delivers asolution whose benefit is at least 1/4 (1/2 for
uniform-size data items) of the optimal benefit. The approximation
algorithm is amenableto localized distributed implementation, which is
shown via simulations to perform close to the approximation lgorithm.
Our distributedalgorithm naturally extends to networks with mobile
nodes. We simulate our distributed algorithm using a network
simulator (ns2) anddemonstrate that it significantly outperforms
another existing caching echnique (by Yin and Cao [33]) in all
important performancemetrics. The performance differential is
particularly large in more challenging scenarios such as higher access
frequency and smaller
Software requirements:
Operating System: windows 2000/NT
ABSTRACT
On-demand routing protocols (DSR), use route caches to make routing decisions. Due to
mobility, cached routes easily become stale. The goal of the project is to proactively
disseminating the broken link information to the nodes that have that link in their caches. It
defines a new cache structure called a cache table and presents a distributed cache algorithm.
Each node maintains in its cache table the information necessary for cache updates. When a link
failure is detected, the algorithm notifies all reachable nodes that have cached the link in a
distributed manner. It concludes that proactive cache updating is the key to the adaptation of ondemand routing protocols to mobility.
ll
3 Hardware Requirements
Hard disk
RAM
Processor Speed
Processor
3.4.4 Software Requirements
JDK 1.5
Java Swings
MS-Access
:
:
:
:
40 GB
512 MB
3.00GHz
Pentium IV
Abstract
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes
(hosts) which communicate with each other via wireless links either directly or relying on
other nodes as routers. The operation of MANETs does not depend on pre-existing
infrastructure or base stations. Network nodes in MANETs are free to move randomly.
Therefore, the network topology of a MANET may change rapidly and unpredictably. All
network activities, such as discovering the topology and delivering data packets, have to
be executed by the nodes themselves, either individually or collectively. Depending on its
application, the structure of a MANET may vary from a small, static network that is
highly power-constrained to a large-scale, mobile, highly dynamic network.
There are two types of MANETs: closed and open. In a closed
MANET, all mobile nodes cooperate with each other toward a common goal, such as
emergency search/rescue or military and law enforcement operations. In an open
MANET, different mobile nodes with different goals share their resources in order to
ensure global connectivity. However, some resources are consumed quickly as the nodes
participate in the network functions. For instance, battery power is considered to be most
important in a mobile environment. An individual mobile node may attempt to benefit
from other nodes, but refuse to share its own resources. Such nodes are called selfish or
misbehaving nodes, and their behavior is termed selfishness or misbehavior.
(electronic) currency or similar payment system may be set up. Nodes get paid for
providing services to other nodes. When they request other nodes to help them for packet
forwarding, they use the same payment system to pay for such services
The main problem with credit-based schemes is that they usually
require some kind of tamper resistant hardware and/or extra protection for the virtual
currency or the payment system.
2) Reputation-Based Schemes:
The second category of techniques to combat node misbehavior in
MANETs is Reputation Based. In such schemes, network nodes collectively
detect and declare the misbehavior of a suspicious node. Such a declaration is
then propagated throughout the network, so that the misbehaving node will be cut
off from the rest of the network.
Due to its reliance on overhearing, however, the watchdog technique
may fail to detect misbehavior or raise false alarms in the presence of ambiguous
collisions, receiver collisions, and limited transmission power.
Windows
Java
: JDK1.5
: Swings
HARDWARE REQUIREMENTS
Key Board : Standard Key Board with 101 Keys
Processor
: Pentium IV
Monitor
: SVGA Color Monitor
Hard disk
: 20 GB
RAM
256 MB
ON WIRELESS SCHEDULING
ALGORITHMS FOR MINIMIZING THE
QUEUE-OVERFLOW PROBABILITY
AIM:
To Minimize the Queue-Overflow Probability in the wireless Network by using an
Scheduling algorithm alpha in the router side.
Synopsis:
The link scheduling algorithm mainly focuses on to reduce the queue overflow
rate over queue length. Let us consider a cellular network in which there are N users to
transmit the data through the router in that each user connects with a router to transmit that
makes the queue in the other end.
To overcome the queue the base station selects user based on the service
rate, after it reaches the threshold. The goal is to find algorithms for scheduling the
transmissions such that the queues are stabilized at given offered loads. An important result
along this direction is the development of the so-called throughput-optimal algorithms.
In our system we have approached the scheduling algorithm in the Online
Mobile Banking of the Mobile User.
Existing System:
The Constrained queuing system is used as a model of a radio networks,
the server correspond to the link and the constraints disallows simultaneous transmission. At
each time slot routing decision are taken for served customer and eligible set consider for
activation.
Proposed System:
In scheduling algorithms collectively referred to as the alpha algorithms. For a
given, the alpha algorithm picks the user for service at each time that has the largest product of the
transmission rate. This result enables us to design scheduling algorithms that are both close to optimal in
terms of the asymptotic decay rate of the overflow probability and empirically shown to maintain small
queue-overflow probabilities over queue-length ranges of practical interest.
Software Requirements
JDK 1.6
My SQL 5.0
that the probability of isolation converges to zero as these two metrics tend to infinity.
We finish the paper with simulations in finite-size graphs that demonstrate the effect of
this result in practice.
RESILIENCE of P2P networks under random user arrival and departure
(i.e., churn) has recently become an active research. One of the primary metrics of
resilience is graph disconnection during which a P2P network partitions into several
nontrivial sub graphs and starts to offer limited service to its users. Most partitioning
events in well-connected P2P networks are single-node isolations, which occur when the
immediate neighbors of a node fail before is able to detect their departure and then
replace them with other alive users. For such networks, node isolation analysis has
become the primary method for quantifying network resilience in the presence of user
churn.
3. SYSTEM ANALYSIS
Existing System
In existing system, unstructured p2p network consider only exponential (mean time
to failure) user lifetime and age-independent neighbor replacement.
Unstructured P2P networks are single-node isolations, which occur when the
immediate neighbors of a node fail before a node is able to detect their departure
and then replace them with other alive users.
Probability of user isolation is high in existing system and the users cannot
communicate with the isolated nodes.
When node gets isolated from the network, the links between the nodes get failure.
So, graph gets disconnected.
Newly joining node unable to detect the heavy-tailed user lifetime to avoid its
probability of isolation from the network.
Disadvantages
Node isolated from network. So, communication problem occurs.
Neighbor node unable to detect the failure previously.
Graph Disconnection between the networks.
Resilience of peer to peer networks under random user arrival and departure is
difficult.
New node cannot be able to identify the heavy-tailed node in the network.
Probability of user isolation and graph disconnection is high.
Proposed System
Node isolation analysis has become the primary method for quantifying network
resilience in the presence of user churn.
A joining node randomly selects alive users from the system and chooses the
user with the maximal age. Random walk algorithms have been used to build
unstructured P2P systems and replace failed links with new ones.
Advantages
Reducing probability of user isolation.
Avoids graph partitioning from network.
Overcome Communication problem.
Resilience of peer to peer networks for random user arrival and departure is
done.
Probability of user isolation and graph disconnection is low.
to the node responsible for that objects. The assignment of node IDs is therefore
critically important to the efficiency and security of the system Sybil attacks allow an
adversary to control large portions of P2P network by simultaneously obtaining many
identifiers. The solution to these problems largely rely on the use of trusted certificate
authorities and a structured public key infrastructure ( PKI ) to assign and certify node
IDs . These schemas require maintenance of complex PKI systems .
Proposed System :We consider the use of identity based cryptography to assist in the security and\
performance critical assignment of user identities in p2p systems. Identity based
cryptosystems use textual strings to derive public keys from cryptographic parameters
advertised within a domain. This approach avoids many of the complexities of PKI usage
as a public key is directly derivable from their identity and reduces overheads and
associated with authentication. We exploit these features in p2p systems by assigning and
ID and providing the associated identity based private key to which joining mode. The
use of IBE systems leads to a trust model different than those differed by previous
centralized identity management approaches. In our proposed system identities are keys
are derived directly from the IP addresses of the participating entities. Users of the
system compute the public keys of their peers directly. We identify three protocols
representing diverse trust models and performance profiles based on identity based
cryptography.
Protocol 1:- a fully decentralized ID-based assignment scheme.
Protocol 2:- A centralized scheme in which a single host system plays
dual roles as ID assigning authority and P2P boot strap node.
Protocol 3:- An approach that retains the separation of duties of a
decentralized model at a low cost by using a hybrid of identity based
symmetric key cryptography.
System
Hard Disk
Ram
Floppy Drive
Monitor
Mouse
: 40 GB.
: 256 Mb.
: 1.44 Mb.
: 15 VGA Colour.
: Logitech.
SOFTWARE REQUIREMENT:
Operating system
Coding Language
Tool Used
: Windows XP Professional.
: Java.
: Eclipse.
Existing System:
END-TO-END packet delay is one of the canonical metricsin Internet Protocol (IP)
networks, and is important bothfrom the network operator and application performance
pointsof view. For example the quality of Voice Over IP is directlydependent on delay,
and network providers may have ServiceLevel Agreements (SLAs) specifying allowable
values of delaystatistics across the domains they control. An important componentof endto-end delay is that due to forwarding elements, thefundamental building block of which
is the delay incurred whena packet passes through a single IP router.
Proposed System:
The motivation for the present work is a detailed knowledge and understanding of
such through-router delays. A thorough examination of delay leads inevitably to deeper
questions about congestion, and router queueing dynamics in general. We provide a
comprehensive examination of these issues from three points of view: the understanding
of origins, measurement, and reporting, all grounded in a unique data set taken from a
router in the access network of a Tier-1 provider.
The first aim of this paper is a simple one, to exploit this unique data set by
reporting in detail on the magnitudes, and also the temporal structure, of delays on high
capacity links with nontrivial congestion. The result is one of the most comprehensive
pictures of router delay performance that we are aware of. As our analysis is based on
empirical results, it is not reliant on
assumptions on traffic statistics or router operations. Our second aim is to use the
completeness of the data as a tool to investigate how packet delays occur inside the
router. In other words, we aim to provide a physical model capable of explaining the
observed delay and congestion. Working in the
context of the popular store and forward router architecture [5], we are able to justify the
commonly held assumption that the bottleneck of such an architecture is in the output
buffers, and thereby validate the fluid output queue model relied on routinely in the field
of active probing. We go further to define a refined model with an accuracy close to the
limits of timestamping precision, which is robust to many details of the architecture under
reasonable loads.
Packet delays and congestion are fundamentally linked, as the former occur precisely
because periods of temporary resource starvation, or micro congestion episodes, are dealt
with via buffering. Our third contribution is an investigation of the origins of such
episodes, driven by the question, What is the dominant mechanism responsible for
delays?. We use a powerful methodology of virtual or semi- experiments, that exploits
both the availability of the detailed packet data, and the fidelity of the router model. We
identify, and evaluate the contributions of, three known canonical mechanisms: i)
reduction in link bandwidth from core to access; ii) multiplexing of multiple input
streams; iii) burstiness of the input traffic stream(s).
Modules
CLIENT
SERVER
Modules description:
SERVER: Server is main module in this project, server receive the data sent by client &
calculate the congestion parameters for the client like delay, bandwidth, busy & status of
client.
CLIENT: Client sends the data to server & if client is free at server, data is successfully
sent .Otherwise the data is in queue until previous data is send.
Hardware Requirements:
System
Hard Disk
Ram
Software Requirements:
Operating system
Coding Language
Tool Used
: - Windows XP Professional.
: - Java.
: - Eclipse.
EXISTING SYSTEM:
CLIENT - SERVER FILE SHARING
Content distribution is a centralized one, where the content is distributed from the
centralized server to all clients requesting the document.
Clients send request to the centralized server for downloading the file. Server accepts the
request and sends the file as response to the request.In most client-server setups, the
server is a dedicated computer whose entire purpose is to distribute files.
DRAWBACKS OF EXISTING SYSTEM
Scalability problem arises when multi requests arises at a single time.
Servers need heavy processing power
Downloading takes hours when clients increases
Requires heavy storage in case of multimedia content
PROPOSED SYSTEM:
Peer-to-peer content distribution provides more resilience and higher availability
through wide-scale replication of content at large numbers of peers.
HARDWARE SPECIFICATION:
Processor :
Speed
RAM
Hard Disk :
General
Pentium-IV
:
1.1GHz
:
512MB
40GB
:
KeyBoard, Monitor , Mouse
SOFTWARE SPECIFICATION:
Operating System : Windows XP
Software
: JAVA ( JDK 1.5.0)
Protocol
: UDP
A Geometric Approach to
Improving Active
Packet Loss Measurement
Abstract
Measurement and estimation of packet loss characteristics are
challenging due to the relatively rare occurrence and typically short duration
of packet loss episodes. While active probe tools are commonly used to
measure packet loss on end-to-end paths, there has been little analysis of the
accuracy of these tools. The objective of our study is to understand how to
measure packet loss episodes accurately with end-to-end probes. Studies
show that the standard Poisson-modulated end-to-end measurement of
packet loss accuracy has to be improved. Thus, we introduce a new
algorithm for packet loss measurement that is designed to overcome the
deficiencies in standard Poisson-based tools. Specifically, our method entails
probe experiments that follow a geometric distribution to enable more
accurate measurements than standard Poisson probing and other traditional
packet loss measurement tools. We also find the transfer rate. We evaluate
the capabilities of our methodology experimentally by developing and
implementing a prototype tool, called BADABING. BADABING reports
loss characteristics are far more accurately than traditional loss measurement
tools.
Existing System:
Proposed System:
System Requirements
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CDDRIVE
KEYBOARD
:
:
:
:
:
:
Software:
FRONT END
TOOLS USED
:
:
JAVA, SWING
JFRAME BUILDER
Description of Problem
The similar system is already available are non-predictive and employs greedy
based algorithms or a variant of it. That is the existing system will not predict in advance
regarding the situation. So we cannot schedule the jobs in network in such a way that the
resources are utilized at the optimal level. The problem is to reduce the processing
overhead during scheduling. The proposed system work to data transfer between
computers of two networks. Generally, during data transfer between pc of two different
networks.
Existing Method
The Data mining Algorithms can be categorized into the following:
AODVAlgorithm
Classification
Clustering Algorithm
Classification:
The process of dividing a dataset into mutually exclusive groups such that the
members of each group are as "close" as possible to one another, and different groups are
as "far" as possible from one another, where distance is measured with respect to specific
variable(s) you are trying to predict. For example, a typical classification problem is to
divide a database of companies into groups that are as homogeneous as possible with
respect to a creditworthiness variable with values "Good" and "Bad."
Clustering:
The process of dividing a dataset into mutually exclusive groups such that the
members of each group are as "close" as possible to one another, and different groups are
as "far" as possible from one another, where distance is measured with respect to all
available variables.
Given databases of sufficient size and quality, data mining technology can generate new
business opportunities by providing these capabilities:
Proposed System
Job scheduling is the key feature of any computing environment and the
efficiency of computing depends largely on the scheduling technique used. Popular
algorithm called Bi-Directional Routing concept is used in the systems across the
network and scheduling the job according to predicting the load.
Here the system will take care of the scheduling of data packets between the source
and destination computers.
Job scheduling to route the packets at all the ports in the router
Maintaining queue of data packets and scheduling algorithm is implemented
First Come First Serve scheduling and Bi-Directional Routing Algorithm
scheduling is called for source and destination Comparison of two algorithm is
shown in this proposed system
SYSTEM REQUIREMENTS:
Hardware:
PROCESSOR
RAM
HARD DISK
: Dual Core
: 1 GB
: 160 GB
Software:
FRONT END
: Java
OPERATING SYSTEM : Windows XP
EXISTING SYSTEM:
PROPOSED SYSTEM:
SYSTEM REQUIREMENTS
Hardware:
PROCESSOR
RAM
HARD DISK
:
:
:
Software:
Front End
: Java, Swing
Tools Used
: JFrameBuilder
Back End
: MS SQL 2000
Operating System : WindowsXP
Existing System:
Proposed System:
high
maximum
Advantage:
The speculative transmission that does not have to wait for grant
hence low latency.
The scheduled transmission achieve high maximum throughput.
System Requirements:
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CDDRIVE
KEYBOARD
MOUSE
Software:
Front End
: Java, Swing
Tools Used
: JFrameBuilder
Operating System : Windows XP
Back End
: SQL Server 2000
Proposed System:
This model leads to the development of an automatic worm
containment strategy that prevents the spread of a worm beyond its
early stage.
We obtain the probability that the total number of hosts that the worm
infects is below a certain level.
Our strategy can effectively contain both fast scan worms and slow
scan worms without knowing the worm signature in advance or
needing to explicitly detect the worm.
Our automatic worm containment schemes effectively contain the
worms and stop its spreading.
System Requirements
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CDDRIVE
KEYBOARD
MOUSE
Software:
:
:
:
:
:
:
:
FRONT END
: JAVA, SWING
TOOLS USED
: JFRAME BUILDER
OPERATING SYSTEM: WINDOWS XP
Existing System:
Proposed System:
System Requirements
Hardware Requirements:
PROCESSOR
RAM
MONITOR
HARD DISK
FLOPPY DRIVE
CDDRIVE
KEYBOARD
Software Requirements:
FRONT END
: Java swing and Networking
OPERATING SYSTEM : Windows XP
BACK END
:Ms Access
Existing System:
Ingress filtering primarily prevents a specific network from being used for
attacking others.
Proposed System:
System Requirements
Hardware Requirements:
PROCESSOR
RAM
MONITOR
HARD DISK
FLOPPY DRIVE
CDDRIVE
KEYBOARD
Software Requirements:
FRONT END
: Java swing and Networking
OPERATING SYSTEM : Windows XP
BACK END
:Ms Access
identifying a backup path for every link that satisfies the above requirement is referred to
as the BLME problem.
This paper develops the necessary theory to establish the sufficient conditions for
existence of a solution to the BLME problem. Solution methodologies for the BLME
problem is developed using two approaches by: 1) formulating the backup path selection
as an integer linear program; 2)developing a polynomial time heuristic based on
minimum cost path routing.
The ILP formulation and heuristic are applied to six networks and their
performance is compared with approaches that assume precise knowledge of dual-link
failure. It is observed that a solution exists for all of the six networks considered. The
heuristic approach is shown to obtain feasible solutions that are resilient to most dual-link
failures, although the backup path lengths may be significantly higher than optimal.
In addition, the paper illustrates the significance of the knowledge of failure
location by illustrating that network with higher connectivity may require lesser capacity
than one with a lower connectivity to recover from dual-link failures.
System Requirements:
Software:
FRONT END : JAVA(SWING)
OS
: Windows Xp SP2
IDE
: NetBeans 6.5, JFrameBuilder
Hardware:
PROCESSOR
RAM
MONITOR
HARD DISK
CD-DRIVE
KEYBOARD
MOUSE
:
:
:
:
:
:
:
Abstract
The next-generation mobile network will support terminal mobility, personal
mobility, and service provider portability, making global roaming seamless. A locationindependent personal telecommunication number (PTN) scheme is conducive to
implementing such a global mobile system. However, the nongeographic PTNs coupled
with the anticipated large number of mobile users in future mobile networks may
introduce very large centralized databases. This necessitates research into the design and
performance of high-throughput database technologies used in mobile systems to ensure
that future systems will be able to carry efficiently the anticipated loads. This project
proposes a scalable, robust, efficient location database architecture based on the locationindependent PTNs.
The proposed multitree database architecture consists of a number of database
subsystems, each of which is a three-level tree structure and is connected to the others
only through its root. By exploiting the localized nature of calling and mobility patterns,
the proposed architecture effectively reduces the database loads as well as the signaling
traffic incurred by the location registration and call delivery procedures. In addition, two
memory-resident database indices, memory-resident direct file and
T-tree, are proposed for the location databases to further improve their throughput.
Analysis model and numerical results are presented to evaluate the efficiency of the
proposed database architecture. Results have revealed that the proposed database
architecture for location management can effectively support the anticipated
high user density in the future mobile networks.
HARDWARE REQUIREMENTS:
Intel Pentium III Processor 128MB RAM
10 GB Free Hard disk space
SOFTWARE SPECIFICATION
Operating System
Software
Database
: Windows 2000/XP/NT.
: JDK 1.5
: Microsoft Access
Operating System
Browser
Web/Application Server
Database
Database Connectivity
Java Technologies
Scripting Technology
--------
Windows 95/98/NT/2000
IE
Tomcat Server
Oracle
JDBC
Java (Servlets, Jsp)
JavaScript
Existing Systems:
1. Structural metrics are calculated from the source code such as
references and data sharing between methods of a class
belong together for cohesion.
2. It define and measure relationships among the methods of a
class based on the number of pairs of methods that share
instance or class variables one way or another for cohesion.
Disadvantage
Proposed Systems
1. In proposed System unstructural information is retrieved from
the source code like comments and identifiers.
2. Information is retrieved from the source code using Latent
Semantic Indexing.
3. With the help of C3 and existing metrics we are achieving the
high cohesion and low coupling.
Advantage
System Requirements:
Hardware Requirements:
PROCESSOR
RAM
MONITOR
HARD DISK
FLOPPY DRIVE
CDDRIVE
KEYBOARD
MOUSE
:
:
:
:
:
:
Software Requirements:
LANGUAGE
: JAVA
FRONT-END TOOL
: SWING
OPERATING SYSTEM : WINDOWS-XP
ROPOSED SYSTEM:
In this paper, we propose the dynamic search (DS) algorithm, which is a
generalization of flooding and RW. DS overcomes the disadvantages of flooding and RW
and takes advantage of different contexts under which each search algorithm performs
well. The operation of DS resembles flooding for the short-term search and RW for the
long-term search. In order to analyze the performance of DS, we apply the random graphs
as the models of network topologies and adopt the probability generating functions to
model the link degree distribution. We evaluate the performance of search algorithms in
accordance with some performance metrics including the success rate, search time,
number of query hits, and number of query messages, query efficiency, and search
efficiency.
PROBLEM FORMULATION:
Flooding and RW are two typical examples of blind search algorithms by which
query messages are sent to neighbors without any knowledge about the possible locations
of the queried resources or any preference for the directions to send. Some other blind
search algorithms include modified BFS (MBFS) [23], directed BFS [6], expanding ring
and random periodical flooding (RPF).These algorithms try to modify the operation of
flooding to improve the efficiency. However, they still generate a large amount of query
messages. Jiang et al. propose a Light Flood algorithm, which is a combination of the
initial pure flooding and subsequent tree-based flooding.
PROPOSED SOLUTION:
DS is designed as a generalization of flooding, MBFS, and RW. There are two
phases in DS. Each phase has a different searching strategy. The choice of search strategy
at each phase depends on the relationship between the hop count h of query messages and
the decision threshold n of DS.
