Mca(.net & java) application projects abstracts(v)

35
2014-ADVANCED PROJECTS S.NO PROJECT TITLES LANGUAGE DOMAIN 1 TRAVELLING MANAGEMENT SYSTEM: Radiant Reservation System (RRS), A Integrated Software for tour operating companies which comprises all the tour industry related and especially made keeping view of South Africa, Tanzania and other East African countries. RRS helps them, Tour Operating Companies, manage their Customers, Hotels, Vehicles and Agents and makes all operations of the tour company easy and accurate. VB.NET REAL TIME 2 SOCIAL NETWORK: A social network service focuses on the building and verifying of online social networks for communities of people who share interests and activities, or who are interested in exploring the interests and activities of others, and which necessitates the use of software. Most services are primarily web based and provide a collection of various ways for users to interact, such as messaging, queries, Advices and file uploading. The System, which was in the past, had Message Sending; Invite the friends, Communities and Photo Albums. But those systems didn’t having file attachment feature. The present system Message sending through chatting mechanisms, Inviting the friends, Communities, Photo Albums and also file attachments (which is the drawback in the existing system) are the main features. Social networks connect people at low cost; this can be beneficial for entrepreneurs and Small businesses looking to expand their contract base. These networks often act as a customer relationship management tool for companies selling products and services. Companies can also use social networks for advertising in the form of banners and text ads. Since businesses operate globally, social networks can make it easier to keep in touch with contacts around the world. ASP.NET WITH C# NETWORK 3 LIBRARY MANAGEMENT SYSTEM: The project titled Library Management System is Library management software for monitoring and controlling the transactions in a library .The project Library Management System is developed in java, which mainly focuses on basic operations in a library like adding new member, new books, and updating new information, searching books and members and facility to borrow and return books. This system also gives us the complete information about the library. The user can enter the record of new books and retrieve the details of books available in the library, and also user can issue the books to the students/peoples and maintain their records and can also check how many books are issued and stock available in the library. In this project it is easy to maintain the late fine of customers who returns the issued books after the due date. Throughout the project the focus has been on presenting information and comments in an easy and intelligible manner. The project is very useful for those who want to know about Library Management System. VB.NET WITH C# REALTIME

Transcript of Mca(.net & java) application projects abstracts(v)

Page 1: Mca(.net & java) application projects abstracts(v)

2014-ADVANCED PROJECTS

S.NO PROJECT TITLES LANGUAGE DOMAIN

1

TRAVELLING MANAGEMENT SYSTEM: Radiant

Reservation System (RRS), A Integrated Software for tour

operating companies which comprises all the tour industry

related and especially made keeping view of South Africa,

Tanzania and other East African countries. RRS helps them, Tour

Operating Companies, manage their Customers, Hotels, Vehicles

and Agents and makes all operations of the tour company easy

and accurate.

VB.NET

REAL TIME

2

SOCIAL NETWORK: A social network service focuses on the

building and verifying of online social networks for communities

of people who share interests and activities, or who are interested

in exploring the interests and activities of others, and which

necessitates the use of software. Most services are primarily web

based and provide a collection of various ways for users to

interact, such as messaging, queries, Advices and file uploading.

The System, which was in the past, had Message Sending; Invite

the friends, Communities and Photo Albums. But those systems

didn’t having file attachment feature. The present system

Message sending through chatting mechanisms, Inviting the

friends, Communities, Photo Albums and also file attachments

(which is the drawback in the existing system) are the main

features. Social networks connect people at low cost; this can be

beneficial for entrepreneurs and Small businesses looking to

expand their contract base. These networks often act as a

customer relationship management tool for companies selling

products and services. Companies can also use social networks

for advertising in the form of banners and text ads. Since

businesses operate globally, social networks can make it easier to

keep in touch with contacts around the world.

ASP.NET WITH

C#

NETWORK

3

LIBRARY MANAGEMENT SYSTEM: The project titled

Library Management System is Library management software for

monitoring and controlling the transactions in a library .The

project Library Management System is developed in java, which

mainly focuses on basic operations in a library like adding new

member, new books, and updating new information, searching

books and members and facility to borrow and return books. This

system also gives us the complete information about the library.

The user can enter the record of new books and retrieve the

details of books available in the library, and also user can issue

the books to the students/peoples and maintain their records and

can also check how many books are issued and stock available in

the library. In this project it is easy to maintain the late fine of

customers who returns the issued books after the due date.

Throughout the project the focus has been on presenting

information and comments in an easy and intelligible manner.

The project is very useful for those who want to know about

Library Management System.

VB.NET WITH

C#

REALTIME

Page 2: Mca(.net & java) application projects abstracts(v)

4

IMPLEMENTATION OF ECCENTRIC NETWORK FOR

INTRANET: Eccentric network is mainly used in software

companies. Because many persons involve in completion of the

project like team leader, project leader. Team members should

finish their daily task and their source code should be stored in

the main server. This is the day-to-day task done by the team

members. Project leader assigns modules for the team members.

These details are informed to the members manually. If the team

member or the team leader is not in the office they can’t perform

this task. So here we developed a private network for the team

leader and the team member. Using this network the project

leader can assign the projects to the respective team members.

Once the team member comes to work, they can come know the

work assigned by checking offline. This information contains

with the team member network id and password with project

name and the roll of the project and time duration of the projects.

Once any team member got the project assignment mail they can

interact with our private network and they do their daily task at

any time. Here the project leader and project team member have

their individual section for their processing. Using the admin

section the project leader can assign the projects. Users can

interact with the network through user section. Here they can

view all the files and folders, which are uploaded by them. If they

have the permission to delete the file it can be done remotely.

ASP.NET WITH

C#

NETWORK

5

PATIENT INFROMATION SYSTEM: New technologies have improved the ability of electronically storing, transferring and sharing medical data also changed. At

the same time, they also create serious questions about who has access to this information and how they are

protected. The aim of PIS is to store the detailed information about the Patient like treatment details, date of joining and allocated doctor. The major

modules in this system are allocating the bed, allocating the doctor to the patient. The features of this

system are: Knowing the patient details and patient status, To know the type of treatment he/ she undergoing, To know the consulted doctor details, his

/ her visiting hours, To know the information about the doctors included and deleted, It allows adding /

editing patient registration, To know the list of doctors available, To know the total list of beds available

ASP.NET WITH

C#

REALTIME

Page 3: Mca(.net & java) application projects abstracts(v)

6

ONLINE TEST SIMULATOR: The purpose of on-line test simulator is to take online test in an efficient manner

and no time wasting for checking the paper. The main objective of on-line test simulator is to efficiently

evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers

according to their convenience and time and there is no need of using extra thing like paper, pen etc. Scope

of this project is very broad in terms of other manually taking exams. Few of them are: - This can be used in educational institutions as well as in corporate world.

This system Can be used anywhere any time as it is a web based application (user location doesn’t matter).

There is no restriction that examiner has to be present when the candidate takes the test.

JAVA WITH

SWINGS

REALTIME

7

WEB BASED RAILWAY RESERVATION MECHANISM: The purpose of on-line test simulator is to take online test in an efficient manner and no time wasting for

checking the paper. The main objective of on-line test simulator is to efficiently evaluate the candidate

thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their

convenience and time and there is no need of using extra thing like paper, pen etc. Scope of this project is

very broad in terms of other manually taking exams. Few of them are: - This can be used in educational institutions as well as in corporate world. This system

Can be used anywhere any time as it is a web based application (user location doesn’t matter). There is no

restriction that examiner has to be present when the candidate takes the test.

ASP.NET

REALTIME

Page 4: Mca(.net & java) application projects abstracts(v)

8

DISTRIBUTED CHANNEL MANAGEMENT SYSTEM: The concept deals with the propagation of pesticides

management firm activities. Propest Co. ltd is one of the popular companies for pesticides, which is

expected to provide its valuable services to its customers efficiently. With the advent of new technology every task in modern life is being

absorbed rapidly within the routine of human life. Such technologies are applied for various field to

improve the overall system performance and to deepen the organization grow. Propest Co. has also thought of utilizing such technology to reach its

expanding customer base and provide efficient service to the customer. The result one such attempt is this

Product called Distribution Channel Management System. This product has been mainly designed to overcome some of the problems faced with the

previous system. The main problem faced was unnecessary delay in information processing and

expensive.

ASP.NET

REALTIME

9

E-STUDENTS CONSULTANCY: The project is a

comprehensive web application, which is more helpful in

simplifying the testing process. It is more prominent role in the

business-oriented field and also on the other kind of sectors. The

system simplifies the test process, in estimating the skill set of

the student and their eligibility. As the globe world is a

competitive world, examining each individual is a complex task

to handle, which may also lead to misconception of results that

more probably an inaccurate one.

This system comes in handy in manage the working process of

examine the student, the user who are new to this system can

register their identity to gain access to it’s features. After

successful authentication, this system generates an individual set

of question to the users ; the user can make up their own choice of

choosing the correct option from the objective quiz. After

completion of giving answers to each question of choice the quiz

end, with the automated process of the system. This system

manipulates the quiz result, showing the skill set of the each user,

by generating a survey of the results helps the organization or

any business sectors in choosing the right person for the perfect

job.

ASP.NET

REALTIME

Page 5: Mca(.net & java) application projects abstracts(v)

10

GUI-BASED DATA DIRECTOR: The data is an essential thing for

all cases to manage, and also it is necessary to keep that data in a

secured manner, many of the cases there are lots of officials fell into

this act to insecure the data, so the outcome results fault. The

System “GUI-Based Data Director” is publishes an impressive

elucidation for handling the database from the user elevation. This

site produces the grasped way out especially for non-technical

persons such as data entry operators. All the way through this site

the registered users can generate their own database into the back

end SQL SERVER from the front end ASP.NET, after creating the

database this site endow with the way to the user to engender the

table with the apposite constitution into the database. This site also

allows the user to insert the proceedings into the shaped table,

modernize the obtainable proceedings into the offered table, as well

as obliterate the unnecessary records into the table. This site also

provides the way to truncate the intact records from the backend

table.

ASP.NET

REALTIME

11

E- LOAN SERVICES: This project is a flexible application for the

Private Finance Corporation. It involve in many manual calculations

related to their day-to-day activities. Loan Manipulation process is

handled automatically by this system. This system is mainly focused

on control and analyzes the client’s Personal and Official

information due to the further verifications. The details of the clients

are stored in the system for further references before loan

processing. Hence there arises a need for intelligible User Interface

for the preliminary data entry process. Loans are classified as

Personal, Housing, Vehicle and Cash Loans. Each process need a

separate module for the further activities involved in this process.

This application provides a Web based environment for the end user

for all the data entry process like loan transactions; cash entries,

cheque issues and other manipulations thereby facilitate the need of

the clients and also enhance the financial growth.

ASP.NET

REALTIME

12

AIRLINES ANNOUNCEMENT SYSTEM: An Airline

Announcement system is part of the so-called Passenger Service

Systems, which are applications supporting the direct contact with

the passenger. The Airline Reservations System was one of the

earliest changes to improve efficiency. Eventually evolved into the

Computer. A Computer Reservation System is used for the

reservations of a particular airline and interfaces with a Global

Distribution System, which supports travel agencies and other

distribution channels in making reservations for most major airlines

in a single system.

