View
186
Download
0
Category
Tags:
Preview:
Citation preview
2014-ADVANCED PROJECTS
S.NO PROJECT TITLES LANGUAGE DOMAIN
1
TRAVELLING MANAGEMENT SYSTEM: Radiant
Reservation System (RRS), A Integrated Software for tour
operating companies which comprises all the tour industry
related and especially made keeping view of South Africa,
Tanzania and other East African countries. RRS helps them, Tour
Operating Companies, manage their Customers, Hotels, Vehicles
and Agents and makes all operations of the tour company easy
and accurate.
VB.NET
REAL TIME
2
SOCIAL NETWORK: A social network service focuses on the
building and verifying of online social networks for communities
of people who share interests and activities, or who are interested
in exploring the interests and activities of others, and which
necessitates the use of software. Most services are primarily web
based and provide a collection of various ways for users to
interact, such as messaging, queries, Advices and file uploading.
The System, which was in the past, had Message Sending; Invite
the friends, Communities and Photo Albums. But those systems
didn’t having file attachment feature. The present system
Message sending through chatting mechanisms, Inviting the
friends, Communities, Photo Albums and also file attachments
(which is the drawback in the existing system) are the main
features. Social networks connect people at low cost; this can be
beneficial for entrepreneurs and Small businesses looking to
expand their contract base. These networks often act as a
customer relationship management tool for companies selling
products and services. Companies can also use social networks
for advertising in the form of banners and text ads. Since
businesses operate globally, social networks can make it easier to
keep in touch with contacts around the world.
ASP.NET WITH
C#
NETWORK
3
LIBRARY MANAGEMENT SYSTEM: The project titled
Library Management System is Library management software for
monitoring and controlling the transactions in a library .The
project Library Management System is developed in java, which
mainly focuses on basic operations in a library like adding new
member, new books, and updating new information, searching
books and members and facility to borrow and return books. This
system also gives us the complete information about the library.
The user can enter the record of new books and retrieve the
details of books available in the library, and also user can issue
the books to the students/peoples and maintain their records and
can also check how many books are issued and stock available in
the library. In this project it is easy to maintain the late fine of
customers who returns the issued books after the due date.
Throughout the project the focus has been on presenting
information and comments in an easy and intelligible manner.
The project is very useful for those who want to know about
Library Management System.
VB.NET WITH
C#
REALTIME
4
IMPLEMENTATION OF ECCENTRIC NETWORK FOR
INTRANET: Eccentric network is mainly used in software
companies. Because many persons involve in completion of the
project like team leader, project leader. Team members should
finish their daily task and their source code should be stored in
the main server. This is the day-to-day task done by the team
members. Project leader assigns modules for the team members.
These details are informed to the members manually. If the team
member or the team leader is not in the office they can’t perform
this task. So here we developed a private network for the team
leader and the team member. Using this network the project
leader can assign the projects to the respective team members.
Once the team member comes to work, they can come know the
work assigned by checking offline. This information contains
with the team member network id and password with project
name and the roll of the project and time duration of the projects.
Once any team member got the project assignment mail they can
interact with our private network and they do their daily task at
any time. Here the project leader and project team member have
their individual section for their processing. Using the admin
section the project leader can assign the projects. Users can
interact with the network through user section. Here they can
view all the files and folders, which are uploaded by them. If they
have the permission to delete the file it can be done remotely.
ASP.NET WITH
C#
NETWORK
5
PATIENT INFROMATION SYSTEM: New technologies have improved the ability of electronically storing, transferring and sharing medical data also changed. At
the same time, they also create serious questions about who has access to this information and how they are
protected. The aim of PIS is to store the detailed information about the Patient like treatment details, date of joining and allocated doctor. The major
modules in this system are allocating the bed, allocating the doctor to the patient. The features of this
system are: Knowing the patient details and patient status, To know the type of treatment he/ she undergoing, To know the consulted doctor details, his
/ her visiting hours, To know the information about the doctors included and deleted, It allows adding /
editing patient registration, To know the list of doctors available, To know the total list of beds available
ASP.NET WITH
C#
REALTIME
6
ONLINE TEST SIMULATOR: The purpose of on-line test simulator is to take online test in an efficient manner
and no time wasting for checking the paper. The main objective of on-line test simulator is to efficiently
evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers
according to their convenience and time and there is no need of using extra thing like paper, pen etc. Scope
of this project is very broad in terms of other manually taking exams. Few of them are: - This can be used in educational institutions as well as in corporate world.
This system Can be used anywhere any time as it is a web based application (user location doesn’t matter).
There is no restriction that examiner has to be present when the candidate takes the test.
JAVA WITH
SWINGS
REALTIME
7
WEB BASED RAILWAY RESERVATION MECHANISM: The purpose of on-line test simulator is to take online test in an efficient manner and no time wasting for
checking the paper. The main objective of on-line test simulator is to efficiently evaluate the candidate
thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their
convenience and time and there is no need of using extra thing like paper, pen etc. Scope of this project is
very broad in terms of other manually taking exams. Few of them are: - This can be used in educational institutions as well as in corporate world. This system
Can be used anywhere any time as it is a web based application (user location doesn’t matter). There is no
restriction that examiner has to be present when the candidate takes the test.
ASP.NET
REALTIME
8
DISTRIBUTED CHANNEL MANAGEMENT SYSTEM: The concept deals with the propagation of pesticides
management firm activities. Propest Co. ltd is one of the popular companies for pesticides, which is
expected to provide its valuable services to its customers efficiently. With the advent of new technology every task in modern life is being
absorbed rapidly within the routine of human life. Such technologies are applied for various field to
improve the overall system performance and to deepen the organization grow. Propest Co. has also thought of utilizing such technology to reach its
expanding customer base and provide efficient service to the customer. The result one such attempt is this
Product called Distribution Channel Management System. This product has been mainly designed to overcome some of the problems faced with the
previous system. The main problem faced was unnecessary delay in information processing and
expensive.
ASP.NET
REALTIME
9
E-STUDENTS CONSULTANCY: The project is a
comprehensive web application, which is more helpful in
simplifying the testing process. It is more prominent role in the
business-oriented field and also on the other kind of sectors. The
system simplifies the test process, in estimating the skill set of
the student and their eligibility. As the globe world is a
competitive world, examining each individual is a complex task
to handle, which may also lead to misconception of results that
more probably an inaccurate one.
This system comes in handy in manage the working process of
examine the student, the user who are new to this system can
register their identity to gain access to it’s features. After
successful authentication, this system generates an individual set
of question to the users ; the user can make up their own choice of
choosing the correct option from the objective quiz. After
completion of giving answers to each question of choice the quiz
end, with the automated process of the system. This system
manipulates the quiz result, showing the skill set of the each user,
by generating a survey of the results helps the organization or
any business sectors in choosing the right person for the perfect
job.
ASP.NET
REALTIME
10
GUI-BASED DATA DIRECTOR: The data is an essential thing for
all cases to manage, and also it is necessary to keep that data in a
secured manner, many of the cases there are lots of officials fell into
this act to insecure the data, so the outcome results fault. The
System “GUI-Based Data Director” is publishes an impressive
elucidation for handling the database from the user elevation. This
site produces the grasped way out especially for non-technical
persons such as data entry operators. All the way through this site
the registered users can generate their own database into the back
end SQL SERVER from the front end ASP.NET, after creating the
database this site endow with the way to the user to engender the
table with the apposite constitution into the database. This site also
allows the user to insert the proceedings into the shaped table,
modernize the obtainable proceedings into the offered table, as well
as obliterate the unnecessary records into the table. This site also
provides the way to truncate the intact records from the backend
table.
ASP.NET
REALTIME
11
E- LOAN SERVICES: This project is a flexible application for the
Private Finance Corporation. It involve in many manual calculations
related to their day-to-day activities. Loan Manipulation process is
handled automatically by this system. This system is mainly focused
on control and analyzes the client’s Personal and Official
information due to the further verifications. The details of the clients
are stored in the system for further references before loan
processing. Hence there arises a need for intelligible User Interface
for the preliminary data entry process. Loans are classified as
Personal, Housing, Vehicle and Cash Loans. Each process need a
separate module for the further activities involved in this process.
This application provides a Web based environment for the end user
for all the data entry process like loan transactions; cash entries,
cheque issues and other manipulations thereby facilitate the need of
the clients and also enhance the financial growth.
ASP.NET
REALTIME
12
AIRLINES ANNOUNCEMENT SYSTEM: An Airline
Announcement system is part of the so-called Passenger Service
Systems, which are applications supporting the direct contact with
the passenger. The Airline Reservations System was one of the
earliest changes to improve efficiency. Eventually evolved into the
Computer. A Computer Reservation System is used for the
reservations of a particular airline and interfaces with a Global
Distribution System, which supports travel agencies and other
distribution channels in making reservations for most major airlines
in a single system.
ASP.NET
REALTIME
13
ONLINE PROPERTY PROMOTION PARTNER PORTAL: The
project helps for searching and advertising their property and also
provides the land detailed description. The project contains User
Login, Registration, Admin Login, Feedback and Contact Us. A
piece of land, including the air above it and the ground below it, and
any buildings or structures on it. Real estate can include business
and/or residential properties, and are generally sold either by a
relater or directly by the individual who owns the property (for sale
by owner). The property is categorized into two types. They are
residential and commercial. Here the residential and commercial
property gives the detailed information about the property size,
property location, and ownership. Uploading their images is
Highlighted in the home page until the property will sell. This
uploaded image makes much easier for the buyer to see their
property.
ASP.NET
REALTIME
14
VISION PROCESSING FOR REAL-TIME 3-D DATA
ACQUISITION BASED ON CODED STRUCTURED LIGHT:
Structured light vision systems have been successfully used for
accurate measurement of 3-D surfaces in computer vision. However,
their applications are mainly limited to scanning stationary objects
so far since tens of images have to be captured for recovering one 3-
D scene. This paper presents an idea for real-time acquisition of 3-D
surface data by a specially coded vision system. To achieve 3-D
measurement for a dynamic scene, the data acquisition must be
performed with only a single image. A principle of uniquely color-
encoded pattern projection is proposed to design a color matrix for
improving the reconstruction efficiency. The matrix is produced by a
special code sequence and a number of state transitions. A color
projector is controlled by a Computer to generate the desired color
patterns in the scene. The unique indexing of the light codes is
crucial here for color projection since it is essential that each light
grid be uniquely identified by incorporating local neighborhoods so
that 3-D reconstruction can be performed with only local analysis of
a single image. A scheme is presented to describe such a vision
processing method for fast 3-D data acquisition. Practical
experimental performance is provided to analyze the efficiency of
the proposed methods.