Phase1. When h <= n
At this phase, DS acts as flooding or MBFS. The number of neighbors that a
query source sends the query messages to depends on the predefined transmission
probability p. If the link degree of this query source is d, it would only send the query
messages to d. p neighbors. When p is equal to 1, DS resembles flooding. Otherwise, it
operates as MBFS with the transmission probability p.
Phase2. When h > n
At this phase, the search strategy switches to RW. Each node that receives the
query message would send the query message to one of its neighbors if it does not have
the queried resource. Assume that the number of nodes visited by DS at hop h n is the
coverage cn, and then the operation of DS at that time can be regarded as RW with cn
walkers. However, there are some differences between DS and RW when we consider the
whole operation.
: Windows Family.
: JDK 1.5
: Microsoft Sql Server
: Java Swing
considerations, we design and analyze a class of simple and local distributed algorithms
called Nearest Neighbor Tree (NNT) algorithms for energy- efficient construction of an
approximate MST in wireless networks. Assuming that the nodes are uniformly
distributed, we show provable bounds on both the quality of the spanning tree produced
and the energy needed to construct them. We show that while NNT produces a close
approximation to the MST, it consumes asymptotically less energy than the classical
message-optimal distributed MST algorithm due to Gallagery, Humblet, and Spira.
Further, the NNTs can be maintained dynamically with polylogarithmic rearrangements
under node insertions/deletions. We also perform extensive simulations, which show that
the bounds are much better in practice. Our results, to the best of our knowledge,
demonstrate the first tradeoff between the quality of approximation and the energy
required for building spanning trees on wireless networks, and motivate similar
considerations for other important problems.
Existing System:
The minimum spanning tree (MST) problem is an important and commonly
occurring primitive in the design and operation of data and communication networks .
For instance , in ad hoc sensor networks , MST is the optimal routing tree for data
aggregation. Traditionally, the efficiency of distributed algorithms is measured by
the running time and the number of messages exchanged among the computing
nodes , and a lot of research has gone into the design of algorithms that are optimal
with respect to such criteria. The classical algorithm due to Gallagery, Humble t, and
Spira (hence forth referred to as the GHS algorithm) uses _(n ln n ) jEj) messages , and
is essentially optimal with respect to the message complexity . There are distributed
algorithms that find the MST and are essentially optimal in terms of time
complexity : they run in O(Diam(G) ) n1=2polylog(n)) time, and there are (almost)
matching lower bounds. However, these time-optimal algorithms involve a lot of
message transfers (much more than GHS). Even for a wireless network modeled by a
unit disk graph (UDG) or even a ring, any distributed algorithm to construct an MST
needs _(n ln n) messages . Despite their theoretical optimality, these algorithms are
fairly involved, require synchronization and a lot of bookkeeping ;such algorithms are
impractical for ad hoc and sensor networks .
Disadvantages:
The network management and communication has to be done in a local
and distributed fashion.
Battery limitations
Energy is a very crucial resource.
Exchanges a large number of messages, can consume a relatively large
amount of energy (and also time)
It is not suitable in an energy-constrained sensor network
Cycle detection is another one disadvantage
Proposed System:
In this paper, we study a class of simple , local , distributed, approximation
algorithms called the Nearest Neighbor Tree (NNT) algorithms that are provably
good: they build slightly suboptimal trees with low energy complexity and are easy to
maintain dynamically. The NNT algorithms bypass such a step completely by a very
simple idea : each node chooses a unique rank, a quantity from a totally ordered set,
and a node connects to the nearest node of higher rank. The algorithm consists of
exchanging three types of messages : request, available, and connect among the
nodes . Each node begins with broadcasting a request for connection message.
System Requirement:
Hardware requirements:
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb.
Hard Disk
: 10 GB.
Compact Disk
: 650 Mb.
Input device
Output device
Software requirements:
Operating System
Language
: JDK 1.5
Data Bases
Front End
: Java Swing
Existing System:
Existing work on security-enhanced data transmission includes the designs of
cryptography algorithms and system infrastructures and security-enhanced routing
methods. Their common objectives are often to defeat various threats over the Internet,
including eavesdropping, spoofing, session hijacking, etc. Among many well-known
designs for cryptography based systems, the IP Security (IPSec) and the Secure Socket
Layer (SSL) are popularly supported and implemented in many systems and platforms.
Although IPSec and SSL do greatly improve the security level for data transmission, they
unavoidably introduce substantial overheads, especially on gateway/host performance
and effective network bandwidth. For example, the data transmission overhead is 5
cycles/byte over an Intel Pentium II with the Linux IP stack alone, and the overhead
increases to 58 cycles/byte when Advanced Encryption Standard (AES) is adopted for
encryption/decryption for IPSec.
Proposed System:
We propose a dynamic routing algorithm that could randomize delivery paths for
data transmission. The algorithm is easy to implement and compatible with popular
routing protocols, such as the Routing Information Protocol in wired networks and
Destination-Sequenced Distance Vector protocol in wireless networks, without
introducing extra control messages
Hardware Requirements:
System
: Pentium IV 2.4 GHz.
Hard Disk
: 40 GB.
Floppy Drive : 1.44 Mb.
Monitor
: 15 VGA Colour.
Mouse
: Logitech.
Ram
: 256 Mb.
Software Requirements:
Operating system
Coding Language
Tool Used
: - Windows XP Professional.
: - Java.
: - Eclipse.
Disadvantages:
Consistency was not maintained while migrating the object
between the proxies.
It does not handle the proxy disconnections.
It supports only the single object operations.
Proposed System:
This system forms the proxies in the tree structure. It shares the
objects within the proxies. It reduces the workload in the server.
Quiver
enables
consistent
multiobject
operations
and
optimizations for single-object reads that are not possible in
these prior algorithms.
It holds the object even when the proxy has been disconnected.
System Requirements
Hardware:
PROCESSOR
: PENTIUM IV 2.6 GHz
RAM
: 512 MB DD RAM
MONITOR
: 15 COLOR
HARD DISK
: 20 GB
FLOPPY DRIVE : 1.44 MB
CDDRIVE
: LG 52X
KEYBOARD
: STANDARD 102 KEYS
MOUSE
: 3 BUTTONS
Software:
Front End
: Java
Back End
: MS Access
Tools Used
: NetBeans(ide)
Operating System : WindowsXP
PROPOSED SYSTEM
DCMP is dynamic fully decentralized protocol
Queries are transmitted through the peers
DCMP use message flooding to propagate queries
DCMP use the method Native Duplicate Elimination (NDE)
DCMP implements the prototype called Planet Lab
ADVANTAGE OF PROPOSED SYSTEM
Preserve the fault resilience and load balancing
It avoid duplicate messages and repeated messages
It reduce number of cycle per transaction
HARDWARE REQUIREMENTS
Processor/system
Main memory
Cache memory
Processor speed
Keyboard
Hard disk drive
:
:
:
:
:
:
Pentium IV
512 MB RAM
512 KB
600 MHz
101 keys
40 GB
SOFTWARE REQUIREMENTS
Operating system
Front end designing Tool
Programming Language
Text Editor
Database
codes, a class of error control codes, to distribute multicast key dynamically. This scheme
drastically reduces the computation load of each group member compared to existing
schemes employing traditional encryption algorithms. Such a scheme is desirable for
many wireless applications where portable devices or sensors need to reduce their
computation as much as possible due to battery power limitations. Easily combined with
any key-tree-based schemes, this scheme provides much lower computation complexity
while maintaining low and balanced communication complexity and storage complexity
for secure dynamic multicast key distribution.
Existing System
The communication complexity is usually ensured by the number of data bits that
need to be transmitted from the GC to group members to convey information of session
keys, whereas the storage complexity is measured by the number of data bits that the GC
and group members need to store to obtain session keys. Another similarly important but
usually under noticed, if not ignored, factor is the computation complexity, which can be
measured by the number of computation operations (or the computation time on a given
computing platform) that the GC and group members need to distribute and extract
session keys. Hereafter, the problem of how resources can effectively be used to
distribute session keys is referred to as the group key distribution problem.
Draw Back:
The group controller maintains whole group members information, so increase
the storage complexity.
The group members are not able to communicate with any other groups during the
re keying process.
The Group controller takes all responsibilities for the group such as key
generation, re keying process and message transfer to any other groups
Proposed System:
The complexity of the rekeying operation is asymmetric between a new members
join and an old members leave. When a new member joins, the GC can easily multicast
the new session key encrypted by the current session key to all the current members,
followed by a unicast to the new member to send the new session key encrypted by a
predetermined encryption key shared between the GC and the new member. Thus, join is
easy, with low communication and computation cost. However, when an old member
leaves, the current session key cannot be used to convey the new session key information
securely, since it is also known to the old member. Thus, hereafter, we will focus on the
rekeying operation for a single member leave. The same idea can easily be extended to
other rekeying operations such as batch rekeying.
Advantages of the Proposed System:
The Group controller responsibilities are shared by the Group control
intermediater such as Re keying process and scalability of the group process
Use the Identity tree based structure
The group members are not affected by the key generation process when they are
willing to communicate with any other group members
The Centralized key server used for key generation process and the KGC is also
act as a Router for group to group communication
The Re keying process is done only to the particular group members not to the
entire group members
Hardware requirements:
Processor
: Pentium IV
Ram
: 256MB.
Hard Disk
: 80 GB
Software requirements:
Operating System
: Windows XP
Techniques
: JDK 1.5
Data Bases
: Microsoft Sql Server
Front End
: Java Swing.
Windows 98 or more.
Ms Access Back end
HARDWARE REQUIREMENTS: Hard disk
:
40 GB
RAM
:128mb
Processor
:
Pentium
ABSTRACT
This project, titled Homogenous Network Control and
Implementation, presents a way of developing integrity-preserved computer
networks.The propsed generic network is based on a detailed review and
comparitive analysis of ongoing research work in the field of homogenous
distributed systems and fault-tolerant systems. The presented network
facilitates easy sharing of information among the systems in the network by
establishing a peer to peer network connection among all the systems.
Homogenous Network of Workstations (HNOW systems) comprise of
similar kinds of PCs, Workstations connected over a single network. In a
homogenous network, each machine has the ability to send data to another
machine, irrespective of the working conditions of the server.
In general, a set of networks is classified as homogenous, if the
networks are same(e.g., using the same basic technology, frame format
and addressing); a set of networks is classified as heterogeneous if the set
contains network that differ.
The theme of the project is centered on the development of a
homogenous network and establishment of process continuation module,
which plays an imperative part in maintaining the network integrity.
SOFTWARE SPECIFICATION
Operating System
Software
: Windows XP/NT.
: JDK 1.5
ABSTRACT
The routing of traffic between internet domains and autonomous systems is
handled by the Border Gateway Protocol (BGP). The internet comprised of many
administrative domains to transmit the packets from one autonomous system to another
or with in the system.
There is set of bidirectional links between the no of nodes and the network is an
AS graph because the routes selection problem arises when a node has multiple potential
routes to destination .The main goal is to send each packet along the least cost path(LCP),
the pricing mechanism must be strategy proof so that agents have no incentives to lie
about their costs.
.1 Existing System
The drawback of this approach is that it tends to overwhelm the nodes on the least
cost path, which is undesirable for sensor networks since all sensor nodes are
collaborating for a common mission and the duties of failed nodes may not be
taken by other nodes.
A few schemes have been proposed to address this problem by studying the
maximum lifetime routing problem. The problem focuses on computing the flow
and transmission power to maximize the lifetime of the network, which is the time
at which the first node in the network runs out of energy. Some distributed
solutions based on sub gradient algorithms and utility-based algorithm have been
proposed. The common assumption of these works is that the data flows are
conserved during the transmission from the sensor nodes to the sink node, which
however is not true for sensor networks because data collected by neighboring
nodes are often spatially correlated.
solely according to the nodal position. This allows different data correlation
models such as that in to be incorporated without intervening the underlying
routing scheme.
:
:
:
Pentium IV
40GB
512MB
:
:
:
:
IDE/Workbench
My Eclipse 6.0
Existing System
One of the challenges for biomedical application is to provide efficient
high-level interfaces, depending on the applications that enable access to
Grids for nonexperts, ensuring transparent access to medical resources
through services compatible with medical practice. As part of the interfaces,
a flexible architecture for the management of the privacy of data is needed,
compatible with medical practice and with preexisting Grid security systems
are complex enough to be considered an obstacle in the successful Grid
adoption.
Proposed System
The main objective of this paper is to provide Grid middlewares such
as TRENCADIS, with efficient and reliable privacy protection for sensitive
data. This paper presents a model for long-term storage and management of
encrypted data in distributed environments. Furthermore, the paper outlines
how this model is implemented to preserve the privacy of patient
information in Grid-based collaborative computational infrastructures for
biomedical applications. This paper delineates a dependable security
framework in overextended organizations. Throughout the assembly of this
framework, organizations will encounter different degrees of data integrity
and confidentiality.
The specific objectives of the paper are
1) To propose an on-the-fly cryptographic infrastructure to protect privacy
from users with administrative privileges.
2) To provide a flexible architecture for organizing key management for
long-term storage of encrypted data.
3) To propose a model applicable in different environments, Compatible
with current Grid middlewares.
4) To provide an access control mechanism for encryption keys based on
ontological groups and roles.
System Requirements:
Hardware requirements:
Processor
: Any Processor above 500 MHz.
Ram
: 128Mb (Min).
Hard Disk
: 10 GB (Min).
Compact Disk
: 650 Mb (Min).
Input device
: Standard Keyboard and Mouse.
Output device
: VGA and High Resolution Monitor.
Software requirements:
Operating System
: Windows Family.
Language
: JDK 1.5
Data Bases
: Microsoft SQL Server
Front End
: Java Swing
Objective
SQL injection techniques are an increasingly dangerous threat to the security of information
stored upon Oracle Databases. These techniques are being discussed with greater regularity on security
mailing lists, forums, and at conferences. There have been many good papers written about SQL Injection
and a few about the security of Oracle databases and software but not many that focus on SQL injection
and Oracle software. This is the first article in a two-part series that will examine SQL injection attacks
against Oracle databases. The objective of this series is to introduce Oracle users to some of the dangers of
HARDWARE SPECIFICATION
Processor
Ram
Hard Disk
Input device
Output device
SOFTWARE SPECIFICATION
Operating System
Pages developed using
Techniques
Web Browser
Data Bases
Client Side Scripting
: Windows Family.
: Java Server Pages and HTML.
: Apache Tomcat Web Server 5.0, JDK 1.5 or higher
: Microsoft Internet Explorer.
: SQlServer 2000
: Java Script
EXISTING SYSTEM:
ASSURANCE of secure applications and services in wireless networks relies on
the properties of confidentiality and integrity, respectively defined as the ability to keep
data Secret from unauthorized entities and the ability to verify that data has not been
maliciously or accidentally altered. Eschenauer and Gligor recently demonstrated in that
these properties can be efficiently compromised by physically capturing network nodes
and extracting cryptographic keys from their memories. These node capture attacks are
possible in most wireless networks due to the unattended operation of wireless nodes and
the prohibitive cost of tamper-resistant hardware in portable devices. Furthermore, as
shown in , an intelligent adversary can improve the efficiency of a node capture attack
over that of approaches in recent literature focusing on random node capture using
publicly available information leaked from the key assignment protocol.
PROPOSED SYSTEM:
We develop two complementary vulnerability definitions using set theoretic and
circuit theoretic interpretations of the security of network traffic, allowing a network
analyst or an adversary to determine weaknesses in the secure network.
We formalize node capture attacks using the vulnerability metric as a nonlinear
integer programming minimization problem and propose the GNAVE algorithm, a
Greedy Node capture Approximation using Vulnerability Evaluation.
Hardware Requirements
SYSTEM
HARD DISK
RAM
: Dual Core
: 160 GB
: 1 GB
Software Requirements
Existing System: In the existing system PPM algorithm is not perfect, as its
termination condition is not well defined.
Without proper termination condition the attack
constructed by the PPM algorithm would be wrong.
graph
System Requirements
Hardware:
PROCESSOR
: PENTIUM IV 2.6 GHz
RAM
: 512 MB DD RAM
MONITOR
: 15 COLOR
HARD DISK
: 20 GB
FLOPPY DRIVE : 1.44 MB
CDDRIVE
: LG 52X
KEYBOARD
: STANDARD 102 KEYS
MOUSE
: 3 BUTTONS
Software:
Front End
: Java, Swing
Tools Used
: JFrameBuilder
Operating System : WindowsXP
Intrusion Detection In Homogeneous & Heterogeneous
Wireless Sensor Networks
Abstract
Intrusion Detection, which is the art of detecting inappropriate, incorrect,
or anomalous activity. This Project reports the design principles and
evaluation results of a new experimental hybrid intrusion detection system. By
mining anomalous traffic episodes from Internet connections, we build an
ADS that detects anomalies beyond the capabilities of signature-based
SNORT system. A weighted signature generation scheme is developed to
integrate ADS with SNORT by extracting signatures from anomalies detected.
HIDS extracts signatures from the output of ADS and adds them into the
SNORT signature database for fast and accurate intrusion detection
Existing System:
Conventional systems that detect known attacks with low false alarms.
However, the signature-based IDS cannot detect unknown attacks
without any recollected signatures.
Furthermore, signature matching performs well only
for single-connection attacks. With the sophistication of attackers,
more attacks involve multiple connections. This limits the detection
range by signature matching.
Proposed System :
An anomaly-based system uses a different philosophy. A network
anomaly is detected if the incoming traffic pattern deviates from the
normal profiles significantly. This system combines the positive
features of both intrusion detection models to achieve higher detection
accuracy, lower false alarms, and, thus, a raised level of cyber trust.
Software Requirements
Operating System :
Implementation Languages :
Database :
Windows 2000/XP
Jdk 1.5.0
Microsoft Access
CPU:
Memory:
Disk Space:
Network Devices:
Packets are buffered in the routers present in the network which causes
Congestion collapse from undelivered packets arises when bandwidth is
continuously consumed by packets that are dropped before reaching their
ultimate destinations.
Buffering of packets in carried out in the edge routers rather than in the core
routers.
The packets are sent into the network based on the capacity of the network
and hence there is no possibility of any undelivered packets present in the
network.
System requirements:
Hardware Requirements:
Existing System
An ad-hoc combination of intuition, experience, and informal analysis is often
used to speculate the causes of large swings in BGP updates. In addition to the challenge
of scale, the underlying Internet topology is not known precisely and the monitoring points
provide views from only a limited set of geographic locations. In such an environment,
ad-hoc techniques are limited by the expertise of the administrator and it is not easy to
identify the underlying events that cause BGP changes. To provide dependable global data
delivery, analysis tools are needed that can help us to understand the BGP system and
pinpoint the exact cause of connectivity changes.
: Windows
: Java
: JDK1.5
: Frames
HARDWARE SPECIFICATIONS:
Main Memory
MicroProcessor
Hard Disk Drive
Cache Memory
:
:
:
:
64MB.
Pentium III.
4.3 GB.
512KB.
:
:
Windows 98/NT.
Java ,Servlets,Jsp,
SOFTWARE SPECIFICATIONS:
Operating System
Front End
1. Bug Tracker
ABSTRACT
The project is a developed based on the standards of the coding used by the developer is
tested before giving to the client. System that interacts with the code developed bye the user.
Using this project any developer with minimal knowledge can easily check correctness of the
code easily without any errors.
Business Requirements Analysis
Before submitting to the client or hosting any site of the project should maintain a
testing tools. Here this developing system is based on this process only. This project will
maintain a database for each project, in that it maintains project code, bugs. Bug tracking
developers read these bugs and fix the bugs and update the same information in the bug
reports.
The following is the system developed for the above stated needs. An initial feasibility
study was conducted & a conclusion was arrived at that automating such a system would not
only achieve all the things mentioned above.
Hardware Specifications:
Intel P-III Processor
64 MB RAM
40 GB Hard Disc
Software Specifications
Operating System
Language
BackEnd
:
:
:
Windows XP/2000
jsp,servlets.
Oracle
Fashion Studio
ABSTRACT
It seems that over the past few decades a new art form has emerged. This is an art
form that painters, writers and photographers dive into on a daily basis. A piece of art is
considered to be abstract when the image is not clearly defined or visibly noticeable in a
quick glance. The word abstract means not relating to concrete objects but expressing
something that can only be appreciated intellectually. This is a relatively new art form
that takes mundane objects and transfers them to the unknown. Abstract art is one of the
fastest growing fields of photography. A photographer is able to take abstract pictures of
people, landscapes, places, animals and much more. A photographer is given a broader
range to experiment abstractly when using a digital camera but a regular camera can also
be used. There are several hints to help you when taking an abstract picture.
First of all let us discuss what an abstract picture is. An abstract picture can be the
wheel of a tractor, a photograph of a blurred chess piece, a screen window, a solitary fork
sitting alone atop a table or the face of a person, unrecognizable and changed. Abstract
art allows the photographer to create new images that only they may see or to turn
ordinary objects into a spectacular work of art. A graduate student several years ago, who
majored in abstract photography, was told to take a picture of her car. The student then
took pictures of different parts of her car and then made a collage of the collection of
pictures in the shape of her car. This is considered an abstract piece of artwork. When
taking an abstract photograph of a person stop and think before you press the shutter
button. Look at the subject and pick out the physical features, traits or characteristics that
you want the abstract photograph to be composed of. If the subject has been through a
tragedy, photograph the eyes, to convey this weight of sadness. If a person is joyous or
laughing photograph their mouth in order to bring that joy and free spirit to the
photograph.
Abstract photography is great for artists who want to broaden and expand their
creative range. It is also wonderful for photographers who have a unique eye and find
beauty in things that are extraordinary. Next time you have you camera out fool around
with a few of these abstract ideas. You might just fall in love with this relatively new art
form.
There are 3 roles in this system namely,
1. Administrator Module
2. Model Module
3. Student Module
2. INTRODUCTION
What is Project allocation with Fashion Technology?
Fashion Technology is a one stop shop for all your fashion technology needs. FT
partners with small to medium fashion and apparel companies to supply support and
maintain all their IT needs. Fashion Technology offers more than just a product, it offers
service and experience. Fashion Technology believes that the project isnt completed
when the fashion software is implemented. Ongoing training is a critical factor in longterm business success.
3.4 H/W AND S/W REQUIREMENTS:
HARDWARE REQUIREMENTS:
Server side:
Minimum 4GB Hard disk
P-IV processor or equivalent
RAM 512 MB
Jdk 1.6 installed in it
Client side: Any terminal with internet connection and a web browser.
SOFTWARE REQUIREMENTS:
Server side:
Jdk 1.6 installed in it.
Apache tomcat 4.1.36 t installed in it.
