You are on page 1of 28


J2E 6001. IMPACT OF ADAPTIVE RESOURCE ALLOCATION IN UTILITY CLUSTER COMPUTING ENVIRONMENTS Maximizing resource provider profit and satisfying user requirements at the same time is a challenging problem in utility computing environments. In this paper, we intro- duce adaptive resource allocation requests and investigate the impact of using them in utility cluster computing environments. The Service Level Agreements established between users and resource providers rely not only on fixed values, but also on functions that associate allocation parameters. In addition, the resource provider scheduler can automatically modify the number of resources and usage time of allocation requests, as well as split them into sub requests. Users may receive incentives for supplying flexible requests which produce more scheduling options. By using rescheduling, resource providers are able to prioritize the most profitable requests dynamically and still satisfy the requirements of the already accepted user requests. From our experimental results we observed an increase of 14% in the resource provider profit and a reduction of 20% in the average response time of user requests when compared to traditional approaches. J2E 6002. RANK AGGREGATION FOR AUTOMATIC SCHEMA MATCHING Schema matching is a basic operation of data integration and several tools for automating it have been proposed and evaluated in the database community. Research in this area reveals that there is no single schema matcher that is guaranteed to succeed in finding a good mapping for all possible domains, and thus an ensemble of schema matchers should be considered. In this paper we introduce schema meta-matching, a general framework for composing an arbitrary ensemble of schema matchers, and generating a list of best-ranked schema mappings. Informally, schema meta-matching stands for computing a consensus ranking of alternative mappings between two schemata, given the individual graded rankings provided by several schema matchers. We introduce several algorithms for this problem, varying from adaptations of some standard techniques for general quantitative rank aggregation to novel techniques specific to the problem of schema matching, and to combinations of both. We provide a formal analysis of the applicability and relative performance of these algorithms, and evaluate them empirically on a set of real-world schemata. J2E 6003. AUTOMATIC FUZZY ONTOLOGY GENERATION FOR SEMANTIC WEB Ontology is an effective conceptualism commonly used for the Semantic Web. Fuzzy logic can be incorporated to ontology to represent uncertainty information. Typically, fuzzy ontology is generated from a predefined concept hierarchy. However, to construct a concept hierarchy for a certain domain can be a difficult and tedious task. To tackle this problem, this paper proposes the FOGA (Fuzzy Ontology Generation framework) for automatic generation of fuzzy ontology on uncertainty information. The FOGA framework comprises the following components: Fuzzy Formal Concept Analysis, Concept Hierarchy Generation, and Fuzzy Ontology Generation. We also discuss approximating reasoning for incremental enrichment of the ontology with new upcoming data. Finally, a fuzzy-based technique for integrating other attributes of database to the ontology is proposed.

J2E 6004. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS While in-network data fusion can reduce data redundancy and, hence, curtail network load, the fusion process itself may introduce significant energy consumption for emerging wireless sensor networks with vectorial data and/or security requirements. Therefore, fusion-driven routing protocols for sensor networks cannot optimize over communication cost onlyfusion cost must also be accounted for. In our prior work [2], while a randomized algorithm termed

MFST is devised toward this end, it assumes that fusion shall be performed at any intersection node whenever data streams encounter. In this paper, we design a novel routing algorithm, called Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering. Not only does AFST jointly optimize over the costs for both data transmission and fusion, but also AFST evaluates the benefit and cost of data fusion along information routes and adaptively adjusts whether fusion shall be performed at a particular node. Analytically and experimentally, we show that AFST achieves better performance than existing algorithms, including SLT, SPT, and MFST. J2E 6005. WIRELESS MAC PROTOCOL USING IMPLICIT PIPELINING Abstract: In distributed multiple access control protocols, two categories of overhead are usually associated with contention resolution. One is channel idle overhead, where all contending stations are waiting to transmit. Another is collision overhead, which occurs when multiple contending stations attempt to transmit simultaneously. Either idle overhead or collision overhead being large, contention resolution algorithm would be inefficient. Prior research work tries to minimize both the idle and the collision overheads using various methods. In this paper, we propose to apply pipelining techniques to the design of multiple access control protocol so that channel idle overhead could be (partially) hidden and the collision overhead could be reduced. While the concept of pipelined scheduling can be applied to various MAC protocol designs in general, in this paper, we focus on its application to IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage contention resolution MAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of contention resolution degrades dramatically with the increasing load due to high probability of collision. Using the implicit pipelining technique, DSCR hides the majority of channel idle time and reduces the collision probability, hence, improves channel utilization, average access delay, and access energy cost over 802.11 significantly both in wireless LANs and in multihop networks. The simulation results, as well as some analysis, are presented to demonstrate the effectiveness of DSCR. J2E 6006. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING PROTOCOL The goal of our project is to proactively disseminating the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is key to the adaptation of on-demand routing protocols to mobility. J2E 6007. ON SELFISH ROUTING IN INTERNET-LIKE ENVIRONMENT A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing decisions are no longer based on system-wide criteria but are instead designed to optimize host-based or overlay-based metrics. A series of theoretical results showing that selfish routing can result in suboptimal system behavior have cast doubts on this approach. In this paper, we use a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based on realistic topologies and traffic demands in our simulations. We show that in contrast to theoretical worst cases, selfish routing achieves close to optimal average latency in such environments. However, such performance benefits come at the expense of significantly increased congestion on certain links. Moreover, the adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making network traffic less predictable. J2E 6008. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION PROTOCOLS FOR DYNAMIC PEER GROUPS

We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group member will collaboratively contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the group key after every join or leave request, we are going to re key for a batch of join and leave operations. J2E 6009. TCP-LP: LOW-PRIORITY SERVICE VIA END-POINT CONGESTION CONTROL Service prioritization among different traffic classes is an important goal for the Internet. Conventional approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide better-than-best-effort service. We explore the opposite approach, and devise a new distributed algorithm to realize a lowpriority service (as compared to the existing best effort)from the network endpoints. To this end, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilize only the excess network bandwidth as compared to the fair share of bandwidth as targeted by TCP. The key mechanisms unique to TCP-LP congestion control are the use of one-way packet delays for early congestion indications and a TCP-transparent congestion avoidance policy. J2E 6010. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT GENERATION MOBILE NETWORKS The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs coupled with the anticipated large number of mobile users in future mobile networks may introduce very large centralized databases. J2E 6011. SHORTEST PATH FINDING USING GPS BASED NAVIGATION SYSTEM IN CRITICAL SITUATION In this Project we propose a system which would be very useful for the Patients who have Critical Heart Attacks and their Condition could be informed to the nearest Hospital, so as to save the life of the Patient. Here in this project if the patient gets Heart attack, h/she has to give a input to the GPS system, so that GPS is get activated, this immediately transmits the Longitude and Latitude Values to the Central Station or the Server where all the Longitude and Latitude Values of Hospital would be maintained. Here in the Central Server the data is getting processed and it could able to find the Nearest Hospital to the Patients House and the Server sends the message to the Nearest Hospital. Nearest Hospital will get the data and immediately the Ambulance is send to the Patients House, so as to save the Human Life. J2E 6012. NETWORK INTRUSION DETECTION Network intrusion detection has generally been dealt with using sophisticated software and statistical analysis tools. However, occasionally network intrusion detection must be performed manually by administrators, either by detecting the intruders in real-time or by revising network logs, making this a tedious and time-consuming labor. To support this, intrusion detection analysis has been carried out using visual, auditory or tactile sensory information in computer interfaces. However, little is known about how to best integrate the sensory channels for analyzing intrusion detection. We propose a multimodal human-computer interface to analyze malicious attacks during forensic examination of network logs.

