SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
JAVA / J2EE / J2ME PROJECTS LIST

J2E 6001. IMPACT OF ADAPTIVE RESOURCE ALLOCATION IN UTILITY CLUSTER
COMPUTING ENVIRONMENTS

Maximizing resource provider profit and satisfying user requirements at the same time is a
challenging problem in utility computing environments. In this paper, we intro- duce adaptive
resource allocation requests and investigate the impact of using them in utility cluster
computing environments. The Service Level Agreements established between users and
resource providers rely not only on fixed values, but also on functions that associate
allocation parameters. In addition, the resource provider scheduler can automatically modify
the number of resources and usage time of allocation requests, as well as split them into sub
requests. Users may receive incentives for supplying flexible requests which produce more
scheduling options. By using rescheduling, resource providers are able to prioritize the most
profitable requests dynamically and still satisfy the requirements of the already accepted user
requests. From our experimental results we observed an increase of 14% in the resource
provider profit and a reduction of 20% in the average response time of user requests when
compared to traditional approaches.

J2E 6002. RANK AGGREGATION FOR AUTOMATIC SCHEMA MATCHING

Schema matching is a basic operation of data integration and several tools for automating it
have been proposed and evaluated in the database community. Research in this area reveals
that there is no single schema matcher that is guaranteed to succeed in finding a good
mapping for all possible domains, and thus an ensemble of schema matchers should be
considered. In this paper we introduce schema meta-matching, a general framework for
composing an arbitrary ensemble of schema matchers, and generating a list of best-ranked
schema mappings. Informally, schema meta-matching stands for computing a “consensus”
ranking of alternative mappings between two schemata, given the “individual” graded
rankings provided by several schema matchers. We introduce several algorithms for this
problem, varying from adaptations of some standard techniques for general quantitative rank
aggregation to novel techniques specific to the problem of schema matching, and to
combinations of both. We provide a formal analysis of the applicability and relative
performance of these algorithms, and evaluate them empirically on a set of real-world
schemata.

J2E 6003. AUTOMATIC FUZZY ONTOLOGY GENERATION FOR SEMANTIC WEB

Ontology is an effective conceptualism commonly used for the Semantic Web. Fuzzy logic
can be incorporated to ontology to represent uncertainty information. Typically, fuzzy ontology
is generated from a predefined concept hierarchy. However, to construct a concept hierarchy
for a certain domain can be a difficult and tedious task. To tackle this problem, this paper
proposes the FOGA (Fuzzy Ontology Generation framework) for automatic generation of
fuzzy ontology on uncertainty information. The FOGA framework comprises the following
components: Fuzzy Formal Concept Analysis, Concept Hierarchy Generation, and Fuzzy
Ontology Generation. We also discuss approximating reasoning for incremental enrichment of
the ontology with new upcoming data. Finally, a fuzzy-based technique for integrating other
attributes of database to the ontology is proposed.


J2E 6004. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESS
SENSOR NETWORKS

While in-network data fusion can reduce data redundancy and, hence, curtail network load,
the fusion process itself may introduce significant energy consumption for emerging wireless
sensor networks with vectorial data and/or security requirements. Therefore, fusion-driven
routing protocols for sensor networks cannot optimize over communication cost only—fusion
cost must also be accounted for. In our prior work [2], while a randomized algorithm termed
MFST is devised toward this end, it assumes that fusion shall be performed at any
intersection node whenever data streams encounter. In this paper, we design a novel routing
algorithm, called Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering.
Not only does AFST jointly optimize over the costs for both data transmission and fusion, but
also AFST evaluates the benefit and cost of data fusion along information routes and
adaptively adjusts whether fusion shall be performed at a particular node. Analytically and
experimentally, we show that AFST achieves better performance than existing algorithms,
including SLT, SPT, and MFST.

J2E 6005. WIRELESS MAC PROTOCOL USING IMPLICIT PIPELINING

Abstract: In distributed multiple access control protocols, two categories of overhead are
usually associated with contention resolution. One is channel idle overhead, where all
contending stations are waiting to transmit. Another is collision overhead, which occurs when
multiple contending stations attempt to transmit simultaneously. Either idle overhead or
collision overhead being large, contention resolution algorithm would be inefficient. Prior
research work tries to minimize both the idle and the collision overheads using various
methods. In this paper, we propose to apply “pipelining” techniques to the design of multiple
access control protocol so that channel idle overhead could be (partially) hidden and the
collision overhead could be reduced. While the concept of pipelined scheduling can be
applied to various MAC protocol designs in general, in this paper, we focus on its application
to IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage contention resolution
MAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of contention
resolution degrades dramatically with the increasing load due to high probability of collision.
Using the implicit pipelining technique, DSCR hides the majority of channel idle time and
reduces the collision probability, hence, improves channel utilization, average access delay,
and access energy cost over 802.11 significantly both in wireless LANs and in multihop
networks. The simulation results, as well as some analysis, are presented to demonstrate the
effectiveness of DSCR.

J2E 6006. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING
PROTOCOL
         The goal of our project is to proactively disseminating the broken link information to
the nodes that have that link in their caches. We define a new cache structure called a cache
table and present a distributed cache update algorithm. Each node maintains in its cache
table the information necessary for cache updates. When a link failure is detected, the
algorithm notifies all reachable nodes that have cached the link in a distributed manner. We
show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an
adaptive timeout mechanism for link caches. We conclude that proactive cache updating is
key to the adaptation of on-demand routing protocols to mobility.

J2E 6007. ON SELFISH ROUTING IN INTERNET-LIKE ENVIRONMENT

A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing
hosts to either choose routes themselves (e.g., source routing) or use overlay routing
networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing
decisions are no longer based on system-wide criteria but are instead designed to optimize
host-based or overlay-based metrics. A series of theoretical results showing that selfish
routing can result in suboptimal system behavior have cast doubts on this approach. In this
paper, we use a game-theoretic approach to investigate the performance of selfish routing in
Internet-like environments based on realistic topologies and traffic demands in our
simulations. We show that in contrast to theoretical worst cases, selfish routing achieves
close to optimal average latency in such environments. However, such performance benefits
come at the expense of significantly increased congestion on certain links. Moreover, the
adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic
engineering by making network traffic less predictable.

J2E 6008. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION
PROTOCOLS FOR DYNAMIC PEER GROUPS
We consider several distributed collaborative key agreement and authentication protocols for
dynamic peer groups. There are several important characteristics which make this problem
different from traditional secure group communication. They are: 1) distributed nature in which
there is no centralized key server; 2) collaborative nature in which the group key is
contributory (i.e., each group member will collaboratively contribute its part to the global group
key); and 3) dynamic nature in which existing members may leave the group while new
members may join. Instead of performing individual rekeying operations, i.e., recomputing the
group key after every join or leave request, we are going to re key for a batch of join and
leave operations.

J2E 6009. TCP-LP: LOW-PRIORITY SERVICE VIA END-POINT CONGESTION CONTROL

Service prioritization among different traffic classes is an important goal for the Internet.
Conventional approaches to solving this problem consider the existing best-effort class as the
low-priority class, and attempt to develop mechanisms that provide “better-than-best-effort”
service.
We explore the opposite approach, and devise a new distributed algorithm to realize a low-
priority service (as compared to the existing best effort)from the network endpoints. To this
end, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilize
only the excess network bandwidth as compared to the “fair share” of bandwidth as targeted
by TCP.
The key mechanisms unique to TCP-LP congestion control are the use of one-way packet
delays for early congestion indications and a TCP-transparent congestion avoidance policy.

J2E 6010. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN
NEXT GENERATION MOBILE NETWORKS

The next-generation mobile network will support terminal mobility, personal mobility, and
service provider portability, making global roaming seamless. A location-independent
personal telecommunication number (PTN) scheme is conducive to implementing such a
global mobile system. However, the nongeographic PTNs coupled with the anticipated large
number of mobile users in future mobile networks may introduce very large centralized
databases.

J2E 6011. SHORTEST PATH FINDING USING GPS BASED NAVIGATION SYSTEM IN
CRITICAL SITUATION

In this Project we propose a system which would be very useful for the Patients who have
Critical Heart Attacks and their Condition could be informed to the nearest Hospital, so as to
save the life of the Patient. Here in this project if the patient gets Heart attack, h/she has to
give a input to the GPS system, so that GPS is get activated, this immediately transmits the
Longitude and Latitude Values to the Central Station or the Server where all the Longitude
and Latitude Values of Hospital would be maintained. Here in the Central Server the data is
getting processed and it could able to find the Nearest Hospital to the Patient‟s House and the
Server sends the message to the Nearest Hospital. Nearest Hospital will get the data and
immediately the Ambulance is send to the Patient‟s House, so as to save the Human Life.

J2E 6012. NETWORK INTRUSION DETECTION
         Network intrusion detection has generally been dealt with using sophisticated
software and statistical analysis tools. However, occasionally network intrusion detection must
be performed manually by administrators, either by detecting the intruders in real-time or by
revising network logs, making this a tedious and time-consuming labor.
To support this, intrusion detection analysis has been carried out using visual, auditory or
tactile sensory information in computer interfaces. However, little is known about how to best
integrate the sensory channels for analyzing intrusion detection. We propose a multimodal
human-computer interface to analyze malicious attacks during forensic examination of
network logs.
J2E 6013.HONEY POTS – A SECURITY SYSTEM TO IDENTIFY BLACK HAT
            COMMUNITY IN THE NETWORKS

With a majority of Internet service subscribers changing over from conventional dial up
connections to faster and cheaper T1, Cable, ISDNS, DSL, it yields new problems for the
existing subscriber base that contain majority of novice users in terms of Internet Security.
Today‟s Internet security is restricted to personal and network firewalls installed either on the
host‟s computer or a network gateway or a router.
         A Honey pot is a comprehensive security system, which attracts hackers to attack
them thereby finding out the types of attacks and black hat community motives.
         A Honey pot is a security resource whose value lies in being probed, attacked, or
compromised. The key point with this definition is honey pots are not limited to solving only
one problem. They have a number of different applications. To better understand the value of
honey pots, we can break them down into two different categories:
     Production
     Research
         Production honey pots are used to protect your network. They directly help secure
your organization. Research honey pots are different; they are used to collect information.
That information can then be used for a variety of purposes, such as early warning and
prediction, intelligence gathering, or law enforcement.
         Honey pots can be made more efficient by simulating some services, which will lure
the attackers in to the trap.



J2E 6014.INTERANET TRANSFERMATION OF VOICE WITH DATA USING VOICE OVER
              INTERNET PROTOCOL(VOIP)

         Voice over IP (VOIP) is new technology that allows the passing of speech information
over IP data networks. In contrast to common traditional telecommunications, which moves
voice traffic over the special Public Switched Telephone Network (PSTN), VOIP technology
means that the voice shares the same network with the data in a true voice−data
convergence. VOIP has all the well publicized advantages inherent in having a unified data
network infrastructure to manage all communications needs. Care must be taken, however to
ensure that the voice quality is preserved when a data network is used to pass voice
information. Traditionally, voice and data networks have been supported by two separated
infrastructures.

         The voice transport over IP (VOIP) offers service providers the advantage of
integrating their networks into a single infrastructure. The substitution of traditional voice
networks by VOIP will depend on the capability to offer to the end user a similar quality.

        From a practical standpoint it makes no sense to transmit digitized voice samples that
contain only a period of silence. Packets containing period of silence add to network traffic
and can adversely affect the transmission and delivery of other packets carrying digitized
voice samples from the same or different callers. The bandwidth is not effectively used due to
the transmission of unnecessary silence packets across the networks. Hence, the Quality of
Service is affected due wastage of bandwidth.
J2E 6015. GPS BASED VEHICLE LOCATION TRACKING SYSTEM

Vehicle tracking using GPS (Global Positioning System) is fully integrated into the VTS
(Vehicle Tracking System). GPS was developed by the U.S. military to enable accurate
navigation. 24 satellites have been placed in orbit some 20.000 km from the earth's centre.
The vehicle to be tracked is fitted with a GPS receiver and a small antenna. GPS satellites
are continuously transmitting a radio message containing information including when the data
was sent, which satellite sent it and the current reliability of the system. The GPS receiver
fitted in the vehicle receives information from at least 4 satellites and carries out the
necessary calculations to determine its current position. The vehicle tracking device VTU is
the total security protection and fleet management solution. By using the latest GPS and GSM
technology to protect and monitor your car, truck, bike, boat (or moveable asset) virtually
anywhere and then locate it to within a few meters. The device incorporates a covertly
installed module (which works and communicates independently) but has the ability to run in
conjunction with your local GSM network (DTMF, voice message, SMS, GPRS or GSM
modem call). The external data processing of data and communication are done using
ATMEL AT89c51 OR ARM ARM7TDMI-S (T.M) core logic 32bit controller as per the choice.
Anyway both of these projects can also be integrated to PC using java background via RS232
communication or can be displayed on a local 2 X 16 LCD panel. For mapping on Google
Earth.

J2E 6016. SIP - COMMUNICATOR BASED TELE- CONFERENCING SYSTEM

       A teleconferencing project has been implemented in java1.5, sip alpha and Asterisk
server1.4 server provides the customer care and the call centers for secured way for
telemarketing in real-time environment (salesman of the company contacts customer for
product sales or customer contacts salesman for queries about the product) this project
featured with Music On hold, Voice Recording, and Authentication through DTMF technology.
Session initiation protocol integration involves registering services to the Locating Service
either within LAN network or using proxy server.

J2E 6017. ONLINE LIVE SECURITY SYSTEM USING MEDIA CONVERGING & MOTION
          DETECTION TECHNIQUE

        During nighttime, the possibility of theft is more. Hence, a camera is switched on. If it
finds any movement on the pointed place, it immediately sends the mail and give the Beep
sound to the Security guard on alert. Else if motion is detected, it alerts everybody on
Security Guard. Unless and otherwise, security guard switch of the camera and System, the
process goes on.



J2E    6018. LOCATION AIDED ROUTING (LAR) PROTOCOL BASED ROUTE
      IDENTIFICATION, MAINTENANCE DATA TRANSFER IN AD-HOC NETWORKS

        Ad Hoc Network (MANET) process consists of two nodes. Because of the limited
range of communication of a wireless host, it is necessary to perform multi hopping. Routing
protocol is used to find routes along which multi-hoping will be performed. Location Aided
Routing (LAR) protocol is one which utilizes the location information of a node to limit the
search.

          Location Aided Routing is an on-demand routing protocol in which the routes are
found only when required.
                  Route Discovery: Identifies and establishes route between hosts. In LAR,
restrictive flooding of control packets is done to discover the route.

               Route Maintenance: Supervises the data transfer between the two nodes. If
any error occurs during data transfer, necessary steps are executed to continue transfer of
data.
By Implementing the LAR algorithms, we have further reduced the flooding region and
eliminated looping problems.

J2E 6019. RFID BASED HOSPITAL MANAGEMENT SYSTEM

   RFID based access card used by the hospital employee , project has been implemented to
maintain the hospital details in an centralized database using MySql5.0 as the backend where
the employee could able to manage the hospital details using the front end tool which has
been designed using java1.5 .Employee Authentication done through RFID based access
card, integrated with the RFID card reader.

J2E 6020. NETWORK LOAD BALANCING AND REDISTRIBUTION OF THE TRAFFIC
       OVER THE NETWORKS USING GRID COMPUTING SYSTEM


In a Network Grid computing enhances the scalability and availability of mission-critical,
TCP/IP-based services, such as Web, Terminal Services, virtual private networking, and
streaming media servers. This component runs within cluster hosts as part of a operating
system and requires no dedicated hardware support. To scale performance, Network Traffic
Analyzer distributes IP traffic across multiple cluster hosts. It also ensures high availability by
detecting host failures and automatically redistributing traffic to the surviving hosts. Network
Traffic Analyzer provides remote controllability and supports rolling upgrades from a
operating system.

The unique and fully distributed architecture of Network Clustering enables it to deliver very
high performance and failover protection, especially in comparison with dispatcher-based load
balancers. This project describes the key features of this technology and explores its internal
architecture and performance characteristics in detail. The unique and fully distributed
software architecture of Network Traffic Analyzer enables it to deliver the industry's best load
balancing performance and availability.

J2E 6021. MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT

“Video Streaming” is an application designed to transfer the stored video images from one
node to another. The application allows the mobile user to see video file with the intranet
networks with which server (J2EE SERVER) running on the other machine. Video Streaming
gives the user high quality images with much less (General Packet Radio Service) GPRS or
Universal Mobile Telecommunication System (UMTS) traffic, so the communication with the
intranet.


ADVANTAGES

    1. Video Streaming captures the Video file from the server to the client mobile.
    2. Here the images are transferred byte-by-byte mode.
    3. The server will store the images accordingly to the user and each image will be
       captured and each image will be transmitted to the mobile.

