79
KITES Softwares Cochin www . kitesnet . com

New Microsoft Office Word Document

Embed Size (px)

DESCRIPTION

Uploaded from Google Docs

Citation preview

                   

KITES Softwares             

Cochin 

www . kitesnet . com

  

              

  

IEEE Topics 1. Graphical Password StrategyRequirement: Java/.NET 

               This is a new kind of way in which we can use graphical passwords for the information protection mechanism. In the existing scenario we use DAS, is a representative “drawing reproduction” scheme in which the password is a simple picture drawn on a grid. It is a purely graphical password scheme based on recall, and requires the user to create a free-form image on a drawing grid. The drawing is mapped to a sequence of coordinate pairs by listing the cells through which the drawing passes in the order in which it passes through them, with a distinguishing coordinate pair inserted in the sequence for each “pen up ” event, i.e., whenever the user lifts the stylus from the drawing surface.  DAS constitutes a much larger password space transfer              The proposed system can also prevent the brute force attacks effectively. The experiment results show that users tend to set a graphical password at the average length of 100. If the attackerwants to break the correct password by a brute force attack, in the worst case it may take approximate 8100 times for successful authentication, which is an impractical process. The proposed system obtains a good performance in resisting shoulder surfing.              The proposed system is a position-free scheme, the user can draw his graphical password anywhere on the canvas, which makes shoulder surfing a difficult task. For example, the user can make a drawing in a small corner where it is harder to peep. Second, the stroke sequence cannot be reflected by the graph in here, and authentication process sees it as a critical checking factor. This property ensures that the peeper still cannot sign in even if he glimpses the images, because he could not recall the correct stroke sequence set by the legal user. Finally, the proposed system  takes into account the drawing trends, which means it records the user drawing style to a certain extent. Therefore, the security is greatly enhanced as personality is hard to imitate.

 2. Medical Image Search Engine using grid computingRequirement: Java/.NET 

               In this project we show how Grid computing can be used to improve the operation of a medical image search system.              The paper introduces the basic principles of a content-based image retrieval (CBIR) system and identifies the computationally challenging tasks in the system. For the computationally challenging tasks an efficient design is proposed that uses distributed Grid computing to carry out the image processing in a distributed and efficient way. The algorithms of the search system are executed by using a real medical image collection as input and a Grid computing infrastructure to provide the needed computing power. Finally, the results show how the image processing task that required tens of hours to complete can be processed by using only a fraction of the originally required computing time. The amount of data produced in medical care is increasing at a rapid pace. Managing the large quantity of information is a challenging task even for an information science specialist. Thus, the complexity of managing the information may prevent the professionals of medical care from making full use of the collected information. This motivates to create simple (web based) applications to manage and make use of data that is collected in several clinical databases. 3. Image Search Engine.Requirement: Java/.NET 

               The image searching technology is similar to the web searching. But the spider crawler will take care of only images. The keywords for the image search are based on the file name of the image, the link

text pointing to the image, and text adjacent to the image. When the crawler encountered an image, a thumbnail will be cached along with the keywords and original URL. When searching for an image each matching image is displayed. Then when clicking on a thumbnail, the image is displayed in a frame at the top of the page and the website on which that image was found is displayed in a frame below it, making it easier to see from where the image is coming  fag an. 4. DNA Grid.Requirement: Java/.NET 

               Deoxyribonucleic acid (DNA) is a nucleic acid that contains the genetic instructions used in the development and functioning of all known living organisms and some viruses. The main role of DNA molecules is the long-term storage of information. DNA is often compared to a set of blueprints or a recipe, or a code, since it contains the instructions needed to construct other components of cells. The project aim at implementing a DNA pattern matching software and to get the task done in faster pace. This project works based on the Grid architecture i.e. based on Client-Server architecture. The various tasks are provided by standing on this architecture. DNA operation done based on two methods named Finger print identification and Finding parent. This is carried out by pattern matching and matching percentage respectively.  We have to create a database which is applicable to do a time consuming task on a short time period. The database is taken from the site mpiBlast. mpiBLAST is an open-source parallelization of BLAST that achieves super linear speed-up by segmenting a BLAST database and then having each node in a computational cluster search a unique portion of the database. Database segmentation permits each node to search a smaller portion of the database. Thus when the input is given the database checks for the Kilo Bytes and for a value greater than a particular value the result is obtained.              Here we are creating a searching process that is similar to the BLAST which posses the same efficiency and accuracy in the case of searching. Grid computing (or the use of a computational grid) is the application of several computers to a single problem at the same time - usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data.