J2E 6013.HONEY POTS A SECURITY SYSTEM TO IDENTIFY BLACK HAT COMMUNITY IN THE NETWORKS With a majority of Internet service subscribers changing over from conventional dial up connections to faster and cheaper T1, Cable, ISDNS, DSL, it yields new problems for the existing subscriber base that contain majority of novice users in terms of Internet Security. Todays Internet security is restricted to personal and network firewalls installed either on the hosts computer or a network gateway or a router. A Honey pot is a comprehensive security system, which attracts hackers to attack them thereby finding out the types of attacks and black hat community motives. A Honey pot is a security resource whose value lies in being probed, attacked, or compromised. The key point with this definition is honey pots are not limited to solving only one problem. They have a number of different applications. To better understand the value of honey pots, we can break them down into two different categories: Production Research Production honey pots are used to protect your network. They directly help secure your organization. Research honey pots are different; they are used to collect information. That information can then be used for a variety of purposes, such as early warning and prediction, intelligence gathering, or law enforcement. Honey pots can be made more efficient by simulating some services, which will lure the attackers in to the trap.

J2E 6014.INTERANET TRANSFERMATION OF VOICE WITH DATA USING VOICE OVER INTERNET PROTOCOL(VOIP) Voice over IP (VOIP) is new technology that allows the passing of speech information over IP data networks. In contrast to common traditional telecommunications, which moves voice traffic over the special Public Switched Telephone Network (PSTN), VOIP technology means that the voice shares the same network with the data in a true voicedata convergence. VOIP has all the well publicized advantages inherent in having a unified data network infrastructure to manage all communications needs. Care must be taken, however to ensure that the voice quality is preserved when a data network is used to pass voice information. Traditionally, voice and data networks have been supported by two separated infrastructures. The voice transport over IP (VOIP) offers service providers the advantage of integrating their networks into a single infrastructure. The substitution of traditional voice networks by VOIP will depend on the capability to offer to the end user a similar quality. From a practical standpoint it makes no sense to transmit digitized voice samples that contain only a period of silence. Packets containing period of silence add to network traffic and can adversely affect the transmission and delivery of other packets carrying digitized voice samples from the same or different callers. The bandwidth is not effectively used due to the transmission of unnecessary silence packets across the networks. Hence, the Quality of Service is affected due wastage of bandwidth.

J2E 6015. GPS BASED VEHICLE LOCATION TRACKING SYSTEM Vehicle tracking using GPS (Global Positioning System) is fully integrated into the VTS (Vehicle Tracking System). GPS was developed by the U.S. military to enable accurate navigation. 24 satellites have been placed in orbit some 20.000 km from the earth's centre. The vehicle to be tracked is fitted with a GPS receiver and a small antenna. GPS satellites are continuously transmitting a radio message containing information including when the data was sent, which satellite sent it and the current reliability of the system. The GPS receiver fitted in the vehicle receives information from at least 4 satellites and carries out the necessary calculations to determine its current position. The vehicle tracking device VTU is the total security protection and fleet management solution. By using the latest GPS and GSM technology to protect and monitor your car, truck, bike, boat (or moveable asset) virtually anywhere and then locate it to within a few meters. The device incorporates a covertly installed module (which works and communicates independently) but has the ability to run in conjunction with your local GSM network (DTMF, voice message, SMS, GPRS or GSM modem call). The external data processing of data and communication are done using ATMEL AT89c51 OR ARM ARM7TDMI-S (T.M) core logic 32bit controller as per the choice. Anyway both of these projects can also be integrated to PC using java background via RS232 communication or can be displayed on a local 2 X 16 LCD panel. For mapping on Google Earth. J2E 6016. SIP - COMMUNICATOR BASED TELE- CONFERENCING SYSTEM A teleconferencing project has been implemented in java1.5, sip alpha and Asterisk server1.4 server provides the customer care and the call centers for secured way for telemarketing in real-time environment (salesman of the company contacts customer for product sales or customer contacts salesman for queries about the product) this project featured with Music On hold, Voice Recording, and Authentication through DTMF technology. Session initiation protocol integration involves registering services to the Locating Service either within LAN network or using proxy server. J2E 6017. ONLINE LIVE SECURITY SYSTEM USING MEDIA CONVERGING & MOTION DETECTION TECHNIQUE During nighttime, the possibility of theft is more. Hence, a camera is switched on. If it finds any movement on the pointed place, it immediately sends the mail and give the Beep sound to the Security guard on alert. Else if motion is detected, it alerts everybody on Security Guard. Unless and otherwise, security guard switch of the camera and System, the process goes on.



Ad Hoc Network (MANET) process consists of two nodes. Because of the limited range of communication of a wireless host, it is necessary to perform multi hopping. Routing protocol is used to find routes along which multi-hoping will be performed. Location Aided Routing (LAR) protocol is one which utilizes the location information of a node to limit the search. Location Aided Routing is an on-demand routing protocol in which the routes are found only when required. Route Discovery: Identifies and establishes route between hosts. In LAR, restrictive flooding of control packets is done to discover the route. Route Maintenance: Supervises the data transfer between the two nodes. If any error occurs during data transfer, necessary steps are executed to continue transfer of data.

By Implementing the LAR algorithms, we have further reduced the flooding region and eliminated looping problems. J2E 6019. RFID BASED HOSPITAL MANAGEMENT SYSTEM RFID based access card used by the hospital employee , project has been implemented to maintain the hospital details in an centralized database using MySql5.0 as the backend where the employee could able to manage the hospital details using the front end tool which has been designed using java1.5 .Employee Authentication done through RFID based access card, integrated with the RFID card reader. J2E 6020. NETWORK LOAD BALANCING AND REDISTRIBUTION OF THE TRAFFIC OVER THE NETWORKS USING GRID COMPUTING SYSTEM

In a Network Grid computing enhances the scalability and availability of mission-critical, TCP/IP-based services, such as Web, Terminal Services, virtual private networking, and streaming media servers. This component runs within cluster hosts as part of a operating system and requires no dedicated hardware support. To scale performance, Network Traffic Analyzer distributes IP traffic across multiple cluster hosts. It also ensures high availability by detecting host failures and automatically redistributing traffic to the surviving hosts. Network Traffic Analyzer provides remote controllability and supports rolling upgrades from a operating system. The unique and fully distributed architecture of Network Clustering enables it to deliver very high performance and failover protection, especially in comparison with dispatcher-based load balancers. This project describes the key features of this technology and explores its internal architecture and performance characteristics in detail. The unique and fully distributed software architecture of Network Traffic Analyzer enables it to deliver the industry's best load balancing performance and availability. J2E 6021. MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT Video Streaming is an application designed to transfer the stored video images from one node to another. The application allows the mobile user to see video file with the intranet networks with which server (J2EE SERVER) running on the other machine. Video Streaming gives the user high quality images with much less (General Packet Radio Service) GPRS or Universal Mobile Telecommunication System (UMTS) traffic, so the communication with the intranet.