ASP.NET

REALTIME

Page 6: Mca(.net & java) application projects abstracts(v)

13

ONLINE PROPERTY PROMOTION PARTNER PORTAL: The

project helps for searching and advertising their property and also

provides the land detailed description. The project contains User

Login, Registration, Admin Login, Feedback and Contact Us. A

piece of land, including the air above it and the ground below it, and

any buildings or structures on it. Real estate can include business

and/or residential properties, and are generally sold either by a

relater or directly by the individual who owns the property (for sale

by owner). The property is categorized into two types. They are

residential and commercial. Here the residential and commercial

property gives the detailed information about the property size,

property location, and ownership. Uploading their images is

Highlighted in the home page until the property will sell. This

uploaded image makes much easier for the buyer to see their

property.

ASP.NET

REALTIME

14

VISION PROCESSING FOR REAL-TIME 3-D DATA

ACQUISITION BASED ON CODED STRUCTURED LIGHT:

Structured light vision systems have been successfully used for

accurate measurement of 3-D surfaces in computer vision. However,

their applications are mainly limited to scanning stationary objects

so far since tens of images have to be captured for recovering one 3-

D scene. This paper presents an idea for real-time acquisition of 3-D

surface data by a specially coded vision system. To achieve 3-D

measurement for a dynamic scene, the data acquisition must be

performed with only a single image. A principle of uniquely color-

encoded pattern projection is proposed to design a color matrix for

improving the reconstruction efficiency. The matrix is produced by a

special code sequence and a number of state transitions. A color

projector is controlled by a Computer to generate the desired color

patterns in the scene. The unique indexing of the light codes is

crucial here for color projection since it is essential that each light

grid be uniquely identified by incorporating local neighborhoods so

that 3-D reconstruction can be performed with only local analysis of

a single image. A scheme is presented to describe such a vision

processing method for fast 3-D data acquisition. Practical

experimental performance is provided to analyze the efficiency of

the proposed methods.

VB.NET

WITH C#

IMAGE PROCESSING

15

LOCALIZED SENSOR AREA COVERAGE WITH LOW

COMMUNICATION OVERHEAD:

We propose several localized sensor area coverage protocols for

heterogeneous sensors, each with arbitrary sensing and transmission

radii. The approach has a very small communication overhead since

prior knowledge about neighbor existence is not required. Each node

selects a random time out and listens to messages sent by other

nodes before the time out expires. Sensor nodes whose sensing area

is not fully covered (or fully covered but with a disconnected set of

active sensors) when the deadline expires decide to remain active for

the considered round and transmit an activity message announcing it.

VB.NET

WITH C#

MOBILE

COMPUTING

Page 7: Mca(.net & java) application projects abstracts(v)

There are four variants in our approach, depending on whether or not

withdrawal and retreat messages are transmitted. Covered nodes

decide to sleep, with or without transmitting a withdrawal message

to inform neighbors about the status.

After hearing from more neighbors, active sensors

may observe that they became covered and may decide to alter their

original decision and transmit a retreat message. Our simulations

show a largely reduced message overhead while pres erving coverage

quality for the ideal MAC/physical layer. Compared to an existing

method (based on hello messages followed by retreat ones and where

excessive message loss contributed to excessive coverage holes), our

approach has shown robustness in a model with collisions and/or a

realistic physical layer.

16

DISTRIBUTED FLOW MONITORING TOOL:

The project entitled “Distributed Flow Monitoring Tool” is a reliable

monitoring system. Which is helpful in managing the workflow

process of file operation? As current environment is throng up with

large amount of data, it is been complex to handle such data; hence

there arise a need that helps user to have an easier file sharing. This

system has a unique technique in handling the file, in which it has

split of files and join of file, for consideration if the file size is very

large to handle, using the file split method, we can partition the files

into number of segments as per needed, Which would help to have

flexible file sharing experience. The kind of partitioning of files as a

segment is used for security purpose in which the hackers can’t

monitor all the files. This system provides an extension of join

facility, which enables to reassemble the packets at the destination

point. Thus this system is good in monitoring the workflow of split

and joining of files.

VB.NET

FILE SECURITY &

REAL TIME

APPLICATION

17

SECURITY BASED PACKET SPLITTER AND EXPORTER:

Computer networking or Data communications (Datacom) is the

engineering obedience concerned with the message between

computer systems or devices. A computer network is any set of

computers or devices linked to each other with the ability to switch

over data. In computer technology, transfers per second and its more

common derivatives GB per second (abbreviated GT/s) and mega

byte per second (MT/s) refer to the number of operations transferring

data that occur in each second in some given data-transfer channel.

Network security starts from authenticating the user, commonly with

a username and a password. Since this requires just one thing besides

the user name, i.e. the password, which is something you 'know', this

is sometimes termed one factor authentication.

VB.NET

WITH C#

NETWORK, FILE

SECURITY & REAL

TIME APPLICATION

Page 8: Mca(.net & java) application projects abstracts(v)

18

SMOCK: A SCALABLE METHOD OF CRYPTOGRAPHIC KEY

MANAGEMENT FOR MISSION-CRITICAL WIRELESS AD-

HOC NETWORKS: Mission-critical networks show great potential

in emergency response and/or recovery, health care, critical

infrastructure monitoring, etc. Such mission-critical applications

demand that security service be “anywhere,” “anytime,” and

“anyhow.” However, it is challenging to design a key management

scheme in current mission-critical networks to fulfill the required

attributes of secure communications, such as data integrity,

authentication, confidentiality, non-repudiation, and service

availability. In this paper, we present a self-contained public key-

management scheme, a scalable method of cryptographic key

management (SMOCK), which achieves almost zero communication

overhead for authentication, and offers high service availability. In

our scheme, a small number of cryptographic keys are stored offline

at individual nodes before they are deployed in the network. To

provide good scalability in terms of the number of nodes and storage

space, we utilize a combinatorial design of public-private key pairs,

which means nodes combine more than one key pair to encrypt and

decrypt messages. We also show that SMOCK provides controllable

resilience when malicious nodes compromise a limited number of

nodes before key revocation and renewal.

JAVA

WITH

SWINGS

INFORMATION FORENSICS AND

SECURITY

19

EVALUATING THE VULNERABILITY OF NETWORK

TRAFFIC USING JOINT SECURITY AND ROUTING

ANALYSIS: Joint analysis of security and routing protocols in

wireless networks reveals vulnerabilities of secure network traffic

that remain undetected when security and routing protocols are

analyzed independently. We formulate a class of continuous metrics

to evaluate the vulnerability of network traffic as a function of

security and routing protocols used in wireless networks. We

develop two complementary vulnerability definitions using set

theoretic and circuit theoretic interpretations of the security of

network traffic, allowing a network analyst or an adversary to

determine weaknesses in the secure network. We formalize node

capture attacks using the vulnerability metric as a nonlinear integer

programming minimization problem and propose the GNAVE

algorithm, a Greedy Node capture Approximation using

Vulnerability Evaluation. We discuss the availability of security

parameters to the adversary and show that unknown parameters can

be estimated using probabilistic analysis. We demonstrate

vulnerability evaluation using the proposed metrics and node capture

attacks using the GNAVE algorithm through detailed examples and

simulation.

JAVA

WITH

SWINGS

DEPENDABLE AND

SECURE

COMPUTING

Page 9: Mca(.net & java) application projects abstracts(v)

20

FINGERPRINTING WITH MINIMUM DISTANCE DECODING:

This system adopt an information-theoretic framework for the design

of collusion-resistant coding/decoding schemes for digital

fingerprinting. More specifically, the minimum distance decision

rule is used to identify 1 out of pirates. Achievable rates, under this

detection rule, are characterized in two scenarios. First, we consider

the averaging attack where a random coding argument is used to

show that the rate 1/2 is achievable with pirates. For the existence of

a non-resolvable collusion attack, with minimum distance decoding,

for any nonzero rate is established. Inspired by our theoretical

analysis, we then construct coding/decoding schemes for

fingerprinting based on the celebrated belief-propagation framework.

Using an explicit repeat-accumulate code; we obtain a vanishingly

small probability of misidentification at rate 1/3 under averaging

attack with. For collusion attacks, which satisfy the marking

assumption, we use a more sophisticated accumulate repeat

accumulate code to obtain a vanishingly small misidentification

probability at rate 1/9 with. These results represent a marked

improvement over the best available designs in the literature.

JAVA

WITH

SWINGS

INFORMATION

FORENSICS AND

SECURITY

21

ON RELIABILITY AND SECURITY OF RANDOMIZED

DETECTORS AGAINST SENSITIVITY ANALYSIS ATTACKS:

Despite their popularity, spread spectrum schemes are vulnerable

against sensitivity analysis attacks on standard deterministic

watermark detectors. A possible defense is to use a randomized

watermark detector. While randomization sacrifices some detection

performance, it might be expected to improve detector security to

some extent. This paper presents a framework to design randomized

detectors with exponentially large randomization space and

controllable loss in detection reliability. We also devise a general

procedure to attack such detectors by reducing them into equivalent

deterministic detectors. We conclude that, contrary to prior belief,

randomization of the detector is not the ultimate answer for

providing security against sensitivity analysis attacks in spread

spectrum systems. Instead, the randomized detector inherits the

weaknesses of the equivalent deterministic detector.

JAVA

WITH

SWINGS

INFORMATION

FORENSICS AND

SECURITY

22

ACUTE IMAGE CLASHES: The project deals with one of the

major image processing tasks, detecting edges. There are lots of

techniques for detecting edges, but here is an efficient approach

called Convolution filters. This system also includes all image

editing features such as image zooming, image contrast changing,

color editor, image resize, image flipper, and many more. With the

help of this system, a single image can take more than thirty

different shapes with different styles. Edge detection filters work

essentially by looking for contrast in an image. This can be done a

number of different ways; the convolution filters do it by applying a

negative weight on one edge, and a positive on the other. This has

the net effect of trending towards zero if the values are the same, and

trending upwards as contrast exists. This is precisely how the

emboss filter worked, and using an offset of 127 would again make

these filters look similar to our previous embossing filter.

VB.NET

WITH SQL

SERVER

IMAGE PROCESSING

Page 10: Mca(.net & java) application projects abstracts(v)

23

SYS-INFO GATHERER: The project entitled “Sys -Info Gatherer”

utility deals a major upgrade to previous System Information

gathering operation. This system offers various information about

the personal computer, in addition to information, the ability to

control the information displayed. You can start/stop drivers and

service, uninstall programs, control processes, set the computer

information including logo/picture, share/unshare folders, delete

startup programs, and modify user/company information. The

complete list of categories is Bios, Components, Computer, Cpu,

DateAndTime, Desktop, Drivers, Drives, EnvironmentVariables,

EventViewer, FileTypes, Fonts, InstalledPrograms, Introduction,

Keyboard, MultimediaCodecs, Network Information,

OperatingSystem, PointingDevice, Ports, Processes, Services,

Shares, Sound, SpecialFolders, StartupPrograms, UsbDevices,

UserInformation, Video, VisualStyles, Win32Explorer Hardware,

Win32Explorer Memory, Win32Explorer Network, Win32Explorer

Storage, Win32Explorer System, and Win32Explorer Users. By

examining the source code, this application will familarize the reader

with .NET WMI class methods, Panels used as UserControls,

TreeView, ListView, and ListViewGroups. This update fixes a

problem when the application starts as a notification icon.

