Mca & diplamo java titles


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Mca & diplamo java titles

  1. 1. JAVA / J2EE / J2ME PROJECTS LISTJ2E 6001. IMPACT OF ADAPTIVE RESOURCE ALLOCATION IN UTILITY CLUSTERCOMPUTING ENVIRONMENTSMaximizing resource provider profit and satisfying user requirements at the same time is achallenging problem in utility computing environments. In this paper, we intro- duce adaptiveresource allocation requests and investigate the impact of using them in utility clustercomputing environments. The Service Level Agreements established between users andresource providers rely not only on fixed values, but also on functions that associateallocation parameters. In addition, the resource provider scheduler can automatically modifythe number of resources and usage time of allocation requests, as well as split them into subrequests. Users may receive incentives for supplying flexible requests which produce morescheduling options. By using rescheduling, resource providers are able to prioritize the mostprofitable requests dynamically and still satisfy the requirements of the already accepted userrequests. From our experimental results we observed an increase of 14% in the resourceprovider profit and a reduction of 20% in the average response time of user requests whencompared to traditional approaches.J2E 6002. RANK AGGREGATION FOR AUTOMATIC SCHEMA MATCHINGSchema matching is a basic operation of data integration and several tools for automating ithave been proposed and evaluated in the database community. Research in this area revealsthat there is no single schema matcher that is guaranteed to succeed in finding a goodmapping for all possible domains, and thus an ensemble of schema matchers should beconsidered. In this paper we introduce schema meta-matching, a general framework forcomposing an arbitrary ensemble of schema matchers, and generating a list of best-rankedschema mappings. Informally, schema meta-matching stands for computing a “consensus”ranking of alternative mappings between two schemata, given the “individual” gradedrankings provided by several schema matchers. We introduce several algorithms for thisproblem, varying from adaptations of some standard techniques for general quantitative rankaggregation to novel techniques specific to the problem of schema matching, and tocombinations of both. We provide a formal analysis of the applicability and relativeperformance of these algorithms, and evaluate them empirically on a set of real-worldschemata.J2E 6003. AUTOMATIC FUZZY ONTOLOGY GENERATION FOR SEMANTIC WEBOntology is an effective conceptualism commonly used for the Semantic Web. Fuzzy logiccan be incorporated to ontology to represent uncertainty information. Typically, fuzzy ontologyis generated from a predefined concept hierarchy. However, to construct a concept hierarchyfor a certain domain can be a difficult and tedious task. To tackle this problem, this paperproposes the FOGA (Fuzzy Ontology Generation framework) for automatic generation offuzzy ontology on uncertainty information. The FOGA framework comprises the followingcomponents: Fuzzy Formal Concept Analysis, Concept Hierarchy Generation, and FuzzyOntology Generation. We also discuss approximating reasoning for incremental enrichment ofthe ontology with new upcoming data. Finally, a fuzzy-based technique for integrating otherattributes of database to the ontology is proposed.J2E 6004. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESSSENSOR NETWORKSWhile in-network data fusion can reduce data redundancy and, hence, curtail network load,the fusion process itself may introduce significant energy consumption for emerging wirelesssensor networks with vectorial data and/or security requirements. Therefore, fusion-drivenrouting protocols for sensor networks cannot optimize over communication cost only—fusioncost must also be accounted for. In our prior work [2], while a randomized algorithm termed
  2. 2. MFST is devised toward this end, it assumes that fusion shall be performed at anyintersection node whenever data streams encounter. In this paper, we design a novel routingalgorithm, called Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering.Not only does AFST jointly optimize over the costs for both data transmission and fusion, butalso AFST evaluates the benefit and cost of data fusion along information routes andadaptively adjusts whether fusion shall be performed at a particular node. Analytically andexperimentally, we show that AFST achieves better performance than existing algorithms,including SLT, SPT, and MFST.J2E 6005. WIRELESS MAC PROTOCOL USING IMPLICIT PIPELININGAbstract: In distributed multiple access control protocols, two categories of overhead areusually associated with contention resolution. One is channel idle overhead, where allcontending stations are waiting to transmit. Another is collision overhead, which occurs whenmultiple contending stations attempt to transmit simultaneously. Either idle overhead orcollision overhead being large, contention resolution algorithm would be inefficient. Priorresearch work tries to minimize both the idle and the collision overheads using variousmethods. In this paper, we propose to apply “pipelining” techniques to the design of multipleaccess control protocol so that channel idle overhead could be (partially) hidden and thecollision overhead could be reduced. While the concept of pipelined scheduling can beapplied to various MAC protocol designs in general, in this paper, we focus on its applicationto IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage contention resolutionMAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of contentionresolution degrades dramatically with the increasing load due to high probability of collision.Using the implicit pipelining technique, DSCR hides the majority of channel idle time andreduces the collision probability, hence, improves channel utilization, average access delay,and access energy cost over 802.11 significantly both in wireless LANs and in multihopnetworks. The simulation results, as well as some analysis, are presented to demonstrate theeffectiveness of DSCR.J2E 6006. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTINGPROTOCOL The goal of our project is to proactively disseminating the broken link information tothe nodes that have that link in their caches. We define a new cache structure called a cachetable and present a distributed cache update algorithm. Each node maintains in its cachetable the information necessary for cache updates. When a link failure is detected, thealgorithm notifies all reachable nodes that have cached the link in a distributed manner. Weshow that the algorithm outperforms DSR with path caches and with Link-MaxLife, anadaptive timeout mechanism for link caches. We conclude that proactive cache updating iskey to the adaptation of on-demand routing protocols to mobility.J2E 6007. ON SELFISH ROUTING IN INTERNET-LIKE ENVIRONMENTA recent trend in routing research is to avoid inefficiencies in network-level routing by allowinghosts to either choose routes themselves (e.g., source routing) or use overlay routingnetworks (e.g., Detour or RON). Such approaches result in selfish routing, because routingdecisions are no longer based on system-wide criteria but are instead designed to optimizehost-based or overlay-based metrics. A series of theoretical results showing that selfishrouting can result in suboptimal system behavior have cast doubts on this approach. In thispaper, we use a game-theoretic approach to investigate the performance of selfish routing inInternet-like environments based on realistic topologies and traffic demands in oursimulations. We show that in contrast to theoretical worst cases, selfish routing achievesclose to optimal average latency in such environments. However, such performance benefitscome at the expense of significantly increased congestion on certain links. Moreover, theadaptive nature of selfish overlays can significantly reduce the effectiveness of trafficengineering by making network traffic less predictable.J2E 6008. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATIONPROTOCOLS FOR DYNAMIC PEER GROUPS
  3. 3. We consider several distributed collaborative key agreement and authentication protocols fordynamic peer groups. There are several important characteristics which make this problemdifferent from traditional secure group communication. They are: 1) distributed nature in whichthere is no centralized key server; 2) collaborative nature in which the group key iscontributory (i.e., each group member will collaboratively contribute its part to the global groupkey); and 3) dynamic nature in which existing members may leave the group while newmembers may join. Instead of performing individual rekeying operations, i.e., recomputing thegroup key after every join or leave request, we are going to re key for a batch of join andleave operations.J2E 6009. TCP-LP: LOW-PRIORITY SERVICE VIA END-POINT CONGESTION CONTROLService prioritization among different traffic classes is an important goal for the Internet.Conventional approaches to solving this problem consider the existing best-effort class as thelow-priority class, and attempt to develop mechanisms that provide “better-than-best-effort”service.We explore the opposite approach, and devise a new distributed algorithm to realize a low-priority service (as compared to the existing best effort)from the network endpoints. To thisend, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilizeonly the excess network bandwidth as compared to the “fair share” of bandwidth as targetedby TCP.The key mechanisms unique to TCP-LP congestion control are the use of one-way packetdelays for early congestion indications and a TCP-transparent congestion avoidance policy.J2E 6010. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING INNEXT GENERATION MOBILE NETWORKSThe next-generation mobile network will support terminal mobility, personal mobility, andservice provider portability, making global roaming seamless. A location-independentpersonal telecommunication number (PTN) scheme is conducive to implementing such aglobal mobile system. However, the nongeographic PTNs coupled with the anticipated largenumber of mobile users in future mobile networks may introduce very large centralizeddatabases.J2E 6011. SHORTEST PATH FINDING USING GPS BASED NAVIGATION SYSTEM INCRITICAL SITUATIONIn this Project we propose a system which would be very useful for the Patients who haveCritical Heart Attacks and their Condition could be informed to the nearest Hospital, so as tosave the life of the Patient. Here in this project if the patient gets Heart attack, h/she has togive a input to the GPS system, so that GPS is get activated, this immediately transmits theLongitude and Latitude Values to the Central Station or the Server where all the Longitudeand Latitude Values of Hospital would be maintained. Here in the Central Server the data isgetting processed and it could able to find the Nearest Hospital to the Patient‟s House and theServer sends the message to the Nearest Hospital. Nearest Hospital will get the data andimmediately the Ambulance is send to the Patient‟s House, so as to save the Human Life.J2E 6012. NETWORK INTRUSION DETECTION Network intrusion detection has generally been dealt with using sophisticatedsoftware and statistical analysis tools. However, occasionally network intrusion detection mustbe performed manually by administrators, either by detecting the intruders in real-time or byrevising network logs, making this a tedious and time-consuming labor.To support this, intrusion detection analysis has been carried out using visual, auditory ortactile sensory information in computer interfaces. However, little is known about how to bestintegrate the sensory channels for analyzing intrusion detection. We propose a multimodalhuman-computer interface to analyze malicious attacks during forensic examination ofnetwork logs.