ADVANTAGES 1. Video Streaming captures the Video file from the server to the client mobile. 2. Here the images are transferred byte-by-byte mode. 3. The server will store the images accordingly to the user and each image will be captured and each image will be transmitted to the mobile. J2E 6022. NETWORK CONGESTION AVOIDANCE USING NETWORK BORDER PATROL (NBP) The end-to-end nature of congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications, which are unresponsive to network congestion. In this project, we propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP). NBP is a corestateless congestion avoidance mechanism and Parallel downloading is a technique to improve the performance of transferring large files. It assumes that many nodes (servers) in

the network have the requested file. A node (client) that wants to get that file can connect to some or all of the servers in parallel and download different parts of the file from each of them. The aggregate transfer rate that the client observes is the sum of the transfer rates on the paths from each of the servers to the client. In order for the aggregate transfer rate to be higher that the maximum transfer rate which can be obtained by connecting to only one server. J2E 6023. JAVA-BASED HOME AUTOMATION SYSTEM This project is aimed to control devices by achieving Java based Home automation. Here we use Java application (J2ME) in PC, AT89c51, parallel port and Load Driving Circuit. Here the user can give the control command for a particular device through Java mobile application (J2ME) in PC, which is then transmitted through parallel port. In the receiving end the microcontroller receives the device command and recognizes the command and controls the corresponding device through the Load driving circuit. The load driving circuit consists of a Darlington pair IC for current amplification and relays, which are used to switch the devices ON/OFF. J2E 6024. GSM BASED REMOTE BIO- MEDICAL INVETIGATION With the J2ME as back end, the project is used to send SMS and monitor the status of a person. Such as heart beat and temperature and informs it to the mobile number specified; the heart of the chip is the at89c52 controller and java back end. The heart rate detector unit and the temperature sensor unit is fitted to the patient and the data output is fed to the microcontroller via the analog to digital converter the data from the adc is in 8 bit format, it is then processed by the microcontroller and whenever the safe ranges is violated the controller produces a alarm, and visual display, as well as initiates the pc to send the SMS to a specified mobile number using a mobile phone which is interfaced with the pc. J2E 6025. AUTENTICATION OF DIGITAL IMAGES BY ENCYPTION AND DECRYPTION WITH PRIMARY KEY IMPELMENTATION USING LSB ALGORITHM AND STEGANOGRAPHY This Project is to provide the security for images by using key concepts. This project uses the LSB algorithm for data hiding and data extraction. There is a growing importance of steganography in intelligence work, as it is viewed as a serious threat to some governments. In future we would like to implement steganography using audio and video files. A major advantage of the LSB algorithm is it is quick and easy. There has also been steganography software developed which work around LSB color alterations via palette manipulation. LSB insertion also works well with gray-scale images. The project that is implemented deals with digital images acting as a cover medium to store secret data in such a manner that becomes undetectable. Hence it provides a very high means of security without suspicion J2E 6026. RFID BASED TRAIN SPEED AND TIME MONITORING The project uses the RFID readers and tags, the tag is fitted on the train engine, each train carries its own identified tag, and the readers are fitted in each side on level crossing with a clearance of 3 km from the level crossing. The reads the tag id once the train nears the level crossing and passes to the microcontroller, the microcontroller in turn notes the id and displays the train name, and also closes the gate, and at once the train crosses the other end the reader reads the tag and feeds it the microcontroller, the microcontroller in turn opens the gate. The microcontroller can also be programmed to send the Rfid data to the system, so that with the java backend we maintain the database, time of crossing and speed of the train.

J2E 6027. ENHANCING THE QUALITY OF SERVICE IN VOIP Supporting dedicated bandwidth

Improving loss characteristics Avoiding and managing network congestion Shaping network traffic Setting traffic priorities across the network

QoS usually refers to the fidelity of the transmitted voice and facsimile documents, it can also be applied to network availability (call capacity or level of all blocking), telephone feature availability (conferencing, calling number display), and scalability(any-to-any, universal and expandable). The common part in the two modules is the requirement of Sound Recorder and Player for recording the voice and playing back the voice to user. The connection is to be established between the users for transmission of voice across the network. For establishing connection, the existing TCP/IP protocol is to be used in the LOCAL AREA NETWORK. Quality of Service for Voice over IP discusses various QoS concepts and features that are applicable to VoIP. It must include silence tag to generate silence at the receivers end. The quality of service is enhanced by utilizing the available bandwidth. In another Technique, text data is inserted in the place of the silence. The text is extracted from the voice.

J2E 6028. AUDIO CONFERENCE THROUGH SPEEX AND ILBC CODEC Speex / ILBC codec are one of the solutions to the problem study done on the latency, delay and bandwidth, audio quality of java media framework. speex / ilbc codec meant for encoding and decoding audio data through RTP protocol , where usage of speex / ilbc codec improves better voice quality when compare to ulaw,alaw and gsm codec presents in existing java media framework.

J2E 6029. MOBILE AGENT BASED STORING AND RETRIEVAL OF MULTIMEDIA FILES FROM THE DISTRIBUTED MULTIMEDIA DATABASE This project mobile agent are used to store and retrieve a multimedia data from the distributed multimedia database using mobile agents based on host database provide the result to the user upon request. This project uses the mobile agents effectively to retrieve multimedia database at a faster rate and at lower bandwidth using agents in a distributed environment. One of the paradigms that have been suggested for allowing efficient access to remote resources is a transportable agent. A transportable agent is a named program that can migrate from machine to machine in a heterogeneous network. The program chooses when and where to migrate. It can suspend its execution at an arbitrary point, transport to another machine and resume execution on the new machine. Transportable agents have several advantages over the traditional client/server model. Transportable agents consume less network bandwidth and do not require a connection between communicating machines - this is attractive in all networks and particularly attractive in wireless networks.


The Objective of this project is to monitor the client machines, which are all present in the network (LAN, WAN, MAN) through user mobile from any remote location. The main technologies used in this project was HTTP tunneling, RMI, Socket connection. Here user could see the client list which are all connected to the online server through his mobile, the mobile user can create a text file and it can be stored into the PC (client machine) by selecting client name from client list. Administrator (mobile user) can view the content of the text file, which is residing in the client machine from his mobile. He can explore the drive list, directory list and file list from his mobile. Here the mobile user can compile a error free java file which is residing in the pc or he can execute the compiled file from his mobile. Administrator can broadcast or unicast messages to his clients from his mobile or he can chat with the client by selecting the client name from the client list. J2E 6031. REMOTE PACKET CAPTURE, EPHEMERAL PORT ANALYSIS, DATA MONITORING IN THE NETWORKS The success of the Internet has brought networking in each and every day new applications and technologies that are created. In this scenario, the power and complexity of computer networks are growing every day. Thus, network and system security has become an increasingly important issue during the past few years. Security specialists can use a port scanner to check whether people on the network are running software they should not be, making sure that servers are appropriately sealed off and many other things. The knowledge of which ports are open on a system gives an administrator a general idea of the services a system is running. Remote Ephemeral Port Analysis is a piece of software that runs on a distributed system and allows us to analyze the status of the software ports on a remote machine. That is, it determines whether each of the ports is open or not on a host (IP address). Ports that are open on a host represent services, servers, and sometimes Internet applications. Different ports are used for different protocols. This software provides user authentication, so that only the authenticated users can use the software. The users are added, deleted and edited only by the administrator. The software also has the ability to find all the computers currently connected on the network. This software also determines the amount of information transferred across the network. Apart from port status analysis, a very important feature added to this software is the packet capture mechanism. This utility seizes information from each packet transferred across a network and determines several conclusions related to network security and network administration. J2E 6032. SECURITY COMMUNICATION FOR GSM NETWORK USING KERBEROS V5 PROTOCOL Today more then ever, secure communication is a must. Most companies now user network infrastructure to conduct their business, whether internally( intranet model or externally to reach partners or customers (extranet/Internet models). While it is utopian to consider todays networks as being safe, there are solutions to make them more secure and use them with a bit of trust. The key aspects to securing communications over a distributed environment are authentication, integrity, confidentiality and authorization. Kerberos is a network protocol that addresses the authentication part. This application aims at using Kerberos V5 to secure the communication between a J2Me MIDlet communicating over the GPRS, and a Banking Transaction Server. This project mainly covers at gaining the initial ticket provided by the authentication server. Authentication server checks its database to authenticate the user. If the username and the password matches it generates and initial ticket by which we can obtain many service tickets to access the services provided by the banking transaction server.