J2E 6022. NETWORK CONGESTION AVOIDANCE USING NETWORK BORDER PATROL
       (NBP)

The end-to-end nature of congestion control is an important factor in its scalability and
robustness. However, end-to-end congestion control algorithms alone are incapable of
preventing the congestion collapse and unfair bandwidth allocations created by applications,
which are unresponsive to network congestion. In this project, we propose and investigate a
new congestion avoidance mechanism called Network Border Patrol (NBP). NBP is a core-
stateless congestion avoidance mechanism and Parallel downloading is a technique to
improve the performance of transferring large files. It assumes that many nodes (servers) in
the network have the requested file. A node (client) that wants to get that file can connect to
some or all of the servers in parallel and download different parts of the file from each of
them. The aggregate transfer rate that the client observes is the sum of the transfer rates on
the paths from each of the servers to the client. In order for the aggregate transfer rate to be
higher that the maximum transfer rate which can be obtained by connecting to only one
server.

J2E 6023. JAVA-BASED HOME AUTOMATION SYSTEM

                    This project is aimed to control devices by achieving Java based Home
automation. Here we use Java application (J2ME) in PC, AT89c51, parallel port and Load
Driving Circuit. Here the user can give the control command for a particular device through
Java mobile application (J2ME) in PC, which is then transmitted through parallel port. In the
receiving end the microcontroller receives the device command and recognizes the command
and controls the corresponding device through the Load driving circuit. The load driving circuit
consists of a Darlington pair IC for current amplification and relays, which are used to switch
the devices ON/OFF.

J2E 6024. GSM BASED REMOTE BIO- MEDICAL INVETIGATION

 With the J2ME as back end, the project is used to send SMS and monitor the status of a
person. Such as heart beat and temperature and informs it to the mobile number specified;
the heart of the chip is the at89c52 controller and java back end. The heart rate detector unit
and the temperature sensor unit is fitted to the patient and the data output is fed to the
microcontroller via the analog to digital converter the data from the adc is in 8 bit format, it is
then processed by the microcontroller and whenever the safe ranges is violated the controller
produces a alarm, and visual display, as well as initiates the pc to send the SMS to a
specified mobile number using a mobile phone which is interfaced with the pc.

J2E 6025. AUTENTICATION OF DIGITAL IMAGES BY ENCYPTION AND DECRYPTION
WITH PRIMARY KEY IMPELMENTATION USING LSB ALGORITHM AND
STEGANOGRAPHY

This Project is to provide the security for images by using key concepts. This project uses the
LSB algorithm for data hiding and data extraction. There is a growing importance of
steganography in intelligence work, as it is viewed as a serious threat to some governments.
In future we would like to implement steganography using audio and video files. A major
advantage of the LSB algorithm is it is quick and easy. There has also been steganography
software developed which work around LSB color alterations via palette manipulation. LSB
insertion also works well with gray-scale images. The project that is implemented deals with
digital images acting as a cover medium to store secret data in such a manner that becomes
undetectable. Hence it provides a very high means of security without suspicion

J2E 6026. RFID BASED TRAIN SPEED AND TIME MONITORING

The project uses the RFID readers and tags, the tag is fitted on the train engine, each train
carries its own identified tag, and the readers are fitted in each side on level crossing with a
clearance of 3 km from the level crossing. The reads the tag id once the train nears the level
crossing and passes to the microcontroller, the microcontroller in turn notes the id and
displays the train name, and also closes the gate, and at once the train crosses the other end
the reader reads the tag and feeds it the microcontroller, the microcontroller in turn opens the
gate. The microcontroller can also be programmed to send the Rfid data to the system, so
that with the java backend we maintain the database, time of crossing and speed of the train.



J2E 6027. ENHANCING THE QUALITY OF SERVICE IN VOIP

       Supporting dedicated bandwidth
   Improving loss characteristics
       Avoiding and managing network congestion
       Shaping network traffic
       Setting traffic priorities across the network

QoS usually refers to the fidelity of the transmitted voice and facsimile documents, it can also
be applied to network availability (call capacity or level of all blocking), telephone feature
availability (conferencing, calling number display), and scalability(any-to-any, universal and
expandable).

The common part in the two modules is the requirement of „Sound Recorder and Player‟ for
recording the voice and playing back the voice to user. The connection is to be established
between the users for transmission of voice across the network. For establishing connection,
the existing TCP/IP protocol is to be used in the LOCAL AREA NETWORK.
Quality of Service for Voice over IP discusses various QoS concepts and features that are
applicable to VoIP.

       It must include silence tag to generate silence at the receiver‟s end.
       The quality of service is enhanced by utilizing the available bandwidth.
       In another Technique, text data is inserted in the place of the silence.
       The text is extracted from the voice.



J2E 6028. AUDIO CONFERENCE THROUGH SPEEX AND ILBC CODEC

    Speex / ILBC codec are one of the solutions to the problem study done on the latency,
delay and bandwidth, audio quality of java media framework. speex / ilbc codec meant for
encoding and decoding audio data through RTP protocol , where usage of speex / ilbc codec
improves better voice quality when compare to ulaw,alaw and gsm codec presents in existing
java media framework.


J2E 6029. MOBILE AGENT BASED STORING AND RETRIEVAL OF MULTIMEDIA FILES
FROM THE DISTRIBUTED MULTIMEDIA DATABASE

This project mobile agent are used to store and retrieve a multimedia data from the distributed
multimedia database using mobile agents based on host database provide the result to the
user upon request. This project uses the mobile agents effectively to retrieve multimedia
database at a faster rate and at lower bandwidth using agents in a distributed environment.
One of the paradigms that have been suggested for allowing efficient access to remote
resources is a transportable agent. A transportable agent is a named program that can
migrate from machine to machine in a heterogeneous network. The program chooses when
and where to migrate. It can suspend its execution at an arbitrary point, transport to another
machine and resume execution on the new machine. Transportable agents have several
advantages over the traditional client/server model. Transportable agents consume less
network bandwidth and do not require a connection between communicating machines - this
is attractive in all networks and particularly attractive in wireless networks.




J2E 6030. MOBILE BASED REMOTE NETWORK MONITORING AND CONTOL SYSTEM
               USING HTTP TUNNELING, RMI & SOCKET
The Objective of this project is to monitor the client machines, which are all present in the
network (LAN, WAN, MAN) through user mobile from any remote location. The main
technologies used in this project was HTTP tunneling, RMI, Socket connection. Here user
could see the client list which are all connected to the online server through his mobile, the
mobile user can create a text file and it can be stored into the PC (client machine) by
selecting client name from client list.
        Administrator (mobile user) can view the content of the text file, which is residing in
        the client machine from his mobile. He can explore the drive list, directory list and file
        list from his mobile. Here the mobile user can compile a error free java file which is
        residing in the pc or he can execute the compiled file from his mobile. Administrator
        can broadcast or unicast messages to his client‟s from his mobile or he can chat with
        the client by selecting the client name from the client list.
J2E 6031. REMOTE PACKET CAPTURE, EPHEMERAL PORT ANALYSIS, DATA
             MONITORING IN THE NETWORKS

The success of the Internet has brought networking in each and every day new applications
and technologies that are created. In this scenario, the power and complexity of computer
networks are growing every day. Thus, network and system security has become an
increasingly important issue during the past few years.

 Security specialists can use a port scanner to check whether people on the network are
running software they should not be, making sure that servers are appropriately sealed off
and many other things. The knowledge of which ports are open on a system gives an
administrator a general idea of the services a system is running.

 Remote Ephemeral Port Analysis is a piece of software that runs on a distributed system
and allows us to analyze the status of the software ports on a remote machine. That is, it
determines whether each of the ports is open or not on a host (IP address). Ports that are
open on a host represent services, servers, and sometimes Internet applications. Different
ports are used for different protocols. This software provides user authentication, so that only
the authenticated users can use the software. The users are added, deleted and edited only
by the administrator. The software also has the ability to find all the computers currently
connected on the network. This software also determines the amount of information
transferred across the network. Apart from port status analysis, a very important feature
added to this software is the packet capture mechanism. This utility seizes information from
each packet transferred across a network and determines several conclusions related to
network security and network administration.

J2E 6032. SECURITY COMMUNICATION FOR GSM NETWORK USING KERBEROS V5
                 PROTOCOL

Today more then ever, secure communication is a must. Most companies now user network
infrastructure to conduct their business, whether internally( intranet model or externally to
reach partners or customers (extranet/Internet models).
While it is utopian to consider today‟s networks as being safe, there are solutions to make
them more secure and use them with a bit of trust. The key aspects to securing
communications over a distributed environment are authentication, integrity, confidentiality
and authorization. Kerberos is a network protocol that addresses the authentication part. This
application aims at using Kerberos V5 to secure the communication between a J2Me MIDlet
communicating over the GPRS, and a Banking Transaction Server. This project mainly covers
at gaining the initial ticket provided by the authentication server. Authentication server checks
its database to authenticate the user. If the username and the password matches it generates
and initial ticket by which we can obtain many service tickets to access the services provided
by the banking transaction server.
J2E 6033. DESIGN OF AN INTELLIGENT AGENT FOR NETWORK FAULT DETECTION

As the Internet becomes a critical component of our society, a key challenge is to maintain
network availability and reliability. The increasing number of networks is making downtime
more costly. Network management tools and techniques must therefore become better at
detecting and identifying network faults.
        Current fault management implementations generally rely on the expertise of a
human network manager. As networks become more complex and changes occur more
frequently, the human network manager will find it hard to maintain a sufficient level of
expertise on a particular network‟s behavior. Fault management research has covered
approaches such as expert systems, finite state machines, advanced database techniques,
and probabilistic methods.
        Intelligent agent is one that processes information collected by Simple Network
Management Protocol agents and uses it to detect the network anomalies that typically
precede a fault. The intelligent agent approach has several benefits. It can detect unknown
faults and correlate information in space and time. Also it is possible to make an Intelligent
Agent to detect the failure in one of the sub network‟s components even before it can be
occur.


J2E 6034. FACE RECOGNITION

Security and authentication of a person is a crucial part of any industry. There are many
techniques used for this purpose. One of them is face recognition. Face recognition is an
effective means of authenticating a person. The advantage of this approach is that, it enables
us to detect changes in the face pattern of an individual to an appreciable extent. Hence face
recognition can be used as a key factor in crime detection mainly to identify criminals. There
are several approaches to face recognition of which Principal Component Analysis (PCA) and
Neural Networks have been incorporated in our project. The system consists of a database of
a set of facial patterns for each individual. The characteristic features called „eigenfaces‟ are
extracted from the stored images using which the system is trained for subsequent
recognition of new images.

        MODULES

             Training
             Testing

TRAINING:

        To train the users face with already present ID in the database

TESTING:

        To authenticate the user with the face recognition algorithm


J2E 6035. DATA MIGRATION, TRANSLATION & TRANSFERMATION TO OPTIMIZE THE
             DATA MANAGEMENT SYSTEM

                  Data Migration is the process of translating data from one format to another.
Data migration is necessary when an organization decides to use a new computing system or
database management system incompatible with the current system. Typically, data migration
is performed by a set of customized programs that transfer the data. By the use of this
project, the following data migrations can be processed easily.

1.From SQL Server To Oracle
2.From SQL Server To Access
3.From SQL Server To HTML
4.From Oracle To SQL Server
5.From Oracle To Access
6.From Access To SQL Server
7.From Access To Oracle


J2E 6036. SIP-COMMUNICATOR BASED ACTIVE LISTENING AND PASSIVE LISTENING

    An telecom project implemented using java1.5, sip-communicator alpha and Asterisk 1.4
server featured with Active Listening (Manager of an organization chanspy the conversion
between the salesman and the customer. And can communicate with the salesman), Passive
Listening (Manager of an organization chanspy the conversion between the salesman and the
customer) which is a secured way of communication with the implementation of sip protocol.


J2EE 6037. RFID BASED ATM MACHINE TRANSACTION AND PROCESS SYSTEM

                        Integrated with RFID reader for authenticating the customer using
RFID based access card where the RFID ID has been read through serial port using java
technology and the front end design has been done using jdk1.5 , customer details has been
uploaded into MS-Access database, After authentication customer can view his/her Balance
Enquiry, Fund Transfer and Mini Statement.

J2E 6038. MULTIPLE MAIL ACCOUNTS COLLABORATION MANAGER

Nowadays, web users have multiple email accounts. But individual authentication is essential
for accessing each account, which is time-consuming. Currently, no integrated system exists
for individuals to manage multiple email accounts.

Our solution provides a common, uniform API for managing various email accounts using the
Java programming language .It allows users to access mails from various accounts by
logging in once. All the registered mail accounts of the user will be displayed as hyperlinks.
Clicking on each link will lead the user to a new page where he can check for new mails, reply
for a mail, forward a mail, compose mails and delete mails. In this way, this solution saves
time in authenticating multiple accounts by providing a single authentication for all the
registered mail accounts and also reduces the burden on the web server.


J2E 6039. BANDWIDTH CONGESTION CONTROL USING AND AUTHENTICATION
             SERVICE FOR AUTOMATIC DYNAMIC RECONFIGURATION SYSTEM

In any company, the effective utilization of the available bandwidth is of paramount
importance. Every person must use the entire available bandwidth in a satisfactory manner
(i.e.) The entire bandwidth must not be locked to some high bandwidth user refraining other
users of the company due to traffic congestion.
 Considering these difficulties, we propose the following solution.
      Parting the available bandwidth among the special permission and normal users.
      Authentication of the users using Kerberos.
              In order to avoid the congestion, the normal and the special permission users will
     be routed through two different paths. Each user will be allocated a username and
     password, which will be stored in a database. In addition, their access permission details
     will also be maintained. Based on these details the user is routed either to the FTP server
     or to the Domain Server dynamically.

J2E 6040.       REMOTE AND LIVE MEDIA STREAMING IN MOBILE USING J2ME
                TOOLKIT USABLE FOR TRAFFIC VIEWING & CONTROL SYSTEM
This is an Internet Browser application designed to display traffic web cam links. The
application allows the user to view traffic images from several sources, cities, countries and
continents all over the world, as long as the user subscribes the link packages that he intends
to use. This application is particularly meant for traffic police to monitor the city with their
mobile from any remote location, where a web cam will be provided at each and every signal
location.


J2E 6041. INTERNET BASED MACHINE CONTROL SYSTEM

The aim of the project is to control the electronic appliances via the internet. Thus thereby
enabling the controlling of the devices via all over the world is possible. The project utilizes
the Html and Java as the front end, the embedded system as the firmware ends of the
project. Thus the project is firmware based. This project allows a person, to control the
electronic appliances via the internet. The devices carry a specific codes, which is typed in
the explorer address bar is sent to the server. The server reads the data from the html page,
with the help of java. And then provides the respective codes for the co running dynamic link
library files. The output from the parallel port is fed to the controller for further processing, and
the output from controller is fed for relays for controlling of appliances.

J2E 6042. EDGE DETECTING, IMAGE QUERYING, MATCHING, & RANKING USING
             SPATIAL SIMILARITY MATCHING SYSTEM

Like traditional databases, an image database (IDB) is a collection of unique images. Each of these
images are composed of a set of different objects. However, to improve the overall performance of
the search and retrieval process, spatial similarity data modeling and retrieval scheme is used.
Similarity-based search reduces the search space to a limited number of matched instances and thus
retrieving depends on the nature and measure of similarity specified in the query. Edge detection
algorithm is used to detect the outline of the queried image. Image processing is performed
by generating a signature for each queried image, comparing it with the database, ranking the
retrieved images and then displaying the images. This makes searching much more efficient.


J2E 6043. EXTRACTION, RETRIEVAL AND STORAGE OF IMAGES, DATA CONTENTS IN
THE INTERNET

With this concept we can extract the contents of current on line web page or a web page
stored from a hard disk file and we can store it to another file. Web page contents like images,
text, paragraphs, etc. Storing all images to .html file and text to .txt file. This project is
developed on core java for creating user interface window , creating connections and
execution.

Modules:

Homepage
                Main module for connecting to the URL and to invoke content extractor or
                feature extractor modules
Content extractor
                For extracting words in tokenized format and paragraphs and for storing it
                In a text file
Feature extractor
                For extracting images and storing it in a html file

J2E 6044. CROSS PLATFORM INTEGRATION AND GLOBAL EDITOR SYSTEM

There are editors for languages such as C, C++, JAVA that exists separately for each. But
there is no editor that supports all languages in one. Moreover they take more memory space
to run. The editor, which we are designing, supports all languages in one environment. It is a
package, which provides user to program the languages such as C, C++, JAVA. Since the
editors, which already exist, do not support all languages .we are designing an editor that
overcomes this problem. The compilers for all languages are present in the system itself. This
editor needs very less memory space to run. The features in this editor are automatically
insert header files, insert comment lines, insert closing braced to an opened brace. The other
features are shortcut to compiler, auto display of output window, auto help and auto quick
insert. We are developing the user interface design using swing concepts in java. The call to
respective compilers and interface between user and database is done by means of core
java. This system would prove to be friendly to programmer since it reduces the precious
coding time as well as giving help to most of the methods syntax so no need to remember
large number of methods.