  4. 4. J2E 6013.HONEY POTS – A SECURITY SYSTEM TO IDENTIFY BLACK HAT COMMUNITY IN THE NETWORKSWith a majority of Internet service subscribers changing over from conventional dial upconnections to faster and cheaper T1, Cable, ISDNS, DSL, it yields new problems for theexisting subscriber base that contain majority of novice users in terms of Internet Security.Today‟s Internet security is restricted to personal and network firewalls installed either on thehost‟s computer or a network gateway or a router. A Honey pot is a comprehensive security system, which attracts hackers to attackthem thereby finding out the types of attacks and black hat community motives. A Honey pot is a security resource whose value lies in being probed, attacked, orcompromised. The key point with this definition is honey pots are not limited to solving onlyone problem. They have a number of different applications. To better understand the value ofhoney pots, we can break them down into two different categories:  Production  Research Production honey pots are used to protect your network. They directly help secureyour organization. Research honey pots are different; they are used to collect information.That information can then be used for a variety of purposes, such as early warning andprediction, intelligence gathering, or law enforcement. Honey pots can be made more efficient by simulating some services, which will lurethe attackers in to the trap.J2E 6014.INTERANET TRANSFERMATION OF VOICE WITH DATA USING VOICE OVER INTERNET PROTOCOL(VOIP) Voice over IP (VOIP) is new technology that allows the passing of speech informationover IP data networks. In contrast to common traditional telecommunications, which movesvoice traffic over the special Public Switched Telephone Network (PSTN), VOIP technologymeans that the voice shares the same network with the data in a true voice−dataconvergence. VOIP has all the well publicized advantages inherent in having a unified datanetwork infrastructure to manage all communications needs. Care must be taken, however toensure that the voice quality is preserved when a data network is used to pass voiceinformation. Traditionally, voice and data networks have been supported by two separatedinfrastructures. The voice transport over IP (VOIP) offers service providers the advantage ofintegrating their networks into a single infrastructure. The substitution of traditional voicenetworks by VOIP will depend on the capability to offer to the end user a similar quality. From a practical standpoint it makes no sense to transmit digitized voice samples thatcontain only a period of silence. Packets containing period of silence add to network trafficand can adversely affect the transmission and delivery of other packets carrying digitizedvoice samples from the same or different callers. The bandwidth is not effectively used due tothe transmission of unnecessary silence packets across the networks. Hence, the Quality ofService is affected due wastage of bandwidth.
  5. 5. J2E 6015. GPS BASED VEHICLE LOCATION TRACKING SYSTEMVehicle tracking using GPS (Global Positioning System) is fully integrated into the VTS(Vehicle Tracking System). GPS was developed by the U.S. military to enable accuratenavigation. 24 satellites have been placed in orbit some 20.000 km from the earths centre.The vehicle to be tracked is fitted with a GPS receiver and a small antenna. GPS satellitesare continuously transmitting a radio message containing information including when the datawas sent, which satellite sent it and the current reliability of the system. The GPS receiverfitted in the vehicle receives information from at least 4 satellites and carries out thenecessary calculations to determine its current position. The vehicle tracking device VTU isthe total security protection and fleet management solution. By using the latest GPS and GSMtechnology to protect and monitor your car, truck, bike, boat (or moveable asset) virtuallyanywhere and then locate it to within a few meters. The device incorporates a covertlyinstalled module (which works and communicates independently) but has the ability to run inconjunction with your local GSM network (DTMF, voice message, SMS, GPRS or GSMmodem call). The external data processing of data and communication are done usingATMEL AT89c51 OR ARM ARM7TDMI-S (T.M) core logic 32bit controller as per the choice.Anyway both of these projects can also be integrated to PC using java background via RS232communication or can be displayed on a local 2 X 16 LCD panel. For mapping on GoogleEarth.J2E 6016. SIP - COMMUNICATOR BASED TELE- CONFERENCING SYSTEM A teleconferencing project has been implemented in java1.5, sip alpha and Asteriskserver1.4 server provides the customer care and the call centers for secured way fortelemarketing in real-time environment (salesman of the company contacts customer forproduct sales or customer contacts salesman for queries about the product) this projectfeatured with Music On hold, Voice Recording, and Authentication through DTMF technology.Session initiation protocol integration involves registering services to the Locating Serviceeither within LAN network or using proxy server.J2E 6017. ONLINE LIVE SECURITY SYSTEM USING MEDIA CONVERGING & MOTION DETECTION TECHNIQUE During nighttime, the possibility of theft is more. Hence, a camera is switched on. If itfinds any movement on the pointed place, it immediately sends the mail and give the Beepsound to the Security guard on alert. Else if motion is detected, it alerts everybody onSecurity Guard. Unless and otherwise, security guard switch of the camera and System, theprocess goes on.J2E 6018. LOCATION AIDED ROUTING (LAR) PROTOCOL BASED ROUTE IDENTIFICATION, MAINTENANCE DATA TRANSFER IN AD-HOC NETWORKS Ad Hoc Network (MANET) process consists of two nodes. Because of the limitedrange of communication of a wireless host, it is necessary to perform multi hopping. Routingprotocol is used to find routes along which multi-hoping will be performed. Location AidedRouting (LAR) protocol is one which utilizes the location information of a node to limit thesearch. Location Aided Routing is an on-demand routing protocol in which the routes arefound only when required. Route Discovery: Identifies and establishes route between hosts. In LAR,restrictive flooding of control packets is done to discover the route. Route Maintenance: Supervises the data transfer between the two nodes. Ifany error occurs during data transfer, necessary steps are executed to continue transfer ofdata.