5. Face Recognition Using Neural Networks

Requirement: Java/.NET 

                The proposed system is used for identify a person using the face print match. With the help of  neural network first we train the  system for a captured finger print image and then using this image we identify the person  later. Here we use a two layer neural network for the purpose of identifying the face.

              Here in the first layer of the neural network we identify the face of a person. That is we train the network to identify if it is the face of a person that is actually viewing and not some other part of the body. In the second layer we train the network to identify the features of the face and thereby distinguish a particular person.

6. Dynamic GridRequirement: Java/.NET 

               Grid computing (or the use of a computational grid) is the application of several computers to a single problem at the same time - usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data.              Grid computing depends on software to divide and apportion pieces of a program among several computers, sometimes up to many thousands. Grid computing can also be thought of as distributed and large-scale cluster computing, as well as a form of network-distributed parallel processing. It can be small -- confined to a network of computer workstations within a corporation or it can be large -- a public collaboration across many companies or networks.

              Grid computing requires the use of software that can divide and farm out pieces of a program to as many as several thousand computers. Grid computing can be thought of as distributed and large-scale

cluster computing and as a form of network-distributed parallel processing. It can be confined to the network of computer workstations within a corporation or it can be a public collaboration

7. Graphical password Authentication using Cued Click Points

Requirement: Java/.NET 

              Various graphical password schemes have been proposed as alternatives to text-based passwords. Research and experience have shown that text-based passwords are fraught with both usability and security problems that make them less than desirable solutions. Psychology studies have revealed that the human brain is better at recognizing and recalling images than text graphical passwords are intended to capitalize on this human characteristic in hopes that by reducing the memory burden on users, coupled with a larger full password space offered by images, more secure passwords can be produced and users will not resort to unsafe practices in order to cope speakers of any language.

              We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of images. The next image is based on the previous click-point. We present the results of an initial user study which revealed positive results. Performance was very good in terms of speed, accuracy, and number of errors. Users preferred CCP to Pass Points (Wiedenbecketal., 2005), saying that selecting and remembering only one point per image was easier, and that seeing each image triggered their memory of where the corresponding point was located. We also suggest that CCP provides greater security than Pass Points because the number of images increases the workload for attackers or a sequence of images. The next image displayed is based on the previous click-point so users receive immediate implicit feedback as to whether they are on the correct path when logging in. CCP offers both improved usability and security.

8. Monitoring the Application-Layer DDOS AttacksRequirement: Java 

               Here we introduce a scheme to capture the spatial-temporal patterns of a normal ash crowd event and to implement the App-DDoS attacks detection. Since the traffic characteristics of low layers are not enough to distinguish the App-DDoS attacks from the normal ash crowd event, here we find an effective method to identify whether the surge in traffic is caused by App-DDoS attackers or by normal Web surfers.              We define the Access Matrix (AM) to capture spatial-temporal patterns of normal ash crowd and to monitor App-DDoS attacks during ash crowd event based on our previous work .We use hidden semi-Markov model to describe the dynamics of AM and to achieve a numerical and automatic detection. We apply principal component analysis (PCA) and independent component analysis (ICA) to deal with the multidimensional data for HsMM. We design the monitoring architecture and validate it by real ash crowd traffic and three emulated App-DDoS attacks.              Survey has noted that researchers attempt to detect DDoS attacks from three different layers: IP layer, TCP layer, and application layer. From all of these perspectives, researchers are investigating various approaches to distinguish normal traffic from the attack one. Here, we survey representative research from each perspective. Most DDoS-related research has focused on the IP layer. These mechanisms attempt to detect attacks by analysing specific features, e.g., arrival rate or header information. The TCP layer is another main battle held for detecting DdoS attack. Here DDoS attacks were discovered by analysing the TCP packet header against the well defined rules and conditions and distinguished the difference between normal and abnormal traffic. 9. Capturing Router Congestion and DelayRequirement: Java 