VB.NET
WITH C#
IMAGE PROCESSING
15
LOCALIZED SENSOR AREA COVERAGE WITH LOW
COMMUNICATION OVERHEAD:
We propose several localized sensor area coverage protocols for
heterogeneous sensors, each with arbitrary sensing and transmission
radii. The approach has a very small communication overhead since
prior knowledge about neighbor existence is not required. Each node
selects a random time out and listens to messages sent by other
nodes before the time out expires. Sensor nodes whose sensing area
is not fully covered (or fully covered but with a disconnected set of
active sensors) when the deadline expires decide to remain active for
the considered round and transmit an activity message announcing it.
VB.NET
WITH C#
MOBILE
COMPUTING
There are four variants in our approach, depending on whether or not
withdrawal and retreat messages are transmitted. Covered nodes
decide to sleep, with or without transmitting a withdrawal message
to inform neighbors about the status.
After hearing from more neighbors, active sensors
may observe that they became covered and may decide to alter their
original decision and transmit a retreat message. Our simulations
show a largely reduced message overhead while pres erving coverage
quality for the ideal MAC/physical layer. Compared to an existing
method (based on hello messages followed by retreat ones and where
excessive message loss contributed to excessive coverage holes), our
approach has shown robustness in a model with collisions and/or a
realistic physical layer.
16
DISTRIBUTED FLOW MONITORING TOOL:
The project entitled “Distributed Flow Monitoring Tool” is a reliable
monitoring system. Which is helpful in managing the workflow
process of file operation? As current environment is throng up with
large amount of data, it is been complex to handle such data; hence
there arise a need that helps user to have an easier file sharing. This
system has a unique technique in handling the file, in which it has
split of files and join of file, for consideration if the file size is very
large to handle, using the file split method, we can partition the files
into number of segments as per needed, Which would help to have
flexible file sharing experience. The kind of partitioning of files as a
segment is used for security purpose in which the hackers can’t
monitor all the files. This system provides an extension of join
facility, which enables to reassemble the packets at the destination
point. Thus this system is good in monitoring the workflow of split
and joining of files.
VB.NET
FILE SECURITY &
REAL TIME
APPLICATION
17
SECURITY BASED PACKET SPLITTER AND EXPORTER:
Computer networking or Data communications (Datacom) is the
engineering obedience concerned with the message between
computer systems or devices. A computer network is any set of
computers or devices linked to each other with the ability to switch
over data. In computer technology, transfers per second and its more
common derivatives GB per second (abbreviated GT/s) and mega
byte per second (MT/s) refer to the number of operations transferring
data that occur in each second in some given data-transfer channel.
Network security starts from authenticating the user, commonly with
a username and a password. Since this requires just one thing besides
the user name, i.e. the password, which is something you 'know', this
is sometimes termed one factor authentication.
VB.NET
WITH C#
NETWORK, FILE
SECURITY & REAL
TIME APPLICATION
18
SMOCK: A SCALABLE METHOD OF CRYPTOGRAPHIC KEY
MANAGEMENT FOR MISSION-CRITICAL WIRELESS AD-
HOC NETWORKS: Mission-critical networks show great potential
in emergency response and/or recovery, health care, critical
infrastructure monitoring, etc. Such mission-critical applications
demand that security service be “anywhere,” “anytime,” and
“anyhow.” However, it is challenging to design a key management
scheme in current mission-critical networks to fulfill the required
attributes of secure communications, such as data integrity,
authentication, confidentiality, non-repudiation, and service
availability. In this paper, we present a self-contained public key-
management scheme, a scalable method of cryptographic key
management (SMOCK), which achieves almost zero communication
overhead for authentication, and offers high service availability. In
our scheme, a small number of cryptographic keys are stored offline
at individual nodes before they are deployed in the network. To
provide good scalability in terms of the number of nodes and storage
space, we utilize a combinatorial design of public-private key pairs,
which means nodes combine more than one key pair to encrypt and
decrypt messages. We also show that SMOCK provides controllable
resilience when malicious nodes compromise a limited number of
nodes before key revocation and renewal.
JAVA
WITH
SWINGS
INFORMATION FORENSICS AND
SECURITY
19
EVALUATING THE VULNERABILITY OF NETWORK
TRAFFIC USING JOINT SECURITY AND ROUTING
ANALYSIS: Joint analysis of security and routing protocols in
wireless networks reveals vulnerabilities of secure network traffic
that remain undetected when security and routing protocols are
analyzed independently. We formulate a class of continuous metrics
to evaluate the vulnerability of network traffic as a function of
security and routing protocols used in wireless networks. We
develop two complementary vulnerability definitions using set
theoretic and circuit theoretic interpretations of the security of
network traffic, allowing a network analyst or an adversary to
determine weaknesses in the secure network. We formalize node
capture attacks using the vulnerability metric as a nonlinear integer
programming minimization problem and propose the GNAVE
algorithm, a Greedy Node capture Approximation using
Vulnerability Evaluation. We discuss the availability of security
parameters to the adversary and show that unknown parameters can
be estimated using probabilistic analysis. We demonstrate
vulnerability evaluation using the proposed metrics and node capture
attacks using the GNAVE algorithm through detailed examples and
simulation.
JAVA
WITH
SWINGS
DEPENDABLE AND
SECURE
COMPUTING
20
FINGERPRINTING WITH MINIMUM DISTANCE DECODING:
This system adopt an information-theoretic framework for the design
of collusion-resistant coding/decoding schemes for digital
fingerprinting. More specifically, the minimum distance decision
rule is used to identify 1 out of pirates. Achievable rates, under this
detection rule, are characterized in two scenarios. First, we consider
the averaging attack where a random coding argument is used to
show that the rate 1/2 is achievable with pirates. For the existence of
a non-resolvable collusion attack, with minimum distance decoding,
for any nonzero rate is established. Inspired by our theoretical
analysis, we then construct coding/decoding schemes for
fingerprinting based on the celebrated belief-propagation framework.
Using an explicit repeat-accumulate code; we obtain a vanishingly
small probability of misidentification at rate 1/3 under averaging
attack with. For collusion attacks, which satisfy the marking
assumption, we use a more sophisticated accumulate repeat
accumulate code to obtain a vanishingly small misidentification
probability at rate 1/9 with. These results represent a marked
improvement over the best available designs in the literature.
JAVA
WITH
SWINGS
INFORMATION
FORENSICS AND
SECURITY
21
ON RELIABILITY AND SECURITY OF RANDOMIZED
DETECTORS AGAINST SENSITIVITY ANALYSIS ATTACKS:
Despite their popularity, spread spectrum schemes are vulnerable
against sensitivity analysis attacks on standard deterministic
watermark detectors. A possible defense is to use a randomized
watermark detector. While randomization sacrifices some detection
performance, it might be expected to improve detector security to
some extent. This paper presents a framework to design randomized
detectors with exponentially large randomization space and
controllable loss in detection reliability. We also devise a general
procedure to attack such detectors by reducing them into equivalent
deterministic detectors. We conclude that, contrary to prior belief,
randomization of the detector is not the ultimate answer for
providing security against sensitivity analysis attacks in spread
spectrum systems. Instead, the randomized detector inherits the
weaknesses of the equivalent deterministic detector.
JAVA
WITH
SWINGS
INFORMATION
FORENSICS AND
SECURITY
22
ACUTE IMAGE CLASHES: The project deals with one of the
major image processing tasks, detecting edges. There are lots of
techniques for detecting edges, but here is an efficient approach
called Convolution filters. This system also includes all image
editing features such as image zooming, image contrast changing,
color editor, image resize, image flipper, and many more. With the
help of this system, a single image can take more than thirty
different shapes with different styles. Edge detection filters work
essentially by looking for contrast in an image. This can be done a
number of different ways; the convolution filters do it by applying a
negative weight on one edge, and a positive on the other. This has
the net effect of trending towards zero if the values are the same, and
trending upwards as contrast exists. This is precisely how the
emboss filter worked, and using an offset of 127 would again make
these filters look similar to our previous embossing filter.
VB.NET
WITH SQL
SERVER
IMAGE PROCESSING
23
SYS-INFO GATHERER: The project entitled “Sys -Info Gatherer”
utility deals a major upgrade to previous System Information
gathering operation. This system offers various information about
the personal computer, in addition to information, the ability to
control the information displayed. You can start/stop drivers and
service, uninstall programs, control processes, set the computer
information including logo/picture, share/unshare folders, delete
startup programs, and modify user/company information. The
complete list of categories is Bios, Components, Computer, Cpu,
DateAndTime, Desktop, Drivers, Drives, EnvironmentVariables,
EventViewer, FileTypes, Fonts, InstalledPrograms, Introduction,
Keyboard, MultimediaCodecs, Network Information,
OperatingSystem, PointingDevice, Ports, Processes, Services,
Shares, Sound, SpecialFolders, StartupPrograms, UsbDevices,
UserInformation, Video, VisualStyles, Win32Explorer Hardware,
Win32Explorer Memory, Win32Explorer Network, Win32Explorer
Storage, Win32Explorer System, and Win32Explorer Users. By
examining the source code, this application will familarize the reader
with .NET WMI class methods, Panels used as UserControls,
TreeView, ListView, and ListViewGroups. This update fixes a
problem when the application starts as a notification icon.
VB.NET
WITH SQL
SERVER
IMAGE PROCESSING
24
IMAGE PROCESSING BASED ON WATERMARKING
PICTURE MAKER: The project describes an approach to building a
watermarking utility that may be used to add watermarks to any
supported image file format. The resulting application shall permit
the user to open any supported image file format into a scrollable
picture box, to define the text to be applied as a watermark, to set the
font and color of the watermark, to define the opacity of the
watermark, to determine whether or not the watermark appears at the
top or bottom of the image, and to preview the watermark prior to
saving it to the image.
VB.NET
WITH SQL
SERVER
IMAGE PROCESSING
25
MULTI QUERY OPTIMIZATION IN DATAMINING: The project
entitled “Multi Query Optimization in Data Mining” deals with the
concept of data mining. The spectrum of this system is to h ide the
relative data in corresponding ports like XML, HTML, Microsoft
Word, and so on. This system requires the existing database file,
which is necessary for conversion, once the user selects the required
database, and then they can have a complete capability to translate
the corresponding tables into their respective port. For this users
have to create their own identity into the conversion system, with
proper username, password, and with their contact information. If
once the user registers their identity to the system then they can
easily access the system with full rights. The process of the entire
spectrum is defined here: initially user have to select the database,
then they have to fix up their desired port like XML, HTML,
Microsoft Word, or Microsoft Excel Sheet, and finally they have to
convert their database table into the corresponding ports. So, they
can easily manipulate the entire table spectrum into the relative ports
easily.