J2E 6033. DESIGN OF AN INTELLIGENT AGENT FOR NETWORK FAULT DETECTION As the Internet becomes a critical component of our society, a key challenge is to maintain network availability and reliability. The increasing number of networks is making downtime more costly. Network management tools and techniques must therefore become better at detecting and identifying network faults. Current fault management implementations generally rely on the expertise of a human network manager. As networks become more complex and changes occur more frequently, the human network manager will find it hard to maintain a sufficient level of expertise on a particular networks behavior. Fault management research has covered approaches such as expert systems, finite state machines, advanced database techniques, and probabilistic methods. Intelligent agent is one that processes information collected by Simple Network Management Protocol agents and uses it to detect the network anomalies that typically precede a fault. The intelligent agent approach has several benefits. It can detect unknown faults and correlate information in space and time. Also it is possible to make an Intelligent Agent to detect the failure in one of the sub networks components even before it can be occur.

J2E 6034. FACE RECOGNITION Security and authentication of a person is a crucial part of any industry. There are many techniques used for this purpose. One of them is face recognition. Face recognition is an effective means of authenticating a person. The advantage of this approach is that, it enables us to detect changes in the face pattern of an individual to an appreciable extent. Hence face recognition can be used as a key factor in crime detection mainly to identify criminals. There are several approaches to face recognition of which Principal Component Analysis (PCA) and Neural Networks have been incorporated in our project. The system consists of a database of a set of facial patterns for each individual. The characteristic features called eigenfaces are extracted from the stored images using which the system is trained for subsequent recognition of new images. MODULES Training Testing TRAINING: To train the users face with already present ID in the database TESTING: To authenticate the user with the face recognition algorithm

J2E 6035. DATA MIGRATION, TRANSLATION & TRANSFERMATION TO OPTIMIZE THE DATA MANAGEMENT SYSTEM Data Migration is the process of translating data from one format to another. Data migration is necessary when an organization decides to use a new computing system or database management system incompatible with the current system. Typically, data migration is performed by a set of customized programs that transfer the data. By the use of this project, the following data migrations can be processed easily. 1.From SQL Server To Oracle 2.From SQL Server To Access 3.From SQL Server To HTML

4.From Oracle To SQL Server 5.From Oracle To Access 6.From Access To SQL Server 7.From Access To Oracle

J2E 6036. SIP-COMMUNICATOR BASED ACTIVE LISTENING AND PASSIVE LISTENING An telecom project implemented using java1.5, sip-communicator alpha and Asterisk 1.4 server featured with Active Listening (Manager of an organization chanspy the conversion between the salesman and the customer. And can communicate with the salesman), Passive Listening (Manager of an organization chanspy the conversion between the salesman and the customer) which is a secured way of communication with the implementation of sip protocol.

J2EE 6037. RFID BASED ATM MACHINE TRANSACTION AND PROCESS SYSTEM Integrated with RFID reader for authenticating the customer using RFID based access card where the RFID ID has been read through serial port using java technology and the front end design has been done using jdk1.5 , customer details has been uploaded into MS-Access database, After authentication customer can view his/her Balance Enquiry, Fund Transfer and Mini Statement. J2E 6038. MULTIPLE MAIL ACCOUNTS COLLABORATION MANAGER Nowadays, web users have multiple email accounts. But individual authentication is essential for accessing each account, which is time-consuming. Currently, no integrated system exists for individuals to manage multiple email accounts. Our solution provides a common, uniform API for managing various email accounts using the Java programming language .It allows users to access mails from various accounts by logging in once. All the registered mail accounts of the user will be displayed as hyperlinks. Clicking on each link will lead the user to a new page where he can check for new mails, reply for a mail, forward a mail, compose mails and delete mails. In this way, this solution saves time in authenticating multiple accounts by providing a single authentication for all the registered mail accounts and also reduces the burden on the web server.

J2E 6039. BANDWIDTH CONGESTION CONTROL USING AND AUTHENTICATION SERVICE FOR AUTOMATIC DYNAMIC RECONFIGURATION SYSTEM In any company, the effective utilization of the available bandwidth is of paramount importance. Every person must use the entire available bandwidth in a satisfactory manner (i.e.) The entire bandwidth must not be locked to some high bandwidth user refraining other users of the company due to traffic congestion. Considering these difficulties, we propose the following solution. Parting the available bandwidth among the special permission and normal users. Authentication of the users using Kerberos. In order to avoid the congestion, the normal and the special permission users will be routed through two different paths. Each user will be allocated a username and password, which will be stored in a database. In addition, their access permission details will also be maintained. Based on these details the user is routed either to the FTP server or to the Domain Server dynamically. J2E 6040. REMOTE AND LIVE MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT USABLE FOR TRAFFIC VIEWING & CONTROL SYSTEM

This is an Internet Browser application designed to display traffic web cam links. The application allows the user to view traffic images from several sources, cities, countries and continents all over the world, as long as the user subscribes the link packages that he intends to use. This application is particularly meant for traffic police to monitor the city with their mobile from any remote location, where a web cam will be provided at each and every signal location.

J2E 6041. INTERNET BASED MACHINE CONTROL SYSTEM The aim of the project is to control the electronic appliances via the internet. Thus thereby enabling the controlling of the devices via all over the world is possible. The project utilizes the Html and Java as the front end, the embedded system as the firmware ends of the project. Thus the project is firmware based. This project allows a person, to control the electronic appliances via the internet. The devices carry a specific codes, which is typed in the explorer address bar is sent to the server. The server reads the data from the html page, with the help of java. And then provides the respective codes for the co running dynamic link library files. The output from the parallel port is fed to the controller for further processing, and the output from controller is fed for relays for controlling of appliances. J2E 6042. EDGE DETECTING, IMAGE QUERYING, MATCHING, & RANKING USING SPATIAL SIMILARITY MATCHING SYSTEM Like traditional databases, an image database (IDB) is a collection of unique images. Each of these images are composed of a set of different objects. However, to improve the overall performance of the search and retrieval process, spatial similarity data modeling and retrieval scheme is used. Similarity-based search reduces the search space to a limited number of matched instances and thus retrieving depends on the nature and measure of similarity specified in the query. Edge detection algorithm is used to detect the outline of the queried image. Image processing is performed by generating a signature for each queried image, comparing it with the database, ranking the retrieved images and then displaying the images. This makes searching much more efficient.

J2E 6043. EXTRACTION, RETRIEVAL AND STORAGE OF IMAGES, DATA CONTENTS IN THE INTERNET With this concept we can extract the contents of current on line web page or a web page stored from a hard disk file and we can store it to another file. Web page contents like images, text, paragraphs, etc. Storing all images to .html file and text to .txt file. This project is developed on core java for creating user interface window , creating connections and execution. Modules: Homepage Main module for connecting to the URL and to invoke content extractor or feature extractor modules Content extractor For extracting words in tokenized format and paragraphs and for storing it In a text file Feature extractor For extracting images and storing it in a html file J2E 6044. CROSS PLATFORM INTEGRATION AND GLOBAL EDITOR SYSTEM There are editors for languages such as C, C++, JAVA that exists separately for each. But there is no editor that supports all languages in one. Moreover they take more memory space to run. The editor, which we are designing, supports all languages in one environment. It is a package, which provides user to program the languages such as C, C++, JAVA. Since the

editors, which already exist, do not support all languages .we are designing an editor that overcomes this problem. The compilers for all languages are present in the system itself. This editor needs very less memory space to run. The features in this editor are automatically insert header files, insert comment lines, insert closing braced to an opened brace. The other features are shortcut to compiler, auto display of output window, auto help and auto quick insert. We are developing the user interface design using swing concepts in java. The call to respective compilers and interface between user and database is done by means of core java. This system would prove to be friendly to programmer since it reduces the precious coding time as well as giving help to most of the methods syntax so no need to remember large number of methods.