J2E 6045. NETWORK ENABLED EMBEDDED CONTROL

            This project is very much useful and applicable in the college, and office
environment. The project utilizes the Java as the front end, The embedded system as the
firmware end of the project thus the project is firmware based this project allows a person to
control the electronic appliances via the internet. Thereby allowing the access of devices via
the local area network with greater flexibility and user friendly The devices carry a specific
codes, which is typed in the explorer address bar is sent to the server .the server reads the
data from the html page with the help of java, and then provides the respective codes for the
co running dynamic link library files, which is designed with the help of vc++ For further
communication with parallel port. The output from the parallel port is fed to the controller for
further processing, and the output from controller is fed for relays for controlling of appliances.


J2E 6046. IMPLEMENTATION OF SECURITY KERNEL AND FIREWALL USING JAVA

Internet is a dynamic place and is liable for various forms of attack. It is necessary to
guarantee the integrity and safety of the private network connected to it. There are various
methods to safeguard our trusted network. One among them is firewall.

A firewall separates a private network from a public one, the Internet. It screens and filters all
connections coming from the Internet to the private network and vice versa, through a single,
concentrated security checkpoint. A firewall makes sure that you cannot reach the Internet
from the Internet network, or vice versa, unless you pass through this checkpoint.

There are several models and configurations of firewalls out there. But the basic idea behind
them is always the same. Our firewall‟s primary security component is the security kernel.
The security kernel evaluates each incoming and outgoing network packet traversing the
firewall server and enforces security policy against all such packets.

J2E 6047. SECURED DATA COMMUNIACTION USING BASE 64 (BSF) ENCODING AND
                 DECODING – FOR IMAGE, TEXT, AUDIO, FILE ETC.

The main stay of this project is secured data or information or file Communication. The
program provides a User Interface to convert any file type to base64. The base64 conversion
is to remove unreadable characters from your file. You can save your base64 code in a
separate file and then convert it back to the original format whenever you want.

This program provides a complete graphical interface to look like a wizard, which make
conversion easy, understandable and manageable with following FEATURES.

1.Image encoding & decoding
2.Text encoding & decoding
3.Audio encoding & decoding
4.File encoding & decoding
J2E 6048. WIRELESS VIRTUAL NETWORK COMPUTING

WVNC (Wireless Virtual Network Computing) software makes it possible to view and fully-
interact with one computer from mobile device anywhere on the Internet. WVNC software is
cross-platform, allowing remote control between different types of computer. For ultimate
simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from
within a browser without having to install software. WVNC has a wide range of applications
including system administration, IT support and helpdesks. It can also be used to support the
mobile user, both for hot desking within the enterprise and also to provide remote access at
home, or on the road. The system allows several connections to the same desktop, providing
an invaluable tool for collaborative or shared working in the workplace or classroom.
Computer support within the geographically spread family is an ever popular use.


J2E 6049. REMOTE DATA CAPTURE , ACQUISITION AND
SENDING SMS TO REMOTE MOBILE USING JSMS

This project developed to monitor the temperature or humidity of a remote area to notify the
users through his mobile. The remote area can be hospital (monitoring patient temperature),
here the device which is going to monitor will be connected to the PC through parallel port.
The client application was implemented in java and JSMS (java SMS API) used to send SMS
to the users mobile.

J2E 6050. RFID BASED EMPLOYEE DATABASE MANAGEMENT SYSTEM

   RFID based access card used by the employer of any type of organization has been
implemented using java1.5 and struts1.2,MsAccess where an employee login and the logout
time will be monitored with the help of RFID and the pay slip of the employee will be
calculated and updated upto date and time, where the Manager of the organization is
responsible controlling the Database(Updating and modifying new employee details ,
monitoring and managing the employee details with the access card reader.).

J2E 6051. REMOTE WEBCAM MONITORING SYSTEM

“Remote Web Cam” allows users to view their web cam images from any remote location.
This project was implemented in java(applet).here users are allowed to select their web
cam from remote location to view latest snapshot of the web cam images. The remote
application directs web cam to take snapshots in the order of frames these frames will be
send to remote user. This application helps administrator to monitor their staff if they are out
of station.




J2E 6052. IMPLEMENTATION OF CROSS PLATFORM DATABASE ACCESS SYSTEM TO
REDUCE SERVER MAINTENANCE & MEMORY COST

Traditionally all the databases are stored only in the server node which in turn increases the
cost to the server to some extent. In order to avoid this, the new proposed system paves a
new way by maintaining the databases not in the server but distributed among the client
nodes.
If the database resides in the server as the traditional method the cost of the server such as
maintenance costs, memory cost, etc. becomes very high which in turn increases the
application




or the system cost. To avoid such unnecessary cost the new proposed system enhances the
maintenance of the databases.

Moreover the access time of the data from the database residing in a client machine is very
much less when compared to the database residing in the server so the data access time is
very much reduced and the performance of the system increases. The database does not
reside in the server instead it is distributed locally in the clients and so the RMI and RPC has
to be used to access the database present over the remote clients.

J2E 6053. LIVE MEDIA STREAMING, CONVERGING AND TRANSMITTING USING REAL
TIME PROTOCOL (RTP)

Live Media can be transmitted from one computer (System to which Camera is attached)
using RTP protocol. The main part is to transmit the media from this system to other system.
Setting up RTP sessions with several distributed clients and streams can be a tedious and
complicated task. It allows to stream media containing any number of tracks to a number of
different hosts/clients on the network simultaneously.
         Media can be received from the Server to which the Camera is attached and live
images are captured. Sitting in different place, we can view what‟s going on in another place.
The main use may be in places where cash transaction is going on. Setting up RTP sessions
with several distributed clients and streams can be a tedious and complicated task.

J2E 6054. IMPLEMENTATION OF WIRELESS COMMUNICATION GATEWAY USING
                   INTERNET PROTOCOL

Wireless Communication Gateway over IP, details with communication between computer
and cell phone using Internet protocol. WCGOIP deals sending a short message from the PC
to the intermediate server. Then from the intermediate server it is sent to the Gateway
[Simple Wire Server], which has an ip address, which is used by the TCP  IP to delivery the
message to the Gateway. The Gateway connects the Internet to the cell network. The
gateway passes the message sent along with the cell number to the appropriate cell network
and waits for the response. The cell network route message to the receiver cell phone and
sends the status of the message sent to the gateway. Gateway in urn sends the status of
the message sent to the intermediate server.




J2E 6055. CRYPTOGRAPHY IMPLEMENTATION OF SECURED DATA
TRANSFERMATION

Cryptography, the science of secret writing, is the biggest, baddest security tool in the
application programmer's arsenal. Cryptography provides three services that are crucial in
secure programming.

         Files can be encrypted and the encrypted file can be decrypted using this system via
a local network or Internet.

        This project is implemented by core java, swing, awt.
J2E 6056. CROSS PLATFORM INTEGRATION TOOL FOR ACCESS, MONITORING AND
CONTROL OF LINUX & WINDOWS THROUGH JAVA

         When THIS TOOL starts, you should see a split window. In the upper half you'll see
your DOS drives, in the lower half you will see your LINUX drives. Your Linux filesystem is set
to read only by default. Uncheck menu item 'File - Linux read only' first, if you want to write to
your Linux disk. Modifying or deleting is only possible with Ext2 and Ext3 partitions. ReiserFS
partitions are always read only. No files or directories can be modified, deleted or created on
or copied to a REISERFS Partition.

Add another drive

       Choose in the Menu 'FILE' the 'Add DOS Drive' or 'Add Linux Drive' menu item or
        right click in the tree and choose the 'Add Drive ...' menu item of the contextmenu.
        NOTE: Running CROSS TOOL under Linux, you have to add Linux-drives in this
        dialog because "ldir -part" of the CROSS TOOL doesn't work under Linux.
       Enter a valid disk name in the text field 'Drive' and a valid directory in the text field
        'Directory' of the shown dialog.
       To find out, which partitions do contain Linux filesystems, click on the 'PARTITIONS'
        button in the toolbar.
       Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and
        y=1,2,3,..., ReiserFS partitions should be entered as /dev/rdxY (note the "r" instead of
        "h"!).
       ReiserFS partitions are read only.

Removing a Drive

       Right Click on a Drive in the directory tree and choose the 'Remove Drive' menu item
        of the contextmenu.

Connecting and disconnecting to a remote host (host must be running LREADjav)

       To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on
        the 'CONNECT' button in the toolbar or in the Menu 'File' on 'Remote connect ...'. In
        the dialog box enter the host name and the portnumber (if lreadjav is not running on
        standard-port) and click OK.
       To disconnect, click on the 'DISCONNECT button' in the toolbar or in the Menu 'File'
        on 'Remote disconnect'. Using wildcards

       If you for example just want to see files with the extension "java" you can set a
        pattern(*.java) for the DOS and Linux-lists. Choose in the Menu 'File' the item 'DOS
        Pattern ...' to set the pattern for DOS-files or the item 'Linux Pattern ...' to set the
        pattern for Linux-files.

J2E 6057. TRANSACTION AND RECHARGE OF MOBILE TRHOUGH SMS & ATM
SYSTEMS
SMS or Short Message Service allows Cellular or Mobile GSM phones to send and
        receive Text Messages. The use of SMS is a convenient and fast means of
        communication with cellular telephone and pagers.

 This can be alphanumeric and more recently graphical. A sent SMS message is stored at an
SMS Center (SMSC) until the receiver‟s phone receives it. The receiver can identify the
sender by his/her telephone number that is included in the message itself. SMS supports
several input mechanisms that allow interconnection with different message sources and
destinations including voice-mail systems, Web-based messaging and E-mail integration
The scope of this project is to customize the existing pre-paid system offering by ATech
wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise
systems. The system will become the base system and a foundation of the complete wireless
commerce framework, which will be implemented later by ATech Wireless

There are 2 modules:

Mobile Recharge
The scope of this project is to customize the existing pre-paid system offering by ATech
wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise
systems. The system will become the base system and a foundation of the complete wireless
commerce framework, which will be implemented later by ATech Wireless
Transaction on mobile:

Transaction on mobile is used to money between two peoples. this two peoples must be
registered in a bank. And they should have mobile transaction. this transaction starts with
SMS. if user 1 wants to pay Rs.3000 to User 2 .user 1 simply type SMS to particular Bank
with his 4 Digit PIN, Amount and Account No. the request is processed by the bank server
and Amount is transferred to designation account.


J2E 6058. DESIGN AND DEVELOPMENT OF A NOVEL DISTRIBUTED , SCALABLE
             FILE SHARING AND ACCESS SYSTEM WITH GUARANTEED SECURITY

         There has been a huge growth in the use of file sharing software over the last year,
making file sharing one of the top uses of the Internet. Napster was the first technology that
empowered users with his ability to share files amongst themselves. The demise of Napster
led to the development of numerous file sharing technologies, most of which are based on the
Gnutella protocol. The problem with all current file-sharing technologies is that none of them
can guarantee the security of the shared file. This report describes the design, development
and evaluation of a file sharing that proposes a novel solution to the shared file security
problem. The system will allow user to share files in a secure manner and comprises of client
and server applications.
         The client allows users to connect to a server and shares their files amongst all other
system users. The client also gives users the ability to search for files shared by the other
system users, and when a file is found it could be transferred from the other user securely, as
the file would be encrypted. The server allows valid users to connect, records their shared file
list enables connected users to search this list. The server authenticates connected users by
performing a test that only a valid user can respond to in the correct manner. The report
outlines research in the area of networking, including technological backgrounds such as
distributed file system architectures, cryptographic techniques and network programming
methods. The novel feature of the system is the method used to address the security problem
inherent to all current file-sharing technologies. The system developed uses cryptographic
techniques to implement a framework in which to model system security, including
authentication of system users and the files that they share. We can also implement the direct
client-to-client communication, so the ideal time of the client must be greatly reduced. Log
files are not to be created. This project is highly scalable; it can be applied to WAN.
         .
J2E 6059. ENHANCED MULTIPURPOSE IMAGING APPLICATION BASED ON IMAGE
STATISTICS CONCEPTS

The main objective of the project is Image processing .the system to reduce the noise in
image and provide the graphical user interface to apply the different properties like applying
contrast, brightness, threshold level, color balance and to change the property of the image
and provide the useful information about the image .the system is developed in java
(SWINGS)
Platform :OS independent

MODULES

       Image editing
       GUI image
       Process
       Analyze
       Window



J2E 6060. REMOTE AND ADVANCED WEB BASED FILE ACCESS AND MANIPULATION
                SYSTEM

This JSP program allows remote web-based file access and manipulation. You can copy,
create, move, rename and delete files. Text files can be edited and groups of files and folders
can be downloaded as a single zip file that is created on the fly. If you want to copy or move a
file, please enter the target directory name in the Edit field (absolute or relative). If you want to
create a new file or directory, Enter the name in the edit field. If you click on a header name
(e.g. size) the entries will be sorted by this property. If you click two times, they will be sorted
descending.

The button "Download as zip" let you download the selected directories and files packed as
One zip file. The buttons "Delete Files", "Move Files", "Copy Files", delete, move and copy
also selected Directories with subdirectories. If you click on a .zip or .jar filename, you will
see the entries of the packed file. You can unpack .zip, .jar and .gz direct on the server. For
this file type the entry in the Last column is "Unpack". If you click at the "Unpack" link, the file
will be unpacked in The current folder. Note, that you can only unpack a file, if no entry of the
packed file Already exist in the directory (no overwriting). If you want to unpack this file, you
have To delete the files on the server which correspond to the entries. This feature is very
useful, If you would like to upload more than one file. Zip the files together on your computer,
Then upload the zip file and extract it on the server. You can execute commands on the
server (if you are allowed to) by clicking hit "Launch command" Button, but beware that you
cannot interact with the program. If the execution time of the program

J2E 6061. SCREEN CAPTURE, REMOTE MULTICASTING AND INTEGRATION SYSTEM
            USING MEDIA TRACKING, BUFFERING & GEOMETRIC CONCEPTS

The main objective of this project is to capture the current viewing screen and to multicast the
image to different remote system that is the networking System.

FOLLOWING ARE THE MODULES

       SCREEN CAPTURE

        This module capture the current viewing screen using the concept of media tracking,
        buffer and geo metric methods
   IMAGE CANVAS

        This module creates image file from captured screen and multicast the different
        networking system based on the concept of socket programming and buffered image.

       TEST MODULE

          This module implements integration framework based on captured screen module


J2E 6062. HIERARCHY DETECTION AND MANIPULATION SYSTEM

A program's object model captures the essence of its design. It is a graph that represents the
objects in the program and the relationships between them. For some programs, no object
model was developed during design; for others, an object model exists but may be out-of-
sync with the code. In maintenance of a project, an object model is invaluable; it is hard to
make any progress fixing or reworking a program without an understanding of what objects
exist and how they are related to one another.

The aim of this project is to automatically generates an object model for a given Java
application.. This project performs a lightweight analysis of the bytecodes in the given Java
class files and constructs the object model and displays it to the user. It displays the object
model in the form of a graph, which is easily understood by the user.

J2E 6063. SECURED DATA COMMUNICATION BY ENCODING AND DECODING OF
         DATA IN J2ME MOBILE TOOLKIT

The objective of this project is to send a private (encrypted) SMS between two users to avoid
hacking of data while transferring. Here the client and the server application will be installed in
two different users mobiles.

The client server application will be having two modules that is Encoding and Decoding

    Encoding is used for encrypting the SMS and Decoding is used for decryption
    Encoding: original data will be converted into image format
Decoding: image format data will be converted into original data.

J2E 6064. DEVELOPMENT OF WEB ENABLED ONLINE, DYNAMIC ATM CARD
MANAGEMENT SYSTEM

        ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cards
to the bank customers. TO avail the ATM (automatic teller machine) services a customer has
to possess a valid ATM card.
         This project concentrate how to get a ATM card and how it works. A customer has to
apply for the ATM card. His application is registered first and then processed. The card is sent
to the database and check if the number is present. If it is present, check the amount. It is
sufficient then reduces the amount how much he purchase/ want from the database. Or
otherwise it print the error message. Once processing is over, the customer's application is
genuine, and then ATM card is issued to the customer. There on the customer can perform
anytime anywhere transactions on his accounts with the help ATM card by means of various
ATM kiosks available in public places or through the internet.



J2E 6065. IMPLEMENTATION OF 3DES, 168 BIT STRONG
ENCRYPTION ALGORITHM IN MOBILE PHONES
The Mobile Safe Manager application enables users that require to save sensitive information
such as Credit Card, Bank Account Computer Login and General details to store such details
in encrypted form on the phone. All data stored on the phone is protected by 3DESede 168 bit
strong encryption. The key for the user generates this encryption when the application is
installed, so there is not secret key held in the application. Only you, the user know the key
that will unlock your data.
New mobile phones can do more than just provide communications, they have the ability to
run downloadable programs and even store data. This Project We have developed Mobile
Safe Manager to take advantage of these new mobile phones.
If the Mobile is lost with the application running, all about the private information is available
With mobile Safe after a 2 minute of inactivity period, the screen is locked automatically and
the user has to re-enter the password to log inside again.

