Академический Документы
Профессиональный Документы
Культура Документы
recovered on scene and other details, finger prints and picture etc. The system allows admin
to update the status of investigation, and punishment to criminal.
like slow internet, expensive internet bills etc. To solve the problem, the network has to be
redesigned which would allow only browsing traffic and all other traffic bound to the internet
should be blocked.
A way to pick up the phone, dial a number, and see who you are dialing
A way to hang up
cases of any kinds of emergency to save the patients living in the ruralareas. For the effective
implementation of telemedicine service, robust ICT(Information and Communication
Technology) infrastructure is required tomake this service run properly. The main objective of
this
project
isstudents
will
develop/design
the
necessary
ICT
infrastructure
as
10. IOT based Smart Roads Intelligent Highways with display information through mobile
application
An intelligent Highway is an innovative concept for smart roads of future smart cities. It is a
program ofinnovation that links a different way of looking at things with innovative ideas that
apply the opportunities offered bynew technologies in smart ways. Nowadays safety on road
has become an important factor in our life because there isan increasing amount of accidents
on the road and there are some places where accident occur frequently such ascrossings,
turns. Also there is a big problem of traffic jams on the road. Due to heavy rain fall, there is a
possibility ofwater overflow on the bridges and accident may occur. In hilly area there is a
possibility of landslide. so, there came aneed to design a system which can detect these
unexpected events. So we are designing a system that is An IntelligentHighway system with
(Weather Accidents Landslides and traffic) W.A.L.T. which is an innovative concept
tomaintain safety on roads. The system will make use of digital sensor to acquire data of
landslide, accidents traffic jamsand weather condition and that will be displayed on active
LED display on road, using XBee and GSM technologies.
6. An e-Commerce Portal
The portal should have product posting including product images by Admin, Product
Catalogue Search, Shopping Cart and Payment Service Facility. This App should be
developed using Java Spring Framework.
7. Baghchal
Use Java Programming to develop popular Nepali Game "Baghchal"
8. File Sharing-App
This program on installed on users PC should sync all files on users computer and when
installed on mobile devices should sync all files across the mobile device.
9. Call Recorder-APP
Will record and allow to listen all incoming calls when installed on mobile device.
3. CodeBook
Mobile App to Teach Children Basic Scratch Programming Skills and Concepts
https://www.youtube.com/watch?v=5cFjtU0C5JI&feature=youtu.be
This tool can support deployment of software on the computer of the client, remotely.
The addition of the client machines to the network can now be done easily and simply,
with its help
The task performed by the tool on the computer of the client is done silently and quietly
The installation or un-installation of this software can be done with ease.
This software also aims to minimize the support of the direct user.
It also has the ability to control, only from a single console the system operations
It has the power to maintain and look after other software installed in the computer
Also adding other new features to the tool can be done simply
The main aim is to try and organize the systems, only from one server, that is centrally
located, which is in turn connected to a network, so that it can perform its daily activities.
and provide solution with dynamic load balancing method. Initially we work on developing one
shot load balancing policy and extend its features to distributed load balancing policy which
will handle both incoming external loads at each node.
Performance of dynamic load balancing methods are compared with existing methods by
considering the average completion time per task and process rate of each system based on
random arrivals of the external loads.
In present network congestion is important factor where researches are working to reduce
congestion and increase scalability and robustness in network communication. CRF will
control and restrict unwanted traffic before they enter the network and communicate with
routers which are located at borders and restrict unwanted traffic.
7. Network Virtualization:
The cloud is rapidly changing the face of web infrastructure by taking advantage of scale and
flexibility of the shared physical infrastructures. The goal of network virtualization is to compile
a diverse set of requirements into a single configuration of the underlying physical network,
enabling datacenters and such establishments to automatically and simultaneously address a
large and diverse set of customer requirements. This project will produce an open source
implementation of this approach. In addition, this will compare its performance to other
approaches and then extend it to more functionality.
The ticketing authority is the new concept of the proposed plan and according to this plan the
clients will have to get tickets from the ticketing authority to access the network resources.
This method is proposed in order to keep a check on the vulnerable activities. It will keep a
check on the unauthenticated clients and will also secure the networking system. In this
method the back end server will compare the clients permission and the requested operation,
whether it should be allowed or not. If they find any kind of discrepancy between the requests
operations and the permission then they will transfer it to the honey pot for filtration. This new
method can protect the system and also prevent unscrupulous activities.
This method uses two prime numbers for creating new key pair which is not an effective
method. In this method there are chances of mathematical and brute force attacks. Here
private key is available on network.
Considering these issues we implement a secured cryptography method where both private
key and public key are used for encryption and decryption. While sending data messages are
encrypted with public key and on receiving site private key is used for decryption.
securing web services simply because web services require end-to-end security rather than
point-to-point security as provided by SSL.
The objective of this project is to research the security implications of the software as a
service model, develop scenarios to demonstrate the security issues, and design and
evaluate an architecture for securing services.