  6. 6. By Implementing the LAR algorithms, we have further reduced the flooding region andeliminated looping problems.J2E 6019. RFID BASED HOSPITAL MANAGEMENT SYSTEM RFID based access card used by the hospital employee , project has been implemented tomaintain the hospital details in an centralized database using MySql5.0 as the backend wherethe employee could able to manage the hospital details using the front end tool which hasbeen designed using java1.5 .Employee Authentication done through RFID based accesscard, integrated with the RFID card reader.J2E 6020. NETWORK LOAD BALANCING AND REDISTRIBUTION OF THE TRAFFIC OVER THE NETWORKS USING GRID COMPUTING SYSTEMIn a Network Grid computing enhances the scalability and availability of mission-critical,TCP/IP-based services, such as Web, Terminal Services, virtual private networking, andstreaming media servers. This component runs within cluster hosts as part of a operatingsystem and requires no dedicated hardware support. To scale performance, Network TrafficAnalyzer distributes IP traffic across multiple cluster hosts. It also ensures high availability bydetecting host failures and automatically redistributing traffic to the surviving hosts. NetworkTraffic Analyzer provides remote controllability and supports rolling upgrades from aoperating system.The unique and fully distributed architecture of Network Clustering enables it to deliver veryhigh performance and failover protection, especially in comparison with dispatcher-based loadbalancers. This project describes the key features of this technology and explores its internalarchitecture and performance characteristics in detail. The unique and fully distributedsoftware architecture of Network Traffic Analyzer enables it to deliver the industrys best loadbalancing performance and availability.J2E 6021. MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT“Video Streaming” is an application designed to transfer the stored video images from onenode to another. The application allows the mobile user to see video file with the intranetnetworks with which server (J2EE SERVER) running on the other machine. Video Streaminggives the user high quality images with much less (General Packet Radio Service) GPRS orUniversal Mobile Telecommunication System (UMTS) traffic, so the communication with theintranet.ADVANTAGES 1. Video Streaming captures the Video file from the server to the client mobile. 2. Here the images are transferred byte-by-byte mode. 3. The server will store the images accordingly to the user and each image will be captured and each image will be transmitted to the mobile.J2E 6022. NETWORK CONGESTION AVOIDANCE USING NETWORK BORDER PATROL (NBP)The end-to-end nature of congestion control is an important factor in its scalability androbustness. However, end-to-end congestion control algorithms alone are incapable ofpreventing the congestion collapse and unfair bandwidth allocations created by applications,which are unresponsive to network congestion. In this project, we propose and investigate anew congestion avoidance mechanism called Network Border Patrol (NBP). NBP is a core-stateless congestion avoidance mechanism and Parallel downloading is a technique toimprove the performance of transferring large files. It assumes that many nodes (servers) in
  7. 7. the network have the requested file. A node (client) that wants to get that file can connect tosome or all of the servers in parallel and download different parts of the file from each ofthem. The aggregate transfer rate that the client observes is the sum of the transfer rates onthe paths from each of the servers to the client. In order for the aggregate transfer rate to behigher that the maximum transfer rate which can be obtained by connecting to only oneserver.J2E 6023. JAVA-BASED HOME AUTOMATION SYSTEM This project is aimed to control devices by achieving Java based Homeautomation. Here we use Java application (J2ME) in PC, AT89c51, parallel port and LoadDriving Circuit. Here the user can give the control command for a particular device throughJava mobile application (J2ME) in PC, which is then transmitted through parallel port. In thereceiving end the microcontroller receives the device command and recognizes the commandand controls the corresponding device through the Load driving circuit. The load driving circuitconsists of a Darlington pair IC for current amplification and relays, which are used to switchthe devices ON/OFF.J2E 6024. GSM BASED REMOTE BIO- MEDICAL INVETIGATION With the J2ME as back end, the project is used to send SMS and monitor the status of aperson. Such as heart beat and temperature and informs it to the mobile number specified;the heart of the chip is the at89c52 controller and java back end. The heart rate detector unitand the temperature sensor unit is fitted to the patient and the data output is fed to themicrocontroller via the analog to digital converter the data from the adc is in 8 bit format, it isthen processed by the microcontroller and whenever the safe ranges is violated the controllerproduces a alarm, and visual display, as well as initiates the pc to send the SMS to aspecified mobile number using a mobile phone which is interfaced with the pc.J2E 6025. AUTENTICATION OF DIGITAL IMAGES BY ENCYPTION AND DECRYPTIONWITH PRIMARY KEY IMPELMENTATION USING LSB ALGORITHM ANDSTEGANOGRAPHYThis Project is to provide the security for images by using key concepts. This project uses theLSB algorithm for data hiding and data extraction. There is a growing importance ofsteganography in intelligence work, as it is viewed as a serious threat to some governments.In future we would like to implement steganography using audio and video files. A majoradvantage of the LSB algorithm is it is quick and easy. There has also been steganographysoftware developed which work around LSB color alterations via palette manipulation. LSBinsertion also works well with gray-scale images. The project that is implemented deals withdigital images acting as a cover medium to store secret data in such a manner that becomesundetectable. Hence it provides a very high means of security without suspicionJ2E 6026. RFID BASED TRAIN SPEED AND TIME MONITORINGThe project uses the RFID readers and tags, the tag is fitted on the train engine, each traincarries its own identified tag, and the readers are fitted in each side on level crossing with aclearance of 3 km from the level crossing. The reads the tag id once the train nears the levelcrossing and passes to the microcontroller, the microcontroller in turn notes the id anddisplays the train name, and also closes the gate, and at once the train crosses the other endthe reader reads the tag and feeds it the microcontroller, the microcontroller in turn opens thegate. The microcontroller can also be programmed to send the Rfid data to the system, sothat with the java backend we maintain the database, time of crossing and speed of the train.J2E 6027. ENHANCING THE QUALITY OF SERVICE IN VOIP  Supporting dedicated bandwidth
  8. 8.  Improving loss characteristics  Avoiding and managing network congestion  Shaping network traffic  Setting traffic priorities across the networkQoS usually refers to the fidelity of the transmitted voice and facsimile documents, it can alsobe applied to network availability (call capacity or level of all blocking), telephone featureavailability (conferencing, calling number display), and scalability(any-to-any, universal andexpandable).The common part in the two modules is the requirement of „Sound Recorder and Player‟ forrecording the voice and playing back the voice to user. The connection is to be establishedbetween the users for transmission of voice across the network. For establishing connection,the existing TCP/IP protocol is to be used in the LOCAL AREA NETWORK.Quality of Service for Voice over IP discusses various QoS concepts and features that areapplicable to VoIP.  It must include silence tag to generate silence at the receiver‟s end.  The quality of service is enhanced by utilizing the available bandwidth.  In another Technique, text data is inserted in the place of the silence.  The text is extracted from the voice.J2E 6028. AUDIO CONFERENCE THROUGH SPEEX AND ILBC CODEC Speex / ILBC codec are one of the solutions to the problem study done on the latency,delay and bandwidth, audio quality of java media framework. speex / ilbc codec meant forencoding and decoding audio data through RTP protocol , where usage of speex / ilbc codecimproves better voice quality when compare to ulaw,alaw and gsm codec presents in existingjava media framework.J2E 6029. MOBILE AGENT BASED STORING AND RETRIEVAL OF MULTIMEDIA FILESFROM THE DISTRIBUTED MULTIMEDIA DATABASEThis project mobile agent are used to store and retrieve a multimedia data from the distributedmultimedia database using mobile agents based on host database provide the result to theuser upon request. This project uses the mobile agents effectively to retrieve multimediadatabase at a faster rate and at lower bandwidth using agents in a distributed environment.One of the paradigms that have been suggested for allowing efficient access to remoteresources is a transportable agent. A transportable agent is a named program that canmigrate from machine to machine in a heterogeneous network. The program chooses whenand where to migrate. It can suspend its execution at an arbitrary point, transport to anothermachine and resume execution on the new machine. Transportable agents have severaladvantages over the traditional client/server model. Transportable agents consume lessnetwork bandwidth and do not require a connection between communicating machines - thisis attractive in all networks and particularly attractive in wireless networks.J2E 6030. MOBILE BASED REMOTE NETWORK MONITORING AND CONTOL SYSTEM USING HTTP TUNNELING, RMI & SOCKET
  9. 9. The Objective of this project is to monitor the client machines, which are all present in thenetwork (LAN, WAN, MAN) through user mobile from any remote location. The maintechnologies used in this project was HTTP tunneling, RMI, Socket connection. Here usercould see the client list which are all connected to the online server through his mobile, themobile user can create a text file and it can be stored into the PC (client machine) byselecting client name from client list. Administrator (mobile user) can view the content of the text file, which is residing in the client machine from his mobile. He can explore the drive list, directory list and file list from his mobile. Here the mobile user can compile a error free java file which is residing in the pc or he can execute the compiled file from his mobile. Administrator can broadcast or unicast messages to his client‟s from his mobile or he can chat with the client by selecting the client name from the client list.J2E 6031. REMOTE PACKET CAPTURE, EPHEMERAL PORT ANALYSIS, DATA MONITORING IN THE NETWORKSThe success of the Internet has brought networking in each and every day new applicationsand technologies that are created. In this scenario, the power and complexity of computernetworks are growing every day. Thus, network and system security has become anincreasingly important issue during the past few years. Security specialists can use a port scanner to check whether people on the network arerunning software they should not be, making sure that servers are appropriately sealed offand many other things. The knowledge of which ports are open on a system gives anadministrator a general idea of the services a system is running. Remote Ephemeral Port Analysis is a piece of software that runs on a distributed systemand allows us to analyze the status of the software ports on a remote machine. That is, itdetermines whether each of the ports is open or not on a host (IP address). Ports that areopen on a host represent services, servers, and sometimes Internet applications. Differentports are used for different protocols. This software provides user authentication, so that onlythe authenticated users can use the software. The users are added, deleted and edited onlyby the administrator. The software also has the ability to find all the computers currentlyconnected on the network. This software also determines the amount of informationtransferred across the network. Apart from port status analysis, a very important featureadded to this software is the packet capture mechanism. This utility seizes information fromeach packet transferred across a network and determines several conclusions related tonetwork security and network administration.J2E 6032. SECURITY COMMUNICATION FOR GSM NETWORK USING KERBEROS V5 PROTOCOLToday more then ever, secure communication is a must. Most companies now user networkinfrastructure to conduct their business, whether internally( intranet model or externally toreach partners or customers (extranet/Internet models).While it is utopian to consider today‟s networks as being safe, there are solutions to makethem more secure and use them with a bit of trust. The key aspects to securingcommunications over a distributed environment are authentication, integrity, confidentialityand authorization. Kerberos is a network protocol that addresses the authentication part. Thisapplication aims at using Kerberos V5 to secure the communication between a J2Me MIDletcommunicating over the GPRS, and a Banking Transaction Server. This project mainly coversat gaining the initial ticket provided by the authentication server. Authentication server checksits database to authenticate the user. If the username and the password matches it generatesand initial ticket by which we can obtain many service tickets to access the services providedby the banking transaction server.