J2ME 6066. DESIGN AND DEVELOPMENT OF A REMOTE
CITY MAPPING SYSTEM

This Project teaches us how to develop a Remote City Mapping. This Guide will help a visitor
to a city to obtain information about places of importance, Bus route, Train Details and
including all related details on a Java-enabled device such as a mobile phone. We can
develop the application using J2ME (Java 2 Micro Edition), to understand the development of
embedded applications for mobile devices, which have limited processing power and memory
.A server contains a database of the cities and the places of interest, along with details about
each place. A user can access this information through a GUI provided on the mobile device
using the API‟s - MIDP (Mobile Information Device Profile).

   General Information Guide
   Boarding Guide
   Recreation Guide
   Tourism Guide
   Transportation Guide
   Industrial Guide
   Institutional Guide




J2E 6067. THREE DIMENSIONAL (3D) GRAPHICS, IMAGE PROCESSING AND TERRAIN
             RENDERING SYSTEM

The objective of this project is Image processing developed in advanced java by Using Java
3D Software. It provides fast way to create 3 Dimensional graphics applications. The Java3D
API is a hierarchy of Java classes which serve as the interface to a sophisticated three-
dimensional

graphics rendering.

The programmer works with high-level constructs for creating and manipulating 3D Geometric
objects
       Textured rendering
       Resolution
       Rotation
       Wire Frame Rendering
J2E 6068. IMPLEMENTATION OF VIRTUAL SIMULATION OF REALTIME ATM

        Now-a-days ATM is widely used by the peoples of all communities. The bank installs
        ATM in every location of a city in order to have a quick and safe withdrawal of the
        money. Before installing the original ATM in a particular location, the transactions,
        operations and efficiency are tested with the help of the ATM Simulator.


ATM Simulator allows banks to view ATM downloads directly from their
desktop PC, exactly as they would appear on a real ATM (NCR, Diebold,
Wincor-Nixdorf etc.). ATM Simulator connects as a virtual ATM into your existing host
system, and behaves in exactly the same way as a real ATM. Through the unique use of ATM
hardware "personalities", any type of ATM can be simulated in this way, avoiding the need for
costly ATM hardware simply to test transactions.ATM Simulator allows banks to automate the
regression testing of their ATM transactions. No longer must bank staff spend time manually
testing transactions on real ATMs, and simulating hardware faults by jamming the ATM
devices. Test scripts can be replayed at any time without the intervention of an operator, and
the results tabulated in a graphical easy-to-read format.

J2E 6069. ROBOT CONTROL FROM MOBILE

The project was developed in J2ME toolkit and servlet using web logic server as web
server. The objective of this project is to control the mechanism of a ROBOT by the human
through his mobile. Here J2ME toolkit will be used to design client application, which can be
executed from any java enabled GPRS mobile.

The client applet which is running the mobile will be interacting with the servlet which is
running in the web server (Web logic) through which the ROBOT which has been connected
with the PC will be controlled based on the users command


J2E 6070. JAVA BASED FIRE ALARMING

The project was developed using java & J2ME, the objective Of this project is to control the
fire within the normal and maximum limits and if it exceeds the limits, then to alert the
authorized person by sending sms from system(PC) to his mobile.



Software Requirement:

     JDK 1.5
     J2ME toolkit
     JSMS API

Hardware Requirement:

     Mobile
     Data cable
     Parallel port


J2E 6071. NETWORK PACKET SNIFFER AND NETWORK ANALYSER
A packet sniffer (also known as a network analyzer or protocol analyzer or, for
particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or
computer hardware that can intercept and log traffic passing over a digital network or part of a
network. As data streams travel back and forth over the network, the sniffer captures each
packet and eventually decodes and analyzes its content according to the appropriate RFC or
other specifications.

          On wired broadcast LANs, depending on the network structure (hub or switch), one
can capture traffic on all or just parts of the traffic from a single machine within the network;
however, there are some methods to avoid traffic narrowing by switches to gain access to
traffic from other systems on the network (e.g. ARP spoofing). For network monitoring
purposes it may also be desirable to monitor all data packets in a LAN by using a network
switch with a so-called monitoring port, whose purpose is to mirror all packets passing
through all ports of the switch.

        On wireless LANs, one can capture traffic on a particular channel.

         On wired broadcast and wireless LANs, in order to capture traffic other than unicast
traffic sent to the machine running the sniffer software, multicast traffic sent to a multicast
group to which that machine is listening, and broadcast traffic, the network adapter being
used to capture the traffic must be put into promiscuous mode; some sniffers support this,
others don't. On wireless LANs, even if the adapter is in promiscuous mode, packets not for
the service set for which the adapter is configured will usually be ignored; in order to see
those packets, the adapter must be put into monitor mode.




J2E 6072. ONLINE JAVA COMPILER AND SECURITY EDITOR

This Project is mainly used to create, compile the java program. The client machine doesn‟t
having the any java compiler. That is client machine doesn‟t having the java development kit.
the client machine having only to connect to the java server. The client machine only write a
java program and to send to server. The server having java compiler. The server create the
new directory and save the client file and then compile java file and generate the error
message .this message is going to send the client .if the java program haven‟t any error
means then server send message to the client ”No Error”.

In this project is also creating the security editor. This editor is performing encryption and
decryption process. The client creates text and save it to the server. The server perform
encrypt the file and save it to the file. The server also perform decrypts the file and save it to
the file. These two processes are doing by means of the security algorithms. In this project
use very famous security algorithms is “RSA Algorithms”.



J2E 6073. LIVE BROADCASTING, MULTICASTING, & UNICASTING OF VIOCE AND
               TEXT ENCRYPTION


The communication module deals with the various aspects involved during a conversation
between the users. The conference module involves with the way of communication between
the various users. The security module provides auto security to both voice and data. The
communication module is further divided into two modules. They are client module and server
module. The client module deals with the various information required for the various clients
to involve in the conferencing. The client module does the validation process on the
information given by the user attached to the server. The server module does the
authentication process on the clients attached for the conferencing. Then those clients who
are recognized are allowed to communicate with each other. The conference module is
further divided into two modules. They are the broadcasting module and unicasting module.
The conference may be in either text format or audio format. The users are free to choose
their requirement. In broadcasting module, the clients are allowed to communicate with each
other, without any restriction to the number of clients attached to the server. In the unicasting
module, any two or group members connected to the server can communicate within
themselves. That is messages secured within that group.




                              IEEE PROJECTS ( 2008-2009-2010)




JIEEE01: SECURE MOBILE PAYMENT SYSTEM IN WIRELESS ENVIRONMENT

Mobile payments are payments that are carried out through mobile devices in wireless
environment. Mobile payment is considered as the accelerator of e-commerce and m-
commerce. Currently mobile payments deal with several problems to improve requirements of
m-commerce such as: simplifying the mobile payment processes for consumers, improving
the security of payment, especially the application of digital signing in mobile payment. The
proposed work introduces alternative ways for providing mobile banking services aimed at
J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed
solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and
technical limitations, as well as security consideration. This paper defines the secure mobile
payment system to allow mobile users to conduct mobile transactions over Bluetooth
communications but also supports the related secured transactions between the payment
server and mobile clients. Finally, we have discussed some of the performance parameters
such as: time required to password hack for various character lengths, delay and probability
error rate
JIEEE02: DRUPAL CONTENT MANAGEMENT SYSTEM ON MOBILE PHONE.


By adapting the Drupal system to mobile phones we try to target multiple goals:

• Content management system makes content creation and management of the personal
website of your mobile phone easy.
• Via the additional modules developing personal web sites for a variety of purposes becomes
easier.
• With the creation of APIs that allow Drupal to access data in the core applications of the
mobile phone we can create new website functionality that takes advantage of features
available in the mobile devices.
• Drupal provides a very good test case for the underlying layers of the architecture.

JIEEE03: J2ME AND SMART PHONES AS PLATFORM FOR A BLUE TOOTH BODY
     AREA NETWORK FOR PATIENT-TELEMONITORING

This project deals with problems of utilization of mobile equipment working in the biomedicine
field, particularly telemedicine. The basic idea is to create a system that controls important
information about the state of wheelchair bound person like monitoring of ECG and pulse in
early phases, then other optional values like temperature or oxidation of blood.

Sometimes middle-aged people have a collapse, breakdown or heart attack and must be in
hospitals or health resorts for a long time to regenerate their bodies. The time that they spend
in these institutions, is nonutilisable and very long for them. Possibilities of today physics are
restricted by many of prescripts so patients cannot use some of the newest techniques (like
hyperbaric or arctic chambers), which make it possible to reduce the regeneration time by
weeks or months.

This system consists of several interconnected parts that can communicate among
themselves, so they can approach their function. These parts are measuring sensor, PDA or
embedded device, and server for data processing and evaluation. Beside these, the most
important parts that are worth mentioning are various kinds of accessories, such as

GPRS, WiFi, GSM, Bluetooth or GPS modules. By means of them we can communicate. We
mostly use the fastest technology in signal coverage




JIEEE04: DEVICE INDEPENDENT MOBILE APPLICATION CONTROLLER FOR REMOTE
   ADMINISTRATION OF A SERVER OVER A GPRS LINK USING A J2ME CELLULAR


                                                .
         Unhindered connectivity to a computer & the need of the hour. The ability to connect
to e remote machine and control it will have inflate advantages. J2ME (JAVA 2 Micro Edition)
is a platform created to enhance application development for mobile phones. Using the
platform we have crested an application which can control any desktop computer or a server
by sending the required commands over an HTTP Connection.
         The main aim of the application is to remote & access and control different
applications on a static IP PC by connecting to it over a GPRS link from a J2ME enabled cell
phone. The possible applications are:
         1.) Launching Word pad.
         2.) Shutting down and restarting or logging off from your machine.
         3.) Open & Save WordPad Files into the Remote machines.
JIEEE05: MOBILE BANKING SECURITY USING STEGANOGRAPHY

        Upon development of m-commerce as one of the new branches of e-commerce, m-
banking has emerged as one of the main divisions of m-commerce. As the m-banking was
received very well, it has embarked upon supply of various services based on different
systems and with the aid of various services such as the Short Messaging Service (SMS).
However, in spite of its advantages, m-banking is facing some challenges as well. One of
these challenges is the issue of security of this system.
        This paper presents a method for increasing security of the information requested by
users with the use of steganography method. In this method, instead of direct sending of the
information, it is hidden in a picture by the password and is put on a site. Then the address of
the picture is sent to the user. After receiving the address of the picture through SMS, the
user downloads the picture by a special program. After entering the password, the user can
witness the information extracted from the picture if the password is entered correctly.




JIEEE06:ON-DEMAND VIDEO STREAMING IN MOBILE OPPORTUNISTIC NETWORKS


Providing on-demand video streaming services to large numbers of nodes in mobile wireless
networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a
mobile peer-to-peer video-on-demand application based on ubiquitous WiFi enabled devices
such as smartphones and Ultra Mobile PCs. MOVi poses new challenges in on-demand video
streaming caused by limited
wireless communication range, user mobility and variable user population density. MOVi
addresses these challenges by exploiting the opportunistic mix use of downlink and direct
peer-to-peer communication to significantly improve achievable overall system throughput.
Through simulation and actual implementation, we observed that MOVi is able to increase the
number of supported concurrent users two fold compared with unicast based on-demand
video streaming, as well as reducing video start-up delay by half. Significantly, these
performance improvements can be achieved without increasing power consumption at the
end device. Using MOVi, users not only share and distribute on-demand video such as
YouTube clips for their own performance gain but also for the benefit of the collaborative
group.




JIEEE07:RFID CREDIT CARDS SYSTEM.

           Online shopping using electronic payment scheme has gained a lot of popularity in
recent years. In an electronic payment scheme using normal credit cards there is no way to
genuinely identify owner of the credit card. Credit card fraud is the fastest growing crime all
over the world. Any effort to plug the security hole especially for online payment is considered
worthwhile.


           A contactless smartcard is a smartcard that can communicate with other devices
without any physical connection, using Radio-Frequency Identifier (RFID) technology.
Contactless smartcards are becoming increasingly popular, with applications like credit-cards,
national-ID, passports, and physical access. The security of such applications is clearly
critical. A key feature of RFID-based systems is their very short range: typical systems are
designed to operate at a range of ≈ 10cm.


           RFID enabled credit cards are becoming increasingly popular as contactless credit
cards. We envision a future where RFID credit cards will be used for online shopping. RFID
system has tremendous potential to render electronic payments more secure than normal
credit cards. The word RFID enable credit cards may bring in mixed passion, enthusiasm and
perhaps even rage! This is partly paranoia and partly reality. The reality is that an intruder can
read RFID cards without the user even noticing it. This brings in a zone of discomfort and
leads to paranoia. Certain interactivity should exist to bring back this comfort to the user. This
paper tries to make an effort in that direction. In this paper we propose mobile phone based
architecture for secured electronic payments using RFID credit cards.



JIEEE08:ROBOT TELEPORTATION SYSTEM BASED ON GPRS


In this project we present a strategy for using the cellular network, and specifically the general
Packet Radio Service, to teleoperate a mobile robot. This allows the system user a wider
mobility range and coverage. The system application is developed using Java Programming
Language, implementing two teleoperation methods: predefined sequences and instant
actions.
JIEEE09:ADDRESS AUTOCONFIGURATION AND ROUTE DETERMINATION
MECHANISMS FOR THE MANET ARCHITECTURE OVERCOMING THE MULTI-LINK
SUBNET MODEL

The mobile ad hoc network (MANET) is a wireless network composed of mobile nodes which
can communicate with each other via multiple wireless links. Previously, the MANET has
been considered as a single subnetwork, so all nodes in a MANET are assigned the same
subnet prefix, which is the multi-link subnet model. In order to resolve the multi-link subnet
problem, the modified MANET architecture was proposed in [12]. In this paper, we propose
an address autoconfiguration mechanism and a route establishment mechanism for the
modified MANET architecture. Our proposed mechanism can prevent the performance
degradation caused by broadcasting control messages of a reactive routing protocol such as
the Ad-hoc On-demand Distance Vector (AODV). We evaluate the performance of the
proposed mechanisms by carrying out NS-2 based simulations


JIEEE10:PIDS: A PACKET BASED APPROACH TO NETWORK INTRUSION DETECTION AND PREVENTION

Computer networks are one of those unique gifts of modern science which enriched human
life with the blessing of global connectivity. But as the network advanced, intrusions and
misuses followed. Consequently, network security has come into issue. Now-a-days intrusion
detection systems have become a standard component in security infrastructures. Intrusions
typically start with intruders infiltrating a network through a vulnerable host and after that
approaching for further malicious attacks. The techniques used for intrusion detection have
their particular limitations. Any of the Intrusion Detection Systems proposed so far is not
completely flawless. And practically all of them require some kind of termination in network
connections So, the quest for betterment continues. In this progression, here we present
PIDS: a complete intrusion detection system which reduces most of the problems contained
by the previous systems and it doesn‟t need to terminate any network connections to detect
the intruder. This system generates quick responses against intrusions and stops the intruder
to proceed for further attacks.


JIEEE11: RIMOM: A DYNAMIC MULTISTRATEGY ONTOLOGY ALIGNMENT FRAMEWORK

Ontology alignment identifies semantically matching entities in different ontologies. Various
ontology alignment strategies have been proposed; however, few systems have explored how
to automatically combine multiple strategies to improve the matching effectiveness. This
paper presents a dynamic multistrategy ontology alignment framework, named RiMOM. The
key insight in this framework is that similarity characteristics between ontologies may vary
widely. We propose a systematic approach to quantitatively estimate the similarity
characteristics for each alignment task and propose a strategy selection method to
automatically combine the matching strategies based on two estimated factors. In the
approach, we consider both textual and structural characteristics of ontologies. With RiMOM,
we participated in the 2006 and 2007 campaigns of the Ontology Alignment Evaluation
Initiative (OAEI). Our system is among the top three performers in benchmark data sets.




JIEEE12: MINING OF DEFECT IN SOFTWARE AND DEFECT CORRECTION EFFORT PREDICTION

Much current software defect prediction work focuses on the number of defects remaining in a
software system. In this paper, we present association rule mining based methods to predict
defect associations and defect correction effort. This is to help developers detect software
defects and assist project managers in allocating testing resources more effectively. We
applied the proposed methods to the SEL defect data consisting of more than 200 projects
over more than 15 years. The results show that, for defect association prediction, the
accuracy is very high and the false-negative rate is very low. Likewise, for the defect
correction effort prediction, the accuracy for both defect isolation effort prediction and defect
correction effort prediction are also high. We compared the defect correction effort prediction
method with other types of methods—PART, C4.5, and Naı¨ve Bayes—and show that
accuracy has been improved by at least 23 percent. We also evaluated the impact of support
and confidence levels on prediction accuracy, false negative rate, false-positive rate, and the
number of rules. We found that higher support and confidence levels may not result in higher
prediction accuracy, and a sufficient number of rules is a precondition for high prediction
accuracy.

Más contenido relacionado

Was ist angesagt?

RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCEijcses
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
 
Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Global R & D Services
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )SBGC
 
Ieeepro techno solutions 2014 ieee java project - decreasing impact of sla ...
Ieeepro techno solutions   2014 ieee java project - decreasing impact of sla ...Ieeepro techno solutions   2014 ieee java project - decreasing impact of sla ...
Ieeepro techno solutions 2014 ieee java project - decreasing impact of sla ...hemanthbbc
 
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
Ieeepro techno solutions   2014 ieee java project - deadline based resource p...Ieeepro techno solutions   2014 ieee java project - deadline based resource p...
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...hemanthbbc
 
Page a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationPage a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationPvrtechnologies Nellore
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...birdsking
 

Was ist angesagt? (9)

RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
 
Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)Grds conferences icst and icbelsh (10)
Grds conferences icst and icbelsh (10)
 
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
Ieeepro techno solutions 2014 ieee java project - decreasing impact of sla ...
Ieeepro techno solutions   2014 ieee java project - decreasing impact of sla ...Ieeepro techno solutions   2014 ieee java project - decreasing impact of sla ...
Ieeepro techno solutions 2014 ieee java project - decreasing impact of sla ...
 
Continuous query processing for mobile users
Continuous query processing for mobile usersContinuous query processing for mobile users
Continuous query processing for mobile users
 
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
Ieeepro techno solutions   2014 ieee java project - deadline based resource p...Ieeepro techno solutions   2014 ieee java project - deadline based resource p...
Ieeepro techno solutions 2014 ieee java project - deadline based resource p...
 
Page a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computationPage a partition aware engine for parallel graph computation
Page a partition aware engine for parallel graph computation
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
 

Andere mochten auch

Ieee 2012 titles for embedded
Ieee 2012 titles for embeddedIeee 2012 titles for embedded
Ieee 2012 titles for embeddedSoundar Msr
 
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles  IEEE 2012 Software Project...Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles  IEEE 2012 Software Project...
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...John Britto
 
Google Glass Seminar Report
Google Glass  Seminar ReportGoogle Glass  Seminar Report
Google Glass Seminar ReportHit Esh
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Project glass ppt
Project glass  pptProject glass  ppt
Project glass pptBopanna P M
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTVikas Kumar
 

Andere mochten auch (11)

Ieee 2012 titles for embedded
Ieee 2012 titles for embeddedIeee 2012 titles for embedded
Ieee 2012 titles for embedded
 
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles  IEEE 2012 Software Project...Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles  IEEE 2012 Software Project...
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...
 
Google Glass Seminar Report
Google Glass  Seminar ReportGoogle Glass  Seminar Report
Google Glass Seminar Report
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Project glass ppt
Project glass  pptProject glass  ppt
Project glass ppt
 
Google glass
Google glassGoogle glass
Google glass
 
Ppt Smart Card
Ppt Smart CardPpt Smart Card
Ppt Smart Card
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
Smart card ppt
Smart card pptSmart card ppt
Smart card ppt
 
Smart card
Smart cardSmart card
Smart card
 
Google glass ppt
Google glass pptGoogle glass ppt
Google glass ppt
 

Ähnlich wie Mca & diplamo java titles

4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennaincct
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)ncct
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domainsncct
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domainsncct
 
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...ncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Projectncct
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projectsncct
 
Java Projects Ieee Projects
Java Projects Ieee ProjectsJava Projects Ieee Projects
Java Projects Ieee Projectsncct
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projectsncct
 
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Software Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct ChenaiSoftware Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct Chenaincct
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncctncct
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnetredpel dot com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 

Ähnlich wie Mca & diplamo java titles (20)

4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domains
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domains
 
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Project
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projects
 
Java Projects Ieee Projects
Java Projects Ieee ProjectsJava Projects Ieee Projects
Java Projects Ieee Projects
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projects
 
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
College Projects, Be Projects, B Tech Projects, Me Projects, M Tech Projects,...
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Software Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct ChenaiSoftware Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct Chenai
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncct
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 

Mehr von Soundar Msr

Robotics titles for 2012
Robotics  titles for 2012Robotics  titles for 2012
Robotics titles for 2012Soundar Msr
 
Power electronics tiltle for 2012
Power electronics tiltle for 2012Power electronics tiltle for 2012
Power electronics tiltle for 2012Soundar Msr
 
Mini project tittles
Mini project tittlesMini project tittles
Mini project tittlesSoundar Msr
 
Mca & diplamo .net titles
Mca & diplamo .net titlesMca & diplamo .net titles
Mca & diplamo .net titlesSoundar Msr
 
Mba tiltle for 2012
Mba tiltle for 2012Mba tiltle for 2012
Mba tiltle for 2012Soundar Msr
 
Java titles 2012 c
Java titles 2012 cJava titles 2012 c
Java titles 2012 cSoundar Msr
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsiSoundar Msr
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlabSoundar Msr
 
Ieee 2012 titles for java & .net
Ieee 2012 titles for java & .netIeee 2012 titles for java & .net
Ieee 2012 titles for java & .netSoundar Msr
 
Final ieee 2012 embedded list
Final ieee 2012 embedded listFinal ieee 2012 embedded list
Final ieee 2012 embedded listSoundar Msr
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 cSoundar Msr
 
Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Soundar Msr
 
Civil tiltle for 2012
Civil tiltle for 2012Civil tiltle for 2012
Civil tiltle for 2012Soundar Msr
 
Automobile and hydraullic and pneumatic titles for 2012
Automobile and hydraullic and pneumatic  titles for 2012Automobile and hydraullic and pneumatic  titles for 2012
Automobile and hydraullic and pneumatic titles for 2012Soundar Msr
 
Android titles 2012 c
Android  titles 2012 cAndroid  titles 2012 c
Android titles 2012 cSoundar Msr
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsiSoundar Msr
 

Mehr von Soundar Msr (20)

Robotics titles for 2012
Robotics  titles for 2012Robotics  titles for 2012
Robotics titles for 2012
 
Power electronics tiltle for 2012
Power electronics tiltle for 2012Power electronics tiltle for 2012
Power electronics tiltle for 2012
 
Ns2 titles
Ns2 titlesNs2 titles
Ns2 titles
 
Mini project tittles
Mini project tittlesMini project tittles
Mini project tittles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca & diplamo .net titles
Mca & diplamo .net titlesMca & diplamo .net titles
Mca & diplamo .net titles
 
Mba tiltle for 2012
Mba tiltle for 2012Mba tiltle for 2012
Mba tiltle for 2012
 
Matlab titles
Matlab titlesMatlab titles
Matlab titles
 
Java titles 2012 c
Java titles 2012 cJava titles 2012 c
Java titles 2012 c
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsi
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlab
 
Ieee 2012 titles for java & .net
Ieee 2012 titles for java & .netIeee 2012 titles for java & .net
Ieee 2012 titles for java & .net
 
Hard wares
Hard waresHard wares
Hard wares
 
Final ieee 2012 embedded list
Final ieee 2012 embedded listFinal ieee 2012 embedded list
Final ieee 2012 embedded list
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012
 
Civil tiltle for 2012
Civil tiltle for 2012Civil tiltle for 2012
Civil tiltle for 2012
 
Automobile and hydraullic and pneumatic titles for 2012
Automobile and hydraullic and pneumatic  titles for 2012Automobile and hydraullic and pneumatic  titles for 2012
Automobile and hydraullic and pneumatic titles for 2012
 
Android titles 2012 c
Android  titles 2012 cAndroid  titles 2012 c
Android titles 2012 c
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsi
 