Oracle 8i installed in it.
Client side:
Any Web Browser.
2. Smart City
ABSTRACT
India is the one among the fast growing countries. Every one can visit the country
throughout India. In the list of visiting places cities are the mostly visited places. Tourists are
come from different places and new to the city they dont know about the cities, cultures of the
people, local language to communicate and how to approach. Tourist guides are the persons
who guide the tourists about the city like the visiting places, their importance and how to
approach by taking money from them. Tourist guides may cheat tourists for money by telling
lies and chance to rob them. In some cities they are not available.To overcome these problems
an efficient and powerful web application called SMART CITY has implemented.
This is the online application that provides brief information about the city by using
efficient web applications. To get the details about top restaurants, hotels, lodges, events online
SMART CITY is an efficient web application.
MODULES:
The different modules in this system are
City culture
Tourist places
City branches
Hospitals
Educational institutes
Entertainment
City map
Travels
City culture:
This module contains the information about the popular tourist places
City branches:
Describes the most famous places in the city
Hospitals:
Provides information about the famous hospitals in the city
Educational institutes:
This module contains detailed information about the various educational institutions
Entertainment:
Travels:
SOFTWARE REQUIREMENTS:
Operating system
Language
Backend
:
:
:
Windows XP/2000
Java using Servlets and JSP
Oracle
HARDWARE REQUIREMENTS
Processor
:
Pentium II
Harddisk
:
40GB
RAM
:
128 MB
regarding the absence of the student would keep the parents in notice, about their wards
presence in the college. The attendance system is based around tracking student absences, since
there should be fewer of them than presences. An attendance record is stored for a student
whether they are absent/present from college. No record is stored when they are present. This is
the easiest approach in terms of record entry. Attendant is an online database system, which
provides a straightforward way for departments to record attendance information about their
students
By using this system we can accept their attendance through biometrics device.
Modules in College Messing System:
1. Admin module
2. Parent module
3. SMS and E-Mail
HARDWARE REQUIREMENTS:
Processor
: Pentium IV
HDD
: 40GB
SOFTWARE REQUIREMENTS:
Operating System
: Windows 2000 or Windows XP
Language
: JAVA
BACK-END DATABASE : ORACLE
CACHE MEMORY
MEMORY
Input Devices:
KEYBOARD
MOUSE
Output Devices:
101 Keys
Samsung
PRINTER
MONITOR
TVS
Zenith
SPEED
RAM
HARDDISK
FDD
CACHE MEMORY
MEMORY
933 MHz
128 MB or above
10.3 GB or above
1.44 MB Floppy Disk Drive
512 KB.
32 bit.
Input Devices:
KEYBOARD
MOUSE
121 Keys
Intel
Output Devices:
MONITOR
Intel
5. Web Crawler
ABSTRACT
A web crawlers is a program, which automatically traverses the web by
downloading documents and following links from page to page. They are mainly used by
web crawlers engines to gather data for indexing. Other possible applications include
page validation, structural analysis and visualization, update notification, mirroring and
personal web assistants/agents etc. Web crawlers are also known as spiders, robots,
worms etc.
Web crawlerss start by parsing a specified web page, noting any hypertext links
on that page that point to other web pages. They then parse those pages for new links, and
so on, recursively. Web-Search software doesn't actually move around to different
computers on the Internet, as viruses or intelligent agents do. A Search resides on a single
machine. The Search simply sends HTTP requests for documents to other machines on
the Internet, just as a web browser does when the user clicks on links. All the Search
really does is to automate the process of following links.
Web crawlersing speed is governed not only by the speed of ones own Internet
connection, but also by the speed of the sites that are to be Searched. Especially if one is
a Searching site from multiple servers, the total Searching time can be significantly
reduced, if many downloads are done in parallel. This work implements the Breadth
First Searching algorithm, a refined version of one of the first dynamic Web crawlers
algorithm, In order to build a major search engine or a large repository such as the
Internet Archive, high-performance Search start out at a small set of pages and then
explore other pages by following links in a breadth first-like fashion.
Operating System
Language
:
:
:
:
:
H/W REQUIREMENTS:
Processor
Ram
Hard Disk
Spam is a growing problem for email users, and many solutions have been proposed,
from a postage fee for email to Turing tests to simply not accepting email from people
you don't know. Spam filtering is one way to reduce the impact of the problem on the
individual user (though it does nothing to reduce the effect of the network traffic
generated by spam). In its simplest form, a spam filter is a mechanism for classifying a
message as either spam or not spam.
There are many techniques for classifying a message. It can be examined for "spammarkers" such as common spam subjects, known spammer addresses, known mail
forwarding machines, or simply common spam phrases. The header and/or the body can
be examined for these markers. Another method is to classify all messages not from
known addresses as spam. Another is to compare with messages that others have
received, and find common spam messages. And another technique, probably the most
popular at the moment, is to apply machine learning techniques in an email classifier.
The Spam filter implemented is used to block spam also called unsolicited email. It uses
statistical approach called Bayesian filtering to block the spam. First of all
the program has to be trained using a set of spam and non-spam mails. These are put in a
database. The performance increases with the number of training it gets. When a new
mail comes it is tokenized and probability of each word is found by looking into the
database. The total probability is found out and if it is greater than 0.9 it is marked as
spam. With good training it can block 99% of the spam mails with 0 false positives.
Bayesian Filtering In a nutshell, the approach is to tokenize a large corpus of spam and a
large corpus of non-spam. Certain tokens will be common in spam messages and
uncommon in non-spam messages, and certain other tokens will be common in non-spam
messages and uncommon in spam messages. When a message is to be classified, we
tokenize it and see whether the tokens are more like those of a spam message or those of
a non-spam message. How we determine this similarity is what the math is all about.
It isn't complicated, but it has a number of variations.
Theory of Operation Probabilities in this algorithm is calculated using a degenerate case
of Bayes' Rule. There are two simplifying assumptions: that the probabilities of features
(i.e. words) are independent, and that we know nothing about the prior probability of an
email being spam. The first assumption is widespread in text classification. Algorithms
that use it are called "naive Bayesian.' If spammers get good enough at obscuring tokens
for this to be a problem, we can respond by simply removing white space, periods,
commas, etc. and using a dictionary to pick the words out of the resulting sequence. And
of course finding words this way that weren't visible in the original text would in itself be
evidence of spam.
SOFTWARE REQUIREMENTS:
Operating system
:
Windows XP/2000
Language
:
Java using JSP
Web Server
:
Apache Tomcat 6.0
Backend
:
Oracle 9i o 10g
Web Browser
:
ie,firefox,chrome
Scripting Language
:
Java Script
Web Designing
:
HTML,CSS
HARDWARE REQUIREMENTS
Processor
:
Pentium II
Harddisk
:
40GB
RAM
:
128 MB
ABSTRACT
This project is aimed at developing a web-based system, which manages the
activity of Student Project Management and Online Testing. This is a system used by
Educational Institutions or other organizations, which are
willing to give student
projects. This system will manage the database and maintain a list of all student groups
that have registered on this site, conduct their online test and shortlist those students who
have passed the eligibility criteria as set by the professors.
SOFTWARE REQUIREMENTS:
Operating system
Language
Web Server
Backend
Web Browser
Scripting Language
Web Designing
:
:
:
:
:
:
:
Windows XP/2000
Java using Servlets and JSP
Apache Tomcat 6.0
Oracle 9i
ie,firefox,chrome
Java Script
HTML,CSS
HARDWARE REQUIREMENTS
Processor
Harddisk
RAM
:
:
:
Pentium II
40GB
128 MB
AdXpress
Abstract
AdXpress is the largest single source of online intelligence for marketing,
advertising, media and research communities worldwide. AdXpress offers a
FREE World Advertising and Marketing News email service, ensuring the top
global stories are delivered daily to your inbox. Our free classifieds will expose
your ads to local, regional and national buyers in different countries across
the globe. AdXpress is a full featured classified ad manager website.
AdXpress is designed to seamlessly integrate ads in this website.
Our AdXpress ad web site is organized using an easy-to-follow index so that
you can locate the classified ads you're interested in quickly and easily. We
hope you'll enjoy your visit and you will opt this site for placing the ads
forever and you will definitely add our site as a bookmark in your web
browser. Please come back and visit us again soon.
Welcome to AdXpress. We are pleased to be able to offer you free classified
advertising over the Internet. AdXpress splits your screen up into various
sections. At the home page there are list of menu options. These allow you to
go straight to a category you want by navigating through the sub options.
Existing System:
Here the existing system is nothing but manual traditional new paper systems
in which we can post the ads then the customer of new paper can only see these
details. In this system the company will store the business information in a record
which is not safe. We need assign the tasks and get status of the tasks from an
employee manually.
Disadvanatges:
Ad info can accessible for the customers of our new paper
Allows to post limited no of ads
Difficulty in managing different ads in different categories
Difficulty in updated the new links for each and every time
Difficulty in updated the yellow pages information
Difficulty in managing daily business activities of the company
Difficulty in tracking the tasks.
Proposed system:
Here the proposed system is to replace an existing system with
a software solution using which we can post the ads in a classifieds portal sothat the
customer this info from online by sitting at the home. Apart from it we can also post
links and yellow pages information. We can track the tasks related to our ad business
very easily from online.
Advantages:
1.Posting the ads in a portal which the customers can access from online
2.Posting new links and yellows info which the customer can utilize from
Online
3.Allows to company to efficient manage their tasks
4.Allows the company to manage their agents and observe the business
5.through an agent.
6. Allows to categorize the ads which customers to find out the
Information
7. Very easily
:
:
:
SOFTWARE
JDK1.5.0,
Apache Tomcat 5.0.25,
MYSQL 5.0
OPERATING SYSTEM :
Broadwalk
ABSTRACT
The project entitled BROADWALK REALERS NETWORK is developed for
organization of NAVEEN TILES Pvt. Ltd located in Rajastan.The developed
system helps the organization to receive orders through online for product tiles that
can be supplied by the organization.
This Activity includes three modules customers,dealers and administrator.Customer
module facilitates the customers to place order through online,and can view
catalog information provide by organization.In this module each customer order
will be verified to determine whether author dealer existing in the area specified
by customer.If dealer existing then the customer order will be redirected to
corresponding dealer otherwise those orders will be registered as direct customers
orders to Administrator.
Dealer module facilitates authorized dealers to customer orders status in their
area,to place order ,to manage their details in Administrator records.
Administrator module facilitates the Administrator to view direct customers order
status,dealers order status and also to maintain transport charges info and products
catalog information.Administrator can also appoint new Dealer and remove existing
Dealer.
The project developed on platform windows98 using software HTML,JSP,JDBC,
JavaScript, JavaMail and jdk1.4 with backend database Oracle 8.0.
SOFTWARE REQUIREMENTS:
Operating System
Windows xp
Client Side
HTML,JavaScript.
ServerSide
Back-end
Server
:
:
Oracle 10g
Apache Tomcat 5.0
HARDWARE REQUIREMENTS:
PROCESSOR
Pentium 2 366mhz
Monitor
HardDisk
10GB
RAM
32MB
Mouse
Digital
Keyboard
Contelligent
Abstract
Contelligent is a component-based Web Content Management
solution. This system is based on the convenience of the students
to communicate with the resources provided by the COMPUTER
AIDED LEARNING TOOL section of the university.
This project is aimed to provide services to students over
Internet, each student is given with a unique id and as the student
logs on into the system he will be given access to anonymous
number of sections.
E x a m Ti m e Ta b l e s e c t i o n g i v e s t h e i n f o r m a t i o n o f t h e
examination timetable of a course. This section is updated
a c c o r d i n g l y.
Library is a special section. This section deals with all the
books in the library and their management. This section
further divided based on the different categories like
computers, business, finance, and accounts. The status
of the book i.e. if that particular book is available or not
is displayed.
The
system
uses
2
different
types
of
users
1.
administrator
2. Normal user (student) 3. Faculty 4.
Corporate User
Required Hardware:
Pentium IV Processor.
256 MB RAM.
80 GB Hard Disk space.
Ethernet card with an Internet and Internet zone.
Ezeemerchant
ABSTRACT
The popularity of interactive media such as the World Wide Web
(WWW) has been growing at a very rapid pace (see, e.g., GVU 1999).
From a marketing perspective, this has manifested itself primarily in
two ways:
1. A drastic increase in the number of companies that seek to use
the WWW to communicate with (potential) customers, and
2. The rapid adoption of the WWW by broad consumer segments
for a variety of purposes, including pre purchase information
search and online shopping.
The combination of these two developments provides a basis for
substantial growth in the commercial use of interactive media for
shopping called Online Shopping.
We conceptualize this behavior as a shopping activity performed by
a consumer via a computer-based interface, where the consumers
computer is connected to, and can interact with, a retailers digital
storefront (implemented on some computer) through a network (e.g.,
products and the cart. He can also see the customer orders and
confirm the order to deliver the good. The customer and the shopper
can track the orders at any point of time. The main features of this
system:
1. The user can shop the different branded items under one roof.
2. The shopper can change the any page dynamically with out
touching the source code.
3. The shopper can change different processing charge values
dynamically.
4. The shopper can check the credited amounts and select different
options to confirm the orders or else send the mails to customers
using manageable email templates.
Operating System
Windows 2000server and professional
Hardware platform
Pentium 4 processor
256 MB RAM
Software specifications
J2SDK 1.4
J2SDK 1.4 J2EE
MySql 5.0
Required Software
Windows 2000/ XP operating system.
Internet explorer 5.0 and Netscape navigator.
MySQL Server.
Java/J2EE.
Web Server as Tomcat.
Loan Amortizer
ABSTRACT
The life of a person is so hectic that he has to look after
his family affairs as well as grow along with the rest of the society. In this
struggle, sometimes he has to go for a loan to make small purchases for his
family and repay the loan as per the schedule. In this case, small companies
lending the loan on easy installments would be his choice. Loan Amortizer is a
software that enables a lending company like Citi Financials, Fullerton etc to
promote a transparent and secured environment in lending the loans as well as
their recovery process.
The administrator of this software can just view the information besides adding
new users and employees and changing their passwords. Thus he cannot
interfere with the loan process or payments. This part is dealt by manager who
has authority to issue the loan to an individual. He can provide information on
which type of loan being issued and to whom.
Accountant and agents of the finance company can view all the details of the
customer. When a customer makes a payment, they can store the payment
details into the database. Thus, Loan Amortizer is an online software application
which fulfills all the requirements of a typical finance company. It provides the
interface to users in a graphical way to manage the daily transactions as well as
historical data. The users can provide a clear picture to the customers regarding
how much is already paid and how much is still pending. By extending this
software, it is possible to make the customer to directly view his transactions
right from beginning. This will eliminate any mischief played by any third party
person. Also provides the management reports like Released Loans, Payments,
Rejected Applications, Submitted Papers and Finance Report.
This application maintains the centralized database so that any changes done at
a location reflects immediately. This is an online tool so more than one user can
login into system and use the tool simultaneously.
The aim of this application is to reduce the manual effort needed to manage
transactions and historical data used in a finance company. Also this application
provides an interface to users to view the details like the Released Loans and
Finance Report etc.
Technologies used: J2SE, Servlets, JSP, JDBC and Java Script.
Operating System
Windows 2000server and professional
Hardware platform
Pentium 4 processor
256 MB RAM
Transport Plus
ABSTRACT
It is every companys need to see the welfare of its
employees by providing transportation for the employees to attend their duties
successfully. This is the reason many MNC companies maintain their own fleet
and sometimes takes the help of third party transport systems also. When
several employees wish to utilize the bus services provided by the company,
naturally the company employees need a system to allot the buses and oversee
the transportation. Transport Plus is a software that quenches this need.
Transport Plus has four types of users. The administrator
of this software will be able to create new users and change the passwords. He
can add or update the employee information in the company. He can add and
view the information of Transport categories and also available routes.
Depending on the users demands, new route and also new pick up points can be
added to the database. Beyond this, the administrator can also act as a normal
user and book a bus or cab for himself. He has authority to place a cab request
or cancel a request for a bus. This system calculates fare depending on three
categories: short distance, medium and long distance and the fare would be
deducted from the employees salaries.
When an employee of the company wants to avail the
transportation facility, he will forward a request which will be approved by the
administrator depending on the availability of room in the bus. When an
employee wants a cab, it will be arranged by the approver and later depending
on the recommendation of the project manager the charge may or may not be
deducted from the employee salary.
Approver is another user of this system. He can view the
details of transport categories, routes and pick up points. He can approve a
request for a cab from an employee and store the information of assigned cab.
The transport people can view all the information related
to who are the employees utilizing the transportation. They can take a decision
to approve or disapprove the requests placed for transportation. They can
arrange a cab physically for the employee and send the cab details to the
employee who placed the request.
Users and guest users are employees who want to use
the transport facility. The users can place their request for a bus to reach the
company or for a cab when they want to go to a different place. These requests
are approved or declined by the transport people or project manager.
This application has rich user interface so that novice
users can access easily. This application provides the management reports like
followed by a question and answer and finally when he finishes the exam there instantly
system display his marks which he scored.
COMPUTER AIDED LEARNING TOOL is developed in a web based technology with
backend as Oracle Server. This system helps the user to not waste his time in distance training
education when compared to remote education and finally he could instantly view the marks
which he scored in the online exam.
S/W Requirements:
Technologies
Database
: Oracle 9i
H/W Requirements:
P IV 900 MHz+
128 MB RAM
40 GB HDD
E-School
ABSTRACT
The project entitled as E-SCHOOL helps the school/college management to
communicate the details of the attendance, marks, cultural activities and other
information to the students/faculty/parents through Mail/SMS. This system makes use of
threads to calculate the attendance.
Then by generating reports on each day it will identify the students who have less
percentage of attendance than the required aggregate percentage. It sends the messages to
the mobiles of the parents about the attendance and marks details. Apart from this
whenever the parents want to know about their childrens attendance and marks they can
directly login into the site or they can send message to the administrator by giving that
particular students registration number and they can get return message.
Current Scenario
In the existing system, the details of the students regarding their attendance and
marks are being maintained in the database and a print of it is made and sent to parents by
post monthly once. The problems here are:
Proposed System
This system helps the college to communicate the details of the attendance and
marks to the parents through Mail/SMS. By generating reports daily, weekly, monthly it
will identify the students who have less percentage of attendance than the stipulated
attendance percentage and send SMS and Mails to the parents.
Salient Features:
Software Requirements
Operating System
User Interface
Client-side Scripting
Programming Language
Web Applications
IDE/Workbench
Database
Server Deployment
:
:
:
:
:
:
:
:
Windows XP/2003
HTML, CSS, jsp
JavaScript
Java
JDBC, Servlets, JSP, JavaMailAPI
Net beans
Oracle 10g
Tomcat5.5.9
:
:
:
Pentium IV
40GB
256MB
Hardware Requirements
Processor
Hard Disk
RAM
System Analysis
Existing Systems:
Software Requirements :
Operating System
Linux
Programming Language
Web Applications
JSP,XML
Back End
Font End
Windows
:
:
:
:
XP/2003
Java
JDBC,
or
Servlets,
Hardware Requirements:
Processor
Hard Disk
RAM
:
:
:
Pentium IV
40GB
512MB or more
Web shopping
ABSTRACT
Web shopping
Web shop is the process consumers go through to purchase products or services over the
Internet. An online shop, eshop, e-store, internet shop, webshop, webstore, online store,
or virtual store evokes the physical analogy of buying products or services at a bricksand-mortal retailer or in a shopping mall.
The metaphor of an online catalog is also used, by analogy with mail order catalogs. All
types of stores have retail web sites, including those that do and do not also have physical
storefronts and paper catalogs. Webshop is a type of electronic commerce used for
business-to-business (B2B) and business-to-consumer (B2C) transactions.
Contents
Benefits of Webshopping
1. Bargaining power of consumers. They enjoy a wider choice
2. Supplier power. It is more difficult for consumers to manage a non-digital
channel.
3. Internet increases commoditization
4. Threat of new entrants. Online means it is easier to introduce new services with
lower over-heads
5. Threat of substitutes
6. Rivalry among competitors. It is easier to introduce products and services to
different markets
View
You will find a View List option on the client services page web shopping web
site, where you can view the name (or part of the name) or the product code of any
product. This will view the products that matched your search criteria.
Category Navigation
On the left and top of on web shopping you will find 'client'. By clicking on you can log
into respective product surfing where all products will be listed related to the category
you chose. On the page you will find view items and purchases.
Brand Navigation
Requesting Products
If you cannot find a product that you are looking for, you are welcome to send
your feedbacks and we will either send you a link to the specific product or we will try to
source the product that you are looking for and add it to the web site.
New Users:
If you have shopped at any Web Shopping enabled store in the past, you will
already have a web shopping account, and you would be able to login using your Web
Shopping Account. If you are unsure if you have a web shopping account, you can
register your by click on the sign in new user link, this will tell you if you are
registered.
bottom of your purchase list page. Just note that you can only cancel an order if the order
has not been shipped yet.
Remote Locations
Remote locations are any area that does not fall in the Web shopping outlet city
limits.
Suggestions
By visiting our Suggestions section, you can subscribe to any of our exciting
search for items, and they will keep you up to date of the latest happenings on
Web shopping.
E-Talk
Abstract:
E-Talk supports multiple chatrooms. You can open new chatroom by following open
a chatroom link. You can manage a chatroom by selecting the chatroom in the list box
named Manage Chatroom . You can backup all the chatrooms by following
Backuphatrooms link.
Existing Systems:
There is no existing system. Here we have developed this application
just to provide chat rooms to chat different kind of moderators. This is
a system provides all the basic features pf a ChattingSystems.
ProposedSystems:
The first step of analysis process involves the identification of need.
The success of a system depends laragely on how accurately a
problem is defined thoroughly investigated and properly carried out
through the choice of solution .
Software Requirements :
Operating System
Linux
Programming Language
Web Applications
JSP,XML
Back End
Font End
Windows
:
:
:
:
XP/2003
Java
JDBC,
Processor
Hard Disk
RAM
:
:
:
62.
Servlets,
Hardware Requirements:
Pentium IV
40GB
512MB or more
or
The project entitled Telecom Inventory Maintenance System deals with fully
automated system used by the Telecom department.
Telecom industry is one of the major sectors, which provides so many services to
their customers such as request for a new connection, change of number, billing etc.
Maintaining all these services manually is complicated process.
The main objective of this project is to automate the services provided by
telecom system, by which customer can use all the services online.
This project has been divided into four modules.
1. Applications
2. Entries
3. Enquiries
4. Complaints
The Applications module provides following services.
A customer can apply for a new telephone connection by filling the form.
He can request for transferring phone connection to another location.
He can modify the mode of bill payment details.
He can also cancel his phone connection.
The Entries module provides following services.