VB.NET
WITH
MS-
ACCESS
AND SQL
SERVER
DATA MINING
26
SECURED IMAGE PORTRAIT WITH ULTIMATE PLANNING:
The project entitled “Secured Image Portrait with Ultimate
Planning” deals the concept of image processing with ultimate
security mechanism. Now a days many users feel most of the
problems based on the personal image sharing mechanisms, such as
share their personnel photos with the trusted one, as well as it is very
hard to manage the official data with the preferred manner. The
concept in this system illustrates how to make the image in an
unrecognized manner, which will be hard for the attackers or third
parties to obtain that respected images. The user first captures the
appropriate image with the help of fast image capturing tool; the
captured image will be hided into a text based format by using the
secured image portrait mechanism, which provides an efficient way
to the users to handle their data or an image in a secured way. The
Image Manipulation demonstrates how to add any Image to your
image, for example to add frame image. Beside that the users can see
how to rotate and flip image. This system is an ultimate solution for
the users who are all felt with an existing mechanism for manipulate
their images or share the images with trusted ones.
VB.NET
WITH SQL
SERVER
IMAGE SECURITY
MECHANISM
AND PROCESSING
27
CONTENT BASED IMAGE RETRIEVAL: The content based
image retrieval (CBIR) is one of the most popular, rising research
areas of the digital image processing. Most of the available image
search tools, such as Google Images and Yahoo! Image search, are
based on textual annotation of images. In these tools, images are
manually annotated with keywords and then retrieved using text -
based search methods. The performances of these systems are not
satisfactory. The goal of CBIR is to extract visual content of an
image automatically, like color, texture, or shape. This paper aims to
introduce the problems and challenges concerned with the design
and the creation of CBIR systems, which is based on a free hand
sketch (Sketch based image retrieval – SBIR). With the help of the
existing methods, describe a possible solution how to design and
implement a task specific descriptor, which can handle the
informational gap between a sketch and a colored image, making an
opportunity for the efficient search hereby. The used descriptor is
constructed after such special sequence of preprocessing steps that
the transformed full color image and the sketch can be compared.
We have studied EHD, HOG and SIFT. Experimental results on two
sample databases showed good results. Overall, the results show that
the sketch based system allows users an intuitive access to search-
tools. The SBIR technology can be used in several applications such
as digital libraries, crime prevention, and photo sharing sites. Such a
system has great value in apprehending suspects and identifying
victims in forensics and law enforcement. A possible application is
matching a forensic sketch to a gallery of mug shot images. The area
of retrieve images based on the visual content of the query picture
intensified recently, which demands on the quite wide methodology
spectrum on the area of the image processing..
J2EE
IMAGE PROCESSING
28
SMEAR IMITATION CREATURE: This project entitled ‘Smear
Imitation Creature’ provides unique features of painting tool,
enabling the user to make up their own arts, gallery and picture
collections. Using this enhanced features of this tool, we can edit the
JAVA
REAL TIME
NETWORK
SECURITY
image or photos, crop image as per the needed shapes .In editing, the
stimulation provides to flip or rotate the images as per the angle the
user needs. Resizing of image provides the user to resize the image
or picture that are exist or currently made to save it to their desired
format size regards with width and height. Cropping enables the user
to save their desired area in the image or picture loaded, thereby
make it as a perfect collection.
29
CELL BREATHING TECHNIQUES FOR LOAD BALANCING
IN WIRELESS LANS: Maximizing network throughput while
providing fairness is one of the key challenges in wireless LANs
(WLANs). This goal is typically achieved when the load of access
points (APs) is balanced. Recent studies on operational WLANs,
however, have shown that AP load is often substantially uneven. To
alleviate such imbalance of load, several load balancing schemes
have been proposed. These schemes commonly require proprietary
software or hardware at the user side for controlling the user-AP
association. In this paper we present a new load balancing technique
by controlling the size of WLAN cells (i.e., AP’s coverage range),
which is conceptually similar to cell breathing in cellular networks.
The proposed scheme does not require any modification to the users
neither the IEEE 802.11 standard. It only requires the ability of
dynamically changing the transmission power of the AP beacon
messages. We develop a set of polynomial time algorithms that find
the optimal beacon power settings, which minimize the load of the
most congested AP. We also consider the problem of network-wide
min-max load balancing. Simulation results show that the
performance of the proposed method is comparable with or superior
to the best existing association-based method.
VB.NET
WITH C#
SQL
SERVER
COMPUTER
COMMUNICATIONS
30
A* PATH FINDING ALGORITHM: This project illustrates how to
implement an A * path finding algorithm into our program. This
algorithm is used to find the path to get the destinations. A
Geographic Information System (GIS) integrates hardware, software,
and data for capturing, managing, analyzing, and displaying all
forms of geographically referenced information.
VB.NET
NETWORK
31
A GEOMETRIC APPROACH TO IMPROVING ACTIVE
PACKET LOSS MEASUREMENT: Measurement and estimation of
packet loss characteristics are challenging due to the relatively rare
occurrence and typically short duration of packet loss episodes.
While active probe tools are commonly used to measure packet loss
on end-to-end paths, there has been little analysis of the accuracy of
these tools. The objective of our study is to understand how to
measure packet loss episodes accurately with end-to-end probes.
Studies show that the standard Poisson-modulated end-to-end
measurement of packet loss accuracy has to be improved. Thus, we
introduce a new algorithm for packet loss measurement that is
designed to overcome the deficiencies in standard Poisson-based
tools. Specifically, our method entails probe experiments that follow
a geometric distribution to enable more accurate measurements than
standard Poisson probing and other traditional packet loss
measurement tools. We also find the transfer rate. We evaluate the
capabilities of our methodology experimentally by developing and
JAVA
SWINGS
NETWORK AND
NETWORK
SECURITY WITH
ROUTING DOMAIN
implementing a prototype tool, called BADABING. The
experiments demonstrate the trade-offs between impact on the
network and measurement accuracy. BADABING reports loss
characteristics are far more accurately than traditional loss
measurement tools.
32
EFFICIENT RESOURCE ALLOCATION FOR WIRELESS
MULTICAST: The success of wireless and mobile communications
in the 21st century has resulted in a large variety of wireless
technologies such as second and third-generation cellular, satellite,
Wi-Fi, and Bluetooth. The heterogeneous wireless networks
combine various wireless networks and provide universal wireless
access. The leading wireless companies in some countries have
operated networks with multiple wireless technologies, such as T-
Mobile in the United States, British Telecom in the United Kingdom,
Orange Telecom in France, NTT DoCoMo in Japan, and Chunghwa
Telecom in Taiwan. The number of such Companies would increase
because the standards for operators to provide seamless services in
networks with multiple wireless technologies have been proposed by
the Third-Generation Partnership Project (3GPP) and Unlicensed
Mobile Access (UMA) . In addition, users in the heterogeneous
wireless networks are usually covered by more than one cell to avoid
connection drop and service disruption. More mobile terminals in the
wireless networks are likely to own multiple wireless technologies.
Therefore, the heterogeneous wireless networks provide the mobile
hosts with many choices for the cells and wireless technologies to
access the Internet.
VB.NET
MOBILE
COMPUTING WITH
NETWORK SUPPORT
33
HACKER DETECTION IN WIRELESS SENSOR NETWORK:
Intrusion detection in Wireless Sensor Network (WSN) is of
practical interest in many applications such as detecting an intruder
in a battlefield. The intrusion detection is defined as a mechanism for
a WSN to detect the existence of inappropriate, incorrect, or
anomalous moving attackers. In this paper, we consider this issue
according to heterogeneous WSN models. Furthermore, we consider
two sensing detection models: single-sensing detection and multiple-
sensing detection... Our simulation results show the advantage of
multiple sensor heterogeneous WSNs.
JAVA
SWINGS
NETWORK
SECURITY
34
BANDWIDTH ESTIMATION FOR IEEE 802.11-BASED AD
HOC NETWORKS: Since 2005, IEEE 802.11-based networks have
been able to provide a certain level of quality of service (QoS) by the
means of service differentiation, due to the IEEE 802.11e
amendment. However, no mechanism or method has been
standardized to accurately evaluate the amount of resources
remaining on a given channel. Such an evaluation would, however,
be a good asset for bandwidth-constrained applications. In multihop
ad hoc networks, such evaluation becomes even more difficult.
Consequently, despite the various contributions around this research
topic, the estimation of the available bandwidth still represents one
of the main issues in this field. In this paper, we propose an
improved mechanism to estimate the available bandwidth in IEEE
JAVA
SWINGS
& AWT
NETWORK
ROUTING
802.11-based ad hoc networks. Through simulations, we compare
the accuracy of the estimation we propose to the estimation
performed by other state-of-the-art QoS protocols, BRuIT, AAC,
and QoS-AODV.
35
LOCATION BASED SPATIAL QUERY PROCESSING IN
WIRELESS BROADCAST ENVIRONMENTS: Location-based
spatial queries (LBSQs) refer to spatial queries whose answers rely
on the location of the inquirer. Efficient processing of LBSQs is of
critical importance with the ever-increasing deployment and use of
mobile technologies. We show that LBSQs have certain unique
characteristics that traditional spatial query processing in centralized
databases does not address. For example, a significant challenge is
presented by wireless broadcasting environments, which have
excellent scalability but often exhibit high-latency database access.
In this paper, we present a novel query processing technique that,
while maintaining high scalability and accuracy, manages to reduce
the latency considerably in answering location-based spatial queries.
Our approach is based on peer-topeer sharing, which enables us to
process queries without delay at a mobile host by using query results
cached in its neighboring mobile peers. We demonstrate the
feasibility of our approach through a probabilistic analysis, and we
illustrate the appeal of our technique through extensive simulation
results.
JAVA
SWINGS
MOBILE
COMPUTING
36
NETWORK CAPACITY ADAPTATION IN SERVICE OVERLAY
NETWORK: The considered Service Overlay Networks (SON) lease
bandwidth with Quality of Service (QoS) guarantees from a
multitude of Internet Autonomous Systems, through service level
agreements (SLA) with Internet Service Providers (ISP). This
bandwidth is used to establish SON links and deliver end-to end QoS
for real time service connections. The leased bandwidth amount
influences both the admitted traffic and network cost, affecting the
network profit. This gives the network operator the opportunity to
optimize the profit by adapting the restrictions of limiting the
bandwidth of network resources by changing traffic and SLA costs
conditions. We propose a novel approach that maximizes the
network profit based on traffic measurements and SLA cost changes.
The approach uses a structured model that integrates the network
routing policy with the adaptation of maximizing the SON link
capacities. While performing the adaptation of leased bandwidth, the
connection blocking constraints are also limited and maintained.