Mca & diplamo java titles

  • 1. JAVA / J2EE / J2ME PROJECTS LIST J2E 6001. IMPACT OF ADAPTIVE RESOURCE ALLOCATION IN UTILITY CLUSTER COMPUTING ENVIRONMENTS Maximizing resource provider profit and satisfying user requirements at the same time is a challenging problem in utility computing environments. In this paper, we intro- duce adaptive resource allocation requests and investigate the impact of using them in utility cluster computing environments. The Service Level Agreements established between users and resource providers rely not only on fixed values, but also on functions that associate allocation parameters. In addition, the resource provider scheduler can automatically modify the number of resources and usage time of allocation requests, as well as split them into sub requests. Users may receive incentives for supplying flexible requests which produce more scheduling options. By using rescheduling, resource providers are able to prioritize the most profitable requests dynamically and still satisfy the requirements of the already accepted user requests. From our experimental results we observed an increase of 14% in the resource provider profit and a reduction of 20% in the average response time of user requests when compared to traditional approaches. J2E 6002. RANK AGGREGATION FOR AUTOMATIC SCHEMA MATCHING Schema matching is a basic operation of data integration and several tools for automating it have been proposed and evaluated in the database community. Research in this area reveals that there is no single schema matcher that is guaranteed to succeed in finding a good mapping for all possible domains, and thus an ensemble of schema matchers should be considered. In this paper we introduce schema meta-matching, a general framework for composing an arbitrary ensemble of schema matchers, and generating a list of best-ranked schema mappings. Informally, schema meta-matching stands for computing a “consensus” ranking of alternative mappings between two schemata, given the “individual” graded rankings provided by several schema matchers. We introduce several algorithms for this problem, varying from adaptations of some standard techniques for general quantitative rank aggregation to novel techniques specific to the problem of schema matching, and to combinations of both. We provide a formal analysis of the applicability and relative performance of these algorithms, and evaluate them empirically on a set of real-world schemata. J2E 6003. AUTOMATIC FUZZY ONTOLOGY GENERATION FOR SEMANTIC WEB Ontology is an effective conceptualism commonly used for the Semantic Web. Fuzzy logic can be incorporated to ontology to represent uncertainty information. Typically, fuzzy ontology is generated from a predefined concept hierarchy. However, to construct a concept hierarchy for a certain domain can be a difficult and tedious task. To tackle this problem, this paper proposes the FOGA (Fuzzy Ontology Generation framework) for automatic generation of fuzzy ontology on uncertainty information. The FOGA framework comprises the following components: Fuzzy Formal Concept Analysis, Concept Hierarchy Generation, and Fuzzy Ontology Generation. We also discuss approximating reasoning for incremental enrichment of the ontology with new upcoming data. Finally, a fuzzy-based technique for integrating other attributes of database to the ontology is proposed. J2E 6004. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS While in-network data fusion can reduce data redundancy and, hence, curtail network load, the fusion process itself may introduce significant energy consumption for emerging wireless sensor networks with vectorial data and/or security requirements. Therefore, fusion-driven routing protocols for sensor networks cannot optimize over communication cost only—fusion cost must also be accounted for. In our prior work [2], while a randomized algorithm termed
  • 2. MFST is devised toward this end, it assumes that fusion shall be performed at any intersection node whenever data streams encounter. In this paper, we design a novel routing algorithm, called Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering. Not only does AFST jointly optimize over the costs for both data transmission and fusion, but also AFST evaluates the benefit and cost of data fusion along information routes and adaptively adjusts whether fusion shall be performed at a particular node. Analytically and experimentally, we show that AFST achieves better performance than existing algorithms, including SLT, SPT, and MFST. J2E 6005. WIRELESS MAC PROTOCOL USING IMPLICIT PIPELINING Abstract: In distributed multiple access control protocols, two categories of overhead are usually associated with contention resolution. One is channel idle overhead, where all contending stations are waiting to transmit. Another is collision overhead, which occurs when multiple contending stations attempt to transmit simultaneously. Either idle overhead or collision overhead being large, contention resolution algorithm would be inefficient. Prior research work tries to minimize both the idle and the collision overheads using various methods. In this paper, we propose to apply “pipelining” techniques to the design of multiple access control protocol so that channel idle overhead could be (partially) hidden and the collision overhead could be reduced. While the concept of pipelined scheduling can be applied to various MAC protocol designs in general, in this paper, we focus on its application to IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage contention resolution MAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of contention resolution degrades dramatically with the increasing load due to high probability of collision. Using the implicit pipelining technique, DSCR hides the majority of channel idle time and reduces the collision probability, hence, improves channel utilization, average access delay, and access energy cost over 802.11 significantly both in wireless LANs and in multihop networks. The simulation results, as well as some analysis, are presented to demonstrate the effectiveness of DSCR. J2E 6006. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL The goal of our project is to proactively disseminating the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is key to the adaptation of on-demand routing protocols to mobility. J2E 6007. ON SELFISH ROUTING IN INTERNET-LIKE ENVIRONMENT A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing decisions are no longer based on system-wide criteria but are instead designed to optimize host-based or overlay-based metrics. A series of theoretical results showing that selfish routing can result in suboptimal system behavior have cast doubts on this approach. In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations. We show that in contrast to theoretical worst cases, selfish routing achieves close to optimal average latency in such environments. However, such performance benefits come at the expense of significantly increased congestion on certain links. Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable. J2E 6008. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER GROUPS
  • 3. We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the group key after every join or leave request, we are going to re key for a batch of join and leave operations. J2E 6009. TCP-LP: LOW-PRIORITY SERVICE VIA END-POINT CONGESTION CONTROL Service prioritization among different traffic classes is an important goal for the Internet. Conventional approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide “better-than-best-effort” service. We explore the opposite approach, and devise a new distributed algorithm to realize a low- priority service (as compared to the existing best effort)from the network endpoints. To this end, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilize only the excess network bandwidth as compared to the “fair share” of bandwidth as targeted by TCP. The key mechanisms unique to TCP-LP congestion control are the use of one-way packet delays for early congestion indications and a TCP-transparent congestion avoidance policy. J2E 6010. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT GENERATION MOBILE NETWORKS The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile users in future mobile networks may introduce very large centralized databases. J2E 6011. SHORTEST PATH FINDING USING GPS BASED NAVIGATION SYSTEM IN CRITICAL SITUATION In this Project we propose a system which would be very useful for the Patients who have Critical Heart Attacks and their Condition could be informed to the nearest Hospital, so as to save the life of the Patient. Here in this project if the patient gets Heart attack, h/she has to give a input to the GPS system, so that GPS is get activated, this immediately transmits the Longitude and Latitude Values to the Central Station or the Server where all the Longitude and Latitude Values of Hospital would be maintained. Here in the Central Server the data is getting processed and it could able to find the Nearest Hospital to the Patient‟s House and the Server sends the message to the Nearest Hospital. Nearest Hospital will get the data and immediately the Ambulance is send to the Patient‟s House, so as to save the Human Life. J2E 6012. NETWORK INTRUSION DETECTION Network intrusion detection has generally been dealt with using sophisticated software and statistical analysis tools. However, occasionally network intrusion detection must be performed manually by administrators, either by detecting the intruders in real-time or by revising network logs, making this a tedious and time-consuming labor. To support this, intrusion detection analysis has been carried out using visual, auditory or tactile sensory information in computer interfaces. However, little is known about how to best integrate the sensory channels for analyzing intrusion detection. We propose a multimodal human-computer interface to analyze malicious attacks during forensic examination of network logs.
  • 4. J2E 6013.HONEY POTS – A SECURITY SYSTEM TO IDENTIFY BLACK HAT COMMUNITY IN THE NETWORKS With a majority of Internet service subscribers changing over from conventional dial up connections to faster and cheaper T1, Cable, ISDNS, DSL, it yields new problems for the existing subscriber base that contain majority of novice users in terms of Internet Security. Today‟s Internet security is restricted to personal and network firewalls installed either on the host‟s computer or a network gateway or a router. A Honey pot is a comprehensive security system, which attracts hackers to attack them thereby finding out the types of attacks and black hat community motives. A Honey pot is a security resource whose value lies in being probed, attacked, or compromised. The key point with this definition is honey pots are not limited to solving only one problem. They have a number of different applications. To better understand the value of honey pots, we can break them down into two different categories:  Production  Research Production honey pots are used to protect your network. They directly help secure your organization. Research honey pots are different; they are used to collect information. That information can then be used for a variety of purposes, such as early warning and prediction, intelligence gathering, or law enforcement. Honey pots can be made more efficient by simulating some services, which will lure the attackers in to the trap. J2E 6014.INTERANET TRANSFERMATION OF VOICE WITH DATA USING VOICE OVER INTERNET PROTOCOL(VOIP) Voice over IP (VOIP) is new technology that allows the passing of speech information over IP data networks. In contrast to common traditional telecommunications, which moves voice traffic over the special Public Switched Telephone Network (PSTN), VOIP technology means that the voice shares the same network with the data in a true voice−data convergence. VOIP has all the well publicized advantages inherent in having a unified data network infrastructure to manage all communications needs. Care must be taken, however to ensure that the voice quality is preserved when a data network is used to pass voice information. Traditionally, voice and data networks have been supported by two separated infrastructures. The voice transport over IP (VOIP) offers service providers the advantage of integrating their networks into a single infrastructure. The substitution of traditional voice networks by VOIP will depend on the capability to offer to the end user a similar quality. From a practical standpoint it makes no sense to transmit digitized voice samples that contain only a period of silence. Packets containing period of silence add to network traffic and can adversely affect the transmission and delivery of other packets carrying digitized voice samples from the same or different callers. The bandwidth is not effectively used due to the transmission of unnecessary silence packets across the networks. Hence, the Quality of Service is affected due wastage of bandwidth.
  • 5. J2E 6015. GPS BASED VEHICLE LOCATION TRACKING SYSTEM Vehicle tracking using GPS (Global Positioning System) is fully integrated into the VTS (Vehicle Tracking System). GPS was developed by the U.S. military to enable accurate navigation. 24 satellites have been placed in orbit some 20.000 km from the earth's centre. The vehicle to be tracked is fitted with a GPS receiver and a small antenna. GPS satellites are continuously transmitting a radio message containing information including when the data was sent, which satellite sent it and the current reliability of the system. The GPS receiver fitted in the vehicle receives information from at least 4 satellites and carries out the necessary calculations to determine its current position. The vehicle tracking device VTU is the total security protection and fleet management solution. By using the latest GPS and GSM technology to protect and monitor your car, truck, bike, boat (or moveable asset) virtually anywhere and then locate it to within a few meters. The device incorporates a covertly installed module (which works and communicates independently) but has the ability to run in conjunction with your local GSM network (DTMF, voice message, SMS, GPRS or GSM modem call). The external data processing of data and communication are done using ATMEL AT89c51 OR ARM ARM7TDMI-S (T.M) core logic 32bit controller as per the choice. Anyway both of these projects can also be integrated to PC using java background via RS232 communication or can be displayed on a local 2 X 16 LCD panel. For mapping on Google Earth. J2E 6016. SIP - COMMUNICATOR BASED TELE- CONFERENCING SYSTEM A teleconferencing project has been implemented in java1.5, sip alpha and Asterisk server1.4 server provides the customer care and the call centers for secured way for telemarketing in real-time environment (salesman of the company contacts customer for product sales or customer contacts salesman for queries about the product) this project featured with Music On hold, Voice Recording, and Authentication through DTMF technology. Session initiation protocol integration involves registering services to the Locating Service either within LAN network or using proxy server. J2E 6017. ONLINE LIVE SECURITY SYSTEM USING MEDIA CONVERGING & MOTION DETECTION TECHNIQUE During nighttime, the possibility of theft is more. Hence, a camera is switched on. If it finds any movement on the pointed place, it immediately sends the mail and give the Beep sound to the Security guard on alert. Else if motion is detected, it alerts everybody on Security Guard. Unless and otherwise, security guard switch of the camera and System, the process goes on. J2E 6018. LOCATION AIDED ROUTING (LAR) PROTOCOL BASED ROUTE IDENTIFICATION, MAINTENANCE DATA TRANSFER IN AD-HOC NETWORKS Ad Hoc Network (MANET) process consists of two nodes. Because of the limited range of communication of a wireless host, it is necessary to perform multi hopping. Routing protocol is used to find routes along which multi-hoping will be performed. Location Aided Routing (LAR) protocol is one which utilizes the location information of a node to limit the search. Location Aided Routing is an on-demand routing protocol in which the routes are found only when required. Route Discovery: Identifies and establishes route between hosts. In LAR, restrictive flooding of control packets is done to discover the route. Route Maintenance: Supervises the data transfer between the two nodes. If any error occurs during data transfer, necessary steps are executed to continue transfer of data.
  • 6. By Implementing the LAR algorithms, we have further reduced the flooding region and eliminated looping problems. J2E 6019. RFID BASED HOSPITAL MANAGEMENT SYSTEM RFID based access card used by the hospital employee , project has been implemented to maintain the hospital details in an centralized database using MySql5.0 as the backend where the employee could able to manage the hospital details using the front end tool which has been designed using java1.5 .Employee Authentication done through RFID based access card, integrated with the RFID card reader. J2E 6020. NETWORK LOAD BALANCING AND REDISTRIBUTION OF THE TRAFFIC OVER THE NETWORKS USING GRID COMPUTING SYSTEM In a Network Grid computing enhances the scalability and availability of mission-critical, TCP/IP-based services, such as Web, Terminal Services, virtual private networking, and streaming media servers. This component runs within cluster hosts as part of a operating system and requires no dedicated hardware support. To scale performance, Network Traffic Analyzer distributes IP traffic across multiple cluster hosts. It also ensures high availability by detecting host failures and automatically redistributing traffic to the surviving hosts. Network Traffic Analyzer provides remote controllability and supports rolling upgrades from a operating system. The unique and fully distributed architecture of Network Clustering enables it to deliver very high performance and failover protection, especially in comparison with dispatcher-based load balancers. This project describes the key features of this technology and explores its internal architecture and performance characteristics in detail. The unique and fully distributed software architecture of Network Traffic Analyzer enables it to deliver the industry's best load balancing performance and availability. J2E 6021. MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT “Video Streaming” is an application designed to transfer the stored video images from one node to another. The application allows the mobile user to see video file with the intranet networks with which server (J2EE SERVER) running on the other machine. Video Streaming gives the user high quality images with much less (General Packet Radio Service) GPRS or Universal Mobile Telecommunication System (UMTS) traffic, so the communication with the intranet. ADVANTAGES 1. Video Streaming captures the Video file from the server to the client mobile. 2. Here the images are transferred byte-by-byte mode. 3. The server will store the images accordingly to the user and each image will be captured and each image will be transmitted to the mobile. J2E 6022. NETWORK CONGESTION AVOIDANCE USING NETWORK BORDER PATROL (NBP) The end-to-end nature of congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications, which are unresponsive to network congestion. In this project, we propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP). NBP is a core- stateless congestion avoidance mechanism and Parallel downloading is a technique to improve the performance of transferring large files. It assumes that many nodes (servers) in
  • 7. the network have the requested file. A node (client) that wants to get that file can connect to some or all of the servers in parallel and download different parts of the file from each of them. The aggregate transfer rate that the client observes is the sum of the transfer rates on the paths from each of the servers to the client. In order for the aggregate transfer rate to be higher that the maximum transfer rate which can be obtained by connecting to only one server. J2E 6023. JAVA-BASED HOME AUTOMATION SYSTEM This project is aimed to control devices by achieving Java based Home automation. Here we use Java application (J2ME) in PC, AT89c51, parallel port and Load Driving Circuit. Here the user can give the control command for a particular device through Java mobile application (J2ME) in PC, which is then transmitted through parallel port. In the receiving end the microcontroller receives the device command and recognizes the command and controls the corresponding device through the Load driving circuit. The load driving circuit consists of a Darlington pair IC for current amplification and relays, which are used to switch the devices ON/OFF. J2E 6024. GSM BASED REMOTE BIO- MEDICAL INVETIGATION With the J2ME as back end, the project is used to send SMS and monitor the status of a person. Such as heart beat and temperature and informs it to the mobile number specified; the heart of the chip is the at89c52 controller and java back end. The heart rate detector unit and the temperature sensor unit is fitted to the patient and the data output is fed to the microcontroller via the analog to digital converter the data from the adc is in 8 bit format, it is then processed by the microcontroller and whenever the safe ranges is violated the controller produces a alarm, and visual display, as well as initiates the pc to send the SMS to a specified mobile number using a mobile phone which is interfaced with the pc. J2E 6025. AUTENTICATION OF DIGITAL IMAGES BY ENCYPTION AND DECRYPTION WITH PRIMARY KEY IMPELMENTATION USING LSB ALGORITHM AND STEGANOGRAPHY This Project is to provide the security for images by using key concepts. This project uses the LSB algorithm for data hiding and data extraction. There is a growing importance of steganography in intelligence work, as it is viewed as a serious threat to some governments. In future we would like to implement steganography using audio and video files. A major advantage of the LSB algorithm is it is quick and easy. There has also been steganography software developed which work around LSB color alterations via palette manipulation. LSB insertion also works well with gray-scale images. The project that is implemented deals with digital images acting as a cover medium to store secret data in such a manner that becomes undetectable. Hence it provides a very high means of security without suspicion J2E 6026. RFID BASED TRAIN SPEED AND TIME MONITORING The project uses the RFID readers and tags, the tag is fitted on the train engine, each train carries its own identified tag, and the readers are fitted in each side on level crossing with a clearance of 3 km from the level crossing. The reads the tag id once the train nears the level crossing and passes to the microcontroller, the microcontroller in turn notes the id and displays the train name, and also closes the gate, and at once the train crosses the other end the reader reads the tag and feeds it the microcontroller, the microcontroller in turn opens the gate. The microcontroller can also be programmed to send the Rfid data to the system, so that with the java backend we maintain the database, time of crossing and speed of the train. J2E 6027. ENHANCING THE QUALITY OF SERVICE IN VOIP  Supporting dedicated bandwidth
  • 8. Improving loss characteristics  Avoiding and managing network congestion  Shaping network traffic  Setting traffic priorities across the network QoS usually refers to the fidelity of the transmitted voice and facsimile documents, it can also be applied to network availability (call capacity or level of all blocking), telephone feature availability (conferencing, calling number display), and scalability(any-to-any, universal and expandable). The common part in the two modules is the requirement of „Sound Recorder and Player‟ for recording the voice and playing back the voice to user. The connection is to be established between the users for transmission of voice across the network. For establishing connection, the existing TCP/IP protocol is to be used in the LOCAL AREA NETWORK. Quality of Service for Voice over IP discusses various QoS concepts and features that are applicable to VoIP.  It must include silence tag to generate silence at the receiver‟s end.  The quality of service is enhanced by utilizing the available bandwidth.  In another Technique, text data is inserted in the place of the silence.  The text is extracted from the voice. J2E 6028. AUDIO CONFERENCE THROUGH SPEEX AND ILBC CODEC Speex / ILBC codec are one of the solutions to the problem study done on the latency, delay and bandwidth, audio quality of java media framework. speex / ilbc codec meant for encoding and decoding audio data through RTP protocol , where usage of speex / ilbc codec improves better voice quality when compare to ulaw,alaw and gsm codec presents in existing java media framework. J2E 6029. MOBILE AGENT BASED STORING AND RETRIEVAL OF MULTIMEDIA FILES FROM THE DISTRIBUTED MULTIMEDIA DATABASE This project mobile agent are used to store and retrieve a multimedia data from the distributed multimedia database using mobile agents based on host database provide the result to the user upon request. This project uses the mobile agents effectively to retrieve multimedia database at a faster rate and at lower bandwidth using agents in a distributed environment. One of the paradigms that have been suggested for allowing efficient access to remote resources is a transportable agent. A transportable agent is a named program that can migrate from machine to machine in a heterogeneous network. The program chooses when and where to migrate. It can suspend its execution at an arbitrary point, transport to another machine and resume execution on the new machine. Transportable agents have several advantages over the traditional client/server model. Transportable agents consume less network bandwidth and do not require a connection between communicating machines - this is attractive in all networks and particularly attractive in wireless networks. J2E 6030. MOBILE BASED REMOTE NETWORK MONITORING AND CONTOL SYSTEM USING HTTP TUNNELING, RMI & SOCKET