VB.NET

WITH SQL

SERVER

IMAGE PROCESSING

24

IMAGE PROCESSING BASED ON WATERMARKING

PICTURE MAKER: The project describes an approach to building a

watermarking utility that may be used to add watermarks to any

supported image file format. The resulting application shall permit

the user to open any supported image file format into a scrollable

picture box, to define the text to be applied as a watermark, to set the

font and color of the watermark, to define the opacity of the

watermark, to determine whether or not the watermark appears at the

top or bottom of the image, and to preview the watermark prior to

saving it to the image.

VB.NET

WITH SQL

SERVER

IMAGE PROCESSING

25

MULTI QUERY OPTIMIZATION IN DATAMINING: The project

entitled “Multi Query Optimization in Data Mining” deals with the

concept of data mining. The spectrum of this system is to h ide the

relative data in corresponding ports like XML, HTML, Microsoft

Word, and so on. This system requires the existing database file,

which is necessary for conversion, once the user selects the required

database, and then they can have a complete capability to translate

the corresponding tables into their respective port. For this users

have to create their own identity into the conversion system, with

proper username, password, and with their contact information. If

once the user registers their identity to the system then they can

easily access the system with full rights. The process of the entire

spectrum is defined here: initially user have to select the database,

then they have to fix up their desired port like XML, HTML,

Microsoft Word, or Microsoft Excel Sheet, and finally they have to

convert their database table into the corresponding ports. So, they

can easily manipulate the entire table spectrum into the relative ports

easily.

VB.NET

WITH

MS-

ACCESS

AND SQL

SERVER

DATA MINING

Page 11: Mca(.net & java) application projects abstracts(v)

26

SECURED IMAGE PORTRAIT WITH ULTIMATE PLANNING:

The project entitled “Secured Image Portrait with Ultimate

Planning” deals the concept of image processing with ultimate

security mechanism. Now a days many users feel most of the

problems based on the personal image sharing mechanisms, such as

share their personnel photos with the trusted one, as well as it is very

hard to manage the official data with the preferred manner. The

concept in this system illustrates how to make the image in an

unrecognized manner, which will be hard for the attackers or third

parties to obtain that respected images. The user first captures the

appropriate image with the help of fast image capturing tool; the

captured image will be hided into a text based format by using the

secured image portrait mechanism, which provides an efficient way

to the users to handle their data or an image in a secured way. The

Image Manipulation demonstrates how to add any Image to your

image, for example to add frame image. Beside that the users can see

how to rotate and flip image. This system is an ultimate solution for

the users who are all felt with an existing mechanism for manipulate

their images or share the images with trusted ones.

VB.NET

WITH SQL

SERVER

IMAGE SECURITY

MECHANISM

AND PROCESSING

27

CONTENT BASED IMAGE RETRIEVAL: The content based

image retrieval (CBIR) is one of the most popular, rising research

areas of the digital image processing. Most of the available image

search tools, such as Google Images and Yahoo! Image search, are

based on textual annotation of images. In these tools, images are

manually annotated with keywords and then retrieved using text -

based search methods. The performances of these systems are not

satisfactory. The goal of CBIR is to extract visual content of an

image automatically, like color, texture, or shape. This paper aims to

introduce the problems and challenges concerned with the design

and the creation of CBIR systems, which is based on a free hand

sketch (Sketch based image retrieval – SBIR). With the help of the

existing methods, describe a possible solution how to design and

implement a task specific descriptor, which can handle the

informational gap between a sketch and a colored image, making an

opportunity for the efficient search hereby. The used descriptor is

constructed after such special sequence of preprocessing steps that

the transformed full color image and the sketch can be compared.

We have studied EHD, HOG and SIFT. Experimental results on two

sample databases showed good results. Overall, the results show that

the sketch based system allows users an intuitive access to search-

tools. The SBIR technology can be used in several applications such

as digital libraries, crime prevention, and photo sharing sites. Such a

system has great value in apprehending suspects and identifying

victims in forensics and law enforcement. A possible application is

matching a forensic sketch to a gallery of mug shot images. The area

of retrieve images based on the visual content of the query picture

intensified recently, which demands on the quite wide methodology

spectrum on the area of the image processing..

J2EE

IMAGE PROCESSING

28

SMEAR IMITATION CREATURE: This project entitled ‘Smear

Imitation Creature’ provides unique features of painting tool,

enabling the user to make up their own arts, gallery and picture

collections. Using this enhanced features of this tool, we can edit the

JAVA

REAL TIME

NETWORK

SECURITY

Page 12: Mca(.net & java) application projects abstracts(v)

image or photos, crop image as per the needed shapes .In editing, the

stimulation provides to flip or rotate the images as per the angle the

user needs. Resizing of image provides the user to resize the image

or picture that are exist or currently made to save it to their desired

format size regards with width and height. Cropping enables the user

to save their desired area in the image or picture loaded, thereby

make it as a perfect collection.

29

CELL BREATHING TECHNIQUES FOR LOAD BALANCING

IN WIRELESS LANS: Maximizing network throughput while

providing fairness is one of the key challenges in wireless LANs

(WLANs). This goal is typically achieved when the load of access

points (APs) is balanced. Recent studies on operational WLANs,

however, have shown that AP load is often substantially uneven. To

alleviate such imbalance of load, several load balancing schemes

have been proposed. These schemes commonly require proprietary

software or hardware at the user side for controlling the user-AP

association. In this paper we present a new load balancing technique

by controlling the size of WLAN cells (i.e., AP’s coverage range),

which is conceptually similar to cell breathing in cellular networks.

The proposed scheme does not require any modification to the users

neither the IEEE 802.11 standard. It only requires the ability of

dynamically changing the transmission power of the AP beacon

messages. We develop a set of polynomial time algorithms that find

the optimal beacon power settings, which minimize the load of the

most congested AP. We also consider the problem of network-wide

min-max load balancing. Simulation results show that the

performance of the proposed method is comparable with or superior

to the best existing association-based method.

VB.NET

WITH C#

SQL

SERVER

COMPUTER

COMMUNICATIONS

30

A* PATH FINDING ALGORITHM: This project illustrates how to

implement an A * path finding algorithm into our program. This

algorithm is used to find the path to get the destinations. A

Geographic Information System (GIS) integrates hardware, software,

and data for capturing, managing, analyzing, and displaying all

forms of geographically referenced information.

VB.NET

NETWORK

31

A GEOMETRIC APPROACH TO IMPROVING ACTIVE

PACKET LOSS MEASUREMENT: Measurement and estimation of

packet loss characteristics are challenging due to the relatively rare

occurrence and typically short duration of packet loss episodes.

While active probe tools are commonly used to measure packet loss

on end-to-end paths, there has been little analysis of the accuracy of

these tools. The objective of our study is to understand how to

measure packet loss episodes accurately with end-to-end probes.

Studies show that the standard Poisson-modulated end-to-end

measurement of packet loss accuracy has to be improved. Thus, we

introduce a new algorithm for packet loss measurement that is

designed to overcome the deficiencies in standard Poisson-based

tools. Specifically, our method entails probe experiments that follow

a geometric distribution to enable more accurate measurements than

standard Poisson probing and other traditional packet loss

measurement tools. We also find the transfer rate. We evaluate the

capabilities of our methodology experimentally by developing and

JAVA

SWINGS

NETWORK AND

NETWORK

SECURITY WITH

ROUTING DOMAIN

Page 13: Mca(.net & java) application projects abstracts(v)

implementing a prototype tool, called BADABING. The

experiments demonstrate the trade-offs between impact on the

network and measurement accuracy. BADABING reports loss

characteristics are far more accurately than traditional loss

measurement tools.

32

EFFICIENT RESOURCE ALLOCATION FOR WIRELESS

MULTICAST: The success of wireless and mobile communications

in the 21st century has resulted in a large variety of wireless

technologies such as second and third-generation cellular, satellite,

Wi-Fi, and Bluetooth. The heterogeneous wireless networks

combine various wireless networks and provide universal wireless

access. The leading wireless companies in some countries have

operated networks with multiple wireless technologies, such as T-

Mobile in the United States, British Telecom in the United Kingdom,

Orange Telecom in France, NTT DoCoMo in Japan, and Chunghwa

Telecom in Taiwan. The number of such Companies would increase

because the standards for operators to provide seamless services in

networks with multiple wireless technologies have been proposed by

the Third-Generation Partnership Project (3GPP) and Unlicensed

Mobile Access (UMA) . In addition, users in the heterogeneous

wireless networks are usually covered by more than one cell to avoid

connection drop and service disruption. More mobile terminals in the

wireless networks are likely to own multiple wireless technologies.

Therefore, the heterogeneous wireless networks provide the mobile

hosts with many choices for the cells and wireless technologies to

access the Internet.

VB.NET

MOBILE

COMPUTING WITH

NETWORK SUPPORT

33

HACKER DETECTION IN WIRELESS SENSOR NETWORK:

Intrusion detection in Wireless Sensor Network (WSN) is of

practical interest in many applications such as detecting an intruder

in a battlefield. The intrusion detection is defined as a mechanism for

a WSN to detect the existence of inappropriate, incorrect, or

anomalous moving attackers. In this paper, we consider this issue

according to heterogeneous WSN models. Furthermore, we consider

two sensing detection models: single-sensing detection and multiple-

sensing detection... Our simulation results show the advantage of

multiple sensor heterogeneous WSNs.

JAVA

SWINGS

NETWORK

SECURITY

34

BANDWIDTH ESTIMATION FOR IEEE 802.11-BASED AD

HOC NETWORKS: Since 2005, IEEE 802.11-based networks have

been able to provide a certain level of quality of service (QoS) by the

means of service differentiation, due to the IEEE 802.11e

amendment. However, no mechanism or method has been

standardized to accurately evaluate the amount of resources

remaining on a given channel. Such an evaluation would, however,

be a good asset for bandwidth-constrained applications. In multihop

ad hoc networks, such evaluation becomes even more difficult.

Consequently, despite the various contributions around this research

topic, the estimation of the available bandwidth still represents one

of the main issues in this field. In this paper, we propose an

improved mechanism to estimate the available bandwidth in IEEE

JAVA

SWINGS

& AWT

NETWORK

ROUTING

Page 14: Mca(.net & java) application projects abstracts(v)

802.11-based ad hoc networks. Through simulations, we compare

the accuracy of the estimation we propose to the estimation

performed by other state-of-the-art QoS protocols, BRuIT, AAC,

and QoS-AODV.

35

LOCATION BASED SPATIAL QUERY PROCESSING IN

WIRELESS BROADCAST ENVIRONMENTS: Location-based

spatial queries (LBSQs) refer to spatial queries whose answers rely

on the location of the inquirer. Efficient processing of LBSQs is of

critical importance with the ever-increasing deployment and use of

mobile technologies. We show that LBSQs have certain unique

characteristics that traditional spatial query processing in centralized

databases does not address. For example, a significant challenge is

presented by wireless broadcasting environments, which have

excellent scalability but often exhibit high-latency database access.