J2E 6045. NETWORK ENABLED EMBEDDED CONTROL This project is very much useful and applicable in the college, and office environment. The project utilizes the Java as the front end, The embedded system as the firmware end of the project thus the project is firmware based this project allows a person to control the electronic appliances via the internet. Thereby allowing the access of devices via the local area network with greater flexibility and user friendly The devices carry a specific codes, which is typed in the explorer address bar is sent to the server .the server reads the data from the html page with the help of java, and then provides the respective codes for the co running dynamic link library files, which is designed with the help of vc++ For further communication with parallel port. The output from the parallel port is fed to the controller for further processing, and the output from controller is fed for relays for controlling of appliances.

J2E 6046. IMPLEMENTATION OF SECURITY KERNEL AND FIREWALL USING JAVA Internet is a dynamic place and is liable for various forms of attack. It is necessary to guarantee the integrity and safety of the private network connected to it. There are various methods to safeguard our trusted network. One among them is firewall. A firewall separates a private network from a public one, the Internet. It screens and filters all connections coming from the Internet to the private network and vice versa, through a single, concentrated security checkpoint. A firewall makes sure that you cannot reach the Internet from the Internet network, or vice versa, unless you pass through this checkpoint. There are several models and configurations of firewalls out there. But the basic idea behind them is always the same. Our firewalls primary security component is the security kernel. The security kernel evaluates each incoming and outgoing network packet traversing the firewall server and enforces security policy against all such packets. J2E 6047. SECURED DATA COMMUNIACTION USING BASE 64 (BSF) ENCODING AND DECODING FOR IMAGE, TEXT, AUDIO, FILE ETC. The main stay of this project is secured data or information or file Communication. The program provides a User Interface to convert any file type to base64. The base64 conversion is to remove unreadable characters from your file. You can save your base64 code in a separate file and then convert it back to the original format whenever you want. This program provides a complete graphical interface to look like a wizard, which make conversion easy, understandable and manageable with following FEATURES. 1.Image encoding & decoding 2.Text encoding & decoding 3.Audio encoding & decoding 4.File encoding & decoding

J2E 6048. WIRELESS VIRTUAL NETWORK COMPUTING WVNC (Wireless Virtual Network Computing) software makes it possible to view and fullyinteract with one computer from mobile device anywhere on the Internet. WVNC software is cross-platform, allowing remote control between different types of computer. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software. WVNC has a wide range of applications including system administration, IT support and helpdesks. It can also be used to support the mobile user, both for hot desking within the enterprise and also to provide remote access at home, or on the road. The system allows several connections to the same desktop, providing an invaluable tool for collaborative or shared working in the workplace or classroom. Computer support within the geographically spread family is an ever popular use.

J2E 6049. REMOTE DATA CAPTURE , ACQUISITION AND SENDING SMS TO REMOTE MOBILE USING JSMS This project developed to monitor the temperature or humidity of a remote area to notify the users through his mobile. The remote area can be hospital (monitoring patient temperature), here the device which is going to monitor will be connected to the PC through parallel port. The client application was implemented in java and JSMS (java SMS API) used to send SMS to the users mobile. J2E 6050. RFID BASED EMPLOYEE DATABASE MANAGEMENT SYSTEM RFID based access card used by the employer of any type of organization has been implemented using java1.5 and struts1.2,MsAccess where an employee login and the logout time will be monitored with the help of RFID and the pay slip of the employee will be calculated and updated upto date and time, where the Manager of the organization is responsible controlling the Database(Updating and modifying new employee details , monitoring and managing the employee details with the access card reader.). J2E 6051. REMOTE WEBCAM MONITORING SYSTEM Remote Web Cam allows users to view their web cam images from any remote location. This project was implemented in java(applet).here users are allowed to select their web cam from remote location to view latest snapshot of the web cam images. The remote application directs web cam to take snapshots in the order of frames these frames will be send to remote user. This application helps administrator to monitor their staff if they are out of station.

J2E 6052. IMPLEMENTATION OF CROSS PLATFORM DATABASE ACCESS SYSTEM TO REDUCE SERVER MAINTENANCE & MEMORY COST Traditionally all the databases are stored only in the server node which in turn increases the cost to the server to some extent. In order to avoid this, the new proposed system paves a new way by maintaining the databases not in the server but distributed among the client nodes.

If the database resides in the server as the traditional method the cost of the server such as maintenance costs, memory cost, etc. becomes very high which in turn increases the application

or the system cost. To avoid such unnecessary cost the new proposed system enhances the maintenance of the databases. Moreover the access time of the data from the database residing in a client machine is very much less when compared to the database residing in the server so the data access time is very much reduced and the performance of the system increases. The database does not reside in the server instead it is distributed locally in the clients and so the RMI and RPC has to be used to access the database present over the remote clients. J2E 6053. LIVE MEDIA STREAMING, CONVERGING AND TRANSMITTING USING REAL TIME PROTOCOL (RTP) Live Media can be transmitted from one computer (System to which Camera is attached) using RTP protocol. The main part is to transmit the media from this system to other system. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task. It allows to stream media containing any number of tracks to a number of different hosts/clients on the network simultaneously. Media can be received from the Server to which the Camera is attached and live images are captured. Sitting in different place, we can view whats going on in another place. The main use may be in places where cash transaction is going on. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task. J2E 6054. IMPLEMENTATION OF WIRELESS COMMUNICATION GATEWAY USING INTERNET PROTOCOL Wireless Communication Gateway over IP, details with communication between computer and cell phone using Internet protocol. WCGOIP deals sending a short message from the PC to the intermediate server. Then from the intermediate server it is sent to the Gateway [Simple Wire Server], which has an ip address, which is used by the TCP \ IP to delivery the message to the Gateway. The Gateway connects the Internet to the cell network. The gateway passes the message sent along with the cell number to the appropriate cell network and waits for the response. The cell network route message to the receiver cell phone and sends the status of the message sent to the gateway. Gateway in urn sends the status of the message sent to the intermediate server.

J2E 6055. CRYPTOGRAPHY IMPLEMENTATION OF SECURED DATA TRANSFERMATION Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. Files can be encrypted and the encrypted file can be decrypted using this system via a local network or Internet. This project is implemented by core java, swing, awt.

J2E 6056. CROSS PLATFORM INTEGRATION TOOL FOR ACCESS, MONITORING AND CONTROL OF LINUX & WINDOWS THROUGH JAVA When THIS TOOL starts, you should see a split window. In the upper half you'll see your DOS drives, in the lower half you will see your LINUX drives. Your Linux filesystem is set to read only by default. Uncheck menu item 'File - Linux read only' first, if you want to write to your Linux disk. Modifying or deleting is only possible with Ext2 and Ext3 partitions. ReiserFS partitions are always read only. No files or directories can be modified, deleted or created on or copied to a REISERFS Partition. Add another drive Choose in the Menu 'FILE' the 'Add DOS Drive' or 'Add Linux Drive' menu item or right click in the tree and choose the 'Add Drive ...' menu item of the contextmenu. NOTE: Running CROSS TOOL under Linux, you have to add Linux-drives in this dialog because "ldir -part" of the CROSS TOOL doesn't work under Linux. Enter a valid disk name in the text field 'Drive' and a valid directory in the text field 'Directory' of the shown dialog. To find out, which partitions do contain Linux filesystems, click on the 'PARTITIONS' button in the toolbar. Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and y=1,2,3,..., ReiserFS partitions should be entered as /dev/rdxY (note the "r" instead of "h"!). ReiserFS partitions are read only.