The proposed model is derived over by providing a voice
and video conferencing service decreed over as a separate service
over the SON network provided over with adaptive optimization
approach on the basis of reward maximizing routing policy derived
from the Markov Decision Process theory although it can be applied
to other routing policies. It is been suggested that our model of
routing policy is been injected over with the various nodes in the
service overlay network. Outcasting the network traffic limitation in
this upcoming technology.
VB.Net
with C#
NETWORK
37
ELECTRONIC TEST MANAGEMENT: The project entitled
"Electronic Examination Management" is used to test the Domain
knowledge of the students, and employees with respect to the
particular technology. The manual procedure used for conducting
exam is time consuming process and error prone due to human
limitations. The System purpose is to completely automate the old
manual procedure of conducting exam to in an electronic way.
The purpose of this electronic test simulator is to take test in an
efficient manner and no time wasting for checking the paper. The
main objective of the test simulator is to efficiently evaluate the
candidate thoroughly through a fully automated system that not only
saves lot of time but also gives fast results. For students they give
papers according to their convenience and time as well as there is no
need of using extra thing like paper, pen etc.
JAVA
WITH
SWINGS
REAL TIME
APPLICATION
38
MEASURING BOTTLENECK BANDWIDTH OF TARGETED
PATH SEGMENTS: Accurate measurement of network bandwidth
is crucial for network management applications as well as flexible
Internet applications and protocols which actively manage and
dynamically adapt to changing utilization of network resources.
Extensive work has focused on two approaches to measuring
bandwidth measuring it hop-by-hop, and measuring it end-to-end
along a path. Unfortunately, best-practice techniques for the former
are inefficient and techniques for the latter are only able to observe
bottlenecks visible at end-to-end scope. In this paper, we develop
end-to-end probing methods, which can measure bottleneck
bandwidth along arbitrary, targeted sub paths of a path in the
network, including sub paths shared by a set of flows. We evaluate
our technique through extensive ns simulations, and then provide a
comparative Internet performance evaluation against hop-by-hop
techniques. We also describe a number of applications, which we
foresee as standing to benefit from solutions to this problem, ranging
from network troubleshooting and capacity provisioning to
optimizing the layout of application-level overlay networks, to
optimized replica placement.
JAVA
WITH
SWINGS
NETWORK
39
MOBILITY MANAGEMENT APPROACHES FOR MOBILE IP
NETWORKS PERFORMANCE COMPARISON AND USE
RECOMMENDATIONS: In wireless networks, efficient
management of mobility is a crucial issue to support mobile users.
The Mobile Internet Protocol (MIP) has been proposed to support
global mobility in IP networks. Several mobility management
strategies have been proposed which aim reducing the signaling
traffic related to the Mobile Terminals (MTs) registration with the
Home Agents (HAs) whenever their Care-of-Addresses (CoAs)
change. They use different Foreign Agents (FAs) and Gateway FAs
(GFAs) hierarchies to concentrate the registration processes. For
high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic
HMIP (DHMIP) strategies localize the registration in FAs and
GFAs, yielding to high-mobility signaling. The Multicast HMIP
strategy limits the registration processes in the GFAs. For high-
mobility MTs, it provides lowest mobility signaling delay compared
JAVA
With
Swings
MOBILE
COMPUTING
to the HMIP and DHMIP approaches. However, it is resource
consuming strategy unless for frequent MT mobility. Hence, we
propose an analytic model to evaluate the mean signaling delay and
the mean bandwidth per call according to the type of MT mobility.
In our analysis, the MHMIP Outperforms the DHMIP and MIP
strategies in almost all the studied cases. The main contribution of
this paper is the analytic model that allows the mobility management
approaches performance evaluation.
40
ENERGY-EFFICIENT SINR-BASED ROUTING FOR MULTI-
HOP WIRELESS NETWORKS: In this paper, we develop an
energy-efficient routing scheme that takes into account the
interference created by existing flows in the network. The routing
scheme chooses a route such that the network expends the minimum
energy satisfying with the minimum constraints of flows. Unlike
previous works, we explicitly study the impact of routing a new flow
on the energy consumption of the network. Using implementation.
We show that the routes chosen by our algorithm (centralized and
distributed) are more energy efficient than the state of the art.
JAVA
WITH
SWINGS
MOBILE
COMPUTING
41
FAULT-TOLERANT MOBILE AGENT-BASED MONITORING
ECHANISM FOR HIGHLY DYNAMIC DISTRIBUTED
NETWORKS:
Asynchronous and dynamic natures of mobile agents, a certain
number of mobile agent-based monitoring mechanisms have actively
been developed to monitor large-scale and dynamic distributed
networked systems adaptively and efficiently. Among them, some
mechanisms attempt to adapt to dynamic changes in various aspects
such as network traffic patterns, resource addition and deletion,
network topology and so on. However, failures of some domain
managers are very critical to providing correct, real-time and
efficient monitoring functionality in a large-scale mobile agent-
based distributed monitoring system. In this paper, we present a
novel fault tolerance mechanism to have the following advantageous
features appropriate for large-scale and dynamic hierarchical mobile
agent-based monitoring organizations. It supports fast failure
detection functionality with low failure-free overhead by each
domain manager transmitting heartbeat messages to its immediate
higher-level manager. Also, it minimizes the number of non-faulty
monitoring managers affected by failures of domain managers.
Moreover, it allows consistent failure detection actions to be
performed continuously in case of agent creation, migration and
termination, and is able to execute consistent takeover actions even
in concurrent failures of domain managers.
JAVA
WITH
SWINGS
CONSUMER
COMMUNICATIONS
AND NETWORKING
CONFERENCE
42
A DISTRIBUTED STREAM QUERY OPTIMIZATION
FRAMEWORK THROUGH INTEGRATED PLANNING AND
DEPLOYMENT: This system addresses the problem of optimizing
multiple distributed stream queries that are executing simultaneously
in distributed data stream systems. We argue that the static query
optimization approach of "plan, then deployment" is inadequate for
handling distributed queries involving multiple streams and node
dynamics faced in distributed data stream systems and applications.
JAVA
WITH
SWINGS
PARALLEL AND
DISTRIBUTED
SYSTEMS
Thus, the selection of an optimal execution plan in such dynamic and
networked computing systems must consider operator ordering,
reuse, network placement, and search space reduction. We propose
to use hierarchical network partitions to exploit various opportunities
for operator-level reuse while utilizing network characteristics to
maintain a manageable search space during query planning and
deployment. We develop top-down, bottom-up, and hybrid
algorithms for exploiting operator-level reuse through hierarchical
network partitions. Formal analysis is presented to establish the
bounds on the search space and sub optimality of our algorithms. We
have implemented our algorithms in the IFLOW system, an adaptive
distributed stream management system.
43
DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS:
Despite their popularity, spread spectrum schemes are vulnerable
against sensitivity analysis attacks on standard deterministic
watermark detectors. A possible defense is to use a randomized
watermark detector. While randomization sacrifices some detection
performance, it might be expected to improve detector security to
some extent. This paper presents a framework to design randomized
detectors with exponentially large randomization space and
controllable loss in detection reliability. We also devise a general
procedure to attack such detectors by reducing them into equivalent
deterministic detectors. We conclude that, contrary to prior belief,
randomization of the detector is not the ultimate answer for
providing security against sensitivity analysis attacks in spread
spectrum systems. Instead, the randomized detector inherits the
weaknesses of the equivalent deterministic detector.
JAVA
WITH
SWINGS
PARALLEL AND
DISTRIBUTED
SYSTEMS
44
MOVEMENT-ASSISTED CONNECTIVITY RESTORATION IN
WIRELESS SENSOR AND ACTOR NETWORKS: Recent years
have witnessed a growing interest in applications of wireless sensor
and actor networks (WSANs). In these applications, a set of mobile
actor nodes are deployed in addition to sensors in order to collect
sensors' data and perform specific tasks in response to detected
events/objects. In most scenarios, actors have to respond
collectively, which requires interactor coordination. Therefore,
maintaining a connected interactor network is critical to the
effectiveness of WSANs. However, WSANs often operate
unattended in harsh environments where actors can easily fail or get
damaged. An actor failure may lead to partitioning the interactor
network and thus hinder the fulfillment of the application
requirements. In this paper, we present DARA, a distributed actor
recovery algorithm, which opts to efficiently restore the connectivity
of the interactor network that has been affected by the failure of an
actor. Two variants of the algorithm are developed to address 1- and
2-connectivity requirements. The idea is to identify the least set of
actors that should be repositioned in order to reestablish a particular
level of connectivity. DARA strives to localize the scope of the
recovery process and minimize the movement overhead imposed on
the involved actors. The effectiveness of DARA is validated through
simulation experiments.
JAVA
WITH
SWINGS
PARALLEL AND
DISTRIBUTED
SYSTEMS
45
SECURITY ANALYSIS OF THE SASI PROTOCOL: The ultra
lightweight RFID protocols only involve simple bitwise operations
(like XOR, AND, OR, etc.) on tags. In this paper, we show that the
ultra lightweight strong authentication and strong integrity (SASI)
protocol has two security vulnerabilities, namely, denial-of-service
and anonymity tracing based on a compromised tag. The former
permanently disables the authentication capability of a RFID tag by
destroying synchronization between the tag and the RFID reader.
The latter links a compromised tag with past actions performed on
this tag.
JAVA
WITH
SWINGS
PARALLEL AND
DISTRIBUTED
SYSTEMS
46
VISIBLE REVERSE K-NEAREST NEIGHBOR QUERY
PROCESSING IN SPATIAL DATABASES: Reverse nearest
neighbor (RNN) queries have a broad application base such as
decision support, profile-based marketing, resource allocation, data
mining, etc. Previous work on RNN search does not take obstacles
into consideration. In the real world, however, there are many
physical obstacles (e.g., buildings, blindages, etc.), and their
presence may affect the visibility/distance between two objects. In
this paper, we introduce a novel variant of RNN queries, namely
visible reverse nearest neighbor (VRNN) search, which considers the
obstacle influence on the visibility of objects. Given a data set P, an
obstacle set O, and a query point q, a VRNN query retrieves the
points in P that have q as their nearest neighbor and are visible to q.
We propose an efficient algorithm for VRNN query processing,
assuming that both P and O are indexed by R-trees. Our method does
not require any pre-processing, and employs half-plane property and
visibility check to prune the search space.
JAVA
WITH
SWINGS
DATA
ENGINEERING
47
ISOLATED MANAGEMENT ON INTRANET: The project entitled
“Isolated Management on Intranet” deals the entire college
management spectrum in an extreme manner. This system describes
an idea to provide an isolated management on intranet. In this system
students can attain the tangible benefits of the web browser in a
restricted manner, the sites provided to the students is entirely
controlled by the administrator. For an administrator a new category
of browser is introduced to make the administrator provision easier.