In this paper, we present a novel query processing technique that,

while maintaining high scalability and accuracy, manages to reduce

the latency considerably in answering location-based spatial queries.

Our approach is based on peer-topeer sharing, which enables us to

process queries without delay at a mobile host by using query results

cached in its neighboring mobile peers. We demonstrate the

feasibility of our approach through a probabilistic analysis, and we

illustrate the appeal of our technique through extensive simulation

results.

JAVA

SWINGS

MOBILE

COMPUTING

36

NETWORK CAPACITY ADAPTATION IN SERVICE OVERLAY

NETWORK: The considered Service Overlay Networks (SON) lease

bandwidth with Quality of Service (QoS) guarantees from a

multitude of Internet Autonomous Systems, through service level

agreements (SLA) with Internet Service Providers (ISP). This

bandwidth is used to establish SON links and deliver end-to end QoS

for real time service connections. The leased bandwidth amount

influences both the admitted traffic and network cost, affecting the

network profit. This gives the network operator the opportunity to

optimize the profit by adapting the restrictions of limiting the

bandwidth of network resources by changing traffic and SLA costs

conditions. We propose a novel approach that maximizes the

network profit based on traffic measurements and SLA cost changes.

The approach uses a structured model that integrates the network

routing policy with the adaptation of maximizing the SON link

capacities. While performing the adaptation of leased bandwidth, the

connection blocking constraints are also limited and maintained.

The proposed model is derived over by providing a voice

and video conferencing service decreed over as a separate service

over the SON network provided over with adaptive optimization

approach on the basis of reward maximizing routing policy derived

from the Markov Decision Process theory although it can be applied

to other routing policies. It is been suggested that our model of

routing policy is been injected over with the various nodes in the

service overlay network. Outcasting the network traffic limitation in

this upcoming technology.

VB.Net

with C#

NETWORK

Page 15: Mca(.net & java) application projects abstracts(v)

37

ELECTRONIC TEST MANAGEMENT: The project entitled

"Electronic Examination Management" is used to test the Domain

knowledge of the students, and employees with respect to the

particular technology. The manual procedure used for conducting

exam is time consuming process and error prone due to human

limitations. The System purpose is to completely automate the old

manual procedure of conducting exam to in an electronic way.

The purpose of this electronic test simulator is to take test in an

efficient manner and no time wasting for checking the paper. The

main objective of the test simulator is to efficiently evaluate the

candidate thoroughly through a fully automated system that not only

saves lot of time but also gives fast results. For students they give

papers according to their convenience and time as well as there is no

need of using extra thing like paper, pen etc.

JAVA

WITH

SWINGS

REAL TIME

APPLICATION

38

MEASURING BOTTLENECK BANDWIDTH OF TARGETED

PATH SEGMENTS: Accurate measurement of network bandwidth

is crucial for network management applications as well as flexible

Internet applications and protocols which actively manage and

dynamically adapt to changing utilization of network resources.

Extensive work has focused on two approaches to measuring

bandwidth measuring it hop-by-hop, and measuring it end-to-end

along a path. Unfortunately, best-practice techniques for the former

are inefficient and techniques for the latter are only able to observe

bottlenecks visible at end-to-end scope. In this paper, we develop

end-to-end probing methods, which can measure bottleneck

bandwidth along arbitrary, targeted sub paths of a path in the

network, including sub paths shared by a set of flows. We evaluate

our technique through extensive ns simulations, and then provide a

comparative Internet performance evaluation against hop-by-hop

techniques. We also describe a number of applications, which we

foresee as standing to benefit from solutions to this problem, ranging

from network troubleshooting and capacity provisioning to

optimizing the layout of application-level overlay networks, to

optimized replica placement.

JAVA

WITH

SWINGS

NETWORK

39

MOBILITY MANAGEMENT APPROACHES FOR MOBILE IP

NETWORKS PERFORMANCE COMPARISON AND USE

RECOMMENDATIONS: In wireless networks, efficient

management of mobility is a crucial issue to support mobile users.

The Mobile Internet Protocol (MIP) has been proposed to support

global mobility in IP networks. Several mobility management

strategies have been proposed which aim reducing the signaling

traffic related to the Mobile Terminals (MTs) registration with the

Home Agents (HAs) whenever their Care-of-Addresses (CoAs)

change. They use different Foreign Agents (FAs) and Gateway FAs

(GFAs) hierarchies to concentrate the registration processes. For

high-mobility MTs, the Hierarchical MIP (HMIP) and Dynamic

HMIP (DHMIP) strategies localize the registration in FAs and

GFAs, yielding to high-mobility signaling. The Multicast HMIP

strategy limits the registration processes in the GFAs. For high-

mobility MTs, it provides lowest mobility signaling delay compared

JAVA

With

Swings

MOBILE

COMPUTING

Page 16: Mca(.net & java) application projects abstracts(v)

to the HMIP and DHMIP approaches. However, it is resource

consuming strategy unless for frequent MT mobility. Hence, we

propose an analytic model to evaluate the mean signaling delay and

the mean bandwidth per call according to the type of MT mobility.

In our analysis, the MHMIP Outperforms the DHMIP and MIP

strategies in almost all the studied cases. The main contribution of

this paper is the analytic model that allows the mobility management

approaches performance evaluation.

40

ENERGY-EFFICIENT SINR-BASED ROUTING FOR MULTI-

HOP WIRELESS NETWORKS: In this paper, we develop an

energy-efficient routing scheme that takes into account the

interference created by existing flows in the network. The routing

scheme chooses a route such that the network expends the minimum

energy satisfying with the minimum constraints of flows. Unlike

previous works, we explicitly study the impact of routing a new flow

on the energy consumption of the network. Using implementation.

We show that the routes chosen by our algorithm (centralized and

distributed) are more energy efficient than the state of the art.

JAVA

WITH

SWINGS

MOBILE

COMPUTING

41

FAULT-TOLERANT MOBILE AGENT-BASED MONITORING

ECHANISM FOR HIGHLY DYNAMIC DISTRIBUTED

NETWORKS:

Asynchronous and dynamic natures of mobile agents, a certain

number of mobile agent-based monitoring mechanisms have actively

been developed to monitor large-scale and dynamic distributed

networked systems adaptively and efficiently. Among them, some

mechanisms attempt to adapt to dynamic changes in various aspects

such as network traffic patterns, resource addition and deletion,

network topology and so on. However, failures of some domain

managers are very critical to providing correct, real-time and

efficient monitoring functionality in a large-scale mobile agent-

based distributed monitoring system. In this paper, we present a

novel fault tolerance mechanism to have the following advantageous

features appropriate for large-scale and dynamic hierarchical mobile

agent-based monitoring organizations. It supports fast failure

detection functionality with low failure-free overhead by each

domain manager transmitting heartbeat messages to its immediate

higher-level manager. Also, it minimizes the number of non-faulty

monitoring managers affected by failures of domain managers.

Moreover, it allows consistent failure detection actions to be

performed continuously in case of agent creation, migration and

termination, and is able to execute consistent takeover actions even

in concurrent failures of domain managers.

JAVA

WITH

SWINGS

CONSUMER

COMMUNICATIONS

AND NETWORKING

CONFERENCE

42

A DISTRIBUTED STREAM QUERY OPTIMIZATION

FRAMEWORK THROUGH INTEGRATED PLANNING AND

DEPLOYMENT: This system addresses the problem of optimizing

multiple distributed stream queries that are executing simultaneously

in distributed data stream systems. We argue that the static query

optimization approach of "plan, then deployment" is inadequate for

handling distributed queries involving multiple streams and node

dynamics faced in distributed data stream systems and applications.

JAVA

WITH

SWINGS

PARALLEL AND

DISTRIBUTED

SYSTEMS

Page 17: Mca(.net & java) application projects abstracts(v)

Thus, the selection of an optimal execution plan in such dynamic and

networked computing systems must consider operator ordering,

reuse, network placement, and search space reduction. We propose

to use hierarchical network partitions to exploit various opportunities

for operator-level reuse while utilizing network characteristics to

maintain a manageable search space during query planning and

deployment. We develop top-down, bottom-up, and hybrid

algorithms for exploiting operator-level reuse through hierarchical

network partitions. Formal analysis is presented to establish the

bounds on the search space and sub optimality of our algorithms. We

have implemented our algorithms in the IFLOW system, an adaptive

distributed stream management system.

43

DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS:

Despite their popularity, spread spectrum schemes are vulnerable

against sensitivity analysis attacks on standard deterministic

watermark detectors. A possible defense is to use a randomized

watermark detector. While randomization sacrifices some detection

performance, it might be expected to improve detector security to

some extent. This paper presents a framework to design randomized

detectors with exponentially large randomization space and

controllable loss in detection reliability. We also devise a general

procedure to attack such detectors by reducing them into equivalent

deterministic detectors. We conclude that, contrary to prior belief,

randomization of the detector is not the ultimate answer for

providing security against sensitivity analysis attacks in spread

spectrum systems. Instead, the randomized detector inherits the

weaknesses of the equivalent deterministic detector.

JAVA

WITH

SWINGS

PARALLEL AND

DISTRIBUTED

SYSTEMS

44

MOVEMENT-ASSISTED CONNECTIVITY RESTORATION IN

WIRELESS SENSOR AND ACTOR NETWORKS: Recent years

have witnessed a growing interest in applications of wireless sensor

and actor networks (WSANs). In these applications, a set of mobile

actor nodes are deployed in addition to sensors in order to collect

sensors' data and perform specific tasks in response to detected

events/objects. In most scenarios, actors have to respond

collectively, which requires interactor coordination. Therefore,

maintaining a connected interactor network is critical to the

effectiveness of WSANs. However, WSANs often operate

unattended in harsh environments where actors can easily fail or get

damaged. An actor failure may lead to partitioning the interactor

network and thus hinder the fulfillment of the application

requirements. In this paper, we present DARA, a distributed actor

recovery algorithm, which opts to efficiently restore the connectivity

of the interactor network that has been affected by the failure of an

actor. Two variants of the algorithm are developed to address 1- and

2-connectivity requirements. The idea is to identify the least set of

actors that should be repositioned in order to reestablish a particular

level of connectivity. DARA strives to localize the scope of the

recovery process and minimize the movement overhead imposed on

the involved actors. The effectiveness of DARA is validated through

simulation experiments.

JAVA

WITH

SWINGS

PARALLEL AND

DISTRIBUTED

SYSTEMS

Page 18: Mca(.net & java) application projects abstracts(v)

45

SECURITY ANALYSIS OF THE SASI PROTOCOL: The ultra

lightweight RFID protocols only involve simple bitwise operations

(like XOR, AND, OR, etc.) on tags. In this paper, we show that the

ultra lightweight strong authentication and strong integrity (SASI)

protocol has two security vulnerabilities, namely, denial-of-service

and anonymity tracing based on a compromised tag. The former

permanently disables the authentication capability of a RFID tag by

destroying synchronization between the tag and the RFID reader.

The latter links a compromised tag with past actions performed on

this tag.