If the customer requested for change of telephone number, here if we
enter the old number, it will display the new number.
The Enquiries module provides following services.
The customer can make a request about his bill.
He can also know the information about changed numbers.
He can also ask about the status of his applications.
The Complaints module provides following services.
The customers can complaint regarding the service and all other issues
Existing System:
The existing system is a manual one where the entrant has to go to the Telecom
Connection System and get details of the company for getting the new connection. Here
it is getting a tedious one for the user to go and manually register with it. And in the
process only a few users are take the connection. To overcome this they have proposed
for the online Connection.
Problem Statement:
The previous system was a manual system. So, the system is not available to all
globally. To make the system available globally, it is now proposed to be web enabled.
In the existing manual process entrants cannot get the information of all the
telecom system where by registering with Telecom Connection System they can get the
updated share values and also since the registration process is atomized, participation in
Connection is easy to the entrants.
Proposed System:
The proposed system is the online registration of the entrants with the company.
By atomizing this Connection process, the entrants enjoy the facility to participate from
anywhere. Entrants can also get the information online about all the telecom system. By
this process the user can get all the information of the Connection process from where
ever he wants as there is no need for him to come to the office and register for
Connection. Thus the proposed system is efficient all the way.
1 HARDWARE AND SOFTWARE SPECIFICATION:
Hardware Environment:
The selection of hardware is very important in the existence and proper working of
any software. In the selection of hardware, the size and the capacity requirements are also
important.
The Web Based Manufacturing System can be efficiently run on Pentium system
with at least 128 MB RAM and Hard disk drive having 20 GB. Floppy disk drive of 1.44
MB and 14 inch Samsung color monitor suits the information system operation.(A Printer is
required for hard copy output).
Processor
:
Intel P-III based system
Processor Speed
:
250 MHz to 833MHz
RAM
:
256MB
Hard Disk
:
40GB
Software Environment:
One of the most difficult tasks is that, the selection of the software, once system
requirement is known is determining whether a particular software package fits the
requirements. After initial selection further security is needed to determine the desirability of
particular software compared with other candidates. This section first summarizes the
application requirement question and then suggests more detailed comparisons.
Operating System
Browser
Web/Application Server
Database
Database Connectivity
Java Technologies
Scripting Technology
--------
Windows 95/98/NT/2000
IE
Tomcat Server
Oracle
JDBC
Java (Servlets, Jsp)
JavaScript
Corporate user will register to the corporate client and corporate client
sends all the registration details to the super user, and after the registration the
end-user will submit the HD problems to the super user. When the super user
gets the HD problems he will check the details of the end-user and send the
responses to the support team who will message the responses to the corporate
users.
Work Flow Management System is very useful for the corporate clients
who want their business to extend world wide i.e., by keeping contact and good
relation with the corporate users who buy their products. The corporate clients
who buy Work Flow Management System for their business can know what are
the various problems of their product which are coming from their users so that
they improve their products to the user needs. Any user who knows a little about
of the computer can handle Work Flow Management System
Software Requirements:
Jsp,servlets
Oracle10g.
HARDWARE REQUIREMENTS
Processor
Pentium II
Harddisk
40GB
RAM
128 MB
E-Bank
ABSTRACT
The main objective of this proposed system is to online all
the activities of a bank. The system is like to enable the bank employees to open accounts
for their customers with ease and to add the details, to transfer amount from one account
to another account and doing all the activities related to loan, making all type of
transactions. Using the system employees can also generate different types of modules.
Issue Loans
Generate Reports .
Using the system client can also generate different type of modules.
Taking all the advantages involved in computerizing, the proposed system Net
Banking System integrates all the manual activities by linking them under a single
head. This System processes the day-to-day activities and generates tender reports that
help the user to get a good grasp of the situation(s) and take decisions quickly and intime.
HARDWARE SPECIFICATIONS
Processor
:
Intel Pentium III or Above
Ram
Cache
Hard disk
:
:
:
256 MB or more
512 KB
16 GB hard disk recommended for primary partition.
Windows XP or later
J2EE,TOMCAT
ORACLE-8i
Tutelage Imprinter
ABSTRACT
Education has become a part of every human. There are several types of education
systems presently running. Tutelage Imprinter is one of the education systems that are under
process long before but only committed to the University.
TUTELAGE IMPRINTER is an out classes study that allow you to educate when you
have a desire and time. A chance to study in any place you like, during your summer vocations
or while some other activities. The only thing is that you should be provided with all the
necessary materials.
This system maintains all the course details so that the users of this system after
registration views the list of the course details and also the scheduled course details. After
finishing the course the user will test his performance by attending an online examination
followed by a question and answer and finally when he finishes the exam there instantly
system display his marks which he scored.
Tutelage Imprinter is developed in a web based technology with backend as Oracle
Server. This system helps the user to not waste his time in distance training education when
compared to remote education and finally he could instantly view the marks which he scored
in the online exam.
S/W Requirements:
Technologies
Database
: Oracle 9i
H/W Requirements:
P IV 900 MHz+
128 MB RAM
40 GB HDD
Easy Journey
ABSTRACT
India is the one among the fast growing countries. Every one can visit the country
throughout India. In the list of visiting places cities are the mostly visited places. Tourists
are come from different places and new to the city they dont know about the cities,
cultures of the people, local language to communicate and how to approach.
Tourist guides are the persons who guide the tourists about the city like the
visiting places, their importance and how to approach by taking money from them.
Tourist guides may cheat tourists for money by telling lies and chance to rob them. In
some cities they are not available.
To overcome these problems an efficient and powerful web application called
EASY JOURNEY has implemented.
This is the online application that provides brief information about the city by
using efficient web applications. To get the details about top restaurants, hotels, lodges,
events online EASY JOURNEY is an efficient web application.
SOFTWARE REQUIREMENTS:
Operating system
:
Windows XP/2000
Language
:
Java using Servlets and JSP
Backend
:
Oracle
HARDWARE REQUIREMENTS
Processor
:
Pentium II
Harddisk
:
40GB
RAM
:
128 MB
Software Environment
Operating System : Windows 2000/XP/NT
Front end software: jdk1.5
Back end software : ORACLE8i
Hardware Environment
Processor
Ram
Hard disk
Monitor
:
:
:
:
1.Protocol Scrubbing
ABSTRACT
This paper describes the design and implementation of protocol scrubbers.
Protocol scrubbers are transparent, interposed mechanisms for explicitly removing
network scans and attacks at various protocol layers. The transport scrubber supports
downstream passive network-based intrusion detection systems by converting ambiguous
network flows into well-behaved flows that are unequivocally interpreted by all
downstream endpoints. The fingerprint scrubber restricts an attackers ability to
determine the operating system of a protected host. As an example, this paper presents
the implementation of a TCP scrubber that eliminates inserton and evasion attacks
attacks that use ambiguities to subvert detectionon passive network-based intrusion
detection systems,while preserving high performance. The TCP scrubber is based on a
novel, simplified state machine that performs in a fast and scalable manner. The
fingerprint scrubber is built upon the TCP scrubber and removes additional ambiguities
from flows that can reveal implementation-specific details about a hosts operating
system.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
4.Hop By Hop
ABSTRACT
IP multicast is facing a slow take-off although it has been a hotly debated topic
for more than a decade. Many reasons are responsible for this status. Hence, the Internet
is likely to be organized with both unicast and multicast enabled networks. Thus, it is of
utmost importance to design protocols that allow the progressive deployment of the
multicast service by supporting unicast clouds. This paper presents HBH (hop-by-hop
Software Requirements
Operating System
Other Tools & Technologies
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
6.Image Rendering For A Grid Tech
ABSTRACT
Grid Computing is an advanced technology of distributed computing. A Grid
is a collection of computers, storage and other devices which are joined together by any
means of communication like internet and which can be used to manage information and
solve their problems among themselves.
Grid Computing allows usage of the unutilized resources of other systems.
This is achieved by distributing the workload of the system to the other systems in order
to use their unused resources such as their memory, processor, etc which results in
balancing the workload, decreasing the network traffic, bandwidth, etc. This concept is
used in our project to render a large image in a very short time by distributing the image
to many systems for using their resources.
As the workload is evenly distributed among the grid network, even the large
work can be done in a short time itself. The main scope is that using the unused resources
to complete the work efficiently. This project helps to use the resources efficiently and
cost effective. Grid Computing is about making large amounts of computing power
available for applications and users. Collaborative development of Java Grid Engine
technology provides the proper development framework to ensure that Grid Engine
technology meets the requirements of the largest number of users.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
Network Analyzer
ABSTRACT
This paper describes how to use an AEA Technology network analyzer to tune an
antenna. This paper discusses tuning issues at a general level; no specific model of
antenna is addressed here. For best link efficiency, you must properly tune the antenna to
resonance. Additionally, if the antenna has two or more adjustments available, you
should also tune the antenna for the optimum match. Resonance occurs when the reactive
portion of the antenna impedance is zero. This causes the voltage to be in phase with the
current, and allows the transmitter to generate its maximum power. SWR or return loss
readings do not provide enough information to determine resonance. You must use a
vector impedance reading to see resonance. The transmission lines used to feed the
antenna can add a layer of confusion to the measurements. If practical, tune the antenna
by itself first, then add in the feedline for more measurement
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, NetWorking
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
: Windows 95/98/NT/2000
: Java, Swings, Jdbc
Hard Disk 40 GB
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, Networking
These embedded data are can be visible or invisible depend on the particular
applications and the requirements of applications. , and can later be detected or extracted.
It has made a considerable progress in recent years and attracted attention from both
academia and industry. It plays a vital role as it allows to identify the legitimate owner,
track authorized users via fingerprinting or detect malicious tampering of the document.
Several watermarking methods exist for every kind of digital media .for example Text
documents, images, video, audio even for 3D polygon models, maps and computer
programs. Our project deals with watermarking the images with other images and text.
Modules:
1. Text on image
2. Image on image
Software Requirements
Operating System
: Windows 95/98/NT/2000
Web/Application Server : Tomcat
Database Server
: Oracle 8i
Other Tools & Technologies
: Java (JDK), Servlets (JSDK), JavaMail
Hardware Requirements
Pentium IV
64 MB Ram
Hard Disk 4.3 GB
JBrowser
ABSTRACT
Our project deals with developing some tools, which help in enhancing the activities at
different stages in the software development life cycle (SDLC). Our tools will fall under the
category of CASE tools which enable sophistication during the software development.
We aim at developing two tools, (a) Code Analyzer ( jBrowser ) and (b) Log Reader.
The jBrowser would be a tool that would help the user track control flow between java classes
via method calls. Given a starting point, this tool tracks the entire path within a particular
location spotting various method calls under different scenarios. We aim at building this tool as
an effective tool to understand the control flow while reengineering and reverse engineering
and as a testing tool which would identify the broken links between the java classes.
The Log Reader is another simple tool. This tool focuses on presenting the user with a
user friendly GUI, using which the user can query and extract useful information from the log
files generated by an application server in an interactive and understandable manner.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, Networking
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, Networking
15.Webs Eye
ABSTRACT
Webs Eye is software to develop web pages .Many people is aware of world
wide web and web pages, but not even capable of dreaming a web page design. The
Webs Eye is q user friendly software which will assist you in designing a web page and
putting your creative ideas in the web to change you really professional in the Worlds
Eyes. Suppose if you are a professional Webs Eye will show a different face as an
intelligent colleague to navigate you. Webs Eye uses Java @ Platform to develop an
extra featured user friendly software for creating web pages. Web page code generation is
done in HTML. The strong graphical user interface which is the unique property of this
project helps to distribute the tags intelligently . The project mainly aims at simplifying
user effort for creating a web page.
Extra features of Webs Eye
Full fledged html help covers all the areas of HTML
Inbuilt browser to have a preview
Integrated IE allows downloading
Two modals one for Beginners and other for
Professionals
Installation kit
Vast library of button objects
Software Requirements
Operating System
Other Tools & Technologies
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings, Networking
Hardware Requirements
16.Web Extractor
ABSTRACT
A web web extract is a program, which automatically traverses the web by
downloading documents and following links from page to page. Web search engines to
gather data mainly use them. Other possible applications include page validation,
structural analysis and visualization; update notification, mirroring and personal web
assistants/agents etc. web extract are also known as spiders, robots, worms etc.
web extracts start by parsing a specified web page, noting any hypertext
links on that page that point to other web pages. They then parse those pages for new
links, and so on, recursively. Web-Importer software doesn't actually move around to
different computers on the Internet, as viruses or an intelligent agent does. An importer
resides on a single machine. The importer simply sends HTTP requests for documents to
other machines on the Internet, just as a web browser does when the user clicks on links.
All the importer really does is to automate the process of following links.
Web importing speed is governed not only by the speed of ones own
Internet connection, but also by the speed of the sites that are to be downloaded.
Especially if one is an importing site from multiple servers, the total downloading time
can be significantly reduced, if many downloads are done in parallel. This work
implements the Breadth First Importing algorithm, a refined version of one of the first
dynamic Web search algorithm, In order to build a major search engine or a large
repository such as the Internet Archive, high-performance importers start out at a small
set of pages and then explore other pages by following links in a breadth first-like
fashion.
Modules:
1.
2.
S/W Requirements:
Operating System
Language Name
H/W Requirements:
Processor
Ram
Hard Disk
Modules
Hardware Specifications:
Intel P-III Processor
64 MB RAM
40 GB Hard Disc
Software Specifications:
Operating System
Language
Visual Editor
ABSTRACT
Providing the users with the create documents main purpose of this application.
The project implementation is mainly concerned with create documents are
maintained by our editor. The project has been developed by utilizing
JAVA2, using Swing, IO, and wt(Abstract Window Toolkit) The successful
platform used is Windows and has its application in windows based System.
The abstraction for a System is its Documents, the usual methods in now-adays based on Windows Environments. The term Word Processing refers to
the activity carried out using a computer and suitable software to create,
view, edit, manipulate, transmit, store, retrieve and print documents.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings
19. Stegohider
ABSTRACT
Steganography is the art of hiding information. There are a large number of
Steganographic methods used in different applicatons.It is extensively used in Digital
Water marking, communication within closed community with additional degrees of
security. An attempt is being made to implement a new technique , entitled
Steganographic Application Tool, for image encoding in steganography. It provides
more security for data transfer on Internet and other networks. Our intention is to hide the
existence of the message; While Cryptography scrambles a message so that it can not be
understood. Using Steganography a secret message can be transmitted without the fact of
the transmission being discovered. This hiding of data can be done in three different
media such as text, image and audio files. Though there are variety of image formats to
implement the algorithms used in this system, we use the JPEG format to embed the Plain
text as it contains the compressed image format. In this technique, firstly the pixels values
(RGB values) of the image in which the plain text is to be embedded are extracted. The
bits of the plain text into the two LSB bits of the RGB values in the image. The
transparency bits of the pixels are not disturbed. The fact that we are embedding the plain
text into the two LSB bits enables the recipient to get the original image without any
distortions. In order to provide more security, we are first encrypting the message using
DES algorithm and then cipher text as the input to our technique and the same message
will be extracted and decrypted at the receiver end.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
: Windows 95/98/NT/2000
: Java, Swings
EMBEDDING
DATA
INTO
VIDEO
FILE
WITH LESS DISTORTION USING LSB TECHNIQUE
ABSTRACT
The Embedding Data into Video File is an application which deals
with security during transmission of data across the network. Security for the data is
required, as there is always a possibility for someone to read those secret data. The
system deals with implementing security using steganography. Steganography is the art
of hiding information in ways so as to prevent detection of hidden messages.
Data Embedding into Video File is software, which tries to alter the
originality of the data files in to some encrypted form by using Tiny Encryption
Algorithm. Encryption of data plays a vital role in the real time environment to keep the
data out of reach of unauthorized people, such that it is not altered and tampered. After
encryption, the files can be transferred securely by using steganography. We are using
video as stegno media to embed the encrypted data file .So this has been defined as
Video Steganography. The application should have a reversal process as of which
should be in a position to deembed data file from video and decrypt the data to its
original format upon the proper request by the user. The goal of our project is to design a
tool for providing security to the system during transmission of data through the network.
The project is developed using graphics in java swings.
Software Requirements
Operating System
Other Tools & Technologies
Hardware Requirements
P IV 2.4
: Windows 95/98/NT/2000
: Java, Swings
128 MB Ram
Hard Disk 40 GB
This project deals with the functionalities of the node systems connected through
a network. This system implements Remote control at the application level.
This project controls the remote systems by performing the node operations like
shutdown, checking files and its permissions, etc. As the application is built purely on
JAVA using RMI APIs, it is platform independent and the users can run their application
using this software.
Java also provides a strong development platform in its own right for remotecontrol solutions. This system helps in handling the operations of the administrator, in
order to avoid time delay by executing the tasks, from the server itself.
This enhances the work efficiency of the administrator and also reduces the
physical work strain. It can also be used to reduce the unnecessary power consumption in
an organization.
In the present generation systems, there is a need for the administrator has to go all
around the network in order to terminate any system that is left non-terminated.
The administrator has to take all the trouble of going to a particular system to access a
file that is needed by him.
In order to get the system configuration details of any particular system, the
administrator has to take the trouble of going to that system for obtaining the
information.
The processes that are running in a particular system can be viewed only in that
system itself by using the present generation softwares.
In order to provide security for the files from unauthorized users, the administrator
has to assign the file permissions. In the existing systems this is handled by
performing the required actions on that particular system itself.
5.3.1
In order to terminate the operations on the remote systems, the administrator can
obtain the current process details of the remote systems from the server itself.
In order to ensure the security for the files in an organization, the administrator
can provide the file access permissions.
Running rmiregistry in the client systems performs all the above operations.
Software Requirements:
OPERATING PLATFORM
Technologies
5.3.2
:
:
Hardware Specifications:
PROCESSOR
RAM
HARD DISK
VDU
KEY BOARD
LAN
:
:
:
:
:
ENABLED
PENTIUM-4
256 MB (MINIMUM)
20 GB (MINIMUM)
SVGA COLOR MONITOR
104 STANDARDS
HTTP Server
ABSTRACT
GRAPHICAL WEB Server is a web based window application.
A HTTP Server displays a browser page with a graphical user interface. Web browsers
plays a critical role in making Web content accessible to people with disabilities. Access
to Web content requires that Web browsers provide users with final control over the
styling of rendered content, the type of content rendered and the execution of automated
behaviors. The features available in Web browsers determine the extent to which users
can orient themselves and navigate the structure of Web resources. . This project HTTP
Server uses a port number to retrieve the applications on a web page This project is
depending on the port number and using this port number in the url we access the pages .
The present subject matter describes a HTTP Server stores visual representations of userselected web pages and provides a convenient way to collect web pages and related
information . Using the techniques described herein, a user can easily save information
including: a link to a web page; a thumbnail image related to the web page; a title of the
web page; information from the web page; metadata associated with the web page; and
user comments regarding the web page. In this paper we describe how we are using the
visualization system to visualize the portion of the Web explored during a browsing
session. As the user browses, the Web browser communicates the URL and title of each
document fetched as well as all the anchors contained in the document. Finally we are
creating our own server using port number.
5.3.1
Software Requirements:
OPERATING PLATFORM
Technologies
:
SWINGS,networking,JSP,Servlets
5.3.3
JAVA
Hardware Specifications:
PROCESSOR
RAM
HARD DISK
VDU
KEY BOARD
LAN
:
:
:
:
:
ENABLED
PENTIUM-4
256 MB (MINIMUM)
20 GB (MINIMUM)
SVGA COLOR MONITOR
104 STANDARDS
5.3.1
Software Requirements:
OPERATING PLATFORM
:
Technologies
:
SWINGS,networking,JSP,Servlets
5.3.4
Hardware Specifications:
PROCESSOR
RAM
HARD DISK
VDU
KEY BOARD
LAN
:
:
:
:
:
:
PENTIUM-4
256 MB (MINIMUM)
20 GB (MINIMUM)
SVGA COLOR MONITOR
104 STANDARDS
ENABLED
9. Image Compression
ABSTRACT
Image Compression is mainly used for compressing the image data with out any
significant image data or image clarity. This is for easy maintenance, network transforming and
security also provided. In this project the lousy compression techniques can be used in some
contexts where data loss cannot affect the image clarity in this area.
In some important situations image compression uses Lossless compression involves
with compressing data which, when decompressed, will be an exact replica of the original data.
This is the case when binary data such as executables, documents etc. are compressed. They
need to be exactly reproduced when decompressed. On the other hand, images need not be
reproduced 'exactly'. An approximation of the original image is enough for most purposes, as
long as the error between the original and the compressed image is tolerable.
Hardware Requirements
Pentium IV Processor.
128 MB RAM.
20GB Hard Disk space.
Software Requirements
Windows 2000 XP operating system.
J2sdk1.4.0 or higher
Pretty Good Privacy
ABSTRACT
PGP Encryption (Pretty Good Privacy) is a computer program that provides
cryptographic privacy and authentication. The first PGP version, by designer and developer
Phil Zimmermann, became available in 1991. Since then major enhancements have been made
and a wide range of products are now available from PGP Corporation and other companies.
The PGP Universal 2.x management server handles centralized deployment, security
policy, policy enforcement and reporting. It is used for automated email encryption in the
gateway and manages PGP Desktop 9.x clients. It works with the PGP public keyserver - called
the PGP Global Directory - to find recipient keys. It has the capability of delivering email
securely when no recipient key is found via a secure HTTPS browser session.
With PGP Desktop 9.0 managed by PGP Universal Server 2.0, released in 2005, all
PGP encryption applications are based on a new proxy-based architecture. These newer
versions of PGP software eliminate the use of email plug-ins and insulate the user from
changes to other desktop applications. All desktop and server operations are now based on
security policies and operate in an automated fashion. The PGP Universal server automates the
creation, management, and expiration of keys esharing these keys among all PGP encryption
applications.
New versions of PGP applications use both OpenPGP and the S/MIME, allowing
communications with any user of a NIST specified standard.
Encryption/decryption.
PGP message encryption uses asymmetric key encryption algorithms that use the
public portion of a recipient's linked key pair, a public key, and a private key. The sender
uses the recipient's public key to encrypt a shared key (aka a secret key or conventional
key) for a symmetric cipher algorithm. That key is used, finally, to encrypt the plaintext
of a message. Many PGP users' public keys are available to all from the many PGP key
servers around the world which act as mirror sites for each other.
The recipient of a PGP encrypted email message decrypts it using the session key
for a symmetric algorithm. That session key is included in the message in encrypted form
and was itself decrypted using the recipient's private key. Use of two ciphers in this way
is sensible because of the very considerable difference in operating speed between
asymmetric key and symmetric key ciphers (the differences are often 1000+ times). This
operation is completely automated in current PGP desktop client products.