  10. 10. J2E 6033. DESIGN OF AN INTELLIGENT AGENT FOR NETWORK FAULT DETECTIONAs the Internet becomes a critical component of our society, a key challenge is to maintainnetwork availability and reliability. The increasing number of networks is making downtimemore costly. Network management tools and techniques must therefore become better atdetecting and identifying network faults. Current fault management implementations generally rely on the expertise of ahuman network manager. As networks become more complex and changes occur morefrequently, the human network manager will find it hard to maintain a sufficient level ofexpertise on a particular network‟s behavior. Fault management research has coveredapproaches such as expert systems, finite state machines, advanced database techniques,and probabilistic methods. Intelligent agent is one that processes information collected by Simple NetworkManagement Protocol agents and uses it to detect the network anomalies that typicallyprecede a fault. The intelligent agent approach has several benefits. It can detect unknownfaults and correlate information in space and time. Also it is possible to make an IntelligentAgent to detect the failure in one of the sub network‟s components even before it can beoccur.J2E 6034. FACE RECOGNITIONSecurity and authentication of a person is a crucial part of any industry. There are manytechniques used for this purpose. One of them is face recognition. Face recognition is aneffective means of authenticating a person. The advantage of this approach is that, it enablesus to detect changes in the face pattern of an individual to an appreciable extent. Hence facerecognition can be used as a key factor in crime detection mainly to identify criminals. Thereare several approaches to face recognition of which Principal Component Analysis (PCA) andNeural Networks have been incorporated in our project. The system consists of a database ofa set of facial patterns for each individual. The characteristic features called „eigenfaces‟ areextracted from the stored images using which the system is trained for subsequentrecognition of new images. MODULES  Training  TestingTRAINING: To train the users face with already present ID in the databaseTESTING: To authenticate the user with the face recognition algorithmJ2E 6035. DATA MIGRATION, TRANSLATION & TRANSFERMATION TO OPTIMIZE THE DATA MANAGEMENT SYSTEM Data Migration is the process of translating data from one format to another.Data migration is necessary when an organization decides to use a new computing system ordatabase management system incompatible with the current system. Typically, data migrationis performed by a set of customized programs that transfer the data. By the use of thisproject, the following data migrations can be processed easily.1.From SQL Server To Oracle2.From SQL Server To Access3.From SQL Server To HTML
  11. 11. 4.From Oracle To SQL Server5.From Oracle To Access6.From Access To SQL Server7.From Access To OracleJ2E 6036. SIP-COMMUNICATOR BASED ACTIVE LISTENING AND PASSIVE LISTENING An telecom project implemented using java1.5, sip-communicator alpha and Asterisk 1.4server featured with Active Listening (Manager of an organization chanspy the conversionbetween the salesman and the customer. And can communicate with the salesman), PassiveListening (Manager of an organization chanspy the conversion between the salesman and thecustomer) which is a secured way of communication with the implementation of sip protocol.J2EE 6037. RFID BASED ATM MACHINE TRANSACTION AND PROCESS SYSTEM Integrated with RFID reader for authenticating the customer usingRFID based access card where the RFID ID has been read through serial port using javatechnology and the front end design has been done using jdk1.5 , customer details has beenuploaded into MS-Access database, After authentication customer can view his/her BalanceEnquiry, Fund Transfer and Mini Statement.J2E 6038. MULTIPLE MAIL ACCOUNTS COLLABORATION MANAGERNowadays, web users have multiple email accounts. But individual authentication is essentialfor accessing each account, which is time-consuming. Currently, no integrated system existsfor individuals to manage multiple email accounts.Our solution provides a common, uniform API for managing various email accounts using theJava programming language .It allows users to access mails from various accounts bylogging in once. All the registered mail accounts of the user will be displayed as hyperlinks.Clicking on each link will lead the user to a new page where he can check for new mails, replyfor a mail, forward a mail, compose mails and delete mails. In this way, this solution savestime in authenticating multiple accounts by providing a single authentication for all theregistered mail accounts and also reduces the burden on the web server.J2E 6039. BANDWIDTH CONGESTION CONTROL USING AND AUTHENTICATION SERVICE FOR AUTOMATIC DYNAMIC RECONFIGURATION SYSTEMIn any company, the effective utilization of the available bandwidth is of paramountimportance. Every person must use the entire available bandwidth in a satisfactory manner(i.e.) The entire bandwidth must not be locked to some high bandwidth user refraining otherusers of the company due to traffic congestion. Considering these difficulties, we propose the following solution.  Parting the available bandwidth among the special permission and normal users.  Authentication of the users using Kerberos. In order to avoid the congestion, the normal and the special permission users will be routed through two different paths. Each user will be allocated a username and password, which will be stored in a database. In addition, their access permission details will also be maintained. Based on these details the user is routed either to the FTP server or to the Domain Server dynamically.J2E 6040. REMOTE AND LIVE MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT USABLE FOR TRAFFIC VIEWING & CONTROL SYSTEM
  12. 12. This is an Internet Browser application designed to display traffic web cam links. Theapplication allows the user to view traffic images from several sources, cities, countries andcontinents all over the world, as long as the user subscribes the link packages that he intendsto use. This application is particularly meant for traffic police to monitor the city with theirmobile from any remote location, where a web cam will be provided at each and every signallocation.J2E 6041. INTERNET BASED MACHINE CONTROL SYSTEMThe aim of the project is to control the electronic appliances via the internet. Thus therebyenabling the controlling of the devices via all over the world is possible. The project utilizesthe Html and Java as the front end, the embedded system as the firmware ends of theproject. Thus the project is firmware based. This project allows a person, to control theelectronic appliances via the internet. The devices carry a specific codes, which is typed inthe explorer address bar is sent to the server. The server reads the data from the html page,with the help of java. And then provides the respective codes for the co running dynamic linklibrary files. The output from the parallel port is fed to the controller for further processing, andthe output from controller is fed for relays for controlling of appliances.J2E 6042. EDGE DETECTING, IMAGE QUERYING, MATCHING, & RANKING USING SPATIAL SIMILARITY MATCHING SYSTEMLike traditional databases, an image database (IDB) is a collection of unique images. Each of theseimages are composed of a set of different objects. However, to improve the overall performance ofthe search and retrieval process, spatial similarity data modeling and retrieval scheme is used.Similarity-based search reduces the search space to a limited number of matched instances and thusretrieving depends on the nature and measure of similarity specified in the query. Edge detectionalgorithm is used to detect the outline of the queried image. Image processing is performedby generating a signature for each queried image, comparing it with the database, ranking theretrieved images and then displaying the images. This makes searching much more efficient.J2E 6043. EXTRACTION, RETRIEVAL AND STORAGE OF IMAGES, DATA CONTENTS INTHE INTERNETWith this concept we can extract the contents of current on line web page or a web pagestored from a hard disk file and we can store it to another file. Web page contents like images,text, paragraphs, etc. Storing all images to .html file and text to .txt file. This project isdeveloped on core java for creating user interface window , creating connections andexecution.Modules:Homepage Main module for connecting to the URL and to invoke content extractor or feature extractor modulesContent extractor For extracting words in tokenized format and paragraphs and for storing it In a text fileFeature extractor For extracting images and storing it in a html fileJ2E 6044. CROSS PLATFORM INTEGRATION AND GLOBAL EDITOR SYSTEMThere are editors for languages such as C, C++, JAVA that exists separately for each. Butthere is no editor that supports all languages in one. Moreover they take more memory spaceto run. The editor, which we are designing, supports all languages in one environment. It is apackage, which provides user to program the languages such as C, C++, JAVA. Since the