JAVA

WITH

SWINGS

PARALLEL AND

DISTRIBUTED

SYSTEMS

46

VISIBLE REVERSE K-NEAREST NEIGHBOR QUERY

PROCESSING IN SPATIAL DATABASES: Reverse nearest

neighbor (RNN) queries have a broad application base such as

decision support, profile-based marketing, resource allocation, data

mining, etc. Previous work on RNN search does not take obstacles

into consideration. In the real world, however, there are many

physical obstacles (e.g., buildings, blindages, etc.), and their

presence may affect the visibility/distance between two objects. In

this paper, we introduce a novel variant of RNN queries, namely

visible reverse nearest neighbor (VRNN) search, which considers the

obstacle influence on the visibility of objects. Given a data set P, an

obstacle set O, and a query point q, a VRNN query retrieves the

points in P that have q as their nearest neighbor and are visible to q.

We propose an efficient algorithm for VRNN query processing,

assuming that both P and O are indexed by R-trees. Our method does

not require any pre-processing, and employs half-plane property and

visibility check to prune the search space.

JAVA

WITH

SWINGS

DATA

ENGINEERING

47

ISOLATED MANAGEMENT ON INTRANET: The project entitled

“Isolated Management on Intranet” deals the entire college

management spectrum in an extreme manner. This system describes

an idea to provide an isolated management on intranet. In this system

students can attain the tangible benefits of the web browser in a

restricted manner, the sites provided to the students is entirely

controlled by the administrator. For an administrator a new category

of browser is introduced to make the administrator provision easier.

This software also helps the administrator to maintain a history of

data, that is what are all the sites previously visited by the

administrator. This project can be employed in any institutions,

where one has to control the users by blocking the Web sites. This

system expects the full authentication prior to access all the features

available in it. Once the user proved their identity to the system then

they can easily access all the features presented within it. This

Project can be well utilized by the network Administrator for

controlling the users from the remote corner.

VB.NET

WITH SQL

SERVER

REAL TIME

NETWORK

SECURITY

48

ROUTE RESERVATION IN INTER NETWORKS: This paper

investigates whether and when route reservation-based (RB)

communication can yield better delay performance than non-

reservation-based (NRB) communication in Inter networks. In

addition to posing this fundamental question, the requirements (in

JAVA

SWINGS

WITH

SQL

SERVER

NETWORK

AND

COMPUTER

COMMUNICATIONS

Page 19: Mca(.net & java) application projects abstracts(v)

terms of route discovery, medium access control (MAC) protocol,

and pipelining, etc.) for making RB switching superior to NRB

switching are also identified. A novel analytical framework is

developed and the network performance under both RB and NRB

schemes is quantified. It is shown that if the aforementioned

requirements are met, then RB schemes can indeed yield better delay

performance than NRB schemes. This advantage, however, comes at

the expense of lower throughput and good put compared to NRB

schemes.

49

CRACK REMOVAL ALGORITHM: An integrated methodology

for the detection and removal of cracks on digitized paintings is

presented in this project. The cracks are detected by threshold the

output of the morphological top-hat transform. Afterward, the thin

dark brush strokes which have been misidentified as cracks are

removed using either a median radial basis function neural network

on hue and saturation data or a semi-automatic procedure based on

region growing. Finally, crack filling using order statistics filters or

controlled an isotropic diffusion is performed. The methodology has

been shown to perform very well on digitized paintings suffering

from cracks..

VB.NET

WITH

SQL

SERVER

IMAGE

PROCESSING

50

SECURE DATA MANAGEMENT WITH FOLDER SECURITY

AND RESOURCE MAINTENANCE: The project entitled “Folder

Security System” fully describes about how to handle the particular

folder in the system or PC in a secured manner. In this system we

can create a back up for the particular file, which is stored in the

respective folder. With this facility we can easily create a copy of the

exact file in the same directory as well as in the same respective

folder. This system also provides the facility to restore the file in

some other folder within the same or different directory, which

means if you want to create the same file in some other folder in that

case this feature, is an exact way to do that thing. With this system

we can search weather the particular type of file is available in the

corresponding folder or not, and also this system allow the user to

remove the particular file from that folder if required.

VB.NET

WITH

SQL

SERVER

SECURE

COMPUTING

51

AUTOMOBILES SALES MONITORING SYSTEM: The project

spare sales are a software package developed in Visual Basic Net. It

is developed to computerize the customer enquiry for the needed

spare parts. The purpose is to service the customer as quick as

possible. When the enquiry for the needed spare part is made

through either its code or name or local name or by seeing the

catalog, the system will search for the available product and will

report the availability and other details. Thus we can save the

searching time. The catalog includes the figurative representation of

the specified spare parts with its full description. All the needed

internal designs are displayed in classified manner. Warranty

management module is also included in this project. When a claim

for warranty aroused all the details of that spare part such as

purchase number, part code etc will be verified with the details in the

system. After a successful verification the subsequent steps for

warranty will be initiated.

VB.NET

WITH

SQL

SERVER

REAL TIME

APPLICATION

Page 20: Mca(.net & java) application projects abstracts(v)

52

REMOTE RESOURCE COMPRESSION PORT: The Project

“Remote Zipping Portal” is the tool for Transferring large files over

the Internet can be speeded up significantly if

compression/decompression is applied before/after the

upload/download operation. This project contains four major parts

are Client tool, Server tool, Compression and transfer monitor. The

module Compression contains the objects and classes to compress

the given file by advanced ZIP algorithm. And this compression

module used in tow sides of server and client. In the Server Module

contains the tool which listening the Client request by enabling the

server application objects. This tool Listening port and remote IP

Address, which requests the server to send the compressed data. The

Client module the request handler designed to send the request to

active server for transaction. These are the modules defined in this

project. This project provides the large amount of file sharing with

minimum time and faster.

VB.NET

WITH

SQL

SERVER

REAL TIME

APPLICATION

53

REGION BASED IMAGE CUTTER AND FORMATTER: The

project entitled “Region Based Image Cutter And Formatter” deals

with one of the major image processing tasks, that is make the image

into specific regions and format them. This software allows the user

to access this system only after checking their authentication. The

users have to register themselves into this system, and getting their

username, and password. After getting that the users can log into

this system, and accessing the appropriate features. This system

allows the registered user to select the raster image first. The image

retains its original edge definition without producing "jaggies" is

known as raster image. The jagged edges on curves and diagonal

lines in an image are commonly called jaggies. The user can shape

minimize or maximize the view of the selected image by means of

scroll the mouse ball either front or back. After selecting the

perspective image the user have to create or select the specific

region. This software allows the user to test the created region. The

region can be used to shape a particular control or formatting an

image.

VB.NET

WITH

SQL

SERVER

IMAGE

PROCESSING

54

CAM BASED SECURITY PROVIDER: In this competitive and

business age, it becomes crucial to everyone to manage the office

and organization in a secured manner because of the intruders, third

parties, competitors, and hackers. This system is introduced to

provide a hi-tech security measure to the official persons as well as

business people to identify the intruders of their organization.

Security Cam based system converts the Web Cam to a Security

Camera. The entire system works belonging to the protocol address

feed into the network. If any person crosses in front of the

predefined camera, this system will alert the respective persons and

produce the immediate solution to identify the person or intruder.

This system provides the hi-tech security measure by means of

enabling the security scanner; it generally helps the respective

persons to scan the associative devices with in the device that may

be your personal computer or laptop. Once the official parties start

the security based web cam system it enables the alerter to start

working, and scan the intruders, if any intruders cross this or come

within that covered circle of the security system it produces the alert

VB.NET

WITH

SQL

SERVER

IMAGE

PROCESSING

Page 21: Mca(.net & java) application projects abstracts(v)

by means of creating the noise, as well capture the picture of the

third person. So this simply provides the solution to handle your

organization in a secured manner, and also reveal the answer to this

query-how to maintain the organization or own business place in a

secured way?

55

ONLINE BLOOD BANK MANAGEMENT SYSTEM: This portal

is a place for new Blood donor system to be start into the available

environments. The system planned to create the awareness to blood

donor to provide the blood for required peoples . This system plans to

collect the information from all the respective blood donors and

requestors, as well as provide the service to them in an extreme

manner.

ASP.NET

WITH

SQL

SERVER

REAL TIME

APPLICATION

56

IMAGE ENCRYPTION AND DECRYPTION: Mobile and cloud

computing have emerged as the new computing platforms and are

converging into a powerful cloud-mobile computing platform. This

article envisions a virtualized screen as a new dimension in such a

platform to further optimize the overall computing experience for

users. In a virtualized screen, screen rendering is done in the cloud,

and delivered as images to the client for interactive display. This

enables thin-client mobile devices to enjoy many computationally

intensive and graphically rich services. Technical challenges are

discussed and addressed. Two novel cloud-mobile applications,

Cloud Browser and Cloud Phone, are presented to demonstrate the

advantages of such a virtualized screen.

Vb.NET/

JAVA

REAL TIME

APPLICATION

57

AUTOMATING THE DESIGN AND CONSTRUCTION OF

QUERY FORMS: One of the simplest ways to query a database is

through a form where a user can fill in relevant information and

obtain desired results by submitting the form. Designing good forms

is a nontrivial manual task, and the designer needs a sound

understanding of both the data organization and the querying needs.

Furthermore, form design usually has conflicting goals: each form

should be simple and easy to understand, while collectively, the

interface must support as many queries as possible. In this paper, we

present a framework for generating forms in an automatic and

principled way, given a database and a sample query workload. We

design a tunable clustering algorithm for establishing form structure

based on multiple “similar” queries, which includes a mechanism for

extending forms to support future “similar” queries. The algorithm is

adaptive and can incrementally adjust forms to reflect the most

current querying trends. We have implemented our form generation

system on a real database and evaluated it on a comprehensive set of

query loads and database schemas. We observe that our system

generates a modest number of forms for large and diverse query

loads even after placing a strict bound on form complexity.

ASP.NET

DATA MINING

58

DATA MINING ANALYSIS ON EB BILL SYSTEM: Preparing a

data set for analysis is generally the most time consuming task in a

data mining project, requiring many complex SQL queries, joining

VB.NET

DATA MINING &

REAL TIME

APPLICATION

Page 22: Mca(.net & java) application projects abstracts(v)

tables and aggregating columns. Existing SQL aggregations have

limitations to prepare data sets because they return one column per

aggregated group. In general, a significant manual effort is required

to build data sets, where a horizontal layout is required. We propose

simple, yet powerful, methods to generate SQL code to return

aggregated columns in a horizontal tabular layout, returning a set of

numbers instead of one number per row. This new class of functions

is called horizontal aggregations. Horizontal aggregations build data

sets with a horizontal renormalized layout, which is the standard

layout required by most data mining algorithms. We propose three

fundamental methods to evaluate horizontal aggregations: CASE:

Exploiting the programming CASE construct; SPJ: Based on

standard relational algebra operators (SPJ queries); PIVOT: Using

the PIVOT operator, which is offered by some DBMSs. Experiments

with large tables compare the proposed query evaluation methods.

Our CASE method has similar speed to the PIVOT operator and it is

much faster than the SPJ method. In general, the CASE and PIVOT

methods exhibit linear scalability, whereas the SPJ method does not.