Digital signatures:
A similar strategy is used to detect whether a message has been altered since it
was completed, and whether it was actually sent by the person/entity claimed to be the
sender. It is used by default in conjunction with encryption, but can be applied to
plaintext as well. The sender uses PGP encryption to create a digital signature for the
message with either the RSA or DSA signature algorithms. To do so, PGP products
compute a hash (also called a message digest) from the plaintext, and then creates the
digital signature from that hash using the sender's private key.
The message recipient uses the sender's public key and the digital signature to
recover the original message digest. He compares this message digest with the message
digest he computed himself from the (recovered) plaintext. If the signature matches the
received plaintext's message digest, it must be presumed (to a very high degree of
confidence) that the message received has not been tampered with, either deliberately or
accidentally, since it was properly signed
SOFTWARE SPECIFICATIONS:
Operating System
Language
H/W REQUIREMENTS:
Processor
Ram
Hard Disk
:
:
:
:
:
by sitting on the server machine. The list of files with the specific extension will be displayed
on the server machine.
Some of the features are:
The proposed system should be in the way, the user can enter the client system IP, file
extension, path of the file or folder very quickly.
It should display the matching files. The files should be display in the order as they
exist.
The modules are
1. User interface
2. Searching
User interface
It provides very attractive and friendly user interface. The user can easily
interact with the system ( to provide client system IP / file system extensions..Etc).
Searching
This module allows us to search the files and folders exist in client system. It
allows regular expressions to Search the files. It displays in the files in an order as
they exist in system.
ENVIRONMENT:
Operating System Server: Windows XP or later
Programming language: Java
Graphical User Interface: Java Swings API
Hardware Specification:
Issue Loans
Issue DDs
Using the system client can also generate different type of modules.
Software Specification
Operating System Server: Windows XP or later
Programming language: Java
Graphical User Interface: Java Swings,Jdbc
Hardware Specification:
follows:
Module
Module
Module
Module
Module
1:
2:
3:
4:
5:
Route Discovery.
Data Security.
Data Transfer.
Route Maintenance.
Route Disconnection
Software Requirements
Operating System
Other Tools & Technologies
: Windows 95/98/NT/2000
: Java
Hardware Requirements
P IV 2.4
128 MB Ram
Hard Disk 40 GB
33.Web Importer
ABSTRACT
A web importer is a program, which automatically traverses the web by
downloading documents and following links from page to page. Web search engines to
gather data mainly use them. Other possible applications include page validation,
structural analysis and visualization; update notification, mirroring and personal web
assistants/agents etc. Web importers are also known as spiders, robots, worms etc.
Web Importers start by parsing a specified web page, noting any hypertext links
on that page that point to other web pages. They then parse those pages for new links, and
so on, recursively. Web-Importer software doesn't actually move around to different
computers on the Internet, as viruses or an intelligent agent does. An importer resides on
a single machine. The importer simply sends HTTP requests for documents to other
machines on the Internet, just as a web browser does when the user clicks on links. All
the importer really does is to automate the process of following links.
Web importing speed is governed not only by the speed of ones own Internet
connection, but also by the speed of the sites that are to be downloaded. Especially
if one is an importing site from multiple servers, the total downloading time can be
significantly reduced, if many downloads are done in parallel. This work
implements the Breadth First Importing algorithm, a refined version of one of
the first dynamic Web search algorithm, In order to build a major search engine or
S/W Requirements:
Operating System
Language Name
H/W Requirements:
Processor
Ram
Hard Disk
34.Atm Simulator
ABSTRACT
The project ATM STIMULATOR is beneficial for the any people who are in
villages or in ruler area or in metro city. A person who needs a fast cash and fast and hard
cash. We presents a software ATM machine for the transaction of money and saving of
money. The database is maintained for each individual account. This project has been
designed as such the ATM using the software. In our project overall several forms have
been created. For these form of records this database is used. This project is maintains a
database for different records, it means that for the account transactions.Advantages:
Fast accessing
No manpower is needed
No need to go to bank to deposit
Time consuming process
Hardware Specifications:
4 GB Hard Disc
Software Specifications:
Operating System
Language
Database
:
:
:
Hardware Specifications:
Software Specifications:
Operating System
:
Windows NT/ Windows 98
Language
:JAVA using SWINGS/AWT,Networking
Extreme Pc
ABSTRACT
XtremePC is an open source project has been developed using Java RMI-NIO and
Win32 API with Windows XP Look & Feel. It provides opportunity to access files of your
remote PC from anywhere in the world. You can even run any type of file with associated
executable files, turn off the remote PC, restart, log off, lock etc.
You can also download files from your Remote PC to the current PC, and upload files
from the currently using PC to the Remote PC. You will also be able to know the file
information before downloading and uploading files so that you would always know the file
size which is being downloaded or uploaded. Caching the contents of drives, folders added
extremely fast navigation so that you will always feel that you are accessing local drives.
It also ensures the security of passed information both ways using Data Encryption
Standard (DES) algorithm using Electronic Code Book (ECB). The Remote PC is always
protected by password. You have to know the password in order for using the Remote PC from
the current PC.
Here is a snapshot attached with this email, how you will see your PC out of your
house. However, Lite Edition does not support XP Look & Feel.
Whats new?
No more command-line interfaces. Now it is loaded with Graphical User Interface with
Windows XP Look & Feel. Those who faced problem loading XP Look& Feel, may try
this Lite Edition. It uses only built-in Java Look & Feel, which reduced size of the
distributable file.
Easy and EXTREMELY fast navigation through Internet, feels like local drives.
Select a file from the remote PC and use menu to download, upload, and run on
remote PC.
Run files on remote PC with any kind of extension.
New I/O, Remote Method Invocation (RMI) technologies are involved.
Software Specification
Java RMI
Swings
meetings) using distinct means of transportation. Consequently, their arrival times vary
according to not only to the means but also to the departure point.
The idea is to produce a case study scenario where students can will fully register their
routes and keep their classmates updated on their arrival times. With potential application to
meeting arrangement and lesson start times, such system shall be modeled as an Informative
Digital Screen (IDS) similar to the ones located at bus stops across the city. For our case study,
we assume that such means are restricted to bus, car, and bicycle only.
By using this system, students and staff at university or college can potentially arrange
meetings and in general, be more informed to schedule activities. Such system is to be modeled
using object oriented techniques and deployed accordingly as a Java computer programming
application.
Software Specification
Java Swings
Hardware Specifications:
ABSTRACT
Our project deals with developing some tools, which help in enhancing the
activities at different stages in the software development life cycle (SDLC). Our
tools will fall under the category of CASE tools which enable sophistication
during the software development.
We aim at developing two tools, (a) Code Analyzer ( jBrowser ) and (b)
Log Reader. The jBrowser would be a tool that would help the user track control
flow between java classes via method calls. Given a starting point, this tool tracks
the entire path within a particular location spotting various method calls under
different scenarios. We aim at building this tool as an effective tool to understand
the control flow while reengineering and reverse engineering and as a testing tool
which would identify the broken links between the java classes.
The Log Reader is another simple tool. This tool focuses on presenting the
user with a user friendly GUI, using which the user can query and extract useful
Hardware Specifications:
Abstract
dramatically
improve
performance
when
operations
2.
Abstract
In this paper, we consider an overarching problem that
encompasses both performance metrics. In particular, we study the
network capacity problem under a given network lifetime requirement.
Specifically, for a wireless sensor network where each node is
provisioned with an initial energy, if all nodes are required to live up to
a certain lifetime criterion, Since the objective of maximizing the sum
of rates of all the nodes in the network can lead to a severe bias in
rate
allocation
among
the
nodes,
we
advocate
the
use
of
problem
much
more
efficiently
than
state-of-the-art
3.
Abstract
Measurement and estimation of packet loss characteristics are
challenging due to the relatively rare occurrence and typically short
duration of packet loss episodes. While active probe tools are
commonly used to measure packet loss on end-to-end paths, there
has been little analysis of the accuracy of these tools or their impact
on the network. The objective of our study is to understand how to
measure packet loss episodes accurately with end-to-end probes. We
begin by testing the capability of standard Poisson- modulated end-to-
BADABING.
The
experiments
demonstrate
the
trade-offs
merit of the RPPM algorithm is that when the algorithm terminates, the
algorithm guarantees that the constructed attack graph is correct, with
a specified level of confidence. We carry out simulations on the RPPM
algorithm and show that the RPPM algorithm can guarantee the
correctness of the constructed attack graph under 1) different
probabilities that a router marks the attack packets and 2) different
structures of the network graph. The RPPM algorithm provides an
autonomous way for the original PPM algorithm to determine its
termination, and it is a promising means of enhancing the reliability of
the PPM algorithm.
5.
models:
single-sensing
detection
and
multiple-sensing
6.
input
centrally-scheduled
cell
switch
for
high-performance
between
issuance
of
request
and
arrival
of
the
7.
problem to
8.
for
example
method
attributes
and
references.
In
9.
world-wide
web
has
become
the
most
important
10.
Abstract
Location-based spatial queries (LBSQ s) refer to spatial queries
whose answers rely on the location of the inquirer. Efficient processing
of LBSQ s is of critical importance with the ever-increasing deployment
and use of mobile technologies. We show that LBSQ s has certain
unique characteristics that the traditional spatial query processing in
centralized databases does not address. For example, a significant
challenge is presented by wireless broadcasting environments, which
have excellent scalability but often exhibit high-latency database
access. In this paper, we present a novel query processing technique
that, though maintaining high scalability and accuracy, manages to
reduce the latency considerably in answering LBSQ s. Our approach is
based on peer-to-peer sharing, which enables us to process queries
without delay at a mobile host by using query results cached in its
neighboring mobile peers. We demonstrate the feasibility of our
approach through a probabilistic analysis, and we illustrate the appeal
of our technique through extensive simulation results.
11.
12.
for
uniform
scanning
worms
and
then
extended
to
Abstract
Data
caching
can significantly
improve the
efficiency of
access
cost,
we
present
polynomial-time
centralized
perform
close
to
the
approximation
algorithm.
Our
distributed
14.
simulation
studies, we
show that,
even
with
partial
15.
watermark
extraction
and
incorporation
of
cryptographic
can
be
achieved.
A novel
effective
Backward-Forward
52708.
constructed
semantic
inference
model
(SIM)
that
52709.
MUTUAL EXCLUSION
Abstract
Networks employ link protection to achieve fast recovery from
link failures. While the first link failure can be protected using link
protection, there are several alternatives for protecting against the
second failure. This paper formally classifies the approaches to duallink failure resiliency. One of the strategies to recover from dual-link
failures
is
to
employ
link
protection
for
the
two
failed
links
independently, which requires that two links may not use each other in
their backup paths if they may fail simultaneously. Such a requirement
is referred to as backup link mutual exclusion (BLME) constraint and
the problem of identifying a backup path for every link that satisfies
the above requirement is referred to as the BLME problem. This paper
develops the necessary theory to establish the sufficient conditions for
existence of a solution to the BLME problem. Solution methodologies
for the BLME problem is developed using two approaches by: 1)
formulating the backup path selection as an integer linear program; 2)
Abstract
Active learning methods have been considered with increased
interest in the statistical learning community. Initially developed within
a classification framework, a lot of extensions are now being proposed
to handle multimedia applications. This paper provides algorithms
within a statistical framework to extend active learning for online
content-based image retrieval (CBIR). The classification framework is
presented with experiments to compare several powerful classification
techniques in this information retrieval context. Focusing on interactive
methods, active learning strategy is then described. The limitations of
this approach for CBIR are emphasized before presenting our new
active selection process RETIN. First, as any active method is sensitive
to the boundary estimation between classes, the RETIN strategy
carries out a boundary correction to make the retrieval process more
52711.
Abstract
The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit)
quantum cryptography is used to provide authenticated secure
communication
between
sender
and
receiver.
In
quantum
sender
and
receiver.
The
advantage
of
quantum
In this
20.
sequential
straightforward
scanning
computations
of
of
the
query
patterns
conditions
followed
is
by
sufficient.
However, as the database grows, this procedure can be too slow, and
21
22
indexing text files. In case of multimedia files the meta data files are
created manually by the programmers. This phase also involves
algorithms for converting .doc and .pdf files to .txt format. In this
system the searching is not done at the run time as indexing is done
before hand.
In Phase 2 folders would be replaced by a new construct called
a library. A library is a virtual folder that intelligently gathers
information about files on the system and presents them to the users.
The concept of folders ceases to exist. Instead, the users are
privileged enough to view similar files together irrespective of their
location in the physical memory. This enables retrieval of files based
on various parameters. This concept is named as CAROUSEL VIEW
after the proposed system with the same name to be launched by the
Microsofts Windows Longhorn which is a complete revolution in itself.
23
XTC
AD-HOC
network
topology
control
algorithm
24
protocol
Abstract
On-demand routing protocols use route caches to make
routing decisions. Due to mobility, cached routes easily become stale.
To address the cache staleness issue, prior work in DSR used
heuristics with ad hoc parameters to predict the lifetime of a link or a
route.
However,
heuristics
cannot
accurately
estimate
timeouts
manner.
The
algorithm
does
not
use
any
ad
hoc
25
Computing
Abstract
The capability of dynamically adapting to distinct runtime
conditions is an important issue when designing distributed systems
where negotiated quality of service (QOS) cannot always be delivered
between
processes.
Providing
dynamic
underlying
system
QOS
degrade)
or
totally
synchronous.
Moreover, processes are not required to share the same view of the
system synchrony at a given time. To illustrate what can be done in
this programming model and how to use it, the consensus problem is
taken
26
data
space
(observed
variables)
to
the
smaller
intrinsic
27
scheduling
is
the
key
feature
of
any
computing
28
roaming
seamless.
telecommunication
number
location-independent
(PTN)
scheme
is
personal
conducive
to
implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile
users in future mobile networks may introduce very large centralized
databases. This necessitates research into the design and performance
of high-throughput database technologies used in mobile systems to
ensure that future systems will be able to carry efficiently the
anticipated loads. This paper proposes a scalable, robust, efficient
location database architecture based on the location-independent
PTNs. The proposed multi tree database architecture consists of a
number of database subsystems, each of which is a three-level tree
structure and is connected to the others only through its root. By
exploiting the localized nature of calling and mobility patterns, the
proposed architecture effectively reduces the database loads as well as
the signaling traffic incurred by the location registration and call
delivery procedures. In addition, two memory-resident database
indices, memory-resident direct file and T-tree, are proposed for the
location databases to further improve their throughput. Analysis model
and numerical results are presented to evaluate the efficiency of the
proposed database architecture. Results have revealed that the
proposed
database
architecture
for
location
management
can
functions.
The
filter
can
be
applied
iteratively
to
30
security,
while
routing
the
packets
between
mobile
hosts.
Kerberos
authentication
application
and
symmetric
key
31
32.
(ECSFQ)
mechanism,
which
provides
fair
bandwidth
video
Abstract
This paper presents a steganography method using lossy
compressed video which provides a natural way to send a large
and
motion-JPEG2000-BPCS
steganography
are
presented and tested, which are the integration of 3-D SPIHT video
coding and BPCS steganography and that of motion-JPEG2000 and
BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is
superior
to
motion-JPEG2000-BPCS
with
regard
to
embedding
performance.
34
only
fraction
of
the
received
data
packets
are
35
project,
titled
Homogenous
Network
Control
and
Network
of
Workstations
(HNOW
systems)
36
range
from
document
digitizing
and
preservation
to
the introduction part of this report. The project has employed the MLP
technique mentioned and excellent results were obtained for a number
of widely used font types. The technical approach followed in
processing input images, detecting graphic symbols, analyzing and
mapping the symbols and training the network for a set of desired
Unicode characters corresponding to the input images are discussed in
the subsequent sections. Even though the implementation might have
some limitations in terms of functionality and robustness, the
researcher is confident that it fully serves the purpose of addressing
the desired objectives.
There is set of bidirectional links between the no of nodes and the network is an
AS graph because the routes selection problem arises when a node has multiple potential
routes to destination .The main goal is to send each packet along the least cost path(LCP),
the pricing mechanism must be strategy proof so that agents have no incentives to lie
about their costs.
image information which has been converted into a set of numerical number will be
feeded into the neural network. Neural Network will be trained and continuous to
improve based on its learning experience. After a well trained Neural Network has been
constructed, any test image will be processed using the above mentioned image
processing technique. A set of numerical number will be obtained and feeded into the
Neural Network. The output of the Neural Network is the result of the recognition.
The algorithm set, FindChange uses a simplified model of BGP and graph model
of internet. It has distinctions from BGP model such as assuming one best path between
two nodes, single connection between two nodes. FindChange takes the update messages
collected from vantage points as input and accurately locates the link changes. The input
is taken as graphs and by making the comparisons of edges between two nodes the links
which are failed, added or restored and links unchanged are identified. Using this
information path between two nodes is computed before and after the connectivity
changes.
40.
ABSTRACT
adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment
packets in the opposite direction of the routing path.
41.
ABSTRACT
documents on the Web containing a particular script. The increase in usage of handheld
devices which accept handwritten input has created a growing demand for algorithms that
can efficiently analyze and retrieve handwritten data. This project proposes a method to
classify words and lines in an online handwritten document into one of the six major
scripts: Arabic, Cyrillic, Devnagari, Han, Hebrew, or Roman. The classification is based
on 11 different spatial and temporal features extracted from the strokes of the words. The
proposed system attains an overall classification accuracy of 87.1 percent at the word
level with 5-fold cross validation on a data set containing 13,379 words. The
classification accuracy improves to 95 percent as the number of words in the test sample
is increased to five, and to 95.5 percent for complete text lines consisting of an average of
seven words.
System Requirements
Software Requirements
Language : Java1.5
Front End Tool: Swing,
Operating System: Windows 98.
Hardware Requirements
Processor : Intel Pentium III Processor
Random Memory: 128MB
Hard Disk :20GB
Processor Speed: 300 min
42.
ABSTRACT
With the explosive growth of information sources available on the World Wide
Web, it has become increasingly necessary for users to utilize automated tools in find the
desired information resources, and to track and analyze their usage patterns.
Association rule mining is an active data mining research area. However, most
ARM algorithms cater to a centralized environment. In contrast to previous ARM
algorithms, ODAM is a distributed algorithm for geographically distributed data sets that
reduces communication costs. Recently, as the need to mine patterns across distributed
databases has grown, Distributed Association Rule Mining (D-ARM) algorithms have
been developed. These algorithms, however, assume that the databases are either
horizontally or vertically distributed. In the special case of databases populated from
information extracted from textual data, existing D-ARM algorithms cannot discover
rules based on higher-order associations between items in distributed textual documents
that are neither vertically nor horizontally distributed, but rather a hybrid of the two.
Modern organizations are geographically distributed. Typically, each site locally
stores its ever increasing amount of day-to-day data. Using centralized data mining to
discover useful patterns in such organizations' data isn't always feasible because merging
data sets from different sites into a centralized site incurs huge network communication
costs. Data from these organizations are not only distributed over various locations but
also vertically fragmented, making it difficult if not impossible to combine them in a
central location. Distributed data mining has thus emerged as an active subarea of data
mining research.
A significant area of data mining research is association rule mining.
Unfortunately, most ARM algorithms focus on a sequential or centralized environment
where no external communication is required. Distributed ARM algorithms, on the other
hand, aim to generate rules from different data sets spread over various geographical
sites; hence, they require external communications throughout the entire process. DARM
algorithms must reduce communication costs so that generating global association rules
costs less than combining the participating sites' data sets into a centralized site.
43.
Protocol scrubbing
ABSTRACT
44.
ABSTRACT
45.
ABSTRACT
46.
ABSTRACT
Images account for a significant and growing fraction of Web downloads. The
traditional approach to transporting images uses TCP, which provides a generic reliable
in-order bytestream abstraction, but which is overly restrictive for image data. We
analyze the progression of image quality at the receiver with time, and show that the inorder delivery abstraction provided by a TCP-based approach prevents the receiver
application from processing and rendering portions of an image when they actually
arrive. The end result is that an image is rendered in bursts interspersed with long idle
times rather than smoothly. This paper describes the design, implementation, and
evaluation of the image transport protocol (ITP) for image transmission over loss-prone
congested or wireless networks. ITP improves user-perceived latency using applicationlevel framing (ALF) and out-oforder application data unit (ADU) delivery, achieving
significantly better interactive performance as measured by the evolution of peak signal-
to-noise ratio (PSNR) with time at the receiver. ITP runs over UDP, incorporates
receiver-driven selective reliability, uses the congestion manager (CM) to adapt to
network congestion, and is customizable for specific image formats (e.g., JPEG and
JPEG2000). ITP enables a variety of new receiver post-processing algorithms such as
error concealment that further improve the interactivity and responsiveness of
reconstructed images. Performance experiments using our implementation across a
variety of loss conditions demonstrate the benefits of ITP in improving the interactivity
of image downloads at the receiver.
47.
Hop by Hop
ABSTRACT
IP multicast is facing a slow take-off although it has been a hotly debated topic
for more than a decade. Many reasons are responsible for this status. Hence, the Internet
is likely to be organized with both unicast and multicast enabled networks. Thus, it is of
utmost importance to design protocols that allow the progressive deployment of the
multicast service by supporting unicast clouds. This paper presents HBH (hop-by-hop
multicast routing protocol). HBH adopts the source-specific channel abstraction to
simplify address allocation and implements data distribution using recursive unicast trees,
which allow the transparent support of unicast- only routers. An important original
feature of HBH is its tree construction algorithm that takes into account the unicast
routing asymmetries. Since most multicast routing protocols rely on the unicast
infrastructure, the unicast asymmetries impact the structure of the multicast trees.We
show through simulation that HBH outperforms other multicast routing protocols in
terms of the delay experienced by the receivers and the bandwidth consumption of the
multicast trees. Additionally, we show that HBH can be incrementally deployed and that
with a small fraction of HBH-enabled routers in the network HBH outperforms
application-layer multicast.
48.
clients that requested it, and not to send multiple copies of a packet over the
same portion of the network, nor to send packets to clients who dont want it.
The Adhoc Multicast Routing Protocol (AMRoute) presents a novel
approach for robust IP Multicast in mobile ad-hoc networks by exploiting usermulticast trees and dynamic logical cores. It creates a bi-directional, shared tree
for data distribution using only group senders and receivers as tree nodes.
Unicast tunnels are used as tree links to connect neighbors on the Usermulticast tree. Thus AMRoute does not need to be supported by network nodes
that are not interested/capable of multicast, and group State Cost is incurred only
by group senders and receivers. Also, the use of tunnels as tree links implies that
tree structure does not need to change even in case of a dynamic network
topology, which reduces the signaling traffic and packet loss. Thus AMRoute
does not need to track network dynamics; the underlying Unicast protocol is
solely responsible for this function.