  13. 13. editors, which already exist, do not support all languages .we are designing an editor thatovercomes this problem. The compilers for all languages are present in the system itself. Thiseditor needs very less memory space to run. The features in this editor are automaticallyinsert header files, insert comment lines, insert closing braced to an opened brace. The otherfeatures are shortcut to compiler, auto display of output window, auto help and auto quickinsert. We are developing the user interface design using swing concepts in java. The call torespective compilers and interface between user and database is done by means of corejava. This system would prove to be friendly to programmer since it reduces the preciouscoding time as well as giving help to most of the methods syntax so no need to rememberlarge number of methods.J2E 6045. NETWORK ENABLED EMBEDDED CONTROL This project is very much useful and applicable in the college, and officeenvironment. The project utilizes the Java as the front end, The embedded system as thefirmware end of the project thus the project is firmware based this project allows a person tocontrol the electronic appliances via the internet. Thereby allowing the access of devices viathe local area network with greater flexibility and user friendly The devices carry a specificcodes, which is typed in the explorer address bar is sent to the server .the server reads thedata from the html page with the help of java, and then provides the respective codes for theco running dynamic link library files, which is designed with the help of vc++ For furthercommunication with parallel port. The output from the parallel port is fed to the controller forfurther processing, and the output from controller is fed for relays for controlling of appliances.J2E 6046. IMPLEMENTATION OF SECURITY KERNEL AND FIREWALL USING JAVAInternet is a dynamic place and is liable for various forms of attack. It is necessary toguarantee the integrity and safety of the private network connected to it. There are variousmethods to safeguard our trusted network. One among them is firewall.A firewall separates a private network from a public one, the Internet. It screens and filters allconnections coming from the Internet to the private network and vice versa, through a single,concentrated security checkpoint. A firewall makes sure that you cannot reach the Internetfrom the Internet network, or vice versa, unless you pass through this checkpoint.There are several models and configurations of firewalls out there. But the basic idea behindthem is always the same. Our firewall‟s primary security component is the security kernel.The security kernel evaluates each incoming and outgoing network packet traversing thefirewall server and enforces security policy against all such packets.J2E 6047. SECURED DATA COMMUNIACTION USING BASE 64 (BSF) ENCODING AND DECODING – FOR IMAGE, TEXT, AUDIO, FILE ETC.The main stay of this project is secured data or information or file Communication. Theprogram provides a User Interface to convert any file type to base64. The base64 conversionis to remove unreadable characters from your file. You can save your base64 code in aseparate file and then convert it back to the original format whenever you want.This program provides a complete graphical interface to look like a wizard, which makeconversion easy, understandable and manageable with following FEATURES.1.Image encoding & decoding2.Text encoding & decoding3.Audio encoding & decoding4.File encoding & decoding
  14. 14. J2E 6048. WIRELESS VIRTUAL NETWORK COMPUTINGWVNC (Wireless Virtual Network Computing) software makes it possible to view and fully-interact with one computer from mobile device anywhere on the Internet. WVNC software iscross-platform, allowing remote control between different types of computer. For ultimatesimplicity, there is even a Java viewer, so that any desktop can be controlled remotely fromwithin a browser without having to install software. WVNC has a wide range of applicationsincluding system administration, IT support and helpdesks. It can also be used to support themobile user, both for hot desking within the enterprise and also to provide remote access athome, or on the road. The system allows several connections to the same desktop, providingan invaluable tool for collaborative or shared working in the workplace or classroom.Computer support within the geographically spread family is an ever popular use.J2E 6049. REMOTE DATA CAPTURE , ACQUISITION ANDSENDING SMS TO REMOTE MOBILE USING JSMSThis project developed to monitor the temperature or humidity of a remote area to notify theusers through his mobile. The remote area can be hospital (monitoring patient temperature),here the device which is going to monitor will be connected to the PC through parallel port.The client application was implemented in java and JSMS (java SMS API) used to send SMSto the users mobile.J2E 6050. RFID BASED EMPLOYEE DATABASE MANAGEMENT SYSTEM RFID based access card used by the employer of any type of organization has beenimplemented using java1.5 and struts1.2,MsAccess where an employee login and the logouttime will be monitored with the help of RFID and the pay slip of the employee will becalculated and updated upto date and time, where the Manager of the organization isresponsible controlling the Database(Updating and modifying new employee details ,monitoring and managing the employee details with the access card reader.).J2E 6051. REMOTE WEBCAM MONITORING SYSTEM“Remote Web Cam” allows users to view their web cam images from any remote location.This project was implemented in java(applet).here users are allowed to select their webcam from remote location to view latest snapshot of the web cam images. The remoteapplication directs web cam to take snapshots in the order of frames these frames will besend to remote user. This application helps administrator to monitor their staff if they are outof station.J2E 6052. IMPLEMENTATION OF CROSS PLATFORM DATABASE ACCESS SYSTEM TOREDUCE SERVER MAINTENANCE & MEMORY COSTTraditionally all the databases are stored only in the server node which in turn increases thecost to the server to some extent. In order to avoid this, the new proposed system paves anew way by maintaining the databases not in the server but distributed among the clientnodes.
  15. 15. If the database resides in the server as the traditional method the cost of the server such asmaintenance costs, memory cost, etc. becomes very high which in turn increases theapplicationor the system cost. To avoid such unnecessary cost the new proposed system enhances themaintenance of the databases.Moreover the access time of the data from the database residing in a client machine is verymuch less when compared to the database residing in the server so the data access time isvery much reduced and the performance of the system increases. The database does notreside in the server instead it is distributed locally in the clients and so the RMI and RPC hasto be used to access the database present over the remote clients.J2E 6053. LIVE MEDIA STREAMING, CONVERGING AND TRANSMITTING USING REALTIME PROTOCOL (RTP)Live Media can be transmitted from one computer (System to which Camera is attached)using RTP protocol. The main part is to transmit the media from this system to other system.Setting up RTP sessions with several distributed clients and streams can be a tedious andcomplicated task. It allows to stream media containing any number of tracks to a number ofdifferent hosts/clients on the network simultaneously. Media can be received from the Server to which the Camera is attached and liveimages are captured. Sitting in different place, we can view what‟s going on in another place.The main use may be in places where cash transaction is going on. Setting up RTP sessionswith several distributed clients and streams can be a tedious and complicated task.J2E 6054. IMPLEMENTATION OF WIRELESS COMMUNICATION GATEWAY USING INTERNET PROTOCOLWireless Communication Gateway over IP, details with communication between computerand cell phone using Internet protocol. WCGOIP deals sending a short message from the PCto the intermediate server. Then from the intermediate server it is sent to the Gateway[Simple Wire Server], which has an ip address, which is used by the TCP IP to delivery themessage to the Gateway. The Gateway connects the Internet to the cell network. Thegateway passes the message sent along with the cell number to the appropriate cell networkand waits for the response. The cell network route message to the receiver cell phone andsends the status of the message sent to the gateway. Gateway in urn sends the status ofthe message sent to the intermediate server.J2E 6055. CRYPTOGRAPHY IMPLEMENTATION OF SECURED DATATRANSFERMATIONCryptography, the science of secret writing, is the biggest, baddest security tool in theapplication programmers arsenal. Cryptography provides three services that are crucial insecure programming. Files can be encrypted and the encrypted file can be decrypted using this system viaa local network or Internet. This project is implemented by core java, swing, awt.