59

ONLINE PRODUCT OPINION AND RANKING SYSTEM: A

major concern when incorporating large sets of diverse n -gram

features for sentiment classification is the presence of noisy,

irrelevant, and redundant attributes. These concerns can often make

it difficult to harness the augmented discriminatory potential of

extended feature sets. We propose a rule-based multivariate text

feature selection method called Feature Relation Network (FRN) that

considers semantic information and also leverages the syntactic

relationships between n-gram features. FRN is intended to efficiently

enable the inclusion of extended sets of heterogeneous n -gram

features for enhanced sentiment classification. Experiments were

conducted on three online review test beds in comparison with

methods used in prior sentiment classification res earch. FRN

outperformed the comparison univariate, multivariate, and hybrid

feature selection methods; it was able to select attributes resulting in

significantly better classification accuracy irrespective of the feature

subset sizes. Furthermore, by incorporating syntactic information

about n-gram relations, FRN is able to select features in a more

computationally efficient manner than many multivariate and hybrid

techniques.

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

60

SESSION AUTHENDICATION PASSSWORD USING COLOR:

Textual passwords are the most common method used for

authentication. But textual passwords are vulnerable to eves

dropping, dictionary attacks, social engineering and shoulder surfing.

Graphical passwords are introduced as alternative techniques to

textual passwords. Most of the graphical schemes are vulnerable to

shoulder surfing. To address this problem, text can be combined with

images or colors to generate session passwords for authentication.

Session passwords can be used only once and every time a new

password is generated. In this paper, two techniques are proposed to

generate session passwords using text and colors which are resistant

to shoulder surfing. These methods are suitable for Personal Digital

Assistants.

ASP.NET

SECURE

COMPUTING &

REAL TIME

APPLICATION

Page 23: Mca(.net & java) application projects abstracts(v)

61

SENTENCE BASED SEARCH ON CLOUD: The advent of cloud

computing, data owners are motivated to outsource their complex

data management systems from local sites to commercial public

cloud for great flexibility and economic savings. But for protecting

data privacy, sensitive data has to be encrypted before outsourcing,

which obsoletes traditional data utilization based on plaintext

keyword search. Thus, enabling an encrypted cloud data search

service is of paramount importance. Considering the large number of

data users and documents in cloud, it is crucial for the search service

to allow multi-keyword query and provide result similarity ranking

to meet the effective data retrieval need. Related works on

searchable encryption focus on single keyword search or Boolean

keyword search, and rarely differentiate the search results. We

define and solve the challenging problem of privacy-preserving

multi-keyword ranked search over encrypted cloud data (MRSE),

and establish a set of strict privacy requirements for such a secure

cloud data utilization system to become a reality. Among various

multi-keyword semantics, we choose the efficient principle of

“coordinate matching”, i.e., as many matches as possible, to capture

the similarity between search query and data documents, and further

use “inner product similarity” to quantitatively formalize such

principle for similarity measurement. We first propose a basic

MRSE scheme using secure inner product computation, and then

significantly improve it to meet different privacy requirements in

two levels of threat models. Thorough analysis investigating privacy

and efficiency guarantees of proposed schemes is given, and

experiments on the real-world dataset further show proposed

schemes indeed introduce low overhead on computation and

communication.

ASP.NET

CLOUD COMPUTING

& REAL TIME

APPLICATION

62

STEP BY STEP MONITORING FOR PRODUCT PURCHASING

SYSTEM: Business processes are increasingly distributed and open,

making them prone to failure. Monitoring is, therefore, an important

concern not only for the processes themselves but also for the

services that comprise these processes. We present a framework for

multilevel monitoring of these service systems. It formalizes

interaction protocols, policies, and commitments that account for

standard and extended effects following the language-action

perspective, and allows specification of goals and monitors at varied

abstraction levels. We demonstrate how the framework can be

implemented and evaluate it with multiple scenarios that include

specifying and monitoring open-service policy commitments.

VB.NET

REAL TIME

APPLICATION

63

SECURE SERVICE-ORIENTED BANKING SYSTEMS: The

paper describes secure service-oriented architecture for mobile

transactions. The architecture comprises components, protocols,

applications and interfaces and it provides various security services

to various mobile applications: Registration, Certification,

Authentication, and Authorization of users, secure messaging at an

application–level (end–to–end security), protection of data in

databases, and security services for protection of its own

components. The architecture is modular, integrated, extendible and

scalable. The paper describes design of the architecture, the status of

VB.NET

REAL TIME

APPLICATION

Page 24: Mca(.net & java) application projects abstracts(v)

its current implementation, and future research and development

plans.

64

EMPLOYEE BASED PERFORMANCE MONITORING AND

ACTION SYSTEMS: The concept of awareness plays a pivotal role

in research in Computer-Supported Cooperative Work. Recently,

Software Engineering researchers interested in the collaborative

nature of software development have explored the implications of

this concept in the design of software development tools. A critical

aspect of awareness is the associated coordinative work practices of

displaying and monitoring actions. This aspect concerns how

colleagues monitor one another’s actions to understand how these

actions impact their own work and how they display their actions in

such a way that others can easily monitor them while doing their

own work. In this paper, we focus on an additional aspect of

awareness: the identification of the social actors who should be

monitored and the actors to whom their actions should be displayed.

We address this aspect by presenting software developers’ work

practices based on ethnographic data from three different software

development teams. In addition, we illustrate how these work

practices are influenced by different factors, including the

organizational setting, the age of the project, and the software

architecture. We discuss how our results are relevant for both CSCW

and Software Engineering researchers.

VB.NET

REAL TIME

APPLICATION

65

SECURE AND CLOUD BASED PATIENT INFORMATION

SYSTEMS: A key problem in the deployment of large-scale, reliable

cloud computing concerns the difficulty to certify the compliance of

business processes operating in the cloud. Standard audit procedures

such as SAS-70 and SAS- 117 are hard to conduct for cloud based

processes. The paper proposes a novel approach to certify the

compliance of business processes with regulatory requirements. The

approach translates process models into their corresponding Petri net

representations and checks them against requirements also expressed

in this formalism. Being Based on Petri nets, the approach provides

well-founded evidence on adherence and, in case of noncompliance,

indicates the possible vulnerabilities. Keywords: Business process

models, Cloud computing, Compliance certification, Audit, Petri

nets.

ASP.NET

CLOUD COMPUTING

& REAL TIME

APPLICATION

66

ULTIMATE LOCATION INFORMATION SYSTEMS: In many

applications, including location based services, queries may not be

precise. In this paper, we study the problem of efficiently computing

range aggregates in a multidimensional space when the query

location is uncertain. Specifically, for a query point Q whose

location is uncertain and a set S of points in a multi-dimensional

space, we want to calculate the aggregate (e.g., count, average and

sum) over the subset SI of S, Q has at least probability θ within the

distance γ to p. We propose novel, efficient techniques to solve the

problem following the filtering-and-verification paradigm. In

particular, two novel filtering techniques are proposed to effectively

and efficiently remove data points from verification. Our

comprehensive experiments based on both real and synthetic data

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

Page 25: Mca(.net & java) application projects abstracts(v)

demonstrate the efficiency and scalability of our techniques.

67

HIGH SECURE CORPORATE WEB SEARCH ENGINE: It

becomes prevalent, more and more sensitive information are being

centralized into the cloud. Although traditional searchable

encryption schemes allow a user to securely search over encrypted

data through keywords and selectively retrieve files of interest, these

techniques support only exact keyword search. In th is paper, for the

first time we formalize and solve the problem of effective keyword

search over encrypted cloud data while maintaining keyword

privacy. Keyword search greatly enhances system usability by

returning the matching files when users’ searching inputs exactly

match the predefined keywords or the closest possible matching files

based on keyword similarity semantics, when exact match fails. In

our solution, we exploit edit distance to quantify keywords similarity

and develop two advanced techniques on constructing keyword sets,

which achieve optimized storage and representation overheads. We

further propose a brand new symbol-based trie-traverse searching

scheme, where a multi-way tree structure is built up using symbols

transformed from the resulted keyword sets. Through rigorous

security analysis, we show that our proposed solution is secure and

privacy-preserving, while correctly realizing the goal of keyword

search. Extensive experimental results demonstrate the efficiency of

the proposed solution.

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

68

DATA CONFIDENTIAL AGAINST UNTRUSTED SERVERS

USING ATTRIBUTE- BASED ENCRYPTION: It is an emerging

computing paradigm in which resources of the computing

infrastructure are provided as services over the Internet. This paper

proposed some services for data security and access control when

users outsource sensitive data for sharing on cloud servers. This

paper addresses this challenging open issue by, on one hand,

defining and enforcing access policies based on data attributes, and,

on the other hand, allowing the data owner to delegate most of the

computation tasks involved in fine grained data access control to

untrusted cloud servers without disclosing the underlying data

contents. Our proposed scheme enables the data owner to delegate

tasks of data file re-encryption and user secret key update to cloud

servers without disclosing data contents or user access privilege

information. We achieve this goal by exploiting and uniquely

combining techniques of attribute-based encryption (ABE), proxy re-

encryption, and lazy re-encryption. Our proposed scheme also has

salient properties of user access privilege confidentiality and user

secret key accountability and achieves fine - grainedness, scalability

and data confidentiality for data access control in cloud computing.

Extensive analysis shows that our proposed scheme is highly

efficient and provably secures under existing security models.

ASP.NET

CLOUD

COMPUTING

69

SECURED IMAGE COMMUNICATOR: Internet based

communications are evolving at a tremendous rate. Encryption of

data has become an important way to protect data resources

especially on the Internet, intranets and extranets. Encryption

involves applying special mathematical algorithms and keys to

VB.NET

SECURE

COMPUTING

Page 26: Mca(.net & java) application projects abstracts(v)

transform digital data into cipher code before they are transmitted

and decryption involves the application of mathematical algorithms

and keys to get back the original data from cipher code. The goal of

security management is to provide authentication of users, and

integrity, accuracy and safety of data resources. Moreover, an image-

based data requires more effort during encryption and decryption. In

most of the defense and other research organizations, they need to

send and receive the import images related to weapon designs, maps,

satellite pictures etc. If those images are sending normally hackers

can tap the images and import information is leaked out. In order to

overcome this difficult, the image to be processed is first encrypted

and then it is decrypted so that no intermediate users can read the

images unauthorized. For this standard encryption, decryption

algorithms are used such as RSA, AES, and DSA etc.

70

FLIGHT BOOKING PORTAL: Major airlines are now starting to

book air tickets online. But the problem lies in the user friendliness

of such portals. Often users need to contact the support staff and

simultaneously use the portal for booking. Others simply skip the

online booking portal altogether and physically book their tickets.

Flight Booking Portal shows the ideal portal that such airlines need

to implement. It is very user friendly and also effective. The users

can very easily book their tickets and also get a print out of the same.

They can also view flight information for planning their journey.

ASP.NET

REAL TIME

APPLICATION

71

LEAVE MANAGEMENT SYSTEM: This project is aimed at

developing an online leave management system that is of importance

to either an organization. The Leave Management System (LMS) is

an Intranet based application that can be accessed throughout the

organization or a specified group/Dept. This system can be used to

automate the workflow of leave applications and their approvals.

The periodic crediting of leave is also automated. There are features

like email notifications, automatic approval of leave, report

generators etc in this system. Leave Management application will

reduce paper work and maintains record in more efficient way.

VB.NET

REAL TIME

APPLICATION

72

COMPANY INFORMATION TRACKING SYSTEM (CITS): The

“Company information Tracking System” has been developed to

override the problems prevailing in the practicing manual system.