AMRoute does not require a specific Unicast routing protocol; therefore, it can
operate seamlessly over separate domains with different Unicast protocols. We have
tried to overcome the transient loops in the mesh creation. Also we have
implemented the Dynamic core migration technique by using a timer which
periodically changes the current core node, so that the efficiency of the protocol can
be improved.
49.
ABSTRACT
50.
ABSTRACT
: P IV 900 MHz+
Ram
: 128 MB RAM
Hard Disk
: 40 GB
51.
ABSTRACT
Interoperability with other file systems is provided because JNFS runs on top
of a native file system. Thus, JNFS can provide access to files served over both local file
systems such as NTFS or a UNIX local file system, as well as network file systems such
as NFS or DFS.
A Java implementation of JNFS ensures that it will work on all NCcompliant devices, ie., more platform independent than NFS.
Implementation of authentication protocol based on Access Control List
provides good security than NFS for granting access to files.
Advantages:
The proposed system provides more interoperability with other file
systems.
This system is more platform independent than the existing system.
S/W Requirements:
Java Swings, Networking
MS-Access
: P IV 900 MHz+
Ram
: 128 MB RAM
Hard Disk
: 40 GB
52.
Network Analyzer
ABSTRACT
This paper describes how to use an AEA Technology network analyzer to tune
an antenna. This paper discusses tuning issues at a general level; no specific model of
antenna is addressed here. For best link efficiency, you must properly tune the antenna to
resonance. Additionally, if the antenna has two or more adjustments available, you
should also tune the antenna for the optimum match. Resonance occurs when the reactive
portion of the antenna impedance is zero. This causes the voltage to be in phase with the
current, and allows the transmitter to generate its maximum power. SWR or return loss
readings do not provide enough information to determine resonance. You must use a
vector impedance reading to see resonance. The transmission lines used to feed the
antenna can add a layer of confusion to the measurements. If practical, tune the antenna
by itself first, then add in the feedline for more measurements.
53.
ABSTRACT
54.
Fashion Studios
ABSTRACT
It seems that over the past few decades a new art form has emerged. This is an
art form that painters, writers and photographers dive into on a daily basis. A piece of art
is considered to be abstract when the image is not clearly defined or visibly noticeable in
a quick glance. The word abstract means not relating to concrete objects but expressing
something that can only be appreciated intellectually. This is a relatively new art form
that takes mundane objects and transfers them to the unknown. Abstract art is one of the
fastest growing fields of photography. A photographer is able to take abstract pictures of
people, landscapes, places, animals and much more. A photographer is given a broader
range to experiment abstractly when using a digital camera but a regular camera can also
be used. There are several hints to help you when taking an abstract picture.
First of all let us discuss what an abstract picture is. An abstract picture can be
the wheel of a tractor, a photograph of a blurred chess piece, a screen window, a solitary
fork sitting alone atop a table or the face of a person, unrecognizable and changed.
Abstract art allows the photographer to create new images that only they may see or to
turn ordinary objects into a spectacular work of art. A graduate student several years ago,
who majored in abstract photography, was told to take a picture of her car. The student
then took pictures of different parts of her car and then made a collage of the collection of
pictures in the shape of her car. This is considered an abstract piece of artwork. When
taking an abstract photograph of a person stop and think before you press the shutter
button. Look at the subject and pick out the physical features, traits or characteristics that
you want the abstract photograph to be composed of. If the subject has been through a
tragedy, photograph the eyes, to convey this weight of sadness. If a person is joyous or
laughing photograph their mouth in order to bring that joy and free spirit to the
photograph.
Abstract photography is great for artists who want to broaden and expand their
creative range. It is also wonderful for photographers who have a unique eye and find
beauty in things that are extraordinary. Next time you have you camera out fool around
with a few of these abstract ideas. You might just fall in love with this relatively new art
form.
ABSTRACT
Jdk1.4 or higher
Monitoring & Management Tools
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
ABSTRACT
57.
Webs Eye
ABSTRACT
Webs Eye is software to develop web pages .Many people is aware of world
wide web and web pages, but not even capable of dreaming a web page design. The
Webs Eye is q user friendly software which will assist you in designing a web page and
putting your creative ideas in the web to change you really professional in the Worlds
Eyes. Suppose if you are a professional Webs Eye will show a different face as an
intelligent colleague to navigate you. Webs Eye uses Java @ Platform to develop an
extra featured user friendly software for creating web pages. Web page code generation is
done in HTML. The strong graphical user interface which is the unique property of this
project helps to distribute the tags intelligently . The project mainly aims at simplifying
user effort for creating a web page.
Extra features of Webs Eye
Installation kit
58.
Web Extractor
ABSTRACT
A web web extract is a program, which automatically traverses the web by
downloading documents and following links from page to page. Web search engines to
gather data mainly use them. Other possible applications include page validation,
structural analysis and visualization; update notification, mirroring and personal web
assistants/agents etc. web extract are also known as spiders, robots, worms etc.
web extracts start by parsing a specified web page, noting any hypertext
links on that page that point to other web pages. They then parse those pages for new
links, and so on, recursively. Web-Importer software doesn't actually move around to
different computers on the Internet, as viruses or an intelligent agent does. An importer
resides on a single machine. The importer simply sends HTTP requests for documents to
other machines on the Internet, just as a web browser does when the user clicks on links.
All the importer really does is to automate the process of following links.
Web importing speed is governed not only by the speed of ones own
Internet connection, but also by the speed of the sites that are to be downloaded.
Especially if one is an importing site from multiple servers, the total downloading time
can be significantly reduced, if many downloads are done in parallel. This work
implements the Breadth First Importing algorithm, a refined version of one of the first
dynamic Web search algorithm, In order to build a major search engine or a large
repository such as the Internet Archive, high-performance importers start out at a small
set of pages and then explore other pages by following links in a breadth first-like
fashion.
Modules:
6.
7.
Download pages
S/W Requirements:
Operating System
Language Name
: Jdk1.4 or higher
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
59.
Web Shop
ABSTRACT
This project mainly deals with the operation of shopping the different goods,
which are available on the net corresponding to the particular web server so
we can call as Web Shop. Now a days Internet technology is growing to
communicate between the people and fulfilling their needs. Application on
Internet plays an important role in the application development, which is
providing all round solutions right from the mails to e-commerce On such
due-course, this project is stepping towards the Internet project
development used for shopping on net. This project contains mainly
transactions between the customers of the e-Shoppe Server so that to access
the goods that is available at the corresponding server.
In this project the customer after getting into the concern site as to make selection
of the products that are given displayed after that for the payment of the
money he/she as to go through login process and has to specify the credit
card details and get the products ordered.
The old customers customer-id and the related password should be valid for
shopping on the net. This project has been developed using HTML and on
the server side using Active Server Pages.NET with the help of VBScript as
both on server side and client side validations.
60.
Visual Editor
ABSTRACT
Providing the users with the create documents main purpose of this application.
The project implementation is mainly concerned with create documents are
maintained by our editor. The project has been developed by utilizing
JAVA2, using Swing, IO, and wt(Abstract Window Toolkit) The successful
platform used is Windows and has its application in windows based System.
The abstraction for a System is its Documents, the usual methods in now-adays based on Windows Environments. The term Word Processing refers to
the activity carried out using a computer and suitable software to create,
view, edit, manipulate, transmit, store, retrieve and print documents.
61.
Resource Share
ABSTRACT
This project describes how to perform file searching and data base searching efficiently
by loading a database or by using the name of the file. For this the server is going to run,
through the server the required files are going to be retrieved. Here we are used the ms access
data base to store the contents of the file and the fields of the data base which is loaded into the
server. The client is going to be request from which data base or from which file he would like
access the data to the server. The server is accepts the request and send the response by using
the multithreading technology.
S/W Requirements:
Operating System
Language Name
: Jdk1.5.0 or higher
Concepts used
: MultiThreading
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
The project entitled Telecom Inventory Maintenance System deals with fully
automated system used by the Telecom department.
Telecom industry is one of the major sectors, which provides so many services to
their customers such as request for a new connection, change of number, billing etc.
Maintaining all these services manually is complicated process.
The main objective of this project is to automate the services provided by
telecom system, by which customer can use all the services online.
This project has been divided into four modules.
0
Applications
Entries
Enquiries
Complaints
A customer can apply for a new telephone connection by filling the form.
If the customer requested for change of telephone number, here if we enter the
The customers can complaint regarding the service and all other issues.
1
Abstract
Teleconferencing or Chatting, is a method of using technology to bring people and ideas
together despite of the geographical barriers. The technology has been available for years but
the acceptance it was quit recent. Our project is an example of a chat server. It is made up of 2
applications the client application, which runs on the users Pc and server application, which
runs on any Pc on the network. To start chatting client should get connected to server where
they can practice two kinds of chatting, public one (message is broadcasted to all connected
users) and private one (between any 2 users only) and during the last one security measures
were taken. As a common technology used in modern computer network communication,
Socket network programming is one of the most popular technology to develop based on
TCP/IP because it can customize packets communicate with each other effectively [1].
Network communication uses the interface which provided by operating system at different
levels of communication to implement the secure communication in the process of network.
Socket communication belongs to the bottom level of network communication, and API is used
to program for network communication. This paper provides a method about a chat room using
socket based on UDP (User Datagram Protocol). This design includes two parts, Server and
Client. After client and server set up to connect, you can achieve many machines to
communicate. It is equivalent to a dedicated chat server, a simplified WWW server.
ABSTRACT
The STUDENT HELPER is the best way to develop school maintenance quickly and
easily. This is system allows the user to add the classes and as well as to view the classes, and
to maintain schedule to the classes and to add classes to the schedule. The user can add the
teacher and as well as he could able to view the teacher details, at the same time user can add
the exam details when it should be conducted and he could able to view the exam details , at the
same time user can add the contact details and can view the contact details.
Features of System
0
Hardware Requirements:
Processor
Pentium IV
RAM
256MB
HD space
40GB
Os
Language
MS.NET
Database
Xml Reports
Software Requirements:
Thief Detector
ABSTRACT
can transform your webcam and personal computer into a fully functioning video surveillance
system simply by configuring the Motion Detection Software.
Video Surveillance System is a motion detection software that monitors your home,
office, or any premise. The system records action triggered by motion or noise as it happens.
You can view activities monitored by your camera from anywhere with an Internet connection.
The system will send immediate email notification along with a photo directly in your
mailbox as soon as motion or noise intrusion is detected. You can customize alerts like video
and audio recording, taking snaps with date and time, sounding alarms etc. Automatically
upload recorded video, audio and snaps to a FTP server of your choice.
Features:
Use webcams and IP cameras to monitor and record video.
notification when motion or noise is detected by your camera. Schedule monitoring to start and
stop automatically at weekly, once, application startup or daily intervals. Broadcast the video
from the camera so you can view it remotely. Send e-mail notifications with a photo snap of
the motion or noise event sent to your mailbox. View all event history along with recordings
and photo snaps from within the System. Upload recorded videos, audios, and photo snaps on
FTP within a configured interval.
System Specifications:
S/W Requirements:
Operating System
Database Support
: ORACLE
IDE
: JAVA
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 4GB or Above
External device
: Webcam
ABSTRACT
This project describes the process of connecting a window based application with web
application by taking the port number which specified at web page.A method and implementing
computer system is provided in which a function or applet for example may be downloaded
from a network server and graphical user interface
(GUI) processor interprets a data stream consisting of GUI controls and attributes, and
places the controls and attributes in a presentation space. In an exemplary embodiment, a web
browser program loads an HTML (Hypertext Markup Language) from a GUI (Graphical User
Interface) stream processor applet from a web server
. The web browser then loads the GUI stream processor (GSP) from the web server and
begins executing the GSP. The GSP then requests the GUI stream from the web server by
opening a stream to a file, CGI (Common Gateway Interface) script or servlet on the server.
The GSP then receives the GUI stream and assembles the user interface in the JAVA applet
presentation space managed by the browser. The GSP may periodically update itself by
repeating the last two steps.
5
FTP Server
ABSTRACT
ABSTRACT
Education has become a part of every human. There are several types of education
systems presently running. Distance Learning System is one of the education systems that are
under process long before but only committed to the University. The students have to come to
the university to check for the exam dates, syllabus, any changes, hall tickets collection etc,
which results in a time waste of the students.
ABSTRACT
ABSTRACT
ABSTRACT
An information processing technology of the present invention is capable of speeding
up a process that a prospective buyer of a used car determines an intention of purchasing the
car. A car sale information providing system of the present invention includes a car information
storage unit stored with mappings of car information containing a name, a type, a year model
etc of a car to car inspection information obtained as a result of inspecting the car concerned. A
car information input device is provided for inputting the car information and getting the car
information stored in the car information storage unit (A search unit is provided for outputting
an input screen for searching the car information stored in the car information storage unit , and
searching based on conditions inputted. The system includes a car information output unit , for
outputting display information, including a purchase indication interface for transmitting car
purchase information containing the searched car information and the car inspection
information corresponding to the car information.
Bank System
ABSTRACT
The main objective of this proposed system is to all the activities of a bank. The system
is like to enable the bank employees to open accounts for their customers with ease and to add
the details, to transfer amount from one account to another account and doing all the activities
related to loan, making all type of transactions. Using the system employees can also generate
different types of modules.
0
Issue Loans
Issue DDs
Using the system client can also generate different type of modules.
0
ABSTRACT
This program was created for individuals who own numerous unlabeled mixed cds and
would love to have a means of locating tracks on the cd.
In order for this program to work there have to be some type of distinction between the
cds. For instance we label our cds with a number(ie, CD 1, CD 2..). Although "CD 1" is the
most recommended format it isn't the only choice. There are many different alternatives like
labeling the cds by color and so on. A user easily can find out the track of cd by using title or
track number.
Of course the saved cd name will have to match the label. For example, if you save the
cd as "CD 1" then you should label your cd #1 or so, otherwise the program will not benefit
you.
S/W Requirements:
JAVA/J2EE
Oracle/MSSQL/MS-Access
H/W Requirements:
P IV 900 MHz+
128 MB RAM
40 GB HDD
ABSTRACT
ABSTRACT
Airways Reservation System is used to give the customers the best of booking tickets.
The web technologies have been developed in such a manner that they can provide good
services to its users. The airlines ticketing system is a web-based application which have been
developed in one of the web technologies Java with backend as Oracle9i.
The airlines ticketing is the system that provides not only ticket booking services
but also it gives the complete information about the Airlines Company. The ticket booking is
made very easy that the customer can book his ticket by just giving his credit card number. His
ticket will be sent to the prescribed address given by the customer. This online application is
very flexible so that the customer can easily fill his details and receive the ticket in time.
S/W Requirements:
VB/.NET/JAVA/J2EE
Oracle 9i/MSSQL/MS-Access
H/W Requirements:
P IV 900 MHz+
128 MB RAM
40 GB HDD
ABSTRACT
participating nodes are fully cooperative. However, due to the open structure and scarcely
available battery-based energy, node misbehaviors may exist. One such routing misbehavior is
that some sel_sh nodes will participate in the route discovery and maintenance processes but
refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an
add-on technique for routing schemes to detect routing misbehavior and to mitigate their
adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment
packets in the opposite direction of the routing path. In order to reduce additional routing
overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme.
Analytical and simulation results are presented to evaluate the performance of the proposed
Scheme.
Route Discovery.
Module 2:
Data Security.
Module 3:
Data Transfer.
Module 4:
Route Maintenance.
Module 5:
Route Disconnection
Software Requirements
0
Operating System
: Windows 95/98/NT/2000
: Java
Hardware Requirements
0
P IV 2.4
128 MB Ram
Hard Disk 40 GB
2
Crypto Systems
ABSTRACT
In cryptographic terminology, the message is called plaintext or clear text. Encoding the
contents of the message in such a way that hides its contents from outsiders is called
encryption. The encrypted message is called the cipher text. The process of retrieving the
plaintext from the cipher text is called decryption. Encryption and decryption usually make use
of a key, and the coding method is such that decryption can be performed only by knowing the
proper key.
Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art
of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. People who do
cryptography are cryptographers, and practitioners of cryptanalysis are cryptanalysts.
Cryptography deals with all aspects of secure messaging, authentication, digital
signatures, electronic money, and other applications. Cryptology is the branch of mathematics
that studies the mathematical foundations of cryptographic methods.
System Specification:
The system on which the project developed has the following configuration.
Hardware Specifications:
Main Memory
64MB.
MicroProcessor
Pentium III.
4.3 GB.
Cache Memory
512KB.
Software Specifications:
Operating System
Windows 98/NT.
Front End
Back End
File Streams
JExplorer
ABSTRACT
JExplorer is an example on how to use JTree, JList and perform simple filesystem tasks.
At the moment you can only view contents of your local drives. I plan to enable drag and drop,
to make JExplorer more complex clone of Windows Explorer. Soon you'll be able to copy,
move, delete and rename files. In this version I used TreeModel and ListModel instead of
DefaultTreeModel and DefaultListModel which results in more efficient and easy to read code.
JDraw
ABSTRACT
This project developed by Java1.2 Version Jdrawing Design by Java Drawing Tools.
Drawing are Create and Save and Open by our Software. Drawing Files are created by Our
Jdrawings java Tools. The Following Information are provides.
Add
BitmapIcon are pasted to drawing screen.
Edit
Cut and Copy and Paste Delete tools are provided by selected drawing areas.
Help
About the Software.
ABSTRACT
Our project deals with developing some tools, which help in enhancing the activities at
different stages in the software development life cycle (SDLC). Our tools will fall under the
category of CASE tools which enable sophistication during the software development.
We aim at developing two tools, (a) Code Analyzer ( jBrowser ) and (b) Log Reader.
The jBrowser would be a tool that would help the user track control flow between java classes
via method calls. Given a starting point, this tool tracks the entire path within a particular
location spotting various method calls under different scenarios. We aim at building this tool as
an effective tool to understand the control flow while reengineering and reverse engineering
and as a testing tool which would identify the broken links between the java classes.
The Log Reader is another simple tool. This tool focuses on presenting the user with a
user friendly GUI, using which the user can query and extract useful information from the log
files generated by an application server in an interactive and understandable manner.
81.
FTP
ABSTRACT
E-mail system
ABSTRACT
The project E-mail system is a window based application which allows the
multiple users to send and receive the mail forth and back with in a network or outside of
network. This email system having a facility of attachment. The should have a id to enter into
the mail room If the user is a new one he need to register himself to get the user name and
password. A user can change his own profile, as well as able to change the password.
S/W Requirements:
Operating System
Language Name
: Jdk1.4 or higher
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
ABSTRACT
clustering and screening procedure is described which improves the robustness of the system.
We also introduce a method to estimate and apply subject norms representing the "typical":
variation of the subject's signatures. The subject norm functions are parameterized, and the
parameters are trained as an integral part of the discriminative training. The system was
evaluated using 480 authentic signature samples and 260 skilled forgery samples from 44
accounts and achieved an equal error rate of 2.25%.
84.
Chatting
ABSTRACT
ABSTRACT
128 MB RAM
40 GB HDD
ABSTRACT
Images account for a significant and growing fraction of Web downloads. The
traditional approach to transporting images uses TCP, which provides a generic reliable
in-order bytestream abstraction, but which is overly restrictive for image data. We
analyze the progression of image quality at the receiver with time, and show that the inorder delivery abstraction provided by a TCP-based approach prevents the receiver
application from processing and rendering portions of an image when they actually
arrive. The end result is that an image is rendered in bursts interspersed with long idle
times rather than smoothly. This paper describes the design, implementation, and
evaluation of the image transport protocol (ITP) for image transmission over loss-prone
congested or wireless networks. ITP improves user-perceived latency using applicationlevel framing (ALF) and out-oforder application data unit (ADU) delivery, achieving
significantly better interactive performance as measured by the evolution of peak signalto-noise ratio (PSNR) with time at the receiver. ITP runs over UDP, incorporates
receiver-driven selective reliability, uses the congestion manager (CM) to adapt to
network congestion, and is customizable for specific image formats (e.g., JPEG and
JPEG2000). ITP enables a variety of new receiver post-processing algorithms such as
error concealment that further improve the interactivity and responsiveness of
reconstructed images. Performance experiments using our implementation across a
variety of loss conditions demonstrate the benefits of ITP in improving the interactivity
of image downloads at the receiver.
ABSTRACT
In this project report the main focus lies in the generation of frequent patterns, which is
the most important task in explanation of the fundamentals of association rule mining. The
association rule mining is a fundamentally important task in the process of knowledge
discovery in large databases. This is done by analyzing the implementations of the well known
association rule mining algorithms like Apriori, Dynamic Item set Counting Algorithm, FPgrowth and a new algorithm Matrix Based Association Rule Mining Algorithm(MBA).
Run time behaviors of these algorithms are analyzed and compared using Mushroom
dataset. An evaluation study of the algorithms is performed in order to analyze their time
complexity and the impact that they have on the original database.
ABSTRACT
The presence of broken links is a serious problem plaguing the World Wide Web.
Surveys show that 6% of the links on the web are broken. It reduces the usability of the world
web. To deal with this problem, we implemented a web broken links handler check application
with Java web interface. It can check the good links and bad ones in a web page. It has the
functionality for checking a site, saving the checking result, canceling current check and so on.
It differentiates external/internal links, for which internal link sites are recursively checked.
SYSTEM SPECIFICATIONS:
The system on which the project developed has the following configuration.
HARDWARE SPECIFICATIONS:
Main Memory
64MB.
MicroProcessor
Pentium III.
4.3 GB.
Cache Memory
512KB.
Operating System
Windows 98/NT.
Front End
SOFTWARE SPECIFICATIONS:
Bug Tracker
ABSTRACT
The project is a developed based on the standards of the coding used by the developer is
tested before giving to the client. System that interacts with the code developed bye the user.
Using this project any developer with minimal knowledge can easily check correctness of the
code easily without any errors.
The following is the system developed for the above stated needs. An initial feasibility
study was conducted & a conclusion was arrived at that automating such a system would not
only achieve all the things mentioned above.
Hardware Specifications:
0
64 MB RAM
40 GB Hard Disc
Software Specifications
Operating System
Windows XP/2000
Language
jsp,servlets.
BackEnd
Oracle
City Guide
ABSTRACT
India is the one among the fast growing countries. Every one can visit the country
throughout India. In the list of visiting places cities are the mostly visited places. Tourists are
come from different places and new to the city they dont know about the cities, cultures of the
people, local language to communicate and how to approach. Tourist guides are the persons
who guide the tourists about the city like the visiting places, their importance and how to
approach by taking money from them. Tourist guides may cheat tourists for money by telling
lies and chance to rob them. In some cities they are not available.To overcome these problems
an efficient and powerful web application called CITY GUIDE has implemented.