Removing a Drive Right Click on a Drive in the directory tree and choose the 'Remove Drive' menu item of the contextmenu.

Connecting and disconnecting to a remote host (host must be running LREADjav) To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on the 'CONNECT' button in the toolbar or in the Menu 'File' on 'Remote connect ...'. In the dialog box enter the host name and the portnumber (if lreadjav is not running on standard-port) and click OK. To disconnect, click on the 'DISCONNECT button' in the toolbar or in the Menu 'File' on 'Remote disconnect'. Using wildcards If you for example just want to see files with the extension "java" you can set a pattern(*.java) for the DOS and Linux-lists. Choose in the Menu 'File' the item 'DOS Pattern ...' to set the pattern for DOS-files or the item 'Linux Pattern ...' to set the pattern for Linux-files.


SMS or Short Message Service allows Cellular or Mobile GSM phones to send and receive Text Messages. The use of SMS is a convenient and fast means of communication with cellular telephone and pagers. This can be alphanumeric and more recently graphical. A sent SMS message is stored at an SMS Center (SMSC) until the receivers phone receives it. The receiver can identify the sender by his/her telephone number that is included in the message itself. SMS supports several input mechanisms that allow interconnection with different message sources and destinations including voice-mail systems, Web-based messaging and E-mail integration The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become the base system and a foundation of the complete wireless commerce framework, which will be implemented later by ATech Wireless There are 2 modules: Mobile Recharge The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become the base system and a foundation of the complete wireless commerce framework, which will be implemented later by ATech Wireless Transaction on mobile: Transaction on mobile is used to money between two peoples. this two peoples must be registered in a bank. And they should have mobile transaction. this transaction starts with SMS. if user 1 wants to pay Rs.3000 to User 2 .user 1 simply type SMS to particular Bank with his 4 Digit PIN, Amount and Account No. the request is processed by the bank server and Amount is transferred to designation account.

J2E 6058. DESIGN AND DEVELOPMENT OF A NOVEL DISTRIBUTED , SCALABLE FILE SHARING AND ACCESS SYSTEM WITH GUARANTEED SECURITY There has been a huge growth in the use of file sharing software over the last year, making file sharing one of the top uses of the Internet. Napster was the first technology that empowered users with his ability to share files amongst themselves. The demise of Napster led to the development of numerous file sharing technologies, most of which are based on the Gnutella protocol. The problem with all current file-sharing technologies is that none of them can guarantee the security of the shared file. This report describes the design, development and evaluation of a file sharing that proposes a novel solution to the shared file security problem. The system will allow user to share files in a secure manner and comprises of client and server applications. The client allows users to connect to a server and shares their files amongst all other system users. The client also gives users the ability to search for files shared by the other system users, and when a file is found it could be transferred from the other user securely, as the file would be encrypted. The server allows valid users to connect, records their shared file list enables connected users to search this list. The server authenticates connected users by performing a test that only a valid user can respond to in the correct manner. The report outlines research in the area of networking, including technological backgrounds such as distributed file system architectures, cryptographic techniques and network programming methods. The novel feature of the system is the method used to address the security problem inherent to all current file-sharing technologies. The system developed uses cryptographic techniques to implement a framework in which to model system security, including authentication of system users and the files that they share. We can also implement the direct client-to-client communication, so the ideal time of the client must be greatly reduced. Log files are not to be created. This project is highly scalable; it can be applied to WAN. .

J2E 6059. ENHANCED MULTIPURPOSE IMAGING APPLICATION BASED ON IMAGE STATISTICS CONCEPTS The main objective of the project is Image processing .the system to reduce the noise in image and provide the graphical user interface to apply the different properties like applying contrast, brightness, threshold level, color balance and to change the property of the image and provide the useful information about the image .the system is developed in java (SWINGS) Platform :OS independent MODULES Image editing GUI image Process Analyze Window

J2E 6060. REMOTE AND ADVANCED WEB BASED FILE ACCESS AND MANIPULATION SYSTEM This JSP program allows remote web-based file access and manipulation. You can copy, create, move, rename and delete files. Text files can be edited and groups of files and folders can be downloaded as a single zip file that is created on the fly. If you want to copy or move a file, please enter the target directory name in the Edit field (absolute or relative). If you want to create a new file or directory, Enter the name in the edit field. If you click on a header name (e.g. size) the entries will be sorted by this property. If you click two times, they will be sorted descending. The button "Download as zip" let you download the selected directories and files packed as One zip file. The buttons "Delete Files", "Move Files", "Copy Files", delete, move and copy also selected Directories with subdirectories. If you click on a .zip or .jar filename, you will see the entries of the packed file. You can unpack .zip, .jar and .gz direct on the server. For this file type the entry in the Last column is "Unpack". If you click at the "Unpack" link, the file will be unpacked in The current folder. Note, that you can only unpack a file, if no entry of the packed file Already exist in the directory (no overwriting). If you want to unpack this file, you have To delete the files on the server which correspond to the entries. This feature is very useful, If you would like to upload more than one file. Zip the files together on your computer, Then upload the zip file and extract it on the server. You can execute commands on the server (if you are allowed to) by clicking hit "Launch command" Button, but beware that you cannot interact with the program. If the execution time of the program J2E 6061. SCREEN CAPTURE, REMOTE MULTICASTING AND INTEGRATION SYSTEM USING MEDIA TRACKING, BUFFERING & GEOMETRIC CONCEPTS The main objective of this project is to capture the current viewing screen and to multicast the image to different remote system that is the networking System. FOLLOWING ARE THE MODULES SCREEN CAPTURE This module capture the current viewing screen using the concept of media tracking, buffer and geo metric methods

IMAGE CANVAS This module creates image file from captured screen and multicast the different networking system based on the concept of socket programming and buffered image.

TEST MODULE This module implements integration framework based on captured screen module

J2E 6062. HIERARCHY DETECTION AND MANIPULATION SYSTEM A program's object model captures the essence of its design. It is a graph that represents the objects in the program and the relationships between them. For some programs, no object model was developed during design; for others, an object model exists but may be out-ofsync with the code. In maintenance of a project, an object model is invaluable; it is hard to make any progress fixing or reworking a program without an understanding of what objects exist and how they are related to one another. The aim of this project is to automatically generates an object model for a given Java application.. This project performs a lightweight analysis of the bytecodes in the given Java class files and constructs the object model and displays it to the user. It displays the object model in the form of a graph, which is easily understood by the user. J2E 6063. SECURED DATA COMMUNICATION BY ENCODING AND DECODING OF DATA IN J2ME MOBILE TOOLKIT The objective of this project is to send a private (encrypted) SMS between two users to avoid hacking of data while transferring. Here the client and the server application will be installed in two different users mobiles. The client server application will be having two modules that is Encoding and Decoding Encoding is used for encrypting the SMS and Decoding is used for decryption Encoding: original data will be converted into image format Decoding: image format data will be converted into original data. J2E 6064. DEVELOPMENT OF WEB ENABLED ONLINE, DYNAMIC ATM CARD MANAGEMENT SYSTEM ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cards to the bank customers. TO avail the ATM (automatic teller machine) services a customer has to possess a valid ATM card. This project concentrate how to get a ATM card and how it works. A customer has to apply for the ATM card. His application is registered first and then processed. The card is sent to the database and check if the number is present. If it is present, check the amount. It is sufficient then reduces the amount how much he purchase/ want from the database. Or otherwise it print the error message. Once processing is over, the customer's application is genuine, and then ATM card is issued to the customer. There on the customer can perform anytime anywhere transactions on his accounts with the help ATM card by means of various ATM kiosks available in public places or through the internet.