This software also helps the administrator to maintain a history of
data, that is what are all the sites previously visited by the
administrator. This project can be employed in any institutions,
where one has to control the users by blocking the Web sites. This
system expects the full authentication prior to access all the features
available in it. Once the user proved their identity to the system then
they can easily access all the features presented within it. This
Project can be well utilized by the network Administrator for
controlling the users from the remote corner.
VB.NET
WITH SQL
SERVER
REAL TIME
NETWORK
SECURITY
48
ROUTE RESERVATION IN INTER NETWORKS: This paper
investigates whether and when route reservation-based (RB)
communication can yield better delay performance than non-
reservation-based (NRB) communication in Inter networks. In
addition to posing this fundamental question, the requirements (in
JAVA
SWINGS
WITH
SQL
SERVER
NETWORK
AND
COMPUTER
COMMUNICATIONS
terms of route discovery, medium access control (MAC) protocol,
and pipelining, etc.) for making RB switching superior to NRB
switching are also identified. A novel analytical framework is
developed and the network performance under both RB and NRB
schemes is quantified. It is shown that if the aforementioned
requirements are met, then RB schemes can indeed yield better delay
performance than NRB schemes. This advantage, however, comes at
the expense of lower throughput and good put compared to NRB
schemes.
49
CRACK REMOVAL ALGORITHM: An integrated methodology
for the detection and removal of cracks on digitized paintings is
presented in this project. The cracks are detected by threshold the
output of the morphological top-hat transform. Afterward, the thin
dark brush strokes which have been misidentified as cracks are
removed using either a median radial basis function neural network
on hue and saturation data or a semi-automatic procedure based on
region growing. Finally, crack filling using order statistics filters or
controlled an isotropic diffusion is performed. The methodology has
been shown to perform very well on digitized paintings suffering
from cracks..
VB.NET
WITH
SQL
SERVER
IMAGE
PROCESSING
50
SECURE DATA MANAGEMENT WITH FOLDER SECURITY
AND RESOURCE MAINTENANCE: The project entitled “Folder
Security System” fully describes about how to handle the particular
folder in the system or PC in a secured manner. In this system we
can create a back up for the particular file, which is stored in the
respective folder. With this facility we can easily create a copy of the
exact file in the same directory as well as in the same respective
folder. This system also provides the facility to restore the file in
some other folder within the same or different directory, which
means if you want to create the same file in some other folder in that
case this feature, is an exact way to do that thing. With this system
we can search weather the particular type of file is available in the
corresponding folder or not, and also this system allow the user to
remove the particular file from that folder if required.
VB.NET
WITH
SQL
SERVER
SECURE
COMPUTING
51
AUTOMOBILES SALES MONITORING SYSTEM: The project
spare sales are a software package developed in Visual Basic Net. It
is developed to computerize the customer enquiry for the needed
spare parts. The purpose is to service the customer as quick as
possible. When the enquiry for the needed spare part is made
through either its code or name or local name or by seeing the
catalog, the system will search for the available product and will
report the availability and other details. Thus we can save the
searching time. The catalog includes the figurative representation of
the specified spare parts with its full description. All the needed
internal designs are displayed in classified manner. Warranty
management module is also included in this project. When a claim
for warranty aroused all the details of that spare part such as
purchase number, part code etc will be verified with the details in the
system. After a successful verification the subsequent steps for
warranty will be initiated.
VB.NET
WITH
SQL
SERVER
REAL TIME
APPLICATION
52
REMOTE RESOURCE COMPRESSION PORT: The Project
“Remote Zipping Portal” is the tool for Transferring large files over
the Internet can be speeded up significantly if
compression/decompression is applied before/after the
upload/download operation. This project contains four major parts
are Client tool, Server tool, Compression and transfer monitor. The
module Compression contains the objects and classes to compress
the given file by advanced ZIP algorithm. And this compression
module used in tow sides of server and client. In the Server Module
contains the tool which listening the Client request by enabling the
server application objects. This tool Listening port and remote IP
Address, which requests the server to send the compressed data. The
Client module the request handler designed to send the request to
active server for transaction. These are the modules defined in this
project. This project provides the large amount of file sharing with
minimum time and faster.
VB.NET
WITH
SQL
SERVER
REAL TIME
APPLICATION
53
REGION BASED IMAGE CUTTER AND FORMATTER: The
project entitled “Region Based Image Cutter And Formatter” deals
with one of the major image processing tasks, that is make the image
into specific regions and format them. This software allows the user
to access this system only after checking their authentication. The
users have to register themselves into this system, and getting their
username, and password. After getting that the users can log into
this system, and accessing the appropriate features. This system
allows the registered user to select the raster image first. The image
retains its original edge definition without producing "jaggies" is
known as raster image. The jagged edges on curves and diagonal
lines in an image are commonly called jaggies. The user can shape
minimize or maximize the view of the selected image by means of
scroll the mouse ball either front or back. After selecting the
perspective image the user have to create or select the specific
region. This software allows the user to test the created region. The
region can be used to shape a particular control or formatting an
image.
VB.NET
WITH
SQL
SERVER
IMAGE
PROCESSING
54
CAM BASED SECURITY PROVIDER: In this competitive and
business age, it becomes crucial to everyone to manage the office
and organization in a secured manner because of the intruders, third
parties, competitors, and hackers. This system is introduced to
provide a hi-tech security measure to the official persons as well as
business people to identify the intruders of their organization.
Security Cam based system converts the Web Cam to a Security
Camera. The entire system works belonging to the protocol address
feed into the network. If any person crosses in front of the
predefined camera, this system will alert the respective persons and
produce the immediate solution to identify the person or intruder.
This system provides the hi-tech security measure by means of
enabling the security scanner; it generally helps the respective
persons to scan the associative devices with in the device that may
be your personal computer or laptop. Once the official parties start
the security based web cam system it enables the alerter to start
working, and scan the intruders, if any intruders cross this or come
within that covered circle of the security system it produces the alert
VB.NET
WITH
SQL
SERVER
IMAGE
PROCESSING
by means of creating the noise, as well capture the picture of the
third person. So this simply provides the solution to handle your
organization in a secured manner, and also reveal the answer to this
query-how to maintain the organization or own business place in a
secured way?
55
ONLINE BLOOD BANK MANAGEMENT SYSTEM: This portal
is a place for new Blood donor system to be start into the available
environments. The system planned to create the awareness to blood
donor to provide the blood for required peoples . This system plans to
collect the information from all the respective blood donors and
requestors, as well as provide the service to them in an extreme
manner.
ASP.NET
WITH
SQL
SERVER
REAL TIME
APPLICATION
56
IMAGE ENCRYPTION AND DECRYPTION: Mobile and cloud
computing have emerged as the new computing platforms and are
converging into a powerful cloud-mobile computing platform. This
article envisions a virtualized screen as a new dimension in such a
platform to further optimize the overall computing experience for
users. In a virtualized screen, screen rendering is done in the cloud,
and delivered as images to the client for interactive display. This
enables thin-client mobile devices to enjoy many computationally
intensive and graphically rich services. Technical challenges are
discussed and addressed. Two novel cloud-mobile applications,
Cloud Browser and Cloud Phone, are presented to demonstrate the
advantages of such a virtualized screen.
Vb.NET/
JAVA
REAL TIME
APPLICATION
57
AUTOMATING THE DESIGN AND CONSTRUCTION OF
QUERY FORMS: One of the simplest ways to query a database is
through a form where a user can fill in relevant information and
obtain desired results by submitting the form. Designing good forms
is a nontrivial manual task, and the designer needs a sound
understanding of both the data organization and the querying needs.
Furthermore, form design usually has conflicting goals: each form
should be simple and easy to understand, while collectively, the
interface must support as many queries as possible. In this paper, we
present a framework for generating forms in an automatic and
principled way, given a database and a sample query workload. We
design a tunable clustering algorithm for establishing form structure
based on multiple “similar” queries, which includes a mechanism for
extending forms to support future “similar” queries. The algorithm is
adaptive and can incrementally adjust forms to reflect the most
current querying trends. We have implemented our form generation
system on a real database and evaluated it on a comprehensive set of
query loads and database schemas. We observe that our system
generates a modest number of forms for large and diverse query
loads even after placing a strict bound on form complexity.
ASP.NET
DATA MINING
58
DATA MINING ANALYSIS ON EB BILL SYSTEM: Preparing a
data set for analysis is generally the most time consuming task in a
data mining project, requiring many complex SQL queries, joining
VB.NET
DATA MINING &
REAL TIME
APPLICATION
tables and aggregating columns. Existing SQL aggregations have
limitations to prepare data sets because they return one column per
aggregated group. In general, a significant manual effort is required
to build data sets, where a horizontal layout is required. We propose
simple, yet powerful, methods to generate SQL code to return
aggregated columns in a horizontal tabular layout, returning a set of
numbers instead of one number per row. This new class of functions
is called horizontal aggregations. Horizontal aggregations build data
sets with a horizontal renormalized layout, which is the standard
layout required by most data mining algorithms. We propose three
fundamental methods to evaluate horizontal aggregations: CASE:
Exploiting the programming CASE construct; SPJ: Based on
standard relational algebra operators (SPJ queries); PIVOT: Using
the PIVOT operator, which is offered by some DBMSs. Experiments
with large tables compare the proposed query evaluation methods.
Our CASE method has similar speed to the PIVOT operator and it is
much faster than the SPJ method. In general, the CASE and PIVOT
methods exhibit linear scalability, whereas the SPJ method does not.
59
ONLINE PRODUCT OPINION AND RANKING SYSTEM: A
major concern when incorporating large sets of diverse n -gram
features for sentiment classification is the presence of noisy,
irrelevant, and redundant attributes. These concerns can often make
it difficult to harness the augmented discriminatory potential of
extended feature sets. We propose a rule-based multivariate text
feature selection method called Feature Relation Network (FRN) that
considers semantic information and also leverages the syntactic
relationships between n-gram features. FRN is intended to efficiently
enable the inclusion of extended sets of heterogeneous n -gram
features for enhanced sentiment classification. Experiments were
conducted on three online review test beds in comparison with
methods used in prior sentiment classification res earch. FRN
outperformed the comparison univariate, multivariate, and hybrid
feature selection methods; it was able to select attributes resulting in
significantly better classification accuracy irrespective of the feature
subset sizes. Furthermore, by incorporating syntactic information
about n-gram relations, FRN is able to select features in a more
computationally efficient manner than many multivariate and hybrid
techniques.
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
60
SESSION AUTHENDICATION PASSSWORD USING COLOR:
Textual passwords are the most common method used for
authentication. But textual passwords are vulnerable to eves
dropping, dictionary attacks, social engineering and shoulder surfing.