  • 9. The Objective of this project is to monitor the client machines, which are all present in the network (LAN, WAN, MAN) through user mobile from any remote location. The main technologies used in this project was HTTP tunneling, RMI, Socket connection. Here user could see the client list which are all connected to the online server through his mobile, the mobile user can create a text file and it can be stored into the PC (client machine) by selecting client name from client list. Administrator (mobile user) can view the content of the text file, which is residing in the client machine from his mobile. He can explore the drive list, directory list and file list from his mobile. Here the mobile user can compile a error free java file which is residing in the pc or he can execute the compiled file from his mobile. Administrator can broadcast or unicast messages to his client‟s from his mobile or he can chat with the client by selecting the client name from the client list. J2E 6031. REMOTE PACKET CAPTURE, EPHEMERAL PORT ANALYSIS, DATA MONITORING IN THE NETWORKS The success of the Internet has brought networking in each and every day new applications and technologies that are created. In this scenario, the power and complexity of computer networks are growing every day. Thus, network and system security has become an increasingly important issue during the past few years. Security specialists can use a port scanner to check whether people on the network are running software they should not be, making sure that servers are appropriately sealed off and many other things. The knowledge of which ports are open on a system gives an administrator a general idea of the services a system is running. Remote Ephemeral Port Analysis is a piece of software that runs on a distributed system and allows us to analyze the status of the software ports on a remote machine. That is, it determines whether each of the ports is open or not on a host (IP address). Ports that are open on a host represent services, servers, and sometimes Internet applications. Different ports are used for different protocols. This software provides user authentication, so that only the authenticated users can use the software. The users are added, deleted and edited only by the administrator. The software also has the ability to find all the computers currently connected on the network. This software also determines the amount of information transferred across the network. Apart from port status analysis, a very important feature added to this software is the packet capture mechanism. This utility seizes information from each packet transferred across a network and determines several conclusions related to network security and network administration. J2E 6032. SECURITY COMMUNICATION FOR GSM NETWORK USING KERBEROS V5 PROTOCOL Today more then ever, secure communication is a must. Most companies now user network infrastructure to conduct their business, whether internally( intranet model or externally to reach partners or customers (extranet/Internet models). While it is utopian to consider today‟s networks as being safe, there are solutions to make them more secure and use them with a bit of trust. The key aspects to securing communications over a distributed environment are authentication, integrity, confidentiality and authorization. Kerberos is a network protocol that addresses the authentication part. This application aims at using Kerberos V5 to secure the communication between a J2Me MIDlet communicating over the GPRS, and a Banking Transaction Server. This project mainly covers at gaining the initial ticket provided by the authentication server. Authentication server checks its database to authenticate the user. If the username and the password matches it generates and initial ticket by which we can obtain many service tickets to access the services provided by the banking transaction server.
  • 10. J2E 6033. DESIGN OF AN INTELLIGENT AGENT FOR NETWORK FAULT DETECTION As the Internet becomes a critical component of our society, a key challenge is to maintain network availability and reliability. The increasing number of networks is making downtime more costly. Network management tools and techniques must therefore become better at detecting and identifying network faults. Current fault management implementations generally rely on the expertise of a human network manager. As networks become more complex and changes occur more frequently, the human network manager will find it hard to maintain a sufficient level of expertise on a particular network‟s behavior. Fault management research has covered approaches such as expert systems, finite state machines, advanced database techniques, and probabilistic methods. Intelligent agent is one that processes information collected by Simple Network Management Protocol agents and uses it to detect the network anomalies that typically precede a fault. The intelligent agent approach has several benefits. It can detect unknown faults and correlate information in space and time. Also it is possible to make an Intelligent Agent to detect the failure in one of the sub network‟s components even before it can be occur. J2E 6034. FACE RECOGNITION Security and authentication of a person is a crucial part of any industry. There are many techniques used for this purpose. One of them is face recognition. Face recognition is an effective means of authenticating a person. The advantage of this approach is that, it enables us to detect changes in the face pattern of an individual to an appreciable extent. Hence face recognition can be used as a key factor in crime detection mainly to identify criminals. There are several approaches to face recognition of which Principal Component Analysis (PCA) and Neural Networks have been incorporated in our project. The system consists of a database of a set of facial patterns for each individual. The characteristic features called „eigenfaces‟ are extracted from the stored images using which the system is trained for subsequent recognition of new images. MODULES  Training  Testing TRAINING: To train the users face with already present ID in the database TESTING: To authenticate the user with the face recognition algorithm J2E 6035. DATA MIGRATION, TRANSLATION & TRANSFERMATION TO OPTIMIZE THE DATA MANAGEMENT SYSTEM Data Migration is the process of translating data from one format to another. Data migration is necessary when an organization decides to use a new computing system or database management system incompatible with the current system. Typically, data migration is performed by a set of customized programs that transfer the data. By the use of this project, the following data migrations can be processed easily. 1.From SQL Server To Oracle 2.From SQL Server To Access 3.From SQL Server To HTML
  • 11. 4.From Oracle To SQL Server 5.From Oracle To Access 6.From Access To SQL Server 7.From Access To Oracle J2E 6036. SIP-COMMUNICATOR BASED ACTIVE LISTENING AND PASSIVE LISTENING An telecom project implemented using java1.5, sip-communicator alpha and Asterisk 1.4 server featured with Active Listening (Manager of an organization chanspy the conversion between the salesman and the customer. And can communicate with the salesman), Passive Listening (Manager of an organization chanspy the conversion between the salesman and the customer) which is a secured way of communication with the implementation of sip protocol. J2EE 6037. RFID BASED ATM MACHINE TRANSACTION AND PROCESS SYSTEM Integrated with RFID reader for authenticating the customer using RFID based access card where the RFID ID has been read through serial port using java technology and the front end design has been done using jdk1.5 , customer details has been uploaded into MS-Access database, After authentication customer can view his/her Balance Enquiry, Fund Transfer and Mini Statement. J2E 6038. MULTIPLE MAIL ACCOUNTS COLLABORATION MANAGER Nowadays, web users have multiple email accounts. But individual authentication is essential for accessing each account, which is time-consuming. Currently, no integrated system exists for individuals to manage multiple email accounts. Our solution provides a common, uniform API for managing various email accounts using the Java programming language .It allows users to access mails from various accounts by logging in once. All the registered mail accounts of the user will be displayed as hyperlinks. Clicking on each link will lead the user to a new page where he can check for new mails, reply for a mail, forward a mail, compose mails and delete mails. In this way, this solution saves time in authenticating multiple accounts by providing a single authentication for all the registered mail accounts and also reduces the burden on the web server. J2E 6039. BANDWIDTH CONGESTION CONTROL USING AND AUTHENTICATION SERVICE FOR AUTOMATIC DYNAMIC RECONFIGURATION SYSTEM In any company, the effective utilization of the available bandwidth is of paramount importance. Every person must use the entire available bandwidth in a satisfactory manner (i.e.) The entire bandwidth must not be locked to some high bandwidth user refraining other users of the company due to traffic congestion. Considering these difficulties, we propose the following solution.  Parting the available bandwidth among the special permission and normal users.  Authentication of the users using Kerberos. In order to avoid the congestion, the normal and the special permission users will be routed through two different paths. Each user will be allocated a username and password, which will be stored in a database. In addition, their access permission details will also be maintained. Based on these details the user is routed either to the FTP server or to the Domain Server dynamically. J2E 6040. REMOTE AND LIVE MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT USABLE FOR TRAFFIC VIEWING & CONTROL SYSTEM
  • 12. This is an Internet Browser application designed to display traffic web cam links. The application allows the user to view traffic images from several sources, cities, countries and continents all over the world, as long as the user subscribes the link packages that he intends to use. This application is particularly meant for traffic police to monitor the city with their mobile from any remote location, where a web cam will be provided at each and every signal location. J2E 6041. INTERNET BASED MACHINE CONTROL SYSTEM The aim of the project is to control the electronic appliances via the internet. Thus thereby enabling the controlling of the devices via all over the world is possible. The project utilizes the Html and Java as the front end, the embedded system as the firmware ends of the project. Thus the project is firmware based. This project allows a person, to control the electronic appliances via the internet. The devices carry a specific codes, which is typed in the explorer address bar is sent to the server. The server reads the data from the html page, with the help of java. And then provides the respective codes for the co running dynamic link library files. The output from the parallel port is fed to the controller for further processing, and the output from controller is fed for relays for controlling of appliances. J2E 6042. EDGE DETECTING, IMAGE QUERYING, MATCHING, & RANKING USING SPATIAL SIMILARITY MATCHING SYSTEM Like traditional databases, an image database (IDB) is a collection of unique images. Each of these images are composed of a set of different objects. However, to improve the overall performance of the search and retrieval process, spatial similarity data modeling and retrieval scheme is used. Similarity-based search reduces the search space to a limited number of matched instances and thus retrieving depends on the nature and measure of similarity specified in the query. Edge detection algorithm is used to detect the outline of the queried image. Image processing is performed by generating a signature for each queried image, comparing it with the database, ranking the retrieved images and then displaying the images. This makes searching much more efficient. J2E 6043. EXTRACTION, RETRIEVAL AND STORAGE OF IMAGES, DATA CONTENTS IN THE INTERNET With this concept we can extract the contents of current on line web page or a web page stored from a hard disk file and we can store it to another file. Web page contents like images, text, paragraphs, etc. Storing all images to .html file and text to .txt file. This project is developed on core java for creating user interface window , creating connections and execution. Modules: Homepage Main module for connecting to the URL and to invoke content extractor or feature extractor modules Content extractor For extracting words in tokenized format and paragraphs and for storing it In a text file Feature extractor For extracting images and storing it in a html file J2E 6044. CROSS PLATFORM INTEGRATION AND GLOBAL EDITOR SYSTEM There are editors for languages such as C, C++, JAVA that exists separately for each. But there is no editor that supports all languages in one. Moreover they take more memory space to run. The editor, which we are designing, supports all languages in one environment. It is a package, which provides user to program the languages such as C, C++, JAVA. Since the
  • 13. editors, which already exist, do not support all languages .we are designing an editor that overcomes this problem. The compilers for all languages are present in the system itself. This editor needs very less memory space to run. The features in this editor are automatically insert header files, insert comment lines, insert closing braced to an opened brace. The other features are shortcut to compiler, auto display of output window, auto help and auto quick insert. We are developing the user interface design using swing concepts in java. The call to respective compilers and interface between user and database is done by means of core java. This system would prove to be friendly to programmer since it reduces the precious coding time as well as giving help to most of the methods syntax so no need to remember large number of methods. J2E 6045. NETWORK ENABLED EMBEDDED CONTROL This project is very much useful and applicable in the college, and office environment. The project utilizes the Java as the front end, The embedded system as the firmware end of the project thus the project is firmware based this project allows a person to control the electronic appliances via the internet. Thereby allowing the access of devices via the local area network with greater flexibility and user friendly The devices carry a specific codes, which is typed in the explorer address bar is sent to the server .the server reads the data from the html page with the help of java, and then provides the respective codes for the co running dynamic link library files, which is designed with the help of vc++ For further communication with parallel port. The output from the parallel port is fed to the controller for further processing, and the output from controller is fed for relays for controlling of appliances. J2E 6046. IMPLEMENTATION OF SECURITY KERNEL AND FIREWALL USING JAVA Internet is a dynamic place and is liable for various forms of attack. It is necessary to guarantee the integrity and safety of the private network connected to it. There are various methods to safeguard our trusted network. One among them is firewall. A firewall separates a private network from a public one, the Internet. It screens and filters all connections coming from the Internet to the private network and vice versa, through a single, concentrated security checkpoint. A firewall makes sure that you cannot reach the Internet from the Internet network, or vice versa, unless you pass through this checkpoint. There are several models and configurations of firewalls out there. But the basic idea behind them is always the same. Our firewall‟s primary security component is the security kernel. The security kernel evaluates each incoming and outgoing network packet traversing the firewall server and enforces security policy against all such packets. J2E 6047. SECURED DATA COMMUNIACTION USING BASE 64 (BSF) ENCODING AND DECODING – FOR IMAGE, TEXT, AUDIO, FILE ETC. The main stay of this project is secured data or information or file Communication. The program provides a User Interface to convert any file type to base64. The base64 conversion is to remove unreadable characters from your file. You can save your base64 code in a separate file and then convert it back to the original format whenever you want. This program provides a complete graphical interface to look like a wizard, which make conversion easy, understandable and manageable with following FEATURES. 1.Image encoding & decoding 2.Text encoding & decoding 3.Audio encoding & decoding 4.File encoding & decoding
  • 14. J2E 6048. WIRELESS VIRTUAL NETWORK COMPUTING WVNC (Wireless Virtual Network Computing) software makes it possible to view and fully- interact with one computer from mobile device anywhere on the Internet. WVNC software is cross-platform, allowing remote control between different types of computer. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software. WVNC has a wide range of applications including system administration, IT support and helpdesks. It can also be used to support the mobile user, both for hot desking within the enterprise and also to provide remote access at home, or on the road. The system allows several connections to the same desktop, providing an invaluable tool for collaborative or shared working in the workplace or classroom. Computer support within the geographically spread family is an ever popular use. J2E 6049. REMOTE DATA CAPTURE , ACQUISITION AND SENDING SMS TO REMOTE MOBILE USING JSMS This project developed to monitor the temperature or humidity of a remote area to notify the users through his mobile. The remote area can be hospital (monitoring patient temperature), here the device which is going to monitor will be connected to the PC through parallel port. The client application was implemented in java and JSMS (java SMS API) used to send SMS to the users mobile. J2E 6050. RFID BASED EMPLOYEE DATABASE MANAGEMENT SYSTEM RFID based access card used by the employer of any type of organization has been implemented using java1.5 and struts1.2,MsAccess where an employee login and the logout time will be monitored with the help of RFID and the pay slip of the employee will be calculated and updated upto date and time, where the Manager of the organization is responsible controlling the Database(Updating and modifying new employee details , monitoring and managing the employee details with the access card reader.). J2E 6051. REMOTE WEBCAM MONITORING SYSTEM “Remote Web Cam” allows users to view their web cam images from any remote location. This project was implemented in java(applet).here users are allowed to select their web cam from remote location to view latest snapshot of the web cam images. The remote application directs web cam to take snapshots in the order of frames these frames will be send to remote user. This application helps administrator to monitor their staff if they are out of station. J2E 6052. IMPLEMENTATION OF CROSS PLATFORM DATABASE ACCESS SYSTEM TO REDUCE SERVER MAINTENANCE & MEMORY COST Traditionally all the databases are stored only in the server node which in turn increases the cost to the server to some extent. In order to avoid this, the new proposed system paves a new way by maintaining the databases not in the server but distributed among the client nodes.
  • 15. If the database resides in the server as the traditional method the cost of the server such as maintenance costs, memory cost, etc. becomes very high which in turn increases the application or the system cost. To avoid such unnecessary cost the new proposed system enhances the maintenance of the databases. Moreover the access time of the data from the database residing in a client machine is very much less when compared to the database residing in the server so the data access time is very much reduced and the performance of the system increases. The database does not reside in the server instead it is distributed locally in the clients and so the RMI and RPC has to be used to access the database present over the remote clients. J2E 6053. LIVE MEDIA STREAMING, CONVERGING AND TRANSMITTING USING REAL TIME PROTOCOL (RTP) Live Media can be transmitted from one computer (System to which Camera is attached) using RTP protocol. The main part is to transmit the media from this system to other system. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task. It allows to stream media containing any number of tracks to a number of different hosts/clients on the network simultaneously. Media can be received from the Server to which the Camera is attached and live images are captured. Sitting in different place, we can view what‟s going on in another place. The main use may be in places where cash transaction is going on. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task. J2E 6054. IMPLEMENTATION OF WIRELESS COMMUNICATION GATEWAY USING INTERNET PROTOCOL Wireless Communication Gateway over IP, details with communication between computer and cell phone using Internet protocol. WCGOIP deals sending a short message from the PC to the intermediate server. Then from the intermediate server it is sent to the Gateway [Simple Wire Server], which has an ip address, which is used by the TCP IP to delivery the message to the Gateway. The Gateway connects the Internet to the cell network. The gateway passes the message sent along with the cell number to the appropriate cell network and waits for the response. The cell network route message to the receiver cell phone and sends the status of the message sent to the gateway. Gateway in urn sends the status of the message sent to the intermediate server. J2E 6055. CRYPTOGRAPHY IMPLEMENTATION OF SECURED DATA TRANSFERMATION Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. Files can be encrypted and the encrypted file can be decrypted using this system via a local network or Internet. This project is implemented by core java, swing, awt.
  • 16. J2E 6056. CROSS PLATFORM INTEGRATION TOOL FOR ACCESS, MONITORING AND CONTROL OF LINUX & WINDOWS THROUGH JAVA When THIS TOOL starts, you should see a split window. In the upper half you'll see your DOS drives, in the lower half you will see your LINUX drives. Your Linux filesystem is set to read only by default. Uncheck menu item 'File - Linux read only' first, if you want to write to your Linux disk. Modifying or deleting is only possible with Ext2 and Ext3 partitions. ReiserFS partitions are always read only. No files or directories can be modified, deleted or created on or copied to a REISERFS Partition. Add another drive  Choose in the Menu 'FILE' the 'Add DOS Drive' or 'Add Linux Drive' menu item or right click in the tree and choose the 'Add Drive ...' menu item of the contextmenu. NOTE: Running CROSS TOOL under Linux, you have to add Linux-drives in this dialog because "ldir -part" of the CROSS TOOL doesn't work under Linux.  Enter a valid disk name in the text field 'Drive' and a valid directory in the text field 'Directory' of the shown dialog.  To find out, which partitions do contain Linux filesystems, click on the 'PARTITIONS' button in the toolbar.  Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and y=1,2,3,..., ReiserFS partitions should be entered as /dev/rdxY (note the "r" instead of "h"!).  ReiserFS partitions are read only. Removing a Drive  Right Click on a Drive in the directory tree and choose the 'Remove Drive' menu item of the contextmenu. Connecting and disconnecting to a remote host (host must be running LREADjav)  To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on the 'CONNECT' button in the toolbar or in the Menu 'File' on 'Remote connect ...'. In the dialog box enter the host name and the portnumber (if lreadjav is not running on standard-port) and click OK.  To disconnect, click on the 'DISCONNECT button' in the toolbar or in the Menu 'File' on 'Remote disconnect'. Using wildcards  If you for example just want to see files with the extension "java" you can set a pattern(*.java) for the DOS and Linux-lists. Choose in the Menu 'File' the item 'DOS Pattern ...' to set the pattern for DOS-files or the item 'Linux Pattern ...' to set the pattern for Linux-files. J2E 6057. TRANSACTION AND RECHARGE OF MOBILE TRHOUGH SMS & ATM SYSTEMS
  • 17. SMS or Short Message Service allows Cellular or Mobile GSM phones to send and receive Text Messages. The use of SMS is a convenient and fast means of communication with cellular telephone and pagers. This can be alphanumeric and more recently graphical. A sent SMS message is stored at an SMS Center (SMSC) until the receiver‟s phone receives it. The receiver can identify the sender by his/her telephone number that is included in the message itself. SMS supports several input mechanisms that allow interconnection with different message sources and destinations including voice-mail systems, Web-based messaging and E-mail integration The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become the base system and a foundation of the complete wireless commerce framework, which will be implemented later by ATech Wireless There are 2 modules: Mobile Recharge The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become the base system and a foundation of the complete wireless commerce framework, which will be implemented later by ATech Wireless Transaction on mobile: Transaction on mobile is used to money between two peoples. this two peoples must be registered in a bank. And they should have mobile transaction. this transaction starts with SMS. if user 1 wants to pay Rs.3000 to User 2 .user 1 simply type SMS to particular Bank with his 4 Digit PIN, Amount and Account No. the request is processed by the bank server and Amount is transferred to designation account. J2E 6058. DESIGN AND DEVELOPMENT OF A NOVEL DISTRIBUTED , SCALABLE FILE SHARING AND ACCESS SYSTEM WITH GUARANTEED SECURITY There has been a huge growth in the use of file sharing software over the last year, making file sharing one of the top uses of the Internet. Napster was the first technology that empowered users with his ability to share files amongst themselves. The demise of Napster led to the development of numerous file sharing technologies, most of which are based on the Gnutella protocol. The problem with all current file-sharing technologies is that none of them can guarantee the security of the shared file. This report describes the design, development and evaluation of a file sharing that proposes a novel solution to the shared file security problem. The system will allow user to share files in a secure manner and comprises of client and server applications. The client allows users to connect to a server and shares their files amongst all other system users. The client also gives users the ability to search for files shared by the other system users, and when a file is found it could be transferred from the other user securely, as the file would be encrypted. The server allows valid users to connect, records their shared file list enables connected users to search this list. The server authenticates connected users by performing a test that only a valid user can respond to in the correct manner. The report outlines research in the area of networking, including technological backgrounds such as distributed file system architectures, cryptographic techniques and network programming methods. The novel feature of the system is the method used to address the security problem inherent to all current file-sharing technologies. The system developed uses cryptographic techniques to implement a framework in which to model system security, including authentication of system users and the files that they share. We can also implement the direct client-to-client communication, so the ideal time of the client must be greatly reduced. Log files are not to be created. This project is highly scalable; it can be applied to WAN. .