This software is supported to eliminate and in some cases reduce the

hardships faced by this existing system. Moreover this system is

designed for the particular need of the company to carry out

operations in a smooth and effective manner. The application is

reduced as much as possible to avoid errors while entering the data.

It also provides error message while entering invalid data. No

formal knowledge is needed for the user to use this system. Thus by

this all it proves it is user-friendly. CITS allows you to preview and

print different reports that range from individual Work History to

department Headcounts. Each report screen has different options.

You can change the name of the report by editing the Report Title

field. This will not change the name of the report in the drop down

box, only the name as it appears on the report. The header includes

report information such as the report title and date. Your company

VB.NET

REAL TIME

APPLICATION

Page 27: Mca(.net & java) application projects abstracts(v)

name (if selected) and report title will appear in every header. If you

choose to have your company logo displayed on your report, it will

appear in the top left corner. The date range of the report is displayed

below the title. The date of the report is in the top right corner

directly above the page number. The header may also contain

information such as the employee name, department, and Selection

Criteria.

73

DEVELOPMENT OF AN ONLINE LIBRARY MANAGEMENT

SYSTEM (LIMS): This project is aimed at developing an online

Library Management System (LiMS) for the college library. This is

an Intranet based application that can be accessed throughout the

campus. This system can be used to search for books/magazines,

reserve books, find out who is having a particular book, put in

requests to buy a new book etc. This is one integrated system that

contains both the user component and the librarian component.

There are features like email notifications/reminders, report

generators etc in this system.

ASP.NET

REAL TIME

APPLICATION

74

DEVELOPMENT OF AN E-POST OFFICE SYSTEM: The e-Post

Office is the shopping portal of the world renowned postal service

on the internet and an additional distribution channel. It sells Stamps,

Postcards, Packets, and Cartons and has services like courier,

registering for electricity vendors, selling mobile cards, etc. Under

this website many products and services can be ordered, that are also

available in a "normal" branch. The product prices are identical with

the prices of their normal branches. The e-Post Office is expanded

permanently through new products and services in order to offer a

product portfolio corresponding to the market. Private customer and

business customers can order the selected products of the postal

service online quickly and comfortably. Besides this, the e-Services

offer new flexibility through e-Packet, the PICKUP order for

packages over the internet as well as the online forwarding order and

storage order. For the case of the absence or the move, one can let

delegate here the after shipment of the postal service at another

address or store the letter shipments. The customers can register

themselves and can be served individually. Target groups of

customer of the e-Post Office are predominantly little and middle-

class business (SMEs). The customers can have a payment

alternative through credit card. In order to use the load writing

procedure, the customer registers itself in the e-Post Office and

receives a login for its purchases name. You have to develop this

web site, which captures the above functionality. It is an internet

application.

ASP.NET

REAL TIME

APPLICATION

75

DEVELOPMENT OF EFFORT TRACKER SYSTEM: This project

is aimed at developing a Effort Tracker System that is of importance

to an organisation. The Effort Tracker System is used to track the

employee activities and summarize all related activities with the total

hours spent and percentage efficiency utilized and generate a report

for the same.

VB.NET

REAL TIME

APPLICATION

Page 28: Mca(.net & java) application projects abstracts(v)

76

DEVELOPMENT OF A DEFECT TRACKING SYSTEM (DTS):

This project is aimed at developing an online defect tracking system

useful for applications developed in an organization. The Defect

Tracking System (DTS) is a web based application that can be

accessed throughout the organization. This system can be used for

logging defects against an application/module, assigning defects to

individuals and tracking the defects to resolution. There are features

like email notifications, user maintenance, user access control, report

generators etc in this system.

VB.NET

REAL TIME

APPLICATION

77

DEVELOPMENT OF A WEB-BASED RECRUITMENT

PROCESS SYSTEM FOR THE HR GROUP FOR A COMPANY:

This project is aimed at developing a web-based and central

Recruitment Process System for the HR Group for a company. Some

features of this system will be creating vacancies, storing Applicants

data, Interview process initiation, Scheduling Interviews, Storing

Interview results for the applicant and finally Hiring of the applicant.

Reports may be required to be generated for the use of HR group.

ASP.NET

REAL TIME

APPLICATION

78

DEVELOPMENT OF A BUDGET APPROVAL SYSTEM: This

project is aimed at developing a system by which the employees in

the organization submit the bills to their managers. The bills could of

various types and also of various amounts. The employee after

submitting the bill will automatically provide the manager’s name to

which the bill will be submitted. The bill will pass through a

workflow process and the owner of the bill can view the status of the

bill at any time. An email will be sent to the concerned people to let

them know about the status of the bill.

ASP.NET

REAL TIME

APPLICATION

79

COST BASED SECURE CLOUD DATA SYSTEMS:

Cloud applications that offer data management services are

emerging. Such clouds support caching of data in order to provide

quality query services. The users can query the cloud data, paying

the price for the infrastructure they use. Cloud management

necessitates an economy that manages the service of multiple users

in an efficient, but also, resource economic way that allows for cloud

profit. Naturally, the maximization of cloud profit given some

guarantees for user satisfaction presumes an appropriate price-

demand model that enables optimal pricing of query services. The

model should be plausible in that it reflects the correlation of cache

structures involved in the queries. Optimal pricing is achieved based

on a dynamic pricing scheme that adapts to time changes. This paper

proposes a novel price-demand model designed for a cloud cache

and a dynamic pricing scheme for queries executed in the cloud

cache. The pricing solution employs a novel method that estimates

the correlations of the cache services in an time-efficient manner.

The experimental study shows the efficiency of the solution.

ASP.NET

CLOUD COMPUTING

80

CUSTOMER SALES ANALYSIS SYSTEM BASED ON

PURCHASING: In Data Mining, the usefulness of association rules

is strongly limited by the huge amount of delivered rules. To

VB.NET

DATA MINING &

REAL TIME

APPLICATION

Page 29: Mca(.net & java) application projects abstracts(v)

overcome this drawback, several methods were proposed in the

literature such as item set concise representations, redundancy

reduction, and post processing. However, being generally based on

statistical information, most of these methods do not guarantee that

the extracted rules are interesting for the user. Thus, it is crucial to

help the decision-maker with an efficient post processing step in

order to reduce the number of rules. This paper proposes a new

interactive approach to prune and filter discovered rules. First, we

propose to use ontologies in order to improve the integration of user

knowledge in the post processing task. Second, we propose the Rule

Schema formalism extending the specification language proposed by

Liu et al. for user expectations. Furthermore, an interactive

framework is designed to assist the user throughout the analyzing

task. Applying our new approach over voluminous sets of rules, we

were able, by integrating domain expert knowledge in the post

processing step, to reduce the number of rules to several dozens or

less. Moreover, the quality of the filtered rules was validated by the

domain expert at various points in the interactive process.

81

MULTI-USER PUBLIC AUDITING SYSTEM OF DATA

STORAGE SECURITY: It is the long dreamed vision of computing

as a utility, where users can remotely store their data into the cloud

so as to enjoy the on-demand high quality applications and services

from a shared pool of configurable computing resources. By data

outsourcing, users can be relieved from the burden of local data

storage and maintenance. Thus, enabling public audit ability for

cloud data storage security is of critical importance so that users can

resort to an external audit party to check the integrity of outsourced

data when needed. To securely introduce an effective third party

auditor (TPA), the following two fundamental requirements have to

be met: 1) TPA should be able to efficiently audit the cloud data

storage without demanding the local copy of data, and introduce no

additional on-line burden to the cloud user.

ASP.NET

DATA MINING &

CLOUD COMPUTING

82

MAIL BASED HOMEWORK AND ALERT SYSTEM FOR

STUDENTS AND TEACHERS: The project is entitled as Mail

based Homework and Alert System for Students and Teachers is

developed by Asp.net as front end and SQL Server as the back end.

Impact of an online homework assistance project on the motivation

and autonomy to complete homework and on the ability to use

technology of elementary school students. The research aimed to

understand what was the impact of the project on the students

motivation and autonomy to complete their homework and on their

ability to use technology. The quantitative results have shown an

increase in some students motivation and autonomy to complete

homework and in all the students ability to use the technology. They

can able to View and Print their marks.

ASP.NET

REAL TIME

APPLICATION

83

ONLINE MISSING VEHICLE TRACKING APPLICATION FOR

POLICE DEPARTMENT: Thousands of automobiles are lost each

year in the state and thousands of automobiles are also recovered by

the Police from when they catch the culprits or even when the

ASP.NET

REAL TIME

APPLICATION

Page 30: Mca(.net & java) application projects abstracts(v)

culprits leave the vehicles they have stolen after they have used

them. The usual problem with the recovered vehicles reaching the

actual owners is that the vehicle need not be found in the same

jurisdiction as one in which the complaint was launched. So, when a

vehicle is recovered, usually the Police try to trace out the actual

owner of the vehicle from the RTO based on the license and chassis

number. But this is a lengthy and time consuming process for the

RTO to trace out the actual owners from the records and inform back

to the Police stations. Because of these delays, vehicles that are

recovered also take a long time to actually reach their owners.

84

ONLINE CONSUMER COMPLAINT: A consumer complaint or

customer complaint is an expression of dissatisfaction on a

consumer’s behalf to a responsible party. It can also be described in

a positive sense as a report from a consumer providing

documentation about a problem with a product or service. In fact,

some modern business consultants urge businesses to view customer

complaints as a gift. Consumer complaints are usually informal

complaints directly addressed to a company or public service

provider, and most consumers manage to resolve problems with

products and services in this way, but it sometimes requires

persistence.

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

85

HIGH SECURE CORPORATE WEB SEARCH ENGINE: It

becomes prevalent, more and more sensitive information is being

centralized into the cloud. Although traditional searchable

encryption schemes allow a user to securely search over encrypted

data through keywords and selectively retrieve files of interes t, these

techniques support only exact keyword search. In this paper, for the

first time we formalize and solve the problem of effective keyword

search over encrypted cloud data while maintaining keyword

privacy. keyword search greatly enhances system usability by

returning the matching files when users searching inputs exactly

match the predefined keywords or the closest possible matching files

based on keyword similarity semantics, when exact match fails. In

our solution, we exploit edit distance to quantify keywords similarity

and develop two advanced techniques on constructing keyword sets,

which achieve optimized storage and representation overheads.

ASP.NET

DATA MINING

86

BUSINESS ACTIVITY COORDINATION USING WEB

SERVICES: Traditional transaction semantics are not appropriate

for business activities that involve long-running transactions in a

loosely-coupled distributed environment, in particular, for Web

Services that operate between different enterprises over the Internet.

In this paper we describe a novel reservation-based extended

transaction protocol that can be used to coordinate such business

activities. The protocol avoids the use of compensating transactions,

which can result in undesirable effects. In our protocol, each task

within a business activity is executed as two steps. The first step

involves an explicit reservation of resources. The second step

involves the confirmation or cancellation of the reservation. Each

step is executed as a separate traditional short-running transaction.

We show how our protocol can be implemented as a reservation

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

Page 31: Mca(.net & java) application projects abstracts(v)

protocol on top of the Web Services Transaction specification or,

alternatively, as a coordination protocol on top of the Web Services

Coordination specification.