               Here in the proposed system by using a unique monitoring experiment, we capture all packets crossing a operational access router from a Tier-1 provider, and use them to provide a detailed examination of router congestion and packet delays. The complete capture enables not just statistics as

seen from outside the router, but also an accurate physical router model to be identified. This enables a comprehensive examination of congestion and delay from three points of view: the understanding of origins, measurement, and re- porting. Our study defines new methodologies and metrics. In particular, the traffic reporting enables a rich description of the diversity of micro congestion behaviour, without model assumptions, and at achievable computational cost.              However, we believe that the detail and depth of the data analysis also makes this study worthwhile from the data archival point of view. Our specific conclusions are strictly speaking limited to a single data set with low loss and delay. However, since Tier-1 networks tend to be under provisioned, we believe it remains representative of backbone access routers and their traffic today. This conjecture requires testing against more data sets. The rest aim of this paper is a simple one, to exploit this unique data set by reporting in detail on the magnitudes, and also the temporal structure, of delays on high capacity links with non trivial congestion. Here we introduce a scheme to capture the spatial-temporal patterns of a normal ash crowd event and to implement the App-DDoS attacks detection. Since the traffic characteristics of low layers are not enough to distinguish the App-DDoS attacks from the normal ash crowd event, here we find an effective method to identify whether the surge in traffic is caused by App-DDoS attackers or by normal Web surfers.

10. Collage SteganographyRequirement: Java

               Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. In this project one such method is shown with high efficiency. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users like hackers, . Considering that in this method information has been hidden in the appearance of the picture, then by using the present methods of identification of stegano images one cannot identify the steganography images in this method or extract data from them. The proposed method has been implemented by using the Java programming language.              While implementing this method, the main purpose is to hide data in a cover media so that other persons will not notice that such data is there. This is a major distinction of this method with the other methods of hidden exchange. The capacity of steganography in spatial domain method depends on the apparent features of the image and the variety of colors used in it while, in temporal method, capacity relates to the number of pixels and the number of bits allocated to each pixel for display of color. 11. Data Protection Techniques in Modern Computer NetworksRequirement: Java 

               Here we have a computer network security based on Public Key Infrastructure (PKI) systems. We consider possible vulnerabilities of the TCP/IP computer networks and possible techniques to eliminate them. We signify that only a general and multi layered security infrastructure could cope with possible attacks to the computer network systems. We evaluate security mechanisms on application, transport and network layers of ISO/OSI reference model and give examples of the today most popular security protocols applied in each of the mentioned layers. We recommend secure computer network systems that consist of combined security mechanisms on three different ISO/OSI  reference model layers: application layer security based on  strong user authentication, digital signature, confidentiality  protection, digital certificates and hardware tokens, transport layer security based on establishment of a cryptographic tunnel between network nodes and strong node authentication procedure and network IP layer security providing bulk  security mechanisms on network level between network  nodes. User strong authentication procedures based on digital certificates and PKI systems are especially emphasized.              Here we also evaluate and signify differences between software-only, hardware-only and combined software and hardware security systems. Therefore, ubiquitous

smart cards and hardware security modules are considered. Hardware security modules (HSM) represent very important security aspect of the modern computer networks. Main purposes of the HSM are twofold: increasing the overall system security and accelerating cryptographic functions. In the proposed system we have eliminated all the overall possibilities of an attack. Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive in that information is only monitored. Other attacks are active and information is altered with intent to corrupt or destroy the data or the network itself. Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