Graphical passwords are introduced as alternative techniques to
textual passwords. Most of the graphical schemes are vulnerable to
shoulder surfing. To address this problem, text can be combined with
images or colors to generate session passwords for authentication.
Session passwords can be used only once and every time a new
password is generated. In this paper, two techniques are proposed to
generate session passwords using text and colors which are resistant
to shoulder surfing. These methods are suitable for Personal Digital
Assistants.
ASP.NET
SECURE
COMPUTING &
REAL TIME
APPLICATION
61
SENTENCE BASED SEARCH ON CLOUD: The advent of cloud
computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public
cloud for great flexibility and economic savings. But for protecting
data privacy, sensitive data has to be encrypted before outsourcing,
which obsoletes traditional data utilization based on plaintext
keyword search. Thus, enabling an encrypted cloud data search
service is of paramount importance. Considering the large number of
data users and documents in cloud, it is crucial for the search service
to allow multi-keyword query and provide result similarity ranking
to meet the effective data retrieval need. Related works on
searchable encryption focus on single keyword search or Boolean
keyword search, and rarely differentiate the search results. We
define and solve the challenging problem of privacy-preserving
multi-keyword ranked search over encrypted cloud data (MRSE),
and establish a set of strict privacy requirements for such a secure
cloud data utilization system to become a reality. Among various
multi-keyword semantics, we choose the efficient principle of
“coordinate matching”, i.e., as many matches as possible, to capture
the similarity between search query and data documents, and further
use “inner product similarity” to quantitatively formalize such
principle for similarity measurement. We first propose a basic
MRSE scheme using secure inner product computation, and then
significantly improve it to meet different privacy requirements in
two levels of threat models. Thorough analysis investigating privacy
and efficiency guarantees of proposed schemes is given, and
experiments on the real-world dataset further show proposed
schemes indeed introduce low overhead on computation and
communication.
ASP.NET
CLOUD COMPUTING
& REAL TIME
APPLICATION
62
STEP BY STEP MONITORING FOR PRODUCT PURCHASING
SYSTEM: Business processes are increasingly distributed and open,
making them prone to failure. Monitoring is, therefore, an important
concern not only for the processes themselves but also for the
services that comprise these processes. We present a framework for
multilevel monitoring of these service systems. It formalizes
interaction protocols, policies, and commitments that account for
standard and extended effects following the language-action
perspective, and allows specification of goals and monitors at varied
abstraction levels. We demonstrate how the framework can be
implemented and evaluate it with multiple scenarios that include
specifying and monitoring open-service policy commitments.
VB.NET
REAL TIME
APPLICATION
63
SECURE SERVICE-ORIENTED BANKING SYSTEMS: The
paper describes secure service-oriented architecture for mobile
transactions. The architecture comprises components, protocols,
applications and interfaces and it provides various security services
to various mobile applications: Registration, Certification,
Authentication, and Authorization of users, secure messaging at an
application–level (end–to–end security), protection of data in
databases, and security services for protection of its own
components. The architecture is modular, integrated, extendible and
scalable. The paper describes design of the architecture, the status of
VB.NET
REAL TIME
APPLICATION
its current implementation, and future research and development
plans.
64
EMPLOYEE BASED PERFORMANCE MONITORING AND
ACTION SYSTEMS: The concept of awareness plays a pivotal role
in research in Computer-Supported Cooperative Work. Recently,
Software Engineering researchers interested in the collaborative
nature of software development have explored the implications of
this concept in the design of software development tools. A critical
aspect of awareness is the associated coordinative work practices of
displaying and monitoring actions. This aspect concerns how
colleagues monitor one another’s actions to understand how these
actions impact their own work and how they display their actions in
such a way that others can easily monitor them while doing their
own work. In this paper, we focus on an additional aspect of
awareness: the identification of the social actors who should be
monitored and the actors to whom their actions should be displayed.
We address this aspect by presenting software developers’ work
practices based on ethnographic data from three different software
development teams. In addition, we illustrate how these work
practices are influenced by different factors, including the
organizational setting, the age of the project, and the software
architecture. We discuss how our results are relevant for both CSCW
and Software Engineering researchers.
VB.NET
REAL TIME
APPLICATION
65
SECURE AND CLOUD BASED PATIENT INFORMATION
SYSTEMS: A key problem in the deployment of large-scale, reliable
cloud computing concerns the difficulty to certify the compliance of
business processes operating in the cloud. Standard audit procedures
such as SAS-70 and SAS- 117 are hard to conduct for cloud based
processes. The paper proposes a novel approach to certify the
compliance of business processes with regulatory requirements. The
approach translates process models into their corresponding Petri net
representations and checks them against requirements also expressed
in this formalism. Being Based on Petri nets, the approach provides
well-founded evidence on adherence and, in case of noncompliance,
indicates the possible vulnerabilities. Keywords: Business process
models, Cloud computing, Compliance certification, Audit, Petri
nets.
ASP.NET
CLOUD COMPUTING
& REAL TIME
APPLICATION
66
ULTIMATE LOCATION INFORMATION SYSTEMS: In many
applications, including location based services, queries may not be
precise. In this paper, we study the problem of efficiently computing
range aggregates in a multidimensional space when the query
location is uncertain. Specifically, for a query point Q whose
location is uncertain and a set S of points in a multi-dimensional
space, we want to calculate the aggregate (e.g., count, average and
sum) over the subset SI of S, Q has at least probability θ within the
distance γ to p. We propose novel, efficient techniques to solve the
problem following the filtering-and-verification paradigm. In
particular, two novel filtering techniques are proposed to effectively
and efficiently remove data points from verification. Our
comprehensive experiments based on both real and synthetic data
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
demonstrate the efficiency and scalability of our techniques.
67
HIGH SECURE CORPORATE WEB SEARCH ENGINE: It
becomes prevalent, more and more sensitive information are being
centralized into the cloud. Although traditional searchable
encryption schemes allow a user to securely search over encrypted
data through keywords and selectively retrieve files of interest, these
techniques support only exact keyword search. In th is paper, for the
first time we formalize and solve the problem of effective keyword
search over encrypted cloud data while maintaining keyword
privacy. Keyword search greatly enhances system usability by
returning the matching files when users’ searching inputs exactly
match the predefined keywords or the closest possible matching files
based on keyword similarity semantics, when exact match fails. In
our solution, we exploit edit distance to quantify keywords similarity
and develop two advanced techniques on constructing keyword sets,
which achieve optimized storage and representation overheads. We
further propose a brand new symbol-based trie-traverse searching
scheme, where a multi-way tree structure is built up using symbols
transformed from the resulted keyword sets. Through rigorous
security analysis, we show that our proposed solution is secure and
privacy-preserving, while correctly realizing the goal of keyword
search. Extensive experimental results demonstrate the efficiency of
the proposed solution.
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
68
DATA CONFIDENTIAL AGAINST UNTRUSTED SERVERS
USING ATTRIBUTE- BASED ENCRYPTION: It is an emerging
computing paradigm in which resources of the computing
infrastructure are provided as services over the Internet. This paper
proposed some services for data security and access control when
users outsource sensitive data for sharing on cloud servers. This
paper addresses this challenging open issue by, on one hand,
defining and enforcing access policies based on data attributes, and,
on the other hand, allowing the data owner to delegate most of the
computation tasks involved in fine grained data access control to
untrusted cloud servers without disclosing the underlying data
contents. Our proposed scheme enables the data owner to delegate
tasks of data file re-encryption and user secret key update to cloud
servers without disclosing data contents or user access privilege
information. We achieve this goal by exploiting and uniquely
combining techniques of attribute-based encryption (ABE), proxy re-
encryption, and lazy re-encryption. Our proposed scheme also has
salient properties of user access privilege confidentiality and user
secret key accountability and achieves fine - grainedness, scalability
and data confidentiality for data access control in cloud computing.
Extensive analysis shows that our proposed scheme is highly
efficient and provably secures under existing security models.
ASP.NET
CLOUD
COMPUTING
69
SECURED IMAGE COMMUNICATOR: Internet based
communications are evolving at a tremendous rate. Encryption of
data has become an important way to protect data resources
especially on the Internet, intranets and extranets. Encryption
involves applying special mathematical algorithms and keys to
VB.NET
SECURE
COMPUTING
transform digital data into cipher code before they are transmitted
and decryption involves the application of mathematical algorithms
and keys to get back the original data from cipher code. The goal of
security management is to provide authentication of users, and
integrity, accuracy and safety of data resources. Moreover, an image-
based data requires more effort during encryption and decryption. In
most of the defense and other research organizations, they need to
send and receive the import images related to weapon designs, maps,
satellite pictures etc. If those images are sending normally hackers
can tap the images and import information is leaked out. In order to
overcome this difficult, the image to be processed is first encrypted
and then it is decrypted so that no intermediate users can read the
images unauthorized. For this standard encryption, decryption
algorithms are used such as RSA, AES, and DSA etc.
70
FLIGHT BOOKING PORTAL: Major airlines are now starting to
book air tickets online. But the problem lies in the user friendliness
of such portals. Often users need to contact the support staff and
simultaneously use the portal for booking. Others simply skip the
online booking portal altogether and physically book their tickets.
Flight Booking Portal shows the ideal portal that such airlines need
to implement. It is very user friendly and also effective. The users
can very easily book their tickets and also get a print out of the same.
They can also view flight information for planning their journey.
ASP.NET
REAL TIME
APPLICATION
71
LEAVE MANAGEMENT SYSTEM: This project is aimed at
developing an online leave management system that is of importance
to either an organization. The Leave Management System (LMS) is
an Intranet based application that can be accessed throughout the
organization or a specified group/Dept. This system can be used to
automate the workflow of leave applications and their approvals.
The periodic crediting of leave is also automated. There are features
like email notifications, automatic approval of leave, report
generators etc in this system. Leave Management application will
reduce paper work and maintains record in more efficient way.
VB.NET
REAL TIME
APPLICATION
72
COMPANY INFORMATION TRACKING SYSTEM (CITS): The
“Company information Tracking System” has been developed to
override the problems prevailing in the practicing manual system.
This software is supported to eliminate and in some cases reduce the
hardships faced by this existing system. Moreover this system is
designed for the particular need of the company to carry out
operations in a smooth and effective manner. The application is
reduced as much as possible to avoid errors while entering the data.
It also provides error message while entering invalid data. No
formal knowledge is needed for the user to use this system. Thus by
this all it proves it is user-friendly. CITS allows you to preview and
print different reports that range from individual Work History to
department Headcounts. Each report screen has different options.