The Mobile Safe Manager application enables users that require to save sensitive information such as Credit Card, Bank Account Computer Login and General details to store such details in encrypted form on the phone. All data stored on the phone is protected by 3DESede 168 bit strong encryption. The key for the user generates this encryption when the application is installed, so there is not secret key held in the application. Only you, the user know the key that will unlock your data. New mobile phones can do more than just provide communications, they have the ability to run downloadable programs and even store data. This Project We have developed Mobile Safe Manager to take advantage of these new mobile phones. If the Mobile is lost with the application running, all about the private information is available With mobile Safe after a 2 minute of inactivity period, the screen is locked automatically and the user has to re-enter the password to log inside again. J2ME 6066. DESIGN AND DEVELOPMENT OF A REMOTE CITY MAPPING SYSTEM This Project teaches us how to develop a Remote City Mapping. This Guide will help a visitor to a city to obtain information about places of importance, Bus route, Train Details and including all related details on a Java-enabled device such as a mobile phone. We can develop the application using J2ME (Java 2 Micro Edition), to understand the development of embedded applications for mobile devices, which have limited processing power and memory .A server contains a database of the cities and the places of interest, along with details about each place. A user can access this information through a GUI provided on the mobile device using the APIs - MIDP (Mobile Information Device Profile). General Information Guide Boarding Guide Recreation Guide Tourism Guide Transportation Guide Industrial Guide Institutional Guide

J2E 6067. THREE DIMENSIONAL (3D) GRAPHICS, IMAGE PROCESSING AND TERRAIN RENDERING SYSTEM The objective of this project is Image processing developed in advanced java by Using Java 3D Software. It provides fast way to create 3 Dimensional graphics applications. The Java3D API is a hierarchy of Java classes which serve as the interface to a sophisticated threedimensional graphics rendering. The programmer works with high-level constructs for creating and manipulating 3D Geometric objects Textured rendering Resolution Rotation Wire Frame Rendering

J2E 6068. IMPLEMENTATION OF VIRTUAL SIMULATION OF REALTIME ATM Now-a-days ATM is widely used by the peoples of all communities. The bank installs ATM in every location of a city in order to have a quick and safe withdrawal of the money. Before installing the original ATM in a particular location, the transactions, operations and efficiency are tested with the help of the ATM Simulator.

ATM Simulator allows banks to view ATM downloads directly from their desktop PC, exactly as they would appear on a real ATM (NCR, Diebold, Wincor-Nixdorf etc.). ATM Simulator connects as a virtual ATM into your existing host
system, and behaves in exactly the same way as a real ATM. Through the unique use of ATM hardware "personalities", any type of ATM can be simulated in this way, avoiding the need for costly ATM hardware simply to test transactions.ATM Simulator allows banks to automate the regression testing of their ATM transactions. No longer must bank staff spend time manually testing transactions on real ATMs, and simulating hardware faults by jamming the ATM devices. Test scripts can be replayed at any time without the intervention of an operator, and the results tabulated in a graphical easy-to-read format. J2E 6069. ROBOT CONTROL FROM MOBILE The project was developed in J2ME toolkit and servlet using web logic server as web server. The objective of this project is to control the mechanism of a ROBOT by the human through his mobile. Here J2ME toolkit will be used to design client application, which can be executed from any java enabled GPRS mobile. The client applet which is running the mobile will be interacting with the servlet which is running in the web server (Web logic) through which the ROBOT which has been connected with the PC will be controlled based on the users command

J2E 6070. JAVA BASED FIRE ALARMING The project was developed using java & J2ME, the objective Of this project is to control the fire within the normal and maximum limits and if it exceeds the limits, then to alert the authorized person by sending sms from system(PC) to his mobile.

Software Requirement: JDK 1.5 J2ME toolkit JSMS API Hardware Requirement: Mobile Data cable Parallel port


A packet sniffer (also known as a network analyzer or protocol analyzer or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel back and forth over the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications. On wired broadcast LANs, depending on the network structure (hub or switch), one can capture traffic on all or just parts of the traffic from a single machine within the network; however, there are some methods to avoid traffic narrowing by switches to gain access to traffic from other systems on the network (e.g. ARP spoofing). For network monitoring purposes it may also be desirable to monitor all data packets in a LAN by using a network switch with a so-called monitoring port, whose purpose is to mirror all packets passing through all ports of the switch. On wireless LANs, one can capture traffic on a particular channel. On wired broadcast and wireless LANs, in order to capture traffic other than unicast traffic sent to the machine running the sniffer software, multicast traffic sent to a multicast group to which that machine is listening, and broadcast traffic, the network adapter being used to capture the traffic must be put into promiscuous mode; some sniffers support this, others don't. On wireless LANs, even if the adapter is in promiscuous mode, packets not for the service set for which the adapter is configured will usually be ignored; in order to see those packets, the adapter must be put into monitor mode.

J2E 6072. ONLINE JAVA COMPILER AND SECURITY EDITOR This Project is mainly used to create, compile the java program. The client machine doesnt having the any java compiler. That is client machine doesnt having the java development kit. the client machine having only to connect to the java server. The client machine only write a java program and to send to server. The server having java compiler. The server create the new directory and save the client file and then compile java file and generate the error message .this message is going to send the client .if the java program havent any error means then server send message to the client No Error. In this project is also creating the security editor. This editor is performing encryption and decryption process. The client creates text and save it to the server. The server perform encrypt the file and save it to the file. The server also perform decrypts the file and save it to the file. These two processes are doing by means of the security algorithms. In this project use very famous security algorithms is RSA Algorithms.


The communication module deals with the various aspects involved during a conversation between the users. The conference module involves with the way of communication between the various users. The security module provides auto security to both voice and data. The communication module is further divided into two modules. They are client module and server module. The client module deals with the various information required for the various clients

to involve in the conferencing. The client module does the validation process on the information given by the user attached to the server. The server module does the authentication process on the clients attached for the conferencing. Then those clients who are recognized are allowed to communicate with each other. The conference module is further divided into two modules. They are the broadcasting module and unicasting module. The conference may be in either text format or audio format. The users are free to choose their requirement. In broadcasting module, the clients are allowed to communicate with each other, without any restriction to the number of clients attached to the server. In the unicasting module, any two or group members connected to the server can communicate within themselves. That is messages secured within that group.