  • 18. J2E 6059. ENHANCED MULTIPURPOSE IMAGING APPLICATION BASED ON IMAGE STATISTICS CONCEPTS The main objective of the project is Image processing .the system to reduce the noise in image and provide the graphical user interface to apply the different properties like applying contrast, brightness, threshold level, color balance and to change the property of the image and provide the useful information about the image .the system is developed in java (SWINGS) Platform :OS independent MODULES  Image editing  GUI image  Process  Analyze  Window J2E 6060. REMOTE AND ADVANCED WEB BASED FILE ACCESS AND MANIPULATION SYSTEM This JSP program allows remote web-based file access and manipulation. You can copy, create, move, rename and delete files. Text files can be edited and groups of files and folders can be downloaded as a single zip file that is created on the fly. If you want to copy or move a file, please enter the target directory name in the Edit field (absolute or relative). If you want to create a new file or directory, Enter the name in the edit field. If you click on a header name (e.g. size) the entries will be sorted by this property. If you click two times, they will be sorted descending. The button "Download as zip" let you download the selected directories and files packed as One zip file. The buttons "Delete Files", "Move Files", "Copy Files", delete, move and copy also selected Directories with subdirectories. If you click on a .zip or .jar filename, you will see the entries of the packed file. You can unpack .zip, .jar and .gz direct on the server. For this file type the entry in the Last column is "Unpack". If you click at the "Unpack" link, the file will be unpacked in The current folder. Note, that you can only unpack a file, if no entry of the packed file Already exist in the directory (no overwriting). If you want to unpack this file, you have To delete the files on the server which correspond to the entries. This feature is very useful, If you would like to upload more than one file. Zip the files together on your computer, Then upload the zip file and extract it on the server. You can execute commands on the server (if you are allowed to) by clicking hit "Launch command" Button, but beware that you cannot interact with the program. If the execution time of the program J2E 6061. SCREEN CAPTURE, REMOTE MULTICASTING AND INTEGRATION SYSTEM USING MEDIA TRACKING, BUFFERING & GEOMETRIC CONCEPTS The main objective of this project is to capture the current viewing screen and to multicast the image to different remote system that is the networking System. FOLLOWING ARE THE MODULES  SCREEN CAPTURE This module capture the current viewing screen using the concept of media tracking, buffer and geo metric methods
  • 19. IMAGE CANVAS This module creates image file from captured screen and multicast the different networking system based on the concept of socket programming and buffered image.  TEST MODULE This module implements integration framework based on captured screen module J2E 6062. HIERARCHY DETECTION AND MANIPULATION SYSTEM A program's object model captures the essence of its design. It is a graph that represents the objects in the program and the relationships between them. For some programs, no object model was developed during design; for others, an object model exists but may be out-of- sync with the code. In maintenance of a project, an object model is invaluable; it is hard to make any progress fixing or reworking a program without an understanding of what objects exist and how they are related to one another. The aim of this project is to automatically generates an object model for a given Java application.. This project performs a lightweight analysis of the bytecodes in the given Java class files and constructs the object model and displays it to the user. It displays the object model in the form of a graph, which is easily understood by the user. J2E 6063. SECURED DATA COMMUNICATION BY ENCODING AND DECODING OF DATA IN J2ME MOBILE TOOLKIT The objective of this project is to send a private (encrypted) SMS between two users to avoid hacking of data while transferring. Here the client and the server application will be installed in two different users mobiles. The client server application will be having two modules that is Encoding and Decoding  Encoding is used for encrypting the SMS and Decoding is used for decryption  Encoding: original data will be converted into image format Decoding: image format data will be converted into original data. J2E 6064. DEVELOPMENT OF WEB ENABLED ONLINE, DYNAMIC ATM CARD MANAGEMENT SYSTEM ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cards to the bank customers. TO avail the ATM (automatic teller machine) services a customer has to possess a valid ATM card. This project concentrate how to get a ATM card and how it works. A customer has to apply for the ATM card. His application is registered first and then processed. The card is sent to the database and check if the number is present. If it is present, check the amount. It is sufficient then reduces the amount how much he purchase/ want from the database. Or otherwise it print the error message. Once processing is over, the customer's application is genuine, and then ATM card is issued to the customer. There on the customer can perform anytime anywhere transactions on his accounts with the help ATM card by means of various ATM kiosks available in public places or through the internet. J2E 6065. IMPLEMENTATION OF 3DES, 168 BIT STRONG ENCRYPTION ALGORITHM IN MOBILE PHONES
  • 20. The Mobile Safe Manager application enables users that require to save sensitive information such as Credit Card, Bank Account Computer Login and General details to store such details in encrypted form on the phone. All data stored on the phone is protected by 3DESede 168 bit strong encryption. The key for the user generates this encryption when the application is installed, so there is not secret key held in the application. Only you, the user know the key that will unlock your data. New mobile phones can do more than just provide communications, they have the ability to run downloadable programs and even store data. This Project We have developed Mobile Safe Manager to take advantage of these new mobile phones. If the Mobile is lost with the application running, all about the private information is available With mobile Safe after a 2 minute of inactivity period, the screen is locked automatically and the user has to re-enter the password to log inside again. J2ME 6066. DESIGN AND DEVELOPMENT OF A REMOTE CITY MAPPING SYSTEM This Project teaches us how to develop a Remote City Mapping. This Guide will help a visitor to a city to obtain information about places of importance, Bus route, Train Details and including all related details on a Java-enabled device such as a mobile phone. We can develop the application using J2ME (Java 2 Micro Edition), to understand the development of embedded applications for mobile devices, which have limited processing power and memory .A server contains a database of the cities and the places of interest, along with details about each place. A user can access this information through a GUI provided on the mobile device using the API‟s - MIDP (Mobile Information Device Profile).  General Information Guide  Boarding Guide  Recreation Guide  Tourism Guide  Transportation Guide  Industrial Guide  Institutional Guide J2E 6067. THREE DIMENSIONAL (3D) GRAPHICS, IMAGE PROCESSING AND TERRAIN RENDERING SYSTEM The objective of this project is Image processing developed in advanced java by Using Java 3D Software. It provides fast way to create 3 Dimensional graphics applications. The Java3D API is a hierarchy of Java classes which serve as the interface to a sophisticated three- dimensional graphics rendering. The programmer works with high-level constructs for creating and manipulating 3D Geometric objects  Textured rendering  Resolution  Rotation  Wire Frame Rendering
  • 21. J2E 6068. IMPLEMENTATION OF VIRTUAL SIMULATION OF REALTIME ATM Now-a-days ATM is widely used by the peoples of all communities. The bank installs ATM in every location of a city in order to have a quick and safe withdrawal of the money. Before installing the original ATM in a particular location, the transactions, operations and efficiency are tested with the help of the ATM Simulator. ATM Simulator allows banks to view ATM downloads directly from their desktop PC, exactly as they would appear on a real ATM (NCR, Diebold, Wincor-Nixdorf etc.). ATM Simulator connects as a virtual ATM into your existing host system, and behaves in exactly the same way as a real ATM. Through the unique use of ATM hardware "personalities", any type of ATM can be simulated in this way, avoiding the need for costly ATM hardware simply to test transactions.ATM Simulator allows banks to automate the regression testing of their ATM transactions. No longer must bank staff spend time manually testing transactions on real ATMs, and simulating hardware faults by jamming the ATM devices. Test scripts can be replayed at any time without the intervention of an operator, and the results tabulated in a graphical easy-to-read format. J2E 6069. ROBOT CONTROL FROM MOBILE The project was developed in J2ME toolkit and servlet using web logic server as web server. The objective of this project is to control the mechanism of a ROBOT by the human through his mobile. Here J2ME toolkit will be used to design client application, which can be executed from any java enabled GPRS mobile. The client applet which is running the mobile will be interacting with the servlet which is running in the web server (Web logic) through which the ROBOT which has been connected with the PC will be controlled based on the users command J2E 6070. JAVA BASED FIRE ALARMING The project was developed using java & J2ME, the objective Of this project is to control the fire within the normal and maximum limits and if it exceeds the limits, then to alert the authorized person by sending sms from system(PC) to his mobile. Software Requirement:  JDK 1.5  J2ME toolkit  JSMS API Hardware Requirement:  Mobile  Data cable  Parallel port J2E 6071. NETWORK PACKET SNIFFER AND NETWORK ANALYSER
  • 22. A packet sniffer (also known as a network analyzer or protocol analyzer or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel back and forth over the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications. On wired broadcast LANs, depending on the network structure (hub or switch), one can capture traffic on all or just parts of the traffic from a single machine within the network; however, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network (e.g. ARP spoofing). For network monitoring purposes it may also be desirable to monitor all data packets in a LAN by using a network switch with a so-called monitoring port, whose purpose is to mirror all packets passing through all ports of the switch. On wireless LANs, one can capture traffic on a particular channel. On wired broadcast and wireless LANs, in order to capture traffic other than unicast traffic sent to the machine running the sniffer software, multicast traffic sent to a multicast group to which that machine is listening, and broadcast traffic, the network adapter being used to capture the traffic must be put into promiscuous mode; some sniffers support this, others don't. On wireless LANs, even if the adapter is in promiscuous mode, packets not for the service set for which the adapter is configured will usually be ignored; in order to see those packets, the adapter must be put into monitor mode. J2E 6072. ONLINE JAVA COMPILER AND SECURITY EDITOR This Project is mainly used to create, compile the java program. The client machine doesn‟t having the any java compiler. That is client machine doesn‟t having the java development kit. the client machine having only to connect to the java server. The client machine only write a java program and to send to server. The server having java compiler. The server create the new directory and save the client file and then compile java file and generate the error message .this message is going to send the client .if the java program haven‟t any error means then server send message to the client ”No Error”. In this project is also creating the security editor. This editor is performing encryption and decryption process. The client creates text and save it to the server. The server perform encrypt the file and save it to the file. The server also perform decrypts the file and save it to the file. These two processes are doing by means of the security algorithms. In this project use very famous security algorithms is “RSA Algorithms”. J2E 6073. LIVE BROADCASTING, MULTICASTING, & UNICASTING OF VIOCE AND TEXT ENCRYPTION The communication module deals with the various aspects involved during a conversation between the users. The conference module involves with the way of communication between the various users. The security module provides auto security to both voice and data. The communication module is further divided into two modules. They are client module and server module. The client module deals with the various information required for the various clients
  • 23. to involve in the conferencing. The client module does the validation process on the information given by the user attached to the server. The server module does the authentication process on the clients attached for the conferencing. Then those clients who are recognized are allowed to communicate with each other. The conference module is further divided into two modules. They are the broadcasting module and unicasting module. The conference may be in either text format or audio format. The users are free to choose their requirement. In broadcasting module, the clients are allowed to communicate with each other, without any restriction to the number of clients attached to the server. In the unicasting module, any two or group members connected to the server can communicate within themselves. That is messages secured within that group. IEEE PROJECTS ( 2008-2009-2010) JIEEE01: SECURE MOBILE PAYMENT SYSTEM IN WIRELESS ENVIRONMENT Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and m- commerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital signing in mobile payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile transactions over Bluetooth communications but also supports the related secured transactions between the payment server and mobile clients. Finally, we have discussed some of the performance parameters such as: time required to password hack for various character lengths, delay and probability error rate
  • 24. JIEEE02: DRUPAL CONTENT MANAGEMENT SYSTEM ON MOBILE PHONE. By adapting the Drupal system to mobile phones we try to target multiple goals: • Content management system makes content creation and management of the personal website of your mobile phone easy. • Via the additional modules developing personal web sites for a variety of purposes becomes easier. • With the creation of APIs that allow Drupal to access data in the core applications of the mobile phone we can create new website functionality that takes advantage of features available in the mobile devices. • Drupal provides a very good test case for the underlying layers of the architecture. JIEEE03: J2ME AND SMART PHONES AS PLATFORM FOR A BLUE TOOTH BODY AREA NETWORK FOR PATIENT-TELEMONITORING This project deals with problems of utilization of mobile equipment working in the biomedicine field, particularly telemedicine. The basic idea is to create a system that controls important information about the state of wheelchair bound person like monitoring of ECG and pulse in early phases, then other optional values like temperature or oxidation of blood. Sometimes middle-aged people have a collapse, breakdown or heart attack and must be in hospitals or health resorts for a long time to regenerate their bodies. The time that they spend in these institutions, is nonutilisable and very long for them. Possibilities of today physics are restricted by many of prescripts so patients cannot use some of the newest techniques (like hyperbaric or arctic chambers), which make it possible to reduce the regeneration time by weeks or months. This system consists of several interconnected parts that can communicate among themselves, so they can approach their function. These parts are measuring sensor, PDA or embedded device, and server for data processing and evaluation. Beside these, the most important parts that are worth mentioning are various kinds of accessories, such as GPRS, WiFi, GSM, Bluetooth or GPS modules. By means of them we can communicate. We mostly use the fastest technology in signal coverage JIEEE04: DEVICE INDEPENDENT MOBILE APPLICATION CONTROLLER FOR REMOTE ADMINISTRATION OF A SERVER OVER A GPRS LINK USING A J2ME CELLULAR . Unhindered connectivity to a computer & the need of the hour. The ability to connect to e remote machine and control it will have inflate advantages. J2ME (JAVA 2 Micro Edition) is a platform created to enhance application development for mobile phones. Using the platform we have crested an application which can control any desktop computer or a server by sending the required commands over an HTTP Connection. The main aim of the application is to remote & access and control different applications on a static IP PC by connecting to it over a GPRS link from a J2ME enabled cell phone. The possible applications are: 1.) Launching Word pad. 2.) Shutting down and restarting or logging off from your machine. 3.) Open & Save WordPad Files into the Remote machines.
  • 25. JIEEE05: MOBILE BANKING SECURITY USING STEGANOGRAPHY Upon development of m-commerce as one of the new branches of e-commerce, m- banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture by the password and is put on a site. Then the address of the picture is sent to the user. After receiving the address of the picture through SMS, the user downloads the picture by a special program. After entering the password, the user can witness the information extracted from the picture if the password is entered correctly. JIEEE06:ON-DEMAND VIDEO STREAMING IN MOBILE OPPORTUNISTIC NETWORKS Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a mobile peer-to-peer video-on-demand application based on ubiquitous WiFi enabled devices such as smartphones and Ultra Mobile PCs. MOVi poses new challenges in on-demand video streaming caused by limited wireless communication range, user mobility and variable user population density. MOVi addresses these challenges by exploiting the opportunistic mix use of downlink and direct peer-to-peer communication to significantly improve achievable overall system throughput. Through simulation and actual implementation, we observed that MOVi is able to increase the number of supported concurrent users two fold compared with unicast based on-demand video streaming, as well as reducing video start-up delay by half. Significantly, these performance improvements can be achieved without increasing power consumption at the
  • 26. end device. Using MOVi, users not only share and distribute on-demand video such as YouTube clips for their own performance gain but also for the benefit of the collaborative group. JIEEE07:RFID CREDIT CARDS SYSTEM. Online shopping using electronic payment scheme has gained a lot of popularity in recent years. In an electronic payment scheme using normal credit cards there is no way to genuinely identify owner of the credit card. Credit card fraud is the fastest growing crime all over the world. Any effort to plug the security hole especially for online payment is considered worthwhile. A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming increasingly popular, with applications like credit-cards, national-ID, passports, and physical access. The security of such applications is clearly critical. A key feature of RFID-based systems is their very short range: typical systems are designed to operate at a range of ≈ 10cm. RFID enabled credit cards are becoming increasingly popular as contactless credit cards. We envision a future where RFID credit cards will be used for online shopping. RFID system has tremendous potential to render electronic payments more secure than normal credit cards. The word RFID enable credit cards may bring in mixed passion, enthusiasm and perhaps even rage! This is partly paranoia and partly reality. The reality is that an intruder can read RFID cards without the user even noticing it. This brings in a zone of discomfort and leads to paranoia. Certain interactivity should exist to bring back this comfort to the user. This paper tries to make an effort in that direction. In this paper we propose mobile phone based architecture for secured electronic payments using RFID credit cards. JIEEE08:ROBOT TELEPORTATION SYSTEM BASED ON GPRS In this project we present a strategy for using the cellular network, and specifically the general Packet Radio Service, to teleoperate a mobile robot. This allows the system user a wider mobility range and coverage. The system application is developed using Java Programming Language, implementing two teleoperation methods: predefined sequences and instant actions.
  • 27. JIEEE09:ADDRESS AUTOCONFIGURATION AND ROUTE DETERMINATION MECHANISMS FOR THE MANET ARCHITECTURE OVERCOMING THE MULTI-LINK SUBNET MODEL The mobile ad hoc network (MANET) is a wireless network composed of mobile nodes which can communicate with each other via multiple wireless links. Previously, the MANET has been considered as a single subnetwork, so all nodes in a MANET are assigned the same subnet prefix, which is the multi-link subnet model. In order to resolve the multi-link subnet problem, the modified MANET architecture was proposed in [12]. In this paper, we propose an address autoconfiguration mechanism and a route establishment mechanism for the modified MANET architecture. Our proposed mechanism can prevent the performance degradation caused by broadcasting control messages of a reactive routing protocol such as the Ad-hoc On-demand Distance Vector (AODV). We evaluate the performance of the proposed mechanisms by carrying out NS-2 based simulations JIEEE10:PIDS: A PACKET BASED APPROACH TO NETWORK INTRUSION DETECTION AND PREVENTION Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. And practically all of them require some kind of termination in network connections So, the quest for betterment continues. In this progression, here we present PIDS: a complete intrusion detection system which reduces most of the problems contained by the previous systems and it doesn‟t need to terminate any network connections to detect the intruder. This system generates quick responses against intrusions and stops the intruder to proceed for further attacks. JIEEE11: RIMOM: A DYNAMIC MULTISTRATEGY ONTOLOGY ALIGNMENT FRAMEWORK Ontology alignment identifies semantically matching entities in different ontologies. Various ontology alignment strategies have been proposed; however, few systems have explored how to automatically combine multiple strategies to improve the matching effectiveness. This paper presents a dynamic multistrategy ontology alignment framework, named RiMOM. The key insight in this framework is that similarity characteristics between ontologies may vary widely. We propose a systematic approach to quantitatively estimate the similarity characteristics for each alignment task and propose a strategy selection method to automatically combine the matching strategies based on two estimated factors. In the approach, we consider both textual and structural characteristics of ontologies. With RiMOM,
  • 28. we participated in the 2006 and 2007 campaigns of the Ontology Alignment Evaluation Initiative (OAEI). Our system is among the top three performers in benchmark data sets. JIEEE12: MINING OF DEFECT IN SOFTWARE AND DEFECT CORRECTION EFFORT PREDICTION Much current software defect prediction work focuses on the number of defects remaining in a software system. In this paper, we present association rule mining based methods to predict defect associations and defect correction effort. This is to help developers detect software defects and assist project managers in allocating testing resources more effectively. We applied the proposed methods to the SEL defect data consisting of more than 200 projects over more than 15 years. The results show that, for defect association prediction, the accuracy is very high and the false-negative rate is very low. Likewise, for the defect correction effort prediction, the accuracy for both defect isolation effort prediction and defect correction effort prediction are also high. We compared the defect correction effort prediction method with other types of methods—PART, C4.5, and Naı¨ve Bayes—and show that accuracy has been improved by at least 23 percent. We also evaluated the impact of support and confidence levels on prediction accuracy, false negative rate, false-positive rate, and the number of rules. We found that higher support and confidence levels may not result in higher prediction accuracy, and a sufficient number of rules is a precondition for high prediction accuracy.