You can change the name of the report by editing the Report Title
field. This will not change the name of the report in the drop down
box, only the name as it appears on the report. The header includes
report information such as the report title and date. Your company
VB.NET
REAL TIME
APPLICATION
name (if selected) and report title will appear in every header. If you
choose to have your company logo displayed on your report, it will
appear in the top left corner. The date range of the report is displayed
below the title. The date of the report is in the top right corner
directly above the page number. The header may also contain
information such as the employee name, department, and Selection
Criteria.
73
DEVELOPMENT OF AN ONLINE LIBRARY MANAGEMENT
SYSTEM (LIMS): This project is aimed at developing an online
Library Management System (LiMS) for the college library. This is
an Intranet based application that can be accessed throughout the
campus. This system can be used to search for books/magazines,
reserve books, find out who is having a particular book, put in
requests to buy a new book etc. This is one integrated system that
contains both the user component and the librarian component.
There are features like email notifications/reminders, report
generators etc in this system.
ASP.NET
REAL TIME
APPLICATION
74
DEVELOPMENT OF AN E-POST OFFICE SYSTEM: The e-Post
Office is the shopping portal of the world renowned postal service
on the internet and an additional distribution channel. It sells Stamps,
Postcards, Packets, and Cartons and has services like courier,
registering for electricity vendors, selling mobile cards, etc. Under
this website many products and services can be ordered, that are also
available in a "normal" branch. The product prices are identical with
the prices of their normal branches. The e-Post Office is expanded
permanently through new products and services in order to offer a
product portfolio corresponding to the market. Private customer and
business customers can order the selected products of the postal
service online quickly and comfortably. Besides this, the e-Services
offer new flexibility through e-Packet, the PICKUP order for
packages over the internet as well as the online forwarding order and
storage order. For the case of the absence or the move, one can let
delegate here the after shipment of the postal service at another
address or store the letter shipments. The customers can register
themselves and can be served individually. Target groups of
customer of the e-Post Office are predominantly little and middle-
class business (SMEs). The customers can have a payment
alternative through credit card. In order to use the load writing
procedure, the customer registers itself in the e-Post Office and
receives a login for its purchases name. You have to develop this
web site, which captures the above functionality. It is an internet
application.
ASP.NET
REAL TIME
APPLICATION
75
DEVELOPMENT OF EFFORT TRACKER SYSTEM: This project
is aimed at developing a Effort Tracker System that is of importance
to an organisation. The Effort Tracker System is used to track the
employee activities and summarize all related activities with the total
hours spent and percentage efficiency utilized and generate a report
for the same.
VB.NET
REAL TIME
APPLICATION
76
DEVELOPMENT OF A DEFECT TRACKING SYSTEM (DTS):
This project is aimed at developing an online defect tracking system
useful for applications developed in an organization. The Defect
Tracking System (DTS) is a web based application that can be
accessed throughout the organization. This system can be used for
logging defects against an application/module, assigning defects to
individuals and tracking the defects to resolution. There are features
like email notifications, user maintenance, user access control, report
generators etc in this system.
VB.NET
REAL TIME
APPLICATION
77
DEVELOPMENT OF A WEB-BASED RECRUITMENT
PROCESS SYSTEM FOR THE HR GROUP FOR A COMPANY:
This project is aimed at developing a web-based and central
Recruitment Process System for the HR Group for a company. Some
features of this system will be creating vacancies, storing Applicants
data, Interview process initiation, Scheduling Interviews, Storing
Interview results for the applicant and finally Hiring of the applicant.
Reports may be required to be generated for the use of HR group.
ASP.NET
REAL TIME
APPLICATION
78
DEVELOPMENT OF A BUDGET APPROVAL SYSTEM: This
project is aimed at developing a system by which the employees in
the organization submit the bills to their managers. The bills could of
various types and also of various amounts. The employee after
submitting the bill will automatically provide the manager’s name to
which the bill will be submitted. The bill will pass through a
workflow process and the owner of the bill can view the status of the
bill at any time. An email will be sent to the concerned people to let
them know about the status of the bill.
ASP.NET
REAL TIME
APPLICATION
79
COST BASED SECURE CLOUD DATA SYSTEMS:
Cloud applications that offer data management services are
emerging. Such clouds support caching of data in order to provide
quality query services. The users can query the cloud data, paying
the price for the infrastructure they use. Cloud management
necessitates an economy that manages the service of multiple users
in an efficient, but also, resource economic way that allows for cloud
profit. Naturally, the maximization of cloud profit given some
guarantees for user satisfaction presumes an appropriate price-
demand model that enables optimal pricing of query services. The
model should be plausible in that it reflects the correlation of cache
structures involved in the queries. Optimal pricing is achieved based
on a dynamic pricing scheme that adapts to time changes. This paper
proposes a novel price-demand model designed for a cloud cache
and a dynamic pricing scheme for queries executed in the cloud
cache. The pricing solution employs a novel method that estimates
the correlations of the cache services in an time-efficient manner.
The experimental study shows the efficiency of the solution.
ASP.NET
CLOUD COMPUTING
80
CUSTOMER SALES ANALYSIS SYSTEM BASED ON
PURCHASING: In Data Mining, the usefulness of association rules
is strongly limited by the huge amount of delivered rules. To
VB.NET
DATA MINING &
REAL TIME
APPLICATION
overcome this drawback, several methods were proposed in the
literature such as item set concise representations, redundancy
reduction, and post processing. However, being generally based on
statistical information, most of these methods do not guarantee that
the extracted rules are interesting for the user. Thus, it is crucial to
help the decision-maker with an efficient post processing step in
order to reduce the number of rules. This paper proposes a new
interactive approach to prune and filter discovered rules. First, we
propose to use ontologies in order to improve the integration of user
knowledge in the post processing task. Second, we propose the Rule
Schema formalism extending the specification language proposed by
Liu et al. for user expectations. Furthermore, an interactive
framework is designed to assist the user throughout the analyzing
task. Applying our new approach over voluminous sets of rules, we
were able, by integrating domain expert knowledge in the post
processing step, to reduce the number of rules to several dozens or
less. Moreover, the quality of the filtered rules was validated by the
domain expert at various points in the interactive process.
81
MULTI-USER PUBLIC AUDITING SYSTEM OF DATA
STORAGE SECURITY: It is the long dreamed vision of computing
as a utility, where users can remotely store their data into the cloud
so as to enjoy the on-demand high quality applications and services
from a shared pool of configurable computing resources. By data
outsourcing, users can be relieved from the burden of local data
storage and maintenance. Thus, enabling public audit ability for
cloud data storage security is of critical importance so that users can
resort to an external audit party to check the integrity of outsourced
data when needed. To securely introduce an effective third party
auditor (TPA), the following two fundamental requirements have to
be met: 1) TPA should be able to efficiently audit the cloud data
storage without demanding the local copy of data, and introduce no
additional on-line burden to the cloud user.
ASP.NET
DATA MINING &
CLOUD COMPUTING
82
MAIL BASED HOMEWORK AND ALERT SYSTEM FOR
STUDENTS AND TEACHERS: The project is entitled as Mail
based Homework and Alert System for Students and Teachers is
developed by Asp.net as front end and SQL Server as the back end.
Impact of an online homework assistance project on the motivation
and autonomy to complete homework and on the ability to use
technology of elementary school students. The research aimed to
understand what was the impact of the project on the students
motivation and autonomy to complete their homework and on their
ability to use technology. The quantitative results have shown an
increase in some students motivation and autonomy to complete
homework and in all the students ability to use the technology. They
can able to View and Print their marks.
ASP.NET
REAL TIME
APPLICATION
83
ONLINE MISSING VEHICLE TRACKING APPLICATION FOR
POLICE DEPARTMENT: Thousands of automobiles are lost each
year in the state and thousands of automobiles are also recovered by
the Police from when they catch the culprits or even when the
ASP.NET
REAL TIME
APPLICATION
culprits leave the vehicles they have stolen after they have used
them. The usual problem with the recovered vehicles reaching the
actual owners is that the vehicle need not be found in the same
jurisdiction as one in which the complaint was launched. So, when a
vehicle is recovered, usually the Police try to trace out the actual
owner of the vehicle from the RTO based on the license and chassis
number. But this is a lengthy and time consuming process for the
RTO to trace out the actual owners from the records and inform back
to the Police stations. Because of these delays, vehicles that are
recovered also take a long time to actually reach their owners.
84
ONLINE CONSUMER COMPLAINT: A consumer complaint or
customer complaint is an expression of dissatisfaction on a
consumer’s behalf to a responsible party. It can also be described in
a positive sense as a report from a consumer providing
documentation about a problem with a product or service. In fact,
some modern business consultants urge businesses to view customer
complaints as a gift. Consumer complaints are usually informal
complaints directly addressed to a company or public service
provider, and most consumers manage to resolve problems with
products and services in this way, but it sometimes requires
persistence.
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
85
HIGH SECURE CORPORATE WEB SEARCH ENGINE: It
becomes prevalent, more and more sensitive information is being
centralized into the cloud. Although traditional searchable
encryption schemes allow a user to securely search over encrypted
data through keywords and selectively retrieve files of interes t, these
techniques support only exact keyword search. In this paper, for the
first time we formalize and solve the problem of effective keyword
search over encrypted cloud data while maintaining keyword
privacy. keyword search greatly enhances system usability by
returning the matching files when users searching inputs exactly
match the predefined keywords or the closest possible matching files
based on keyword similarity semantics, when exact match fails. In
our solution, we exploit edit distance to quantify keywords similarity
and develop two advanced techniques on constructing keyword sets,
which achieve optimized storage and representation overheads.
ASP.NET
DATA MINING
86
BUSINESS ACTIVITY COORDINATION USING WEB
SERVICES: Traditional transaction semantics are not appropriate
for business activities that involve long-running transactions in a
loosely-coupled distributed environment, in particular, for Web
Services that operate between different enterprises over the Internet.
In this paper we describe a novel reservation-based extended
transaction protocol that can be used to coordinate such business
activities. The protocol avoids the use of compensating transactions,
which can result in undesirable effects. In our protocol, each task
within a business activity is executed as two steps. The first step
involves an explicit reservation of resources. The second step
involves the confirmation or cancellation of the reservation. Each
step is executed as a separate traditional short-running transaction.
We show how our protocol can be implemented as a reservation
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
protocol on top of the Web Services Transaction specification or,
alternatively, as a coordination protocol on top of the Web Services
Coordination specification.
87
EDUCATION LOAN MANAGEMENT SYSTEM: The main
objective of developing this education loan management system is to
provide banking loans for student’s education. Now a day lots of
poor people of not able to provide better education for their children
because of financial problems but with the help of this .net base loan
management application they can apply education loans for their
children. Students can take bank loans with low interest rates by
using this web application.