This is the online application that provides brief information about the city by using
efficient web applications. To get the details about top restaurants, hotels, lodges, events online
CITY GUIDE is an efficient web application.
It provides every one detailed description about entertainment, museum exhibits,
monuments and memorials, movies, theaters, hotels, events for concerts and guides the visitors
with stories, events listings and theater listings.
CITY GUIDE also features arts and entertainment, attractions, recreation, festivals and
most famous devotional places. Youll instantly get access to the information about the city and
provides you with all the information you need to know about the things in the city.
This system provides Lifestyle of the people in the city, Entertainment guide, latest
information on accommodation, food, sightseeing, shopping, social, cultural and tourist
information and is a comprehensive guide.
Users in this module are Admin and the information seeker. Admin can modify the
existing modules and add new modules. Whereas the information seeker can view the site only.
MODULES:
City culture
Tourist places
City branches
Hospitals
Educational institutes
Entertainment
City map
Travels
City culture:
This module contains the information about the popular tourist places
City branches:
Educational institutes:
This module contains detailed information about the various educational institutions
Entertainment:
Contains all the information about the entertainment like movies, cultural
programmes etc.
Travels:
SOFTWARE REQUIREMENTS:
Operating system
Windows XP/2000
Language
Backend
Oracle
HARDWARE REQUIREMENTS
Processor
Pentium II
Harddisk
40GB
RAM
128 MB
ABSTRACT
classes for various reasons and more often, this goes unnoticed by their parents. Therefore, in
our project we would like to develop and deploy a web based Messaging system, which would
automatically inform the corresponding parents about the absence of their ward through an
email to the parents email id or an SMS to the parents mobile.
CMS, which would store all the information about the students ranging from their
attendance to their corresponding semester marks and their fee details. The benefits of the
proposed system are that there would be ease in the attendance taking process, which would get
rid of the paper works and their respective calculations.
We get prompt information regarding the attendance of a particular student either it is
percentage for all classes or for each faculty. Finally, the auto generation of an email or SMS
regarding the absence of the student would keep the parents in notice, about their wards
presence in the college. The attendance system is based around tracking student absences, since
there should be fewer of them than presences. An attendance record is stored for a student
whether they are absent/present from college. No record is stored when they are present. This is
the easiest approach in terms of record entry. Attendant is an online database system, which
provides a straightforward way for departments to record attendance information about their
students
By using this system we can accept their attendance through biometrics device.
Modules in College Messing System:
0
Admin module
Parent module
HARDWARE REQUIREMENTS:
Processor
: Pentium IV
HDD
: 40GB
SOFTWARE REQUIREMENTS:
Operating System
Language
: JAVA
DBwand
ABSTRACT
Modules
0
Results Window
10
11
create databases
modify databases
Hardware Specifications:
Intel P-III Processor
64 MB RAM
40 GB Hard Disc
Software Specifications:
Operating System
Language
ABSTRACT
People recognize each other by their faces and voices, so we feel very comfortable
interacting with a machine that does the same. Voice recognition products are the best example
of the successful application of AI technologies in practice. Many of them already entered the
mainstream market and are routinely used in various areas. Face recognition, on the other hand,
currently receives less public attention and people generally think it is still impossible for a
computer to quickly and accurately recognize its user using only the visual input. For more than
twenty years, face recognition was considered among the hardest problems in AI and computer
vision in particular. However, researchers have discovered regularities in various human
physiological characteristics, like skin color and human facial geometry. One of the best known
early examples of face recognition techniques was presented in 1980s by Teuvo Kohonen,
proving that a simple neural network could perform face recognition for aligned and
normalized face images. Later developments brought fast, cheap unobtrusive and robust
products on the market. According to some reports, face recognition is expected to be among
the fastest growing biometric market segments over the next 2-3 years. It now generates around
15% of the total revenue in this field, behind finger scan and hand geometry methods.
As for the technological background, there are various methods by which a
computer recognizes people. Each one of them focuses on a small set of features that can be
used to uniquely recognize human faces- mouth, nose, eyebrows, jaw line and cheekbone.
Changes in lighting, aging, rotation, facial expression and appearance (glasses, beards, haircuts)
will produce different methods, so it is important to understand their advances and
shortcomings.
Eigen face technology, patented at MIT, utilizes two dimensional, global grayscale
images representing distinctive characteristics of a human face, describing what is common to
groups of individuals and where they differ most. Just as any color can be created by mixing
primary colors, the vast majority of faces can be reconstructed by combining features of
approximately 100-125 eigen faces.
MODULE INFORMATION:
Designing Algorithm
About Matrix Class
Applying Filters
Checking Images through eigen.
System Specifications:
S/W Requirements:
Operating System: Windows XP/2000 Professional
Database Support: ORACLE
IDE
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
Webcam
: 2 mega pixel
ABSTRACT
Image Compression
ABSTRACT
Image Compression is mainly used for compressing the image data with out any
significant image data or image clarity. This is for easy maintenance, network transforming and
security also provided. In this project the lousy compression techniques can be used in some
contexts where data loss cannot affect the image clarity in this area.
In some important situations image compression uses Lossless compression involves
with compressing data which, when decompressed, will be an exact replica of the original data.
This is the case when binary data such as executables, documents etc. are compressed. They
need to be exactly reproduced when decompressed. On the other hand, images need not be
reproduced 'exactly'. An approximation of the original image is enough for most purposes, as
long as the error between the original and the compressed image is tolerable.
Hardware Requirements
Pentium IV Processor.
128 MB RAM.
20GB Hard Disk space.
Software Requirements
Windows 2000 XP operating system.
J2sdk1.4.0 or higher
Net conference
ABSTRACT
The main concept of Net Conference is developing the conference on the net. We can
compare the Net conference with the Telephone Conference. Normally in Telephone
Conference, there will be more than two users connected at a time and all the users are able to
here words from any one of the user. So implementing the same concept on the Net is nothing
but Net Conference.
This project is used to:
Conduct conferences with their employees. So they can get online decisions from
employees from the different branches of the company.
the country. So this will help them to communicate business affairs of the
company and live meetings and conferences between their directors. They can
conduct board of directors meeting.
System Specification:
The system on which the project developed has the following configuration.
Hardware Specifications:
Main Memory
64MB.
MicroProcessor
Pentium III.
4.3 GB.
Cache Memory
512KB.
Operating System
Windows 98/NT.
Front End
Back End
Database Connectivity
Software Specifications:
Online Examination
ABSTRACT
For our society, the learning with the help of electronically media has become an
important factor for the preservation and the creation of qualified jobs. But this type of learning
is lacking of a checking of the contents the students have learned. Only with an enormous
organizational effort and a lot of time, consultation could be realized. Another factor that
blockades the efficient learning is the time that is spent on correcting and returning the exams.
A regular control of the contents is not possible, because the correction of tests and
exams takes to long. But studies proof that just a regular control leads to better results. With
Online examination system we have succeeded in developing a system to realize a convenient,
high-performing and incontestable Multiple-Choice exam. With this type of exam it is possible
to review the contents of the courses in regular intervals. The main focus of this project lies on
the user interface which is easy to handle as well as a fast, flexible evaluation and a maximum
of efficient background information (stats).
Online examination system is the new way to conducting exams to the students using
the efficient web technologies and the Internet. Online is the technology of accessing the
application from sitting anywhere in front of a computer with an ease of operation.
ABSTRACT
This project is intended to develop a tool called Packet Sniffer. The Packet Sniffer
allows the computer to examine and analyze all the traffic passing by its network connection. It
decodes the network traffic and makes sense of it.
When it is set up on a computer, the network interface of the computer is set to
promiscuous mode, listening to all the traffic on the network rather than just those packets
destined for it. Packet Sniffer is a tool that sniffs without modifying the networks packet in
anyway. It merely makes a copy of each packet flowing through the network interface and finds
the source and destination Ethernet addresses of the packets. It also decodes the protocols in the
packets given below.
ARP (Address Resolution Protocol), RARP (Reverse Address Resolution Protocol), IP
(Internet Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol),
ICMP (Internet Control Message Protocol) and IGMP (Internet Group Message Protocol).
The output is appended into normal text file, so that the network administrator can
understand the network traffic and later analyze it.
10
ABSTRACT
The PGP Desktop 9.x application includes desktop email, digital signatures, IM
security, laptop whole disk encryption, file and folder security, self decrypting archives, and
secure shredding of deleted files. Capabilities are licensed in different ways depending on
features required.
The PGP Universal 2.x management server handles centralized deployment, security
policy, policy enforcement and reporting. It is used for automated email encryption in the
gateway and manages PGP Desktop 9.x clients. It works with the PGP public keyserver - called
the PGP Global Directory - to find recipient keys. It has the capability of delivering email
securely when no recipient key is found via a secure HTTPS browser session.
With PGP Desktop 9.0 managed by PGP Universal Server 2.0, released in 2005, all
PGP encryption applications are based on a new proxy-based architecture. These newer
versions of PGP software eliminate the use of email plug-ins and insulate the user from
changes to other desktop applications. All desktop and server operations are now based on
security policies and operate in an automated fashion. The PGP Universal server automates the
creation, management, and expiration of keys esharing these keys among all PGP encryption
applications.
New versions of PGP applications use both OpenPGP and the S/MIME, allowing
communications with any user of a NIST specified standard.
Encryption/decryption.
PGP message encryption uses asymmetric key encryption algorithms that use the
public portion of a recipient's linked key pair, a public key, and a private key. The sender
uses the recipient's public key to encrypt a shared key (aka a secret key or conventional
key) for a symmetric cipher algorithm. That key is used, finally, to encrypt the plaintext
of a message. Many PGP users' public keys are available to all from the many PGP key
servers around the world which act as mirror sites for each other.
The recipient of a PGP encrypted email message decrypts it using the session key
for a symmetric algorithm. That session key is included in the message in encrypted form
and was itself decrypted using the recipient's private key. Use of two ciphers in this way
is sensible because of the very considerable difference in operating speed between
asymmetric key and symmetric key ciphers (the differences are often 1000+ times). This
operation is completely automated in current PGP desktop client products.
Digital signatures:
A similar strategy is used to detect whether a message has been altered since it
was completed, and whether it was actually sent by the person/entity claimed to be the
sender. It is used by default in conjunction with encryption, but can be applied to
plaintext as well. The sender uses PGP encryption to create a digital signature for the
message with either the RSA or DSA signature algorithms. To do so, PGP products
compute a hash (also called a message digest) from the plaintext, and then creates the
digital signature from that hash using the sender's private key.
The message recipient uses the sender's public key and the digital signature to
recover the original message digest. He compares this message digest with the message
digest he computed himself from the (recovered) plaintext. If the signature matches the
received plaintext's message digest, it must be presumed (to a very high degree of
confidence) that the message received has not been tampered with, either deliberately or
accidentally, since it was properly signed
SOFTWARE SPECIFICATIONS:
Operating System
Language
.Net(vb.Net)
Processor
Ram
256MB or Above
Hard Disk
4GB or Above
H/W REQUIREMENTS:
11
A Personal Computer
0
64 MB RAM
4 GB Hard Disc
Software Specifications
Operating System
Language
JAVA
Database
Oracle/Access/SqlServer
12
ABSTRACT
The Smart Payroll System deals with salary pay slips of employees of any
company. In the organizations they provide some facilities for their employees like HRA,
DA, LTC, LLTC etc. Employees will be having some specific number of different kinds
of leaves available for the whole year. As the organization has different departments,
even the facilities and leave details will be different.
Depending upon the allowances the respective amount will be added to the Basic
Salary of the employee. Depending on the leaves taken and loss of pay the amount will
be calculated and gets deducted in the total salary that has been calculated with the
addition of allowances. This project Smart Payroll System will do all those additions and
deductions, and calculates the net salary very efficiently to the accurate point without any
errors. This also keeps track of each employees salary details.
S/W Requirements:
JAVA/J2EE
Oracle/MSSQL/MS-Access
H/W Requirements:
P IV 900 MHz+
128 MB RAM
40 GB HDD
13
Stegohider
ABSTRACT
distortions. In order to provide more security, we are first encrypting the message using
DES algorithm and then cipher text as the input to our technique and the same message
will be extracted and decrypted at the receiver end.
Steganography is really interesting subject and the applications using
Steganography are increasing day-by-day. A number of algorithms were developed and
implemented to achieve Steganography in images and audio. Many new algorithms are
coming and each of them uses a unique method of making life of a Steg-Analyst more
miserable everyday.
103.
EMBEDDING
DATA
INTO
VIDEO
FILE
ABSTRACT
video as stegno media to embed the encrypted data file .So this has been defined as
Video Steganography. The application should have a reversal process as of which
should be in a position to deembed data file from video and decrypt the data to its
original format upon the proper request by the user. The goal of our project is to design a
tool for providing security to the system during transmission of data through the network.
The project is developed using graphics in java swings.
14
Terminal Controller
ABSTRACT
This project deals with easily exporting the user interface over the network to a
remote computer with the rmi protocol. This system does Remote control at the
application level. The system allows controlling the systems remotely like shutdown,
checking files and its permissions, etc.
As the application is built purely on JAVA using RMI APIs, it is platform
independent and you can run your application on any server. Java also provides a strong
development platform in its own right for remote-control solutions.
Modules:
Remote Handling
Remote File Searching
Remote Privileges
Remote Configuration
Hardware Specifications
0
64 MB RAM
40 GB Hard Disc
Software Specifications
Operating System
Language
VB.NET
BackEnd
Oracle9i/SqlServer 2000
15
ABSTRACT
The system deals with providing online support to the people who are facing problems
with various software technologies. Problems with the current system, there is a
communication gap between the customer and the organizations. People generally dont
know the name of the sites of all organizations to post their problem.
Customer usually face some problem while posting the bugs occurred in different
softwares as they have to post their bugs to different sites individually and there is no
surety of quick response from the organization. Few organizations may not be interested
in responding to the customer problems.
So in order to overcome all these limitations and to meet all their requirements,
the current process is replaced with this application.
16
Visual Cryptography
ABSTRACT
Visual cryptography is a cryptographic technique which allows visual information
(pictures, text, etc.) to be encrypted in such a way that the decryption can be performed
by the human visual system, without the aid of computers.
Visual cryptography was pioneered by Moni Naor and Adi Shamir in 1994. They
demonstrated a visual secret sharing scheme, where an image was broken up into n shares
so that only someone with all n shares could decrypt the image, while any n-1 shares
revealed no information about the original image. Each share was printed on a separate
transparency, and decryption was performed by overlaying the shares. When all n shares
were overlayed, the original image would appear. Using a similar idea, transparencies can
be used to implement a one-time pad encryption, where one transparency is a shared
random pad, and another transparency acts as the ciphertext.
Features:
Share image into two parts
Security
Software Requirements
1
Operating System
: Windows 95/98/NT/2000
: Java, Swings
Hardware Requirements
3
P IV 2.4
128 MB Ram
Hard Disk 40 GB
17
Voice Domain
ABSTRACT
This project to be developed for hands free browsing to handle difficult web urls
in an easy way and it can speech voice depending on given text file (text to voice) and
can create a text file by using your voice (Speech recognition). I facilitate the user with
easy handling of computer applications by their voice.
This scope of the project is to create a voice enabled browser, which enables
hands free use of software applications to computing capabilities away from the desk.
In the present world of different means of communication there have been great
changes takes place. The most comfortable and easy way of communication of conveying
message to voice.
Modules :
0
Text-to-Speech
Speech recognition
Software Requirements:
JDK Version
Processor
Pentium IV or above
RAM
256 MB or above
Hard Disk
40 GB
Microphone / Headphone
Speakers
18
ABSTRACT
Water Marking
Text on image
Image on image
Software Requirements
2
Operating System
: Windows 95/98/NT/2000
Web/Application Server
: Tomcat
Database Server
: Oracle 8i
Hardware Requirements
6
Pentium IV
64 MB Ram
19
Web Browser
ABSTRACT
Web Browsers are the most prominent network application programs that are used
for surfing the information on the www. At the beginning, the idea of a World Wide Web
comprised of hypertext links didn't attract much attention. The main reason for this
situation was a lack of user-friendly client software. The World Wide Web is a clientserver information system that consists of two different programs - the client and the
server. These two programs talk' to each other "using a standardized protocol called
hypertext transfer protocol" (HTTP). Today, the World Wide Web is a place of
information sharing, entertainment, as well as a medium for distance work and education.
Therefore, it is necessary to carefully evaluate the wide range of browser software in
order to choose the one, which will most effectively serve ones telecommuting purposes.
The most important browser feature, however, is a fast and accurate hypertext
markup language (HTML) rendering engine. Today, this means that a browser has to
comply with the HTML 2.0 standard. Simultaneously, some features from HTML 3.0
standard (e.g. tables, frames) are already used on many Web sites and a good browser
should support these features as well. Finally, a perfect' browser should support the
Java' script, which can turn Web pages into dynamic sites (e.g., running headlines,
rotating objects, animation of figures and icons). Our project is to design browser
software with some essential features.
20
Web Crawler
ABSTRACT
A web crawlers is a program, which automatically traverses the web by
downloading documents and following links from page to page. They are mainly used by
web crawlers engines to gather data for indexing. Other possible applications include
page validation, structural analysis and visualization, update notification, mirroring and
personal web assistants/agents etc. Web crawlers are also known as spiders, robots,
worms etc.
Web crawlerss start by parsing a specified web page, noting any hypertext links
on that page that point to other web pages. They then parse those pages for new links, and
so on, recursively. Web-Search software doesn't actually move around to different
computers on the Internet, as viruses or intelligent agents do. A Search resides on a single
machine. The Search simply sends HTTP requests for documents to other machines on
the Internet, just as a web browser does when the user clicks on links. All the Search
really does is to automate the process of following links.
Web crawlersing speed is governed not only by the speed of ones own Internet
connection, but also by the speed of the sites that are to be Searched. Especially if one is
a Searching site from multiple servers, the total Searching time can be significantly
reduced, if many downloads are done in parallel. This work implements the Breadth
First Searching algorithm, a refined version of one of the first dynamic Web crawlers
algorithm, In order to build a major search engine or a large repository such as the
Internet Archive, high-performance Search start out at a small set of pages and then
explore other pages by following links in a breadth first-like fashion.
SOFTWARE SPECIFICATIONS:
Operating System
Language
JAVA
H/W REQUIREMENTS:
Processor
Ram
256MB or Above
Hard Disk
4GB or Above
21
ABSTRACT
The system is a web based Manufacturing System that enables a Manufacturing
company to schedule its manufacturing operations based on the daily update of sales
from its dealers. The system is modeled to be used by a Manufacturing company, whose
main activity is manufacturing different products & then selling the finished goods
through a network of Dealers.
To start with, the Stocks of all the Products manufactured by the company and
held in the company warehouse are stored in a Database. The details that are stored
include the quantity of each product held with the company dealers who hold the stocks
of finished products for sale.
Once the sales figures of Products sold in the past week are entered by the Dealers
over the Internet along with the Orders for the next delivery, the schedule for the next
weeks production will be drawn up. A report of the required raw materials or parts will
be drawn up with the approved suppliers for each & the suppliers will be intimated about
the part requirements over the Internet & asked to quote their rates. The message asking
for a Quotation will be sent as an e-mail message. Once the rates are quoted, the Order
will be placed with the required delivery schedules.
The system incorporates intelligent Order processing System that checks and
intimates the required Higher-ups in the Company about any discrepancies in the Orders
that were placed. For example if an Order is placed with a Supplier whose rates are not
the least then an automatic Event-generation will send the details of the Order & the
person who placed it to the Managers or Directors who are supposed to oversee the
process.
Once the parts are supplied the Part Stocks will be updated. Then a production
plan will be drawn up taking the Bill-of-materials into consideration. The Bill-ofMaterials contains the details of each Product & the type & quantity of Parts required for
manufacturing a single unit of the Product. Once the Production plan is approved, the
Part Stocks will be updated when the Parts are issued to the Production Department.
Once the finished products are available from the Production Department, the Products
will be dispatched based on the Orders placed by the Dealers. The stocks with the dealers
will also be maintained.
Software Requirements
6
Operating System
: Windows 95/98/NT/2000
Browser
: IE
Web/Application Server
Database Server
: Oracle 8i
10
Database Connectivity
Hardware Requirements
9
10
64 MB Ram
11
12
13
22
Web Importer
ABSTRACT
A web importer is a program, which automatically traverses the web by
downloading documents and following links from page to page. Web search engines to
gather data mainly use them. Other possible applications include page validation,
structural analysis and visualization; update notification, mirroring and personal web
assistants/agents etc. Web importers are also known as spiders, robots, worms etc.
Web Importers start by parsing a specified web page, noting any hypertext links
on that page that point to other web pages. They then parse those pages for new links, and
so on, recursively. Web-Importer software doesn't actually move around to different
computers on the Internet, as viruses or an intelligent agent does. An importer resides on
a single machine. The importer simply sends HTTP requests for documents to other
machines on the Internet, just as a web browser does when the user clicks on links. All
the importer really does is to automate the process of following links.
Web importing speed is governed not only by the speed of ones own Internet
connection, but also by the speed of the sites that are to be downloaded. Especially
if one is an importing site from multiple servers, the total downloading time can be
significantly reduced, if many downloads are done in parallel. This work
implements the Breadth First Importing algorithm, a refined version of one of
the first dynamic Web search algorithm, In order to build a major search engine or
a large repository such as the Internet Archive, high-performance importers start
out at a small set of pages and then explore other pages by following links in a
breadth first-like fashion.
Modules:
8.
9.
10.
Download pages
S/W Requirements:
Operating System
Language Name
: Jdk1.4 or higher
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
23
ABSTRACT
The system, which was developed now, makes this process of scheduling much
easier and computerized. By this system the manager or top level designated employee
can fix the schedule of any employee working under him, he even can check whether the
employee is free in the particular time or in other times. Thus the top level management
can easily fix the process of scheduling, and even can change the appointment which is
reflected immediately to the related employee avoiding direct contact of the employee
resulting in saving lot of time and work overhead.
The system even has the option for only viewing the employees activities or
appointments. This feature avoids direct contact to the respective employees database
and activities. There is an option where only the supervisor (the top-level manager) can
have direct access to the employees activities, he can change the appointments of the
employees working under him. No other employee of the same designation or same level
of hierarchy can do this.
System Specification:
Software Requirements
11
Operating System
12
Browser
13
Database Server
14
Database Connectivity
: Windows 95/98/NT/2000
: IE
: Oracle 8I or SQL Server
Oracle
3
Hardware Requirements
14
15
64 MB Ram
16
17
18
24
ABSTRACT
With the explosive growth of internet and network services, there is always a
proliferation for distributed application that seek to leverage the power of the internet.