  16. 16. J2E 6056. CROSS PLATFORM INTEGRATION TOOL FOR ACCESS, MONITORING ANDCONTROL OF LINUX & WINDOWS THROUGH JAVA When THIS TOOL starts, you should see a split window. In the upper half youll seeyour DOS drives, in the lower half you will see your LINUX drives. Your Linux filesystem is setto read only by default. Uncheck menu item File - Linux read only first, if you want to write toyour Linux disk. Modifying or deleting is only possible with Ext2 and Ext3 partitions. ReiserFSpartitions are always read only. No files or directories can be modified, deleted or created onor copied to a REISERFS Partition.Add another drive  Choose in the Menu FILE the Add DOS Drive or Add Linux Drive menu item or right click in the tree and choose the Add Drive ... menu item of the contextmenu. NOTE: Running CROSS TOOL under Linux, you have to add Linux-drives in this dialog because "ldir -part" of the CROSS TOOL doesnt work under Linux.  Enter a valid disk name in the text field Drive and a valid directory in the text field Directory of the shown dialog.  To find out, which partitions do contain Linux filesystems, click on the PARTITIONS button in the toolbar.  Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and y=1,2,3,..., ReiserFS partitions should be entered as /dev/rdxY (note the "r" instead of "h"!).  ReiserFS partitions are read only.Removing a Drive  Right Click on a Drive in the directory tree and choose the Remove Drive menu item of the contextmenu.Connecting and disconnecting to a remote host (host must be running LREADjav)  To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on the CONNECT button in the toolbar or in the Menu File on Remote connect .... In the dialog box enter the host name and the portnumber (if lreadjav is not running on standard-port) and click OK.  To disconnect, click on the DISCONNECT button in the toolbar or in the Menu File on Remote disconnect. Using wildcards  If you for example just want to see files with the extension "java" you can set a pattern(*.java) for the DOS and Linux-lists. Choose in the Menu File the item DOS Pattern ... to set the pattern for DOS-files or the item Linux Pattern ... to set the pattern for Linux-files.J2E 6057. TRANSACTION AND RECHARGE OF MOBILE TRHOUGH SMS & ATMSYSTEMS
  17. 17. SMS or Short Message Service allows Cellular or Mobile GSM phones to send and receive Text Messages. The use of SMS is a convenient and fast means of communication with cellular telephone and pagers. This can be alphanumeric and more recently graphical. A sent SMS message is stored at anSMS Center (SMSC) until the receiver‟s phone receives it. The receiver can identify thesender by his/her telephone number that is included in the message itself. SMS supportsseveral input mechanisms that allow interconnection with different message sources anddestinations including voice-mail systems, Web-based messaging and E-mail integrationThe scope of this project is to customize the existing pre-paid system offering by ATechwireless to the requirements of ICICI and Reliance and integrate it in their existing enterprisesystems. The system will become the base system and a foundation of the complete wirelesscommerce framework, which will be implemented later by ATech WirelessThere are 2 modules:Mobile RechargeThe scope of this project is to customize the existing pre-paid system offering by ATechwireless to the requirements of ICICI and Reliance and integrate it in their existing enterprisesystems. The system will become the base system and a foundation of the complete wirelesscommerce framework, which will be implemented later by ATech WirelessTransaction on mobile:Transaction on mobile is used to money between two peoples. this two peoples must beregistered in a bank. And they should have mobile transaction. this transaction starts withSMS. if user 1 wants to pay Rs.3000 to User 2 .user 1 simply type SMS to particular Bankwith his 4 Digit PIN, Amount and Account No. the request is processed by the bank serverand Amount is transferred to designation account.J2E 6058. DESIGN AND DEVELOPMENT OF A NOVEL DISTRIBUTED , SCALABLE FILE SHARING AND ACCESS SYSTEM WITH GUARANTEED SECURITY There has been a huge growth in the use of file sharing software over the last year,making file sharing one of the top uses of the Internet. Napster was the first technology thatempowered users with his ability to share files amongst themselves. The demise of Napsterled to the development of numerous file sharing technologies, most of which are based on theGnutella protocol. The problem with all current file-sharing technologies is that none of themcan guarantee the security of the shared file. This report describes the design, developmentand evaluation of a file sharing that proposes a novel solution to the shared file securityproblem. The system will allow user to share files in a secure manner and comprises of clientand server applications. The client allows users to connect to a server and shares their files amongst all othersystem users. The client also gives users the ability to search for files shared by the othersystem users, and when a file is found it could be transferred from the other user securely, asthe file would be encrypted. The server allows valid users to connect, records their shared filelist enables connected users to search this list. The server authenticates connected users byperforming a test that only a valid user can respond to in the correct manner. The reportoutlines research in the area of networking, including technological backgrounds such asdistributed file system architectures, cryptographic techniques and network programmingmethods. The novel feature of the system is the method used to address the security probleminherent to all current file-sharing technologies. The system developed uses cryptographictechniques to implement a framework in which to model system security, includingauthentication of system users and the files that they share. We can also implement the directclient-to-client communication, so the ideal time of the client must be greatly reduced. Logfiles are not to be created. This project is highly scalable; it can be applied to WAN. .
  18. 18. J2E 6059. ENHANCED MULTIPURPOSE IMAGING APPLICATION BASED ON IMAGESTATISTICS CONCEPTSThe main objective of the project is Image processing .the system to reduce the noise inimage and provide the graphical user interface to apply the different properties like applyingcontrast, brightness, threshold level, color balance and to change the property of the imageand provide the useful information about the image .the system is developed in java(SWINGS)Platform :OS independentMODULES  Image editing  GUI image  Process  Analyze  WindowJ2E 6060. REMOTE AND ADVANCED WEB BASED FILE ACCESS AND MANIPULATION SYSTEMThis JSP program allows remote web-based file access and manipulation. You can copy,create, move, rename and delete files. Text files can be edited and groups of files and folderscan be downloaded as a single zip file that is created on the fly. If you want to copy or move afile, please enter the target directory name in the Edit field (absolute or relative). If you want tocreate a new file or directory, Enter the name in the edit field. If you click on a header name(e.g. size) the entries will be sorted by this property. If you click two times, they will be sorteddescending.The button "Download as zip" let you download the selected directories and files packed asOne zip file. The buttons "Delete Files", "Move Files", "Copy Files", delete, move and copyalso selected Directories with subdirectories. If you click on a .zip or .jar filename, you willsee the entries of the packed file. You can unpack .zip, .jar and .gz direct on the server. Forthis file type the entry in the Last column is "Unpack". If you click at the "Unpack" link, the filewill be unpacked in The current folder. Note, that you can only unpack a file, if no entry of thepacked file Already exist in the directory (no overwriting). If you want to unpack this file, youhave To delete the files on the server which correspond to the entries. This feature is veryuseful, If you would like to upload more than one file. Zip the files together on your computer,Then upload the zip file and extract it on the server. You can execute commands on theserver (if you are allowed to) by clicking hit "Launch command" Button, but beware that youcannot interact with the program. If the execution time of the programJ2E 6061. SCREEN CAPTURE, REMOTE MULTICASTING AND INTEGRATION SYSTEM USING MEDIA TRACKING, BUFFERING & GEOMETRIC CONCEPTSThe main objective of this project is to capture the current viewing screen and to multicast theimage to different remote system that is the networking System.FOLLOWING ARE THE MODULES  SCREEN CAPTURE This module capture the current viewing screen using the concept of media tracking, buffer and geo metric methods
  19. 19.  IMAGE CANVAS This module creates image file from captured screen and multicast the different networking system based on the concept of socket programming and buffered image.  TEST MODULE This module implements integration framework based on captured screen moduleJ2E 6062. HIERARCHY DETECTION AND MANIPULATION SYSTEMA programs object model captures the essence of its design. It is a graph that represents theobjects in the program and the relationships between them. For some programs, no objectmodel was developed during design; for others, an object model exists but may be out-of-sync with the code. In maintenance of a project, an object model is invaluable; it is hard tomake any progress fixing or reworking a program without an understanding of what objectsexist and how they are related to one another.The aim of this project is to automatically generates an object model for a given Javaapplication.. This project performs a lightweight analysis of the bytecodes in the given Javaclass files and constructs the object model and displays it to the user. It displays the objectmodel in the form of a graph, which is easily understood by the user.J2E 6063. SECURED DATA COMMUNICATION BY ENCODING AND DECODING OF DATA IN J2ME MOBILE TOOLKITThe objective of this project is to send a private (encrypted) SMS between two users to avoidhacking of data while transferring. Here the client and the server application will be installed intwo different users mobiles.The client server application will be having two modules that is Encoding and Decoding  Encoding is used for encrypting the SMS and Decoding is used for decryption  Encoding: original data will be converted into image formatDecoding: image format data will be converted into original data.J2E 6064. DEVELOPMENT OF WEB ENABLED ONLINE, DYNAMIC ATM CARDMANAGEMENT SYSTEM ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cardsto the bank customers. TO avail the ATM (automatic teller machine) services a customer hasto possess a valid ATM card. This project concentrate how to get a ATM card and how it works. A customer has toapply for the ATM card. His application is registered first and then processed. The card is sentto the database and check if the number is present. If it is present, check the amount. It issufficient then reduces the amount how much he purchase/ want from the database. Orotherwise it print the error message. Once processing is over, the customers application isgenuine, and then ATM card is issued to the customer. There on the customer can performanytime anywhere transactions on his accounts with the help ATM card by means of variousATM kiosks available in public places or through the internet.J2E 6065. IMPLEMENTATION OF 3DES, 168 BIT STRONGENCRYPTION ALGORITHM IN MOBILE PHONES