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
88
MOBILE PHONE TRADING SYSTEM: The project Mobile Phone
Trading System for mobile is to develop software based information
of Mobile shopping. In global business market the mobile is most
important accessory in real life. Visualizing the huge opportunity,
this is an effort to maximize the business through the development of
this software and keeping the data and thus increasing the customer
base from the local as well as global markets around the world.
ASP.NET
REAL TIME
APPLICATION
89
ADVANCED EMPLOYEE DISCUSSION WITH ENHANCED
WEB TOOLS: In a company, it is not possible for all of the
employees to express their thoughts and engage in discussions.
These discussions are very useful for the company in the prospects
of doubt clearing, brainstorming etc.There exists several applications
but, none of them satisfies the needs of a middle level company, as
some are inefficient and some may be too complex that employees
cannot understand.
ASP.NET
DATA MINING &
REAL TIME
APPLICATION
90
FRONT DESK ADMINISTRATION: The Project Front Desk
Administration objective of this system is to maintain the details
about company vehicles, goods vehicles, visitor’s vehicles and
security details. Mainly this system is applicable for colleges,
universities, companies and different organizations. Using th is
system we can maintain company vehicles in time, out time, and
how many kilometers they run the vehicles. And also maintain the
visitor’s vehicles in time, out time and what purpose they are came
here. Such details are maintained in a web.
VB.NET
REAL TIME
APPLICATION
91
DEFECT TRACKING SYSTEM: This project is aimed at
developing an online defect tracking system useful for applications
developed in an organization. The Defect Tracking System (DTS) is
a web based application that can be accessed throughout the
organization. This system can be used for logging defects against an
application/module, assigning defects to individuals and tracking the
defects to resolution. There are features like email notifications, user
maintenance, user access control, report generators etc in this
system. The software is fully integrated with CRM (Customer
Relationship Management) as well as CMS (Content Management
System) solution and developed in a manner that is easily
manageable, time saving and relieving one from manual works
VB.NET
REAL TIME
APPLICATION
92
HEALTH MAINTENANCE SYSTEM: This project is a computer
system that will be used in the Hospitals. HealthCare is a Practice
Management Software for opticians, optometrist and
ophthalmologist, which leads to smooth working of eye care
organization. "Health Care Maintenance" provides automated case
management, patient scheduling, diagnosis notes, electronic mail
integration to remind patient about their appointment, electronic
revisit letter with paperless environment, Point of Sales (POS),
inventory for spectacles, lenses and sundries and unlimited custom
and pre-built reports. The project has been planned to be having the
view of distributed architecture, with centralized storage of the
database. The application for the storage of the data has been
planned. Using the constructs of MS-SQLServer and all the user
interfaces has been designed using the ASP.Net technologies. The
database connectivity is planned using the "SQL Connection"
methodology. The standards of security and data protective
mechanism have been given a big choice for proper usage. The
application takes care of different modules and their associated
reports which are produced as per the applicable strategies and
standards that are put forwarded by the administrative staff. The
entire project has been developed keeping in view of the distributed
client server computing technology, in mind. The specifications have
been normalized up to 3NF to eliminate all the anomalies that may
arise due to the database transaction that are executed by the general
users and the organizational administration.
ASP.NET
REAL TIME
APPLICATION
93
SOCIAL NETWORKING WITH ADVERTISEMENT: This project
is an online social networking site for connecting Indians across the
Globe. It allows members to build and leverage their network of
contacts in incredibly powerful ways. It is a place where you can
Invite, Connect, Share, Speak out and Have fun. The platform is
designed to provide you with unlimited freedom of expression. Plus,
you can invite your non-Indian friends too to experience the rich
Indian culture through this online portal. User can view/edit their
profile as and when and can be visible to other people who are
signing in online portal. User can upload photos and their portfolios.
User can know about his/her profile view by other users online. With
Social networking portal you can stay in touch with your existing
relationships and also get introduced to new people who share your
interests and hobbies. Communicating with others is made more fun
and interesting as you can share your unlimited photos, Blogs,
Views, and opinions all from one place. The Development of this
project deals with displaying the advertisements on a portal which is
visible to all of the viewers who ever access the website. Here we
can also have the daily advertisement details in a separate form
ASP.NET
REAL TIME
APPLICATION
94
FILE SECURITY SYSTEM: Encryption of data plays a vital role in
the real time environment to keep the data out of reach of
unauthorized people, such that it is not altered and tampered. The
File Security System is software, which tries to alter the originality
of the text into some encrypted form. The major task of File Security
JAVA
SECURE
COMPUTING
System is to provide the user the flexibility of passing the
information implementing the encryption standards as per the
specification and algorithms proposed and store the information in a
form that is unreadable. The Application should have a reversal
process as of which should be in a position to decrypt the data to its
original format upon the proper request by the user. While the
Encryption and Decryption is done the application should confirm
the standards of authentication and authorization of the user. The
Entire application should strive to achieve a user friendly Graphical
User Interface, which need to be in a self-learning mode for the end
user. The System Should provide all the functional standards of
proper navigation within the environment, which makes it possible
for the users to have a smooth flow while working under the
environment. The Overall system should provide proper menu based
navigation for easier navigation and operation. The Application
should be designed in such a way that, as soon as it starts create a
Buffer and associate this buffer to some homogeneous data
environment, the application should ask the user for the Encryption
Key details and should start its functionality upon the logistics that
are provided with in this key. The key should be designed in such a
way that it prevents the unauthorized persons from stealing the
information at any point of time. The application of Decryption
should be a reverse process at the other end and should be translated
only when the receiver of the data applies the proper reversal key.
The Decryption process should have a log-based methodology that
will take care of any errors that may be encountered while the
system is under utilization and should record all those events, which
are above the general standards of security. The software
requirement specification can produce at the culmination of the
analysis task. The function and performance allocated to software as
part of system engineering are refined by established a complete
information description, a detailed functional description, a
representation of system behavior, an indication of performance and
design constrain, appropriate validation criteria, and other
information pertinent to requirements.
95
DIGITAL ENCRYPTION SYSTEM WITH STEGANOGRPHIC
RULES: Modern computer networks make it possible to distribute
documents quickly and economically. This is because of the
decreasing cost of the equipment needed to copy, to print, to process
the information. The widespread adoption of electronic distribution
of copyrighted material is accompanied by illicit copying and illicit
distribution. This is why people think about how to protect their
work, how to prevent such illicit activities and how to trace the
distribution of a document. Steganography is art of hiding
information using images without corrupting the images.
Steganography is art of hiding information in ways that prevent the
detection of hidden messages. Steganography and Cryptography are
cousins in the spycraft family. Cryptography scrambles a message so
it cannot be understood. Steganography hides the message so it
cannot be seen.
VB.NET /
JAVA
SECURE
COMPUTING
96
IMAGE PROCESSING EDITOR: Image Processing comes with a
GUI (graphical user interface) program that lets us play with its
VB.NET
IMAGE
PROCESSING
various features. The program is based on image accessing, so that
more people can use it. As there is lot of crazy towards graphics,
photos or images editing, processing is very important in that
process. This application can be used to change the setting of old
photos, creating a new type of icons to add them into applications
and web sites. This application can be used to change the format of
images from one file type to another in simple way so that users or
programmers can use one image in any format according to
compatibility and accessibility in their applications.
97
CREDIT CARD MANAGEMENT SYSTEM: The Card
Management System is a Windows based application that takes care
of the complete internal Card Processing activities of a Bank
(management and maintenance of cards). It is suitable for the
management of Debit Cards, Credit Cards as well as Smart Cards. It
mainly involves the maintenance and management of card - related
information in a Bank. This product caters to all the Credit, Debit
and Smart Card based functions of a bank like Registration of
Customers for card issue, Opening Card Accounts for the registered
customer, Creation of Cards for registered customers, Hot Carding,
making the Card ready for Embossing by creation of Card Data file
etc. The Card Management System could interact with an external
Card Transaction System, thereby making the Card-related
information maintained by the bank, up-to-date. The purpose is to
build a Card Management System which provides complete card
processing, to meet the needs of full-fledged Credit card and Debit
card based ATM or Point of Sale network.
ASP.NET
REAL TIME
APPLICATION
98
ENABLING PUBLIC VERIFIABILITY AND DATA DYNAMICS
FOR STORAGE SECURITY IN CLOUD COMPUTING: Cloud
Computing has been envisioned as the next-generation architecture
of IT Enterprise. It moves the application software and databases to
the centralized large data centers, where the management of the data
and services may not be fully trustworthy. This unique paradigm
brings about many new security challenges, which have not been
well understood. This work studies the problem of ensuring the
integrity of data s torage in Cloud Computing. In particular, we
consider the task of allowing a third party auditor (TPA), on behalf
of the cloud client, to verify the integrity of the dynamic data stored
in the cloud. The introduction of TPA eliminates the involvement of
client through the auditing of whether his data stored in the cloud is
indeed intact, which can be important in achieving economies of
scale for Cloud Computing. The support for data dynamics via the
most general forms of data operation, such as block modification,
insertion and deletion, is also a significant step toward practicality,
since services in Cloud Computing are not limited to archive or
backup data only. While prior works on ensuring remote data
integrity often lacks the support of either public verifiability or
dynamic data operations, this paper achieves both. We first identify
the difficulties and potential security problems of direct extensions
with fully dynamic data updates from prior works and then show
how to construct an elegant verification scheme for seamless
integration of these two salient features in our protocol design. In
particular, to achieve efficient data dynamics, we improve the Proof
ASP.NET
CLOUD
COMPUTING
of Retrievability model by manipulating the classic Merkle Hash
Tree (MHT) construction for block tag authentication. Extensive
security and performance analysis show that the proposed scheme is
highly efficient and provably secure.
99
IMAGE COMPRESSION AND DE-COMPRESSION: The
compression and decompression of continuous -tone images is
important in document management and transmission systems. This
paper considers an alternative image representation scheme, based
on Gaussian derivatives, to the standard Discrete Cosine
Transformation (DCT), within a Joint Photographic Experts Group
(JPEG) framework. Depending on the computer arithmetic hardware
used, the approach developed might yield a
compression/decompression technique twice as fast as the DCT and
of (essentially) equal quality.
VB.NET
IMAGE PROCESSING
AND REAL TIME
APPLICATION
100
TICKET RESERVATION SYSTEM: This project is aimed at
developing an online ticket reservation system for Cinema Halls.
The Ticket Reservation System is an Internet based application that
can be accesses throughout the Net and can be accessed by anyone
who has a net connection. This application will automate the
reservation of tickets and Enquiries about availability of the tickets.
This application includes email confirmation for the tickets .
ASP.NET
REAL TIME
APPLICATION
Recommended