Remote method invocation is now increasingly being used in Internet based applications
and hence it is important to study the performance parameters of RMI. RMI is the action
of invoking a method of a remote interface on a remote object.
The three methods of RMI namely General , Activation and Custom Socket
Factory are to be evaluated empirically using parameters like Round trip time , Latency
and Packets per Unit time. The graph plotted allows us to gain an insight into the
performance aspects and other tradeoffs of RMI. The General method deals with
invoking any method directly from memory of the remote machine. RMI Activation
allows passive objects to be brought into the active state by instantiating it on an as
needed basis. Custom socket factory method allows customization of socket depending
on the type and amount of data to be transferred over the channel. It is proposed to
implement security for the data being transferred using Rijndael Algorithm that imparts
security due to its high resistance to attacks, code compactness and design simplicity.
Search mechanism is also to be implemented in the GUI, which has user-friendly access
to the three methods of RMI and displays the results of the evaluation.
25
ABSTRACT
This project deals with registration of soft wares and checking the details of
softwares those are already installed. A System administrator can monitor all the system
which are installed or not with in a network environment sitting from single location. By
taking the system id, name and path the administrator is going to register the softwares.
By using the system id the admin can able to install the required software to any
destination with in the network.
S/W Requirements:
Operating System
Language Name
: Jdk1.4 or higher
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
26
ABSTRACT
There are many services, which are utilized by a citizen provided by the
government or private sector. The Project entitled "COURIER SERVICE SYSTEM" is
an intranet application developed to maintain the transactions through net for Courier
Service System.
Dispatches, Receipts details. The primary features of the project entitled "COURIER
SERVICE SYSTEM" are high accuracy, design flexibility and easy availability. And
also it uses database tables Representing entities and relationships between entities.
27
ATM Simulator
ABSTRACT
To deposit, withdraw amount from the banks manually is long process. To made
this manual process fast this proposed system Automatic Teller Machine (ATM) be
designed. This proposed system deals with all transactions of actual ATM centers like
login to your account according to your pin number given, checking balance amount,
savings as well as current account. Also the account holder can deposit, withdraw
amount from his/her current or savings account respectively from any location.
Advantages:
0
Fast accessing
No manpower is needed
Hardware Specifications:
3
64 MB RAM
4 GB Hard Disc
Software Specifications:
Operating System
Language
Database
Access/Oracle/SqlServer
28
ABSTRACT
This is purely a java enabled Network project using which an end user downloads
different files (data) from various servers with a high-speed data transfer. The end user
activating the Download Manager need to submit an URL of the file to be downloaded,
by which the software gets connected to the server and gets the file information with its
status for the download. After which the user is asked for the path to save the file. The
Download manager then downloads the requested file at a high speed.
The software design supports the display of status information of the download
carried out at every second (i.e.) the percentage of file downloaded. The most striking
feature of this download manager is support of high-speed data transfer and it allows the
user to download more than one file simultaneously. It provides a reliable data transfer by
tracing the download status at every moment and helps to continue the file downloading
from the position of its last download if the downloading is terminated by a sudden
disaster like loss of connection due to any reason or failure of transmission.
119.
ABSTRACT
The project is designed at transmitting information via network in a safe and secure
manner. The project is mainly divided into two modules. The first module describes
Message Digest with Secure Hash algorithm for integrity of the message. The second
module describes the International Data Encryption Algorithm where the message is
encrypted first and it can be decrypted using the same algorithm. These two algorithms
are integrated for a safe transmission of the message via the network. The same concept
is embedded in network using the concept of socket programming. The usage of Socket
Programming is that it is used for identifying the destination using the host address and
port number.
ABSTRACT
Finding information on the web is like looking for a needle in a haystack.
Fortunately there are stating points one can use. Tools are also available to help perform
searches for specific data. It is the browser that helps communicate with the Internet
world. A browser is a program that takes input as a page requested; interprets the text,
formats the commands that the text contains, and displays the page properly formatted on
the screen.
Web server serves static content to a web browser at a basic level. This means that
the web server receives a request for a web page as requested through the browser. The
web server is also called HTTP server because it responds to HTTP request. Web server
allows you to serve contents over the Internet using the Hyper Text Markup Language
(HTML) and returns the appropriate HTML document.
Speech technology is becoming increasingly important in both personal and
enterprise computing human interaction with computer. Speech technology allows hands
free use of computers and supports access to computing capabilities away from the desk
over the telephone.
Speech recognition and speech synthesis can improve computing accessibility for
users with disabilities and can reduce the risk of repetitive strain injury and other
problems caused by current interface. Voice Enabled Browser is one that performs all the
activities of the Browser and includes the advanced technology mentioned above to have
a fast and easy operation of Internet.
Our project aims at developing a Web Navigator and incorporating basic
functions into it. After having done this, linking the browser to a speech engine namely
IBM Via Voice.
ABSTRACT
The TCP/IP protocol suite is the standard requirement fo all applications that need
to communicate over the Internet. As TCP/IP applications are unable to specify the QoS
parameters needed for most Asynchronous Transfer Mode (ATM) services, we tend to
use the GCRA Algorithm. The purpose of Cell-Rate Guarantees for Traffic across ATM
Network is to provide QoS.
ATM is a connection-oriented switching technology, utilizing statistical
multiplexing of fixed-length packets, known as cells.
The purpose of
traffic control is to minimize congestion. In an ATM network when the Source Machine
continuously sends cells to the Destination Machine through the Router Machine, there
will be a possibility of occurring congestion. When congestion occurs the Routing
Machine cannot accept more cells and hence these cells will be discarded. This causes
regeneration and retransmission of the discarded ATM cells. The objective of this project
is to simulate an overflowing ATM network and establish a router with congestion
control based on the GCRA algorithm.
ABSTRACT
123.
Net Banking
ABSTRACT
The main objective of this proposed system is to online all the activities of a bank.
The system is like to enable the bank employees to open accounts for their customers
with ease and to add the details, to transfer amount from one account to another account
and doing all the activities related to loan, making all type of transactions. Using the
system employees can also generate different types of modules.
10
11
Issue Loans
12
Issue DDs
13
Using the system client can also generate different type of modules.
3
ABSTRACT
Von Neumann computers distinguish between primary and secondary memories
by providing explicit distinct interfaces to each. After that virtual memory systems use
the primary memory interface to provide access to secondary storage devices by loading
information into the physical primary memory when it is needed. But still these requires a
separate interface to access remote files. So, there is a need to develop systems, which
uses the same interface for accessing the local memory as well as remote memory.
The primary duty of such a system is making better use of existing file &
secondary memory interfaces to maintain transparency to the end user by creating an
illusion to user that everything is happening on his own system.
In this project entitled Distributed File Editor , we developed a simple file with
main concentration on implicit file sharing. Our intention is to provide a graphical user
interface through which the user can access remote files with a level of transparency. To
implement this we use the concepts of distributed systems like distributed file systems
and group communication.
1
ABSTRACT
This project is aimed at developing a web-based system, which manages the
activity of Student Project Management and Online Testing. This is a system used by
Educational Institutions or other organizations, which are
projects. This system will manage the database and maintain a list of all student groups
that have registered on this site, conduct their online test and shortlist those students who
have passed the eligibility criteria as set by the professors.
There are 3 roles in this system namely,
0
Administrator role
Professor role
Student role
An administrator logs into this system, and can register a professor who belongs
to that institution. A student should register, provide his information (like semester
marks, technologies familiar with, prior project experience etc.,) and also provide
information about his team members. He/she is allowed to give the Online Test during a
scheduled time interval. After giving the test students test score is saved in the database.
Professor can login and then shortlist students for allocating the projects by their
academic performance and/or test score.
2
ABSTRACT
Cryptography can be defined as the process of making information indecipherable
to all except those who are the intended recipients of such information. In this day of
electronic communication via the Internet, particularly electronic commerce, securing
sensitive data (such as credit card numbers and e-mail) is becoming increasingly
AdXpress
ABSTRACT
AdXpress is the largest single source of online intelligence for marketing,
advertising, media and research communities worldwide. AdXpress
offers a FREE
World Advertising and Marketing News email service, ensuring the top global stories are
delivered daily to your inbox. Our free classifieds will expose your ads to local, regional
and national buyers in different countries across the globe. AdXpress is a full featured
classified ad manager website. AdXpress is designed to seamlessly integrate ads in this
website.
Our AdXpress ad web site is organized using an easy-to-follow index so that you
can locate the classified ads you're interested in quickly and easily. We hope you'll enjoy
your visit and you will opt this site for placing the ads forever and you will definitely add
our site as a bookmark in your web browser. Please come back and visit us again soon.
Welcome to AdXpress. We are pleased to be able to offer you free classified
advertising over the Internet. AdXpress splits your screen up into various sections. At the
home page there are list of menu options. These allow you to go straight to a category
you want by navigating through the sub options.
There are two types of users who can use this system:
1.Administrator
2.Member
Boardwalk
ABSTRACT
The project entitled BROADWALK REALERS NETWORK is developed
for organization of NAVEEN TILES Pvt. Ltd located in Rajastan.The developed
system helps the organization to receive orders through online for product tiles that
can be supplied by the organization. This Activity includes three modules customers,
dealers and administrator. Customer module facilitates the customers to place order
through online, and can view catalog information provide by organization. In this
module each customer order will be verified to determine whether author dealer
existing in the area specified by customer. If dealer existing then the customer
order will be redirected to corresponding dealer otherwise those orders will be
registered as direct customers orders to Administrator.
Dealer module facilitates authorized dealers to customer orders status in
their area, to place order ,to manage their details in Administrator records.
Administrator module facilitates the Administrator to view direct customers
order status, dealers order status and also to maintain transport charges info and
products catalog information. Administrator can also appoint new Dealer and remove
existing Dealer.
5
Cotelligent
ABSTRACT
Contelligent is a component-based Web Content Management solution. This
system is based on the convenience of the students to communicate with the resources
provided by the distance learning section of the university.
This project is aimed to provide services to students over Internet, each student is
given with a unique id and as the student logs on into the system he will be given access
to anonymous number of sections.
The different sections that are involved in this
system are:
0
Lecture notes
Assignment
Library
The system uses 2 different types of users 1. administrator
2. Normal user
ABSTRACT
The popularity of interactive media such as the World Wide Web (WWW) has
been growing at a very rapid pace (see, e.g., GVU 1999). From a marketing perspective,
this has manifested itself primarily in two ways:
0
A drastic increase in the number of companies that seek to use the WWW to
The rapid adoption of the WWW by broad consumer segments for a variety of
Loan Amortizer
ABSTRACT
The administrator of this software can just view the information besides adding
new users and employees and changing their passwords. Thus he cannot interfere with
the loan process or payments. This part is dealt by manager who has authority to issue the
loan to an individual. He can provide information on which type of loan being issued and
to whom.
Accountant and agents of the finance company can view all the details of the
customer. When a customer makes a payment, they can store the payment details into the
database. Thus, Loan Amortizer is an online software application which fulfills all the
requirements of a typical finance company. It provides the interface to users in a
graphical way to manage the daily transactions as well as historical data. The users can
provide a clear picture to the customers regarding how much is already paid and how
much is still pending. By extending this software, it is possible to make the customer to
directly view his transactions right from beginning. This will eliminate any mischief
played by any third party person. Also provides the management reports like Released
Loans, Payments, Rejected Applications, Submitted Papers and Finance Report.
This application maintains the centralized database so that any changes done at a
location reflects immediately. This is an online tool so more than one user can login into
system and use the tool simultaneously.
The aim of this application is to reduce the manual effort needed to manage
transactions and historical data used in a finance company. Also this application provides
an interface to users to view the details like the Released Loans and Finance Report etc.
Technologies used:
J2SE, Servlets, JSP, JDBC and Java Script.
Transport Plus
ABSTRACT
It is every companys need to see the welfare of its employees by providing
transportation for the employees to attend their duties successfully. This is the reason
many MNC companies maintain their own fleet and sometimes takes the help of third
party transport systems also. When several employees wish to utilize the bus services
provided by the company, naturally the company employees need a system to allot the
buses and oversee the transportation. Transport Plus is a software that quenches this need.
Transport Plus has four types of users. The administrator of this software will be
able to create new users and change the passwords. He can add or update the employee
information in the company. He can add and view the information of Transport categories
and also available routes. Depending on the users demands, new route and also new pick
up points can be added to the database. Beyond this, the administrator can also act as a
normal user and book a bus or cab for himself. He has authority to place a cab request or
cancel a request for a bus. This system calculates fare depending on three categories:
short distance, medium and long distance and the fare would be deducted from the
employees salaries.
When an employee of the company wants to avail the transportation facility, he
will forward a request which will be approved by the administrator depending on the
availability of room in the bus. When an employee wants a cab, it will be arranged by the
approver and later depending on the recommendation of the project manager the charge
may or may not be deducted from the employee salary.
Approver is another user of this system. He can view the details of transport
categories, routes and pick up points. He can approve a request for a cab from an
employee and store the information of assigned cab.
The transport people can view all the information related to who are the
employees utilizing the transportation. They can take a decision to approve or disapprove
the requests placed for transportation. They can arrange a cab physically for the employee
and send the cab details to the employee who placed the request.
Users and guest users are employees who want to use the transport facility. The
users can place their request for a bus to reach the company or for a cab when they want
to go to a different place. These requests are approved or declined by the transport people
or project manager.
This application has rich user interface so that novice users can access easily. This
application provides the management reports like Occupancy report, Approval status
report, to track the usage of companys transport facility as well as cab facility.
E-School
ABSTRACT
The project entitled as E-SCHOOL helps the school/college management to
communicate the details of the attendance, marks, cultural activities and other
information to the students/faculty/parents through Mail/SMS. This system makes use of
threads to calculate the attendance.
Then by generating reports on each day it will identify the students who have less
percentage of attendance than the required aggregate percentage. It sends the messages to
the mobiles of the parents about the attendance and marks details. Apart from this
whenever the parents want to know about their childrens attendance and marks they can
directly login into the site or they can send message to the administrator by giving that
particular students registration number and they can get return message.
Current Scenario
In the existing system, the details of the students regarding their attendance and
marks are being maintained in the database and a print of it is made and sent to parents by
post monthly once. The problems here are:
0
Proposed System
This system helps the college to communicate the details of the attendance and
marks to the parents through Mail/SMS. By generating reports daily, weekly, monthly it
will identify the students who have less percentage of attendance than the stipulated
attendance percentage and send SMS and Mails to the parents.
Salient Features:
Fast and accurate report generation
Send attendance reports to parents mail
Easy, interactive GUI
Two way Communication through mails
Organizational internal survey
ABSTRACT
Employee Registration i.e., new employee recruitment will take place. News and information
about company can access employee.
Authorities will refer the complaints that are given by employees. Issues will put in front
of related employees to get proper solutions. For selecting higher posts Elections will be
conducted.
The user modules include reading and checking notice and displayed issues.
Employees can register complaint against management. Every employee can participate
in the elections. Nominees can put their promise on net through canvas module. Results
will be displayed for every issue. On an issue an employee can vote only for once. It
generates all the related validations.
Web Forum
ABSTRACT
Web Forum is uniquely designed for reading Internet forums and conferences. You can
easily add your favorite forums to Web Forum to stay informed about updates and changes on
these forums without loading them in your browser. Web Forum saves you time by showing
new and updated topics while hiding topics you have already read. This is a typical forums
which allows users to add threads and reply to existing threads. It also allows users to search
for existing threads. It provides all common tasks related to users such as registration, password
recovery, change profile etc.
Jsp,servlets
Oracle10g
RSFS
ABSTRACT
This REMOTE SYSTEM FILE SEARCH development of a system that is simple
and easy to find client system files.
Using this project any one can search for a particular file or files on the client
machine by simply giving the client machines IP address, file extension and location of the file
by sitting on the server machine. The list of files with the specific extension will be displayed
on the server machine.
Some of the features are:
The proposed system should be in the way, the user can enter the client system IP, file
extension, path of the file or folder very quickly.
It should display the matching files. The files should be display in the order as they
exist.
The modules are
1. User interface
2. Searching
User interface
It provides very attractive and friendly user interface. The user can easily
interact with the system ( to provide client system IP / file system extensions..Etc).
Searching
This module allows us to search the files and folders exist in client system. It
allows regular expressions to Search the files. It displays in the files in an order as
they exist in system.
ENVIRONMENT:
Operating System Server: Windows XP or later
ABSTRACT
Here is E-talk, the JSP Chat Application. It allows opening and managing multi skin
chat rooms. System user can open and control multiples chat rooms. Moderators can manage
users (list, ban, kickoff), manage blacklist, generate transcripts, do backup, and apply chat
rooms parameters such as max users, language, filters, performance, ... Server side needs
Servlets/JSP. Client side could be HTML/CSS/JavaScript, Applet, Flash or Application such as
SWING. Chat rooms are easily customizable thanks to skins, Etalk is ready for XML
communication to its XML Connector service.
ABSTRACT
A method for the project engineering of an automation system is provided. An existing
project is opened or a new project is created in a project engineering software tool.
A project manager, who serves as supervise the work of a project team. The manager
oversees not only the people and technology involved, client information, time and money
constraints and quality of the work. In this automation system project manager is a
administrator who assign the project to team and monitor the progress of work.
Modules in PAS
Administrator Module
Manager Module
Team Member Module
Software Spefication
JSP,Servlets
Oracle 10g
ABSTRACT
Hotel Software is an in-house Windows based application used by businesses to
automate their day-to-day operations such as room bookings, reservations, checkin or checkout.
Hotel reservation software is developed for suitable works of the following types of
accommodation like Hotels, Motels and Guesthouses, University accommodation letting,
Cottages, Villas, Cabins, Hostels or Any other room booking which is to be managed on a dayto-day basis.
Software Specification
Java Swings
Oracle 10g
Extreme PC
ABSTRACT
XtremePC is an open source project has been developed using Java RMI-NIO and
Win32 API with Windows XP Look & Feel. It provides opportunity to access files of your
remote PC from anywhere in the world. You can even run any type of file with associated
executable files, turn off the remote PC, restart, log off, lock etc.
You can also download files from your Remote PC to the current PC, and upload files
from the currently using PC to the Remote PC. You will also be able to know the file
information before downloading and uploading files so that you would always know the file
size which is being downloaded or uploaded. Caching the contents of drives, folders added
extremely fast navigation so that you will always feel that you are accessing local drives.
It also ensures the security of passed information both ways using Data Encryption
Standard (DES) algorithm using Electronic Code Book (ECB). The Remote PC is always
protected by password. You have to know the password in order for using the Remote PC from
the current PC.
Here is a snapshot attached with this email, how you will see your PC out of your
house. However, Lite Edition does not support XP Look & Feel.
Whats new?
No more command-line interfaces. Now it is loaded with Graphical User Interface with
Windows XP Look & Feel. Those who faced problem loading XP Look& Feel, may try this Lite
Edition. It uses only built-in Java Look & Feel, which reduced size of the distributable file.
Easy and EXTREMELY fast navigation through Internet, feels like local drives.
Select a file from the remote PC and use menu to download, upload, and run on
remote PC.
Software Specification
Java RMI
Swings
ABSTRACT
simple one most service providers are not aware of the vast possibilities available and the
potential impact they might have on their business. This white paper is an attempt to set this
right by describing the opportunities embedded in Customer Flow Management.
ABSTRACT
Making cities liveable is a matter of growing concern for different groups across the
globe. As such, the effects that the distinct means transportation can have on different
communities have been an evolving subject of study. This coursework is intended to describe
the design of Meeting Arrangement for a university or college, a simple meeting arrangement
system based on the different means of transportation for students at the college or University.
On a given day, students arrive to the college or university for different activities (lessons and
meetings) using distinct means of transportation. Consequently, their arrival times vary
according to not only to the means but also to the departure point.
The idea is to produce a case study scenario where students can will fully register their
routes and keep their classmates updated on their arrival times. With potential application to
meeting arrangement and lesson start times, such system shall be modeled as an Informative
Digital Screen (IDS) similar to the ones located at bus stops across the city. For our case study,
we assume that such means are restricted to bus, car, and bicycle only.
By using this system, students and staff at university or college can potentially arrange
meetings and in general, be more informed to schedule activities. Such system is to be modeled
using object oriented techniques and deployed accordingly as a Java computer programming
application.
Software Specification
Java Swings
Electronic Care
ABSTRACT
No matter what the industry, businesses are realizing that one of the quickest and most
effective ways to strengthen their business is to treat their customer base like the valuable asset
it is. The competition for customers in every industry is fiercer than ever, as loyal customers are
expensive to acquire and easy to lose. Ten years ago, only a few people might have recognized
the expression "Customer Churn." Today, almost everyone knows what it means, and a
growing number of decision-makers can quote average churn figures for their industry, if not
their own business. Companies are more willing to invest in CRM tools and infrastructure, but
with that increased focus comes increased accountability. The pressure on customer contact
centers to improve service quality is higher than ever before. Through e-care we can solve the
customer problem on service with the help of e-mail.
Software Specification
Jsp,servlets
Oracle10g
ABSTRACT
This Project Mainly Designed for creating database for examination for students and
making online tests for students with random picking of different questions to different students
Application functions.
application developer
adminstrator for login
create a table for registration
Software Specification
Jsp,Servlets
Oracle10g
ABSTRACT
Mega Mart wanted to revive its brand image, so it hired an ad agency for it. The ad
agency came up with brilliant ideas for marketing. They created ads of all types like audio,
video, print media etc. The task of managing these ads was huge and they wanted a software
developed to manage the process better. Entering User Id and password in the Login screen.
Viewing Advertisement pricing details. Viewing Strategy report. Entering Advertisement
pricing details. Budget Allocation by the manager. All the data should be saved to database
generating unique records. Display message to the user.
ABSTRACT
This is game project which seems to be a quiz in cricket. The project will generate a 50
fifty random multiple questions from the database one after another and displays whether the
entered option is correct or not immediately and finally displays the total number of correct
answers and grade of the user.
S/W Requirements:
Operating System : Windows XP/2000 Professional
Language Name
: Jdk1.4 or higher
H/W Requirements:
Processor
Ram
: 256MB or Above
Hard Disk
: 40GB or Above
148. E-Banking
ABSTRACT
The main objective of this proposed system is to
online all the activities of a bank. The system is like to enable the bank employees to
open accounts for their customers with ease and to add the details, to transfer amount
from one account to another account and doing all the activities related to loan, making
all type of transactions. Using the system employees can also generate different types of
modules.
14
15
16
17
18
Issue Loans
19
Issue DDs
20
Using the system client can also generate different type of modules.
6
ABSTRACT