  20. 20. The Mobile Safe Manager application enables users that require to save sensitive informationsuch as Credit Card, Bank Account Computer Login and General details to store such detailsin encrypted form on the phone. All data stored on the phone is protected by 3DESede 168 bitstrong encryption. The key for the user generates this encryption when the application isinstalled, so there is not secret key held in the application. Only you, the user know the keythat will unlock your data.New mobile phones can do more than just provide communications, they have the ability torun downloadable programs and even store data. This Project We have developed MobileSafe Manager to take advantage of these new mobile phones.If the Mobile is lost with the application running, all about the private information is availableWith mobile Safe after a 2 minute of inactivity period, the screen is locked automatically andthe user has to re-enter the password to log inside again.J2ME 6066. DESIGN AND DEVELOPMENT OF A REMOTECITY MAPPING SYSTEMThis Project teaches us how to develop a Remote City Mapping. This Guide will help a visitorto a city to obtain information about places of importance, Bus route, Train Details andincluding all related details on a Java-enabled device such as a mobile phone. We candevelop the application using J2ME (Java 2 Micro Edition), to understand the development ofembedded applications for mobile devices, which have limited processing power and memory.A server contains a database of the cities and the places of interest, along with details abouteach place. A user can access this information through a GUI provided on the mobile deviceusing the API‟s - MIDP (Mobile Information Device Profile). General Information Guide Boarding Guide Recreation Guide Tourism Guide Transportation Guide Industrial Guide Institutional GuideJ2E 6067. THREE DIMENSIONAL (3D) GRAPHICS, IMAGE PROCESSING AND TERRAIN RENDERING SYSTEMThe objective of this project is Image processing developed in advanced java by Using Java3D Software. It provides fast way to create 3 Dimensional graphics applications. The Java3DAPI is a hierarchy of Java classes which serve as the interface to a sophisticated three-dimensionalgraphics rendering.The programmer works with high-level constructs for creating and manipulating 3D Geometricobjects  Textured rendering  Resolution  Rotation  Wire Frame Rendering
  21. 21. J2E 6068. IMPLEMENTATION OF VIRTUAL SIMULATION OF REALTIME ATM Now-a-days ATM is widely used by the peoples of all communities. The bank installs ATM in every location of a city in order to have a quick and safe withdrawal of the money. Before installing the original ATM in a particular location, the transactions, operations and efficiency are tested with the help of the ATM Simulator.ATM Simulator allows banks to view ATM downloads directly from theirdesktop PC, exactly as they would appear on a real ATM (NCR, Diebold,Wincor-Nixdorf etc.). ATM Simulator connects as a virtual ATM into your existing hostsystem, and behaves in exactly the same way as a real ATM. Through the unique use of ATMhardware "personalities", any type of ATM can be simulated in this way, avoiding the need forcostly ATM hardware simply to test transactions.ATM Simulator allows banks to automate theregression testing of their ATM transactions. No longer must bank staff spend time manuallytesting transactions on real ATMs, and simulating hardware faults by jamming the ATMdevices. Test scripts can be replayed at any time without the intervention of an operator, andthe results tabulated in a graphical easy-to-read format.J2E 6069. ROBOT CONTROL FROM MOBILEThe project was developed in J2ME toolkit and servlet using web logic server as webserver. The objective of this project is to control the mechanism of a ROBOT by the humanthrough his mobile. Here J2ME toolkit will be used to design client application, which can beexecuted from any java enabled GPRS mobile.The client applet which is running the mobile will be interacting with the servlet which isrunning in the web server (Web logic) through which the ROBOT which has been connectedwith the PC will be controlled based on the users commandJ2E 6070. JAVA BASED FIRE ALARMINGThe project was developed using java & J2ME, the objective Of this project is to control thefire within the normal and maximum limits and if it exceeds the limits, then to alert theauthorized person by sending sms from system(PC) to his mobile.Software Requirement:  JDK 1.5  J2ME toolkit  JSMS APIHardware Requirement:  Mobile  Data cable  Parallel portJ2E 6071. NETWORK PACKET SNIFFER AND NETWORK ANALYSER
  22. 22. A packet sniffer (also known as a network analyzer or protocol analyzer or, forparticular types of networks, an Ethernet sniffer or wireless sniffer) is computer software orcomputer hardware that can intercept and log traffic passing over a digital network or part of anetwork. As data streams travel back and forth over the network, the sniffer captures eachpacket and eventually decodes and analyzes its content according to the appropriate RFC orother specifications. On wired broadcast LANs, depending on the network structure (hub or switch), onecan capture traffic on all or just parts of the traffic from a single machine within the network;however, there are some methods to avoid traffic narrowing by switches to gain access totraffic from other systems on the network (e.g. ARP spoofing). For network monitoringpurposes it may also be desirable to monitor all data packets in a LAN by using a networkswitch with a so-called monitoring port, whose purpose is to mirror all packets passingthrough all ports of the switch. On wireless LANs, one can capture traffic on a particular channel. On wired broadcast and wireless LANs, in order to capture traffic other than unicasttraffic sent to the machine running the sniffer software, multicast traffic sent to a multicastgroup to which that machine is listening, and broadcast traffic, the network adapter beingused to capture the traffic must be put into promiscuous mode; some sniffers support this,others dont. On wireless LANs, even if the adapter is in promiscuous mode, packets not forthe service set for which the adapter is configured will usually be ignored; in order to seethose packets, the adapter must be put into monitor mode.J2E 6072. ONLINE JAVA COMPILER AND SECURITY EDITORThis Project is mainly used to create, compile the java program. The client machine doesn‟thaving the any java compiler. That is client machine doesn‟t having the java development kit.the client machine having only to connect to the java server. The client machine only write ajava program and to send to server. The server having java compiler. The server create thenew directory and save the client file and then compile java file and generate the errormessage .this message is going to send the client .if the java program haven‟t any errormeans then server send message to the client ”No Error”.In this project is also creating the security editor. This editor is performing encryption anddecryption process. The client creates text and save it to the server. The server performencrypt the file and save it to the file. The server also perform decrypts the file and save it tothe file. These two processes are doing by means of the security algorithms. In this projectuse very famous security algorithms is “RSA Algorithms”.J2E 6073. LIVE BROADCASTING, MULTICASTING, & UNICASTING OF VIOCE AND TEXT ENCRYPTIONThe communication module deals with the various aspects involved during a conversationbetween the users. The conference module involves with the way of communication betweenthe various users. The security module provides auto security to both voice and data. Thecommunication module is further divided into two modules. They are client module and servermodule. The client module deals with the various information required for the various clients
  23. 23. to involve in the conferencing. The client module does the validation process on theinformation given by the user attached to the server. The server module does theauthentication process on the clients attached for the conferencing. Then those clients whoare recognized are allowed to communicate with each other. The conference module isfurther divided into two modules. They are the broadcasting module and unicasting module.The conference may be in either text format or audio format. The users are free to choosetheir requirement. In broadcasting module, the clients are allowed to communicate with eachother, without any restriction to the number of clients attached to the server. In the unicastingmodule, any two or group members connected to the server can communicate withinthemselves. That is messages secured within that group. IEEE PROJECTS ( 2008-2009-2010)JIEEE01: SECURE MOBILE PAYMENT SYSTEM IN WIRELESS ENVIRONMENTMobile payments are payments that are carried out through mobile devices in wirelessenvironment. Mobile payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with several problems to improve requirements ofm-commerce such as: simplifying the mobile payment processes for consumers, improvingthe security of payment, especially the application of digital signing in mobile payment. Theproposed work introduces alternative ways for providing mobile banking services aimed atJ2ME enabled mobile phones over Bluetooth communication. The scope of the proposedsolution is the combination of J2EE and J2ME capabilities, means of overcoming the API andtechnical limitations, as well as security consideration. This paper defines the secure mobilepayment system to allow mobile users to conduct mobile transactions over Bluetoothcommunications but also supports the related secured transactions between the paymentserver and mobile clients. Finally, we have discussed some of the performance parameterssuch as: time required to password hack for various character lengths, delay and probabilityerror rate
  24. 24. JIEEE02: DRUPAL CONTENT MANAGEMENT SYSTEM ON MOBILE PHONE.By adapting the Drupal system to mobile phones we try to target multiple goals:• Content management system makes content creation and management of the personalwebsite of your mobile phone easy.• Via the additional modules developing personal web sites for a variety of purposes becomeseasier.• With the creation of APIs that allow Drupal to access data in the core applications of themobile phone we can create new website functionality that takes advantage of featuresavailable in the mobile devices.• Drupal provides a very good test case for the underlying layers of the architecture.JIEEE03: J2ME AND SMART PHONES AS PLATFORM FOR A BLUE TOOTH BODY AREA NETWORK FOR PATIENT-TELEMONITORINGThis project deals with problems of utilization of mobile equipment working in the biomedicinefield, particularly telemedicine. The basic idea is to create a system that controls importantinformation about the state of wheelchair bound person like monitoring of ECG and pulse inearly phases, then other optional values like temperature or oxidation of blood.Sometimes middle-aged people have a collapse, breakdown or heart attack and must be inhospitals or health resorts for a long time to regenerate their bodies. The time that they spendin these institutions, is nonutilisable and very long for them. Possibilities of today physics arerestricted by many of prescripts so patients cannot use some of the newest techniques (likehyperbaric or arctic chambers), which make it possible to reduce the regeneration time byweeks or months.This system consists of several interconnected parts that can communicate amongthemselves, so they can approach their function. These parts are measuring sensor, PDA orembedded device, and server for data processing and evaluation. Beside these, the mostimportant parts that are worth mentioning are various kinds of accessories, such asGPRS, WiFi, GSM, Bluetooth or GPS modules. By means of them we can communicate. Wemostly use the fastest technology in signal coverageJIEEE04: DEVICE INDEPENDENT MOBILE APPLICATION CONTROLLER FOR REMOTE ADMINISTRATION OF A SERVER OVER A GPRS LINK USING A J2ME CELLULAR . Unhindered connectivity to a computer & the need of the hour. The ability to connectto e remote machine and control it will have inflate advantages. J2ME (JAVA 2 Micro Edition)is a platform created to enhance application development for mobile phones. Using theplatform we have crested an application which can control any desktop computer or a serverby sending the required commands over an HTTP Connection. The main aim of the application is to remote & access and control differentapplications on a static IP PC by connecting to it over a GPRS link from a J2ME enabled cellphone. The possible applications are: 1.) Launching Word pad. 2.) Shutting down and restarting or logging off from your machine. 3.) Open & Save WordPad Files into the Remote machines.