87

EDUCATION LOAN MANAGEMENT SYSTEM: The main

objective of developing this education loan management system is to

provide banking loans for student’s education. Now a day lots of

poor people of not able to provide better education for their children

because of financial problems but with the help of this .net base loan

management application they can apply education loans for their

children. Students can take bank loans with low interest rates by

using this web application.

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

88

MOBILE PHONE TRADING SYSTEM: The project Mobile Phone

Trading System for mobile is to develop software based information

of Mobile shopping. In global business market the mobile is most

important accessory in real life. Visualizing the huge opportunity,

this is an effort to maximize the business through the development of

this software and keeping the data and thus increasing the customer

base from the local as well as global markets around the world.

ASP.NET

REAL TIME

APPLICATION

89

ADVANCED EMPLOYEE DISCUSSION WITH ENHANCED

WEB TOOLS: In a company, it is not possible for all of the

employees to express their thoughts and engage in discussions.

These discussions are very useful for the company in the prospects

of doubt clearing, brainstorming etc.There exists several applications

but, none of them satisfies the needs of a middle level company, as

some are inefficient and some may be too complex that employees

cannot understand.

ASP.NET

DATA MINING &

REAL TIME

APPLICATION

90

FRONT DESK ADMINISTRATION: The Project Front Desk

Administration objective of this system is to maintain the details

about company vehicles, goods vehicles, visitor’s vehicles and

security details. Mainly this system is applicable for colleges,

universities, companies and different organizations. Using th is

system we can maintain company vehicles in time, out time, and

how many kilometers they run the vehicles. And also maintain the

visitor’s vehicles in time, out time and what purpose they are came

here. Such details are maintained in a web.

VB.NET

REAL TIME

APPLICATION

91

DEFECT TRACKING SYSTEM: This project is aimed at

developing an online defect tracking system useful for applications

developed in an organization. The Defect Tracking System (DTS) is

a web based application that can be accessed throughout the

organization. This system can be used for logging defects against an

application/module, assigning defects to individuals and tracking the

defects to resolution. There are features like email notifications, user

maintenance, user access control, report generators etc in this

system. The software is fully integrated with CRM (Customer

Relationship Management) as well as CMS (Content Management

System) solution and developed in a manner that is easily

manageable, time saving and relieving one from manual works

VB.NET

REAL TIME

APPLICATION

Page 32: Mca(.net & java) application projects abstracts(v)

92

HEALTH MAINTENANCE SYSTEM: This project is a computer

system that will be used in the Hospitals. HealthCare is a Practice

Management Software for opticians, optometrist and

ophthalmologist, which leads to smooth working of eye care

organization. "Health Care Maintenance" provides automated case

management, patient scheduling, diagnosis notes, electronic mail

integration to remind patient about their appointment, electronic

revisit letter with paperless environment, Point of Sales (POS),

inventory for spectacles, lenses and sundries and unlimited custom

and pre-built reports. The project has been planned to be having the

view of distributed architecture, with centralized storage of the

database. The application for the storage of the data has been

planned. Using the constructs of MS-SQLServer and all the user

interfaces has been designed using the ASP.Net technologies. The

database connectivity is planned using the "SQL Connection"

methodology. The standards of security and data protective

mechanism have been given a big choice for proper usage. The

application takes care of different modules and their associated

reports which are produced as per the applicable strategies and

standards that are put forwarded by the administrative staff. The

entire project has been developed keeping in view of the distributed

client server computing technology, in mind. The specifications have

been normalized up to 3NF to eliminate all the anomalies that may

arise due to the database transaction that are executed by the general

users and the organizational administration.

ASP.NET

REAL TIME

APPLICATION

93

SOCIAL NETWORKING WITH ADVERTISEMENT: This project

is an online social networking site for connecting Indians across the

Globe. It allows members to build and leverage their network of

contacts in incredibly powerful ways. It is a place where you can

Invite, Connect, Share, Speak out and Have fun. The platform is

designed to provide you with unlimited freedom of expression. Plus,

you can invite your non-Indian friends too to experience the rich

Indian culture through this online portal. User can view/edit their

profile as and when and can be visible to other people who are

signing in online portal. User can upload photos and their portfolios.

User can know about his/her profile view by other users online. With

Social networking portal you can stay in touch with your existing

relationships and also get introduced to new people who share your

interests and hobbies. Communicating with others is made more fun

and interesting as you can share your unlimited photos, Blogs,

Views, and opinions all from one place. The Development of this

project deals with displaying the advertisements on a portal which is

visible to all of the viewers who ever access the website. Here we

can also have the daily advertisement details in a separate form

ASP.NET

REAL TIME

APPLICATION

94

FILE SECURITY SYSTEM: Encryption of data plays a vital role in

the real time environment to keep the data out of reach of

unauthorized people, such that it is not altered and tampered. The

File Security System is software, which tries to alter the originality

of the text into some encrypted form. The major task of File Security

JAVA

SECURE

COMPUTING

Page 33: Mca(.net & java) application projects abstracts(v)

System is to provide the user the flexibility of passing the

information implementing the encryption standards as per the

specification and algorithms proposed and store the information in a

form that is unreadable. The Application should have a reversal

process as of which should be in a position to decrypt the data to its

original format upon the proper request by the user. While the

Encryption and Decryption is done the application should confirm

the standards of authentication and authorization of the user. The

Entire application should strive to achieve a user friendly Graphical

User Interface, which need to be in a self-learning mode for the end

user. The System Should provide all the functional standards of

proper navigation within the environment, which makes it possible

for the users to have a smooth flow while working under the

environment. The Overall system should provide proper menu based

navigation for easier navigation and operation. The Application

should be designed in such a way that, as soon as it starts create a

Buffer and associate this buffer to some homogeneous data

environment, the application should ask the user for the Encryption

Key details and should start its functionality upon the logistics that

are provided with in this key. The key should be designed in such a

way that it prevents the unauthorized persons from stealing the

information at any point of time. The application of Decryption

should be a reverse process at the other end and should be translated

only when the receiver of the data applies the proper reversal key.

The Decryption process should have a log-based methodology that

will take care of any errors that may be encountered while the

system is under utilization and should record all those events, which

are above the general standards of security. The software

requirement specification can produce at the culmination of the

analysis task. The function and performance allocated to software as

part of system engineering are refined by established a complete

information description, a detailed functional description, a

representation of system behavior, an indication of performance and

design constrain, appropriate validation criteria, and other

information pertinent to requirements.

95

DIGITAL ENCRYPTION SYSTEM WITH STEGANOGRPHIC

RULES: Modern computer networks make it possible to distribute

documents quickly and economically. This is because of the

decreasing cost of the equipment needed to copy, to print, to process

the information. The widespread adoption of electronic distribution

of copyrighted material is accompanied by illicit copying and illicit

distribution. This is why people think about how to protect their

work, how to prevent such illicit activities and how to trace the

distribution of a document. Steganography is art of hiding

information using images without corrupting the images.

Steganography is art of hiding information in ways that prevent the

detection of hidden messages. Steganography and Cryptography are

cousins in the spycraft family. Cryptography scrambles a message so

it cannot be understood. Steganography hides the message so it

cannot be seen.

VB.NET /

JAVA

SECURE

COMPUTING

96

IMAGE PROCESSING EDITOR: Image Processing comes with a

GUI (graphical user interface) program that lets us play with its

VB.NET

IMAGE

PROCESSING

Page 34: Mca(.net & java) application projects abstracts(v)

various features. The program is based on image accessing, so that

more people can use it. As there is lot of crazy towards graphics,

photos or images editing, processing is very important in that

process. This application can be used to change the setting of old

photos, creating a new type of icons to add them into applications

and web sites. This application can be used to change the format of

images from one file type to another in simple way so that users or

programmers can use one image in any format according to

compatibility and accessibility in their applications.

97

CREDIT CARD MANAGEMENT SYSTEM: The Card

Management System is a Windows based application that takes care

of the complete internal Card Processing activities of a Bank

(management and maintenance of cards). It is suitable for the

management of Debit Cards, Credit Cards as well as Smart Cards. It

mainly involves the maintenance and management of card - related

information in a Bank. This product caters to all the Credit, Debit

and Smart Card based functions of a bank like Registration of

Customers for card issue, Opening Card Accounts for the registered

customer, Creation of Cards for registered customers, Hot Carding,

making the Card ready for Embossing by creation of Card Data file

etc. The Card Management System could interact with an external

Card Transaction System, thereby making the Card-related

information maintained by the bank, up-to-date. The purpose is to

build a Card Management System which provides complete card

processing, to meet the needs of full-fledged Credit card and Debit

card based ATM or Point of Sale network.

ASP.NET

REAL TIME

APPLICATION

98

ENABLING PUBLIC VERIFIABILITY AND DATA DYNAMICS

FOR STORAGE SECURITY IN CLOUD COMPUTING: Cloud

Computing has been envisioned as the next-generation architecture

of IT Enterprise. It moves the application software and databases to

the centralized large data centers, where the management of the data

and services may not be fully trustworthy. This unique paradigm

brings about many new security challenges, which have not been

well understood. This work studies the problem of ensuring the

integrity of data s torage in Cloud Computing. In particular, we

consider the task of allowing a third party auditor (TPA), on behalf

of the cloud client, to verify the integrity of the dynamic data stored

in the cloud. The introduction of TPA eliminates the involvement of

client through the auditing of whether his data stored in the cloud is

indeed intact, which can be important in achieving economies of

scale for Cloud Computing. The support for data dynamics via the

most general forms of data operation, such as block modification,

insertion and deletion, is also a significant step toward practicality,

since services in Cloud Computing are not limited to archive or

backup data only. While prior works on ensuring remote data

integrity often lacks the support of either public verifiability or

dynamic data operations, this paper achieves both. We first identify

the difficulties and potential security problems of direct extensions

with fully dynamic data updates from prior works and then show

how to construct an elegant verification scheme for seamless

integration of these two salient features in our protocol design. In

particular, to achieve efficient data dynamics, we improve the Proof

ASP.NET

CLOUD

COMPUTING

Page 35: Mca(.net & java) application projects abstracts(v)

of Retrievability model by manipulating the classic Merkle Hash

Tree (MHT) construction for block tag authentication. Extensive

security and performance analysis show that the proposed scheme is

highly efficient and provably secure.

99

IMAGE COMPRESSION AND DE-COMPRESSION: The

compression and decompression of continuous -tone images is

important in document management and transmission systems. This

paper considers an alternative image representation scheme, based

on Gaussian derivatives, to the standard Discrete Cosine

Transformation (DCT), within a Joint Photographic Experts Group

(JPEG) framework. Depending on the computer arithmetic hardware

used, the approach developed might yield a

compression/decompression technique twice as fast as the DCT and

of (essentially) equal quality.

VB.NET

IMAGE PROCESSING

AND REAL TIME

APPLICATION

100

TICKET RESERVATION SYSTEM: This project is aimed at

developing an online ticket reservation system for Cinema Halls.

The Ticket Reservation System is an Internet based application that

can be accesses throughout the Net and can be accessed by anyone

who has a net connection. This application will automate the

reservation of tickets and Enquiries about availability of the tickets.

This application includes email confirmation for the tickets .

ASP.NET

REAL TIME

APPLICATION