IEEE PROJECTS ( 2008-2009-2010)

JIEEE01: SECURE MOBILE PAYMENT SYSTEM IN WIRELESS ENVIRONMENT Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile payment is considered as the accelerator of e-commerce and mcommerce. Currently mobile payments deal with several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes for consumers, improving the security of payment, especially the application of digital signing in mobile payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile transactions over Bluetooth communications but also supports the related secured transactions between the payment server and mobile clients. Finally, we have discussed some of the performance parameters such as: time required to password hack for various character lengths, delay and probability error rate


By adapting the Drupal system to mobile phones we try to target multiple goals: Content management system makes content creation and management of the personal website of your mobile phone easy. Via the additional modules developing personal web sites for a variety of purposes becomes easier. With the creation of APIs that allow Drupal to access data in the core applications of the mobile phone we can create new website functionality that takes advantage of features available in the mobile devices. Drupal provides a very good test case for the underlying layers of the architecture. JIEEE03: J2ME AND SMART PHONES AS PLATFORM FOR A BLUE TOOTH BODY AREA NETWORK FOR PATIENT-TELEMONITORING This project deals with problems of utilization of mobile equipment working in the biomedicine field, particularly telemedicine. The basic idea is to create a system that controls important information about the state of wheelchair bound person like monitoring of ECG and pulse in early phases, then other optional values like temperature or oxidation of blood. Sometimes middle-aged people have a collapse, breakdown or heart attack and must be in hospitals or health resorts for a long time to regenerate their bodies. The time that they spend in these institutions, is nonutilisable and very long for them. Possibilities of today physics are restricted by many of prescripts so patients cannot use some of the newest techniques (like hyperbaric or arctic chambers), which make it possible to reduce the regeneration time by weeks or months. This system consists of several interconnected parts that can communicate among themselves, so they can approach their function. These parts are measuring sensor, PDA or embedded device, and server for data processing and evaluation. Beside these, the most important parts that are worth mentioning are various kinds of accessories, such as GPRS, WiFi, GSM, Bluetooth or GPS modules. By means of them we can communicate. We mostly use the fastest technology in signal coverage


. Unhindered connectivity to a computer & the need of the hour. The ability to connect to e remote machine and control it will have inflate advantages. J2ME (JAVA 2 Micro Edition) is a platform created to enhance application development for mobile phones. Using the platform we have crested an application which can control any desktop computer or a server by sending the required commands over an HTTP Connection. The main aim of the application is to remote & access and control different applications on a static IP PC by connecting to it over a GPRS link from a J2ME enabled cell phone. The possible applications are: 1.) Launching Word pad. 2.) Shutting down and restarting or logging off from your machine. 3.) Open & Save WordPad Files into the Remote machines.

JIEEE05: MOBILE BANKING SECURITY USING STEGANOGRAPHY Upon development of m-commerce as one of the new branches of e-commerce, mbanking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture by the password and is put on a site. Then the address of the picture is sent to the user. After receiving the address of the picture through SMS, the user downloads the picture by a special program. After entering the password, the user can witness the information extracted from the picture if the password is entered correctly.


Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a mobile peer-to-peer video-on-demand application based on ubiquitous WiFi enabled devices such as smartphones and Ultra Mobile PCs. MOVi poses new challenges in on-demand video streaming caused by limited wireless communication range, user mobility and variable user population density. MOVi addresses these challenges by exploiting the opportunistic mix use of downlink and direct peer-to-peer communication to significantly improve achievable overall system throughput. Through simulation and actual implementation, we observed that MOVi is able to increase the number of supported concurrent users two fold compared with unicast based on-demand video streaming, as well as reducing video start-up delay by half. Significantly, these performance improvements can be achieved without increasing power consumption at the

end device. Using MOVi, users not only share and distribute on-demand video such as YouTube clips for their own performance gain but also for the benefit of the collaborative group.

JIEEE07:RFID CREDIT CARDS SYSTEM. Online shopping using electronic payment scheme has gained a lot of popularity in recent years. In an electronic payment scheme using normal credit cards there is no way to genuinely identify owner of the credit card. Credit card fraud is the fastest growing crime all over the world. Any effort to plug the security hole especially for online payment is considered worthwhile.

A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming increasingly popular, with applications like credit-cards, national-ID, passports, and physical access. The security of such applications is clearly critical. A key feature of RFID-based systems is their very short range: typical systems are designed to operate at a range of 10cm.

RFID enabled credit cards are becoming increasingly popular as contactless credit cards. We envision a future where RFID credit cards will be used for online shopping. RFID system has tremendous potential to render electronic payments more secure than normal credit cards. The word RFID enable credit cards may bring in mixed passion, enthusiasm and perhaps even rage! This is partly paranoia and partly reality. The reality is that an intruder can read RFID cards without the user even noticing it. This brings in a zone of discomfort and leads to paranoia. Certain interactivity should exist to bring back this comfort to the user. This paper tries to make an effort in that direction. In this paper we propose mobile phone based architecture for secured electronic payments using RFID credit cards.


In this project we present a strategy for using the cellular network, and specifically the general Packet Radio Service, to teleoperate a mobile robot. This allows the system user a wider mobility range and coverage. The system application is developed using Java Programming Language, implementing two teleoperation methods: predefined sequences and instant actions.

JIEEE09:ADDRESS AUTOCONFIGURATION AND ROUTE DETERMINATION MECHANISMS FOR THE MANET ARCHITECTURE OVERCOMING THE MULTI-LINK SUBNET MODEL The mobile ad hoc network (MANET) is a wireless network composed of mobile nodes which can communicate with each other via multiple wireless links. Previously, the MANET has been considered as a single subnetwork, so all nodes in a MANET are assigned the same subnet prefix, which is the multi-link subnet model. In order to resolve the multi-link subnet problem, the modified MANET architecture was proposed in [12]. In this paper, we propose an address autoconfiguration mechanism and a route establishment mechanism for the modified MANET architecture. Our proposed mechanism can prevent the performance degradation caused by broadcasting control messages of a reactive routing protocol such as the Ad-hoc On-demand Distance Vector (AODV). We evaluate the performance of the proposed mechanisms by carrying out NS-2 based simulations JIEEE10:PIDS: A PACKET BASED APPROACH TO NETWORK INTRUSION DETECTION AND PREVENTION Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. And practically all of them require some kind of termination in network connections So, the quest for betterment continues. In this progression, here we present PIDS: a complete intrusion detection system which reduces most of the problems contained by the previous systems and it doesnt need to terminate any network connections to detect the intruder. This system generates quick responses against intrusions and stops the intruder to proceed for further attacks. JIEEE11: RIMOM: A DYNAMIC MULTISTRATEGY ONTOLOGY ALIGNMENT FRAMEWORK Ontology alignment identifies semantically matching entities in different ontologies. Various ontology alignment strategies have been proposed; however, few systems have explored how to automatically combine multiple strategies to improve the matching effectiveness. This paper presents a dynamic multistrategy ontology alignment framework, named RiMOM. The key insight in this framework is that similarity characteristics between ontologies may vary widely. We propose a systematic approach to quantitatively estimate the similarity characteristics for each alignment task and propose a strategy selection method to automatically combine the matching strategies based on two estimated factors. In the approach, we consider both textual and structural characteristics of ontologies. With RiMOM,

we participated in the 2006 and 2007 campaigns of the Ontology Alignment Evaluation Initiative (OAEI). Our system is among the top three performers in benchmark data sets.

JIEEE12: MINING OF DEFECT IN SOFTWARE AND DEFECT CORRECTION EFFORT PREDICTION Much current software defect prediction work focuses on the number of defects remaining in a software system. In this paper, we present association rule mining based methods to predict defect associations and defect correction effort. This is to help developers detect software defects and assist project managers in allocating testing resources more effectively. We applied the proposed methods to the SEL defect data consisting of more than 200 projects over more than 15 years. The results show that, for defect association prediction, the accuracy is very high and the false-negative rate is very low. Likewise, for the defect correction effort prediction, the accuracy for both defect isolation effort prediction and defect correction effort prediction are also high. We compared the defect correction effort prediction method with other types of methodsPART, C4.5, and Nave Bayesand show that accuracy has been improved by at least 23 percent. We also evaluated the impact of support and confidence levels on prediction accuracy, false negative rate, false-positive rate, and the number of rules. We found that higher support and confidence levels may not result in higher prediction accuracy, and a sufficient number of rules is a precondition for high prediction accuracy.