  25. 25. JIEEE05: MOBILE BANKING SECURITY USING STEGANOGRAPHY Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking wasreceived very well, it has embarked upon supply of various services based on differentsystems and with the aid of various services such as the Short Messaging Service (SMS).However, in spite of its advantages, m-banking is facing some challenges as well. One ofthese challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested byusers with the use of steganography method. In this method, instead of direct sending of theinformation, it is hidden in a picture by the password and is put on a site. Then the address ofthe picture is sent to the user. After receiving the address of the picture through SMS, theuser downloads the picture by a special program. After entering the password, the user canwitness the information extracted from the picture if the password is entered correctly.JIEEE06:ON-DEMAND VIDEO STREAMING IN MOBILE OPPORTUNISTIC NETWORKSProviding on-demand video streaming services to large numbers of nodes in mobile wirelessnetworks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), amobile peer-to-peer video-on-demand application based on ubiquitous WiFi enabled devicessuch as smartphones and Ultra Mobile PCs. MOVi poses new challenges in on-demand videostreaming caused by limitedwireless communication range, user mobility and variable user population density. MOViaddresses these challenges by exploiting the opportunistic mix use of downlink and directpeer-to-peer communication to significantly improve achievable overall system throughput.Through simulation and actual implementation, we observed that MOVi is able to increase thenumber of supported concurrent users two fold compared with unicast based on-demandvideo streaming, as well as reducing video start-up delay by half. Significantly, theseperformance improvements can be achieved without increasing power consumption at the
  26. 26. end device. Using MOVi, users not only share and distribute on-demand video such asYouTube clips for their own performance gain but also for the benefit of the collaborativegroup.JIEEE07:RFID CREDIT CARDS SYSTEM. Online shopping using electronic payment scheme has gained a lot of popularity inrecent years. In an electronic payment scheme using normal credit cards there is no way togenuinely identify owner of the credit card. Credit card fraud is the fastest growing crime allover the world. Any effort to plug the security hole especially for online payment is consideredworthwhile. A contactless smartcard is a smartcard that can communicate with other deviceswithout any physical connection, using Radio-Frequency Identifier (RFID) technology.Contactless smartcards are becoming increasingly popular, with applications like credit-cards,national-ID, passports, and physical access. The security of such applications is clearlycritical. A key feature of RFID-based systems is their very short range: typical systems aredesigned to operate at a range of ≈ 10cm. RFID enabled credit cards are becoming increasingly popular as contactless creditcards. We envision a future where RFID credit cards will be used for online shopping. RFIDsystem has tremendous potential to render electronic payments more secure than normalcredit cards. The word RFID enable credit cards may bring in mixed passion, enthusiasm andperhaps even rage! This is partly paranoia and partly reality. The reality is that an intruder canread RFID cards without the user even noticing it. This brings in a zone of discomfort andleads to paranoia. Certain interactivity should exist to bring back this comfort to the user. Thispaper tries to make an effort in that direction. In this paper we propose mobile phone basedarchitecture for secured electronic payments using RFID credit cards.JIEEE08:ROBOT TELEPORTATION SYSTEM BASED ON GPRSIn this project we present a strategy for using the cellular network, and specifically the generalPacket Radio Service, to teleoperate a mobile robot. This allows the system user a widermobility range and coverage. The system application is developed using Java ProgrammingLanguage, implementing two teleoperation methods: predefined sequences and instantactions.
  27. 27. JIEEE09:ADDRESS AUTOCONFIGURATION AND ROUTE DETERMINATIONMECHANISMS FOR THE MANET ARCHITECTURE OVERCOMING THE MULTI-LINKSUBNET MODELThe mobile ad hoc network (MANET) is a wireless network composed of mobile nodes whichcan communicate with each other via multiple wireless links. Previously, the MANET hasbeen considered as a single subnetwork, so all nodes in a MANET are assigned the samesubnet prefix, which is the multi-link subnet model. In order to resolve the multi-link subnetproblem, the modified MANET architecture was proposed in [12]. In this paper, we proposean address autoconfiguration mechanism and a route establishment mechanism for themodified MANET architecture. Our proposed mechanism can prevent the performancedegradation caused by broadcasting control messages of a reactive routing protocol such asthe Ad-hoc On-demand Distance Vector (AODV). We evaluate the performance of theproposed mechanisms by carrying out NS-2 based simulationsJIEEE10:PIDS: A PACKET BASED APPROACH TO NETWORK INTRUSION DETECTION AND PREVENTIONComputer networks are one of those unique gifts of modern science which enriched humanlife with the blessing of global connectivity. But as the network advanced, intrusions andmisuses followed. Consequently, network security has come into issue. Now-a-days intrusiondetection systems have become a standard component in security infrastructures. Intrusionstypically start with intruders infiltrating a network through a vulnerable host and after thatapproaching for further malicious attacks. The techniques used for intrusion detection havetheir particular limitations. Any of the Intrusion Detection Systems proposed so far is notcompletely flawless. And practically all of them require some kind of termination in networkconnections So, the quest for betterment continues. In this progression, here we presentPIDS: a complete intrusion detection system which reduces most of the problems containedby the previous systems and it doesn‟t need to terminate any network connections to detectthe intruder. This system generates quick responses against intrusions and stops the intruderto proceed for further attacks.JIEEE11: RIMOM: A DYNAMIC MULTISTRATEGY ONTOLOGY ALIGNMENT FRAMEWORKOntology alignment identifies semantically matching entities in different ontologies. Variousontology alignment strategies have been proposed; however, few systems have explored howto automatically combine multiple strategies to improve the matching effectiveness. Thispaper presents a dynamic multistrategy ontology alignment framework, named RiMOM. Thekey insight in this framework is that similarity characteristics between ontologies may varywidely. We propose a systematic approach to quantitatively estimate the similaritycharacteristics for each alignment task and propose a strategy selection method toautomatically combine the matching strategies based on two estimated factors. In theapproach, we consider both textual and structural characteristics of ontologies. With RiMOM,
  28. 28. we participated in the 2006 and 2007 campaigns of the Ontology Alignment EvaluationInitiative (OAEI). Our system is among the top three performers in benchmark data sets.JIEEE12: MINING OF DEFECT IN SOFTWARE AND DEFECT CORRECTION EFFORT PREDICTIONMuch current software defect prediction work focuses on the number of defects remaining in asoftware system. In this paper, we present association rule mining based methods to predictdefect associations and defect correction effort. This is to help developers detect softwaredefects and assist project managers in allocating testing resources more effectively. Weapplied the proposed methods to the SEL defect data consisting of more than 200 projectsover more than 15 years. The results show that, for defect association prediction, theaccuracy is very high and the false-negative rate is very low. Likewise, for the defectcorrection effort prediction, the accuracy for both defect isolation effort prediction and defectcorrection effort prediction are also high. We compared the defect correction effort predictionmethod with other types of methods—PART, C4.5, and Naı¨ve Bayes—and show thataccuracy has been improved by at least 23 percent. We also evaluated the impact of supportand confidence levels on prediction accuracy, false negative rate, false-positive rate, and thenumber of rules. We found that higher support and confidence levels may not result in higherprediction accuracy, and a sufficient number of rules is a precondition for high predictionaccuracy.