 12. Evaluation of Detection Algorithms for MAC Layer MisbehaviorRequirement: Java 

               Here we solve the problem of detecting greedy behaviour in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Sequential Probability Ratio Test (SPRT).              Our evaluation is carried out in four steps. We first derive a new analytical formulation of the SPRT that considers access to the wireless medium in discrete time slots. Then, we introduce an analytical model for DOMINO. As a third step, we evaluate the theoretical performance of SPRT and DOMINO with newly introduced metrics that take into account the repeated nature of the tests. This theoretical comparison provides two major insights into the problem: it confirms the optimality of SPRT, and motivates us to define yet another test: a non-parametric CUSUM statistic that shares the same intuition as DOMINO but gives better performance. We analyze the paper with experimental results, confirming the correctness of our theoretical analysis and validating the introduction of the new non parametric CUSUM statistic. 13. Fragmental Proxy Caching For Streaming Multimedia ObjectsRequirement: Java 

               Here, a fragmental proxy-caching scheme that efficiently manages the streaming multimedia data in proxy cache is proposed to improve the quality of streaming multimedia services. The novel data-fragmentation method in this scheme not only provides finer granularity caching units to allow more effective cache replacement, but also offers a unique and natural way of handling the interactive VCR functions in the proxy-caching environment. Furthermore, a cache-replacement scheme, based on user request arrival rates for different multimedia objects and the playback rates of these objects, is proposed to address the drawbacks in existing cache replacement schemes, most of which consider only the user access frequencies in their cache replacement decisions. In this cache-replacement scheme, a sliding history window is employed to monitor the dynamic user request arrivals, and a tunable-victimization procedure is used to provide an excellent method of managing the cached multimedia data in accordance with different quality of service requirements of the streaming multimedia applications. Performance studies demonstrate that the fragmental proxy-caching scheme significantly outperforms other caching schemes, in terms of byte-hit ratio and the number of delayed starts, and can be tuned to either maximize the byte-hit ratio or minimize the number of delayed starts.

              Since caching or perfecting the prefix portion of the multimedia object in the proxy cache can eliminate the delayed start, the first few processing units in our FPC scheme will be treated as prefix which acts as an atomic unit in cache replacement. With our proposed object fragmentation method, the playback of a processing unit to the client from the proxy cache can be done in parallel with the streaming of the next fragment from the media server to the proxy cache.  In this way we can increase the speed by which we can watch the multimedia objects without the consumption of the band width and we could use the VCR functions on our will without overloading the system and thereby the network that we are using for Internet access.

14. Head Tracking Driven Virtual Computer MouseRequirement: Java                 A novel head tracking driven camera mouse system, called "hMouse", is developed for manipulating hand-free perceptual user interfaces. The system consists of a robust real-time head tracker, a head pose/motion estimator, and a virtual mouse control module. For the hMouse tracker, we propose a 2D detection/tracking complementary switching strategy with an interactive loop. Based on the reliable tracking results, hMouse calculates the user's head roll, tilt, yaw, scaling, horizontal, and vertical motion for further mouse control. Cursor position is navigated and fine tuned by calculating the relative position of tracking window in image space and the user's head tilt or yaw rotation. After mouse cursor is navigated to the desired location, head roll rotation triggers virtual mouse button clicks. Experimental results demonstrate that hMouse succeeds under the circumstances of user jumping, extreme movement, large degree rotation, turning around, hand/object occlusion, part face out of camera shooting region, and multi-user occlusion. It provides alternative solutions for convenient device control, which encourages the application of interactive computer games, machine guidance, robot control, and machine access for disabilities and elders. Implemented on a typical PC our hMouse provides a specific virtual human interface for hand-free mouse connection. Like the general camera mouse, hMouse is composed of a virtual tracking module and a mouse control module.              The main contributions and advantages of our work are summarized as follows.

1.    We propose a new camera mouse system.2.    A robust and fast tracker is developed.3.    A low- cost head pose and motion estimation scheme is introduced.4.    We design an efficient strategy for virtual mouse manipulation in real-time. Our hMouse has all basic functions of hand-hold computer mouse, which can control Microsoft WINDOWS OS and play games.

 15.PhetchRequirement: Java/.NET                Here the proposed system Phetch can  be used to provide free, real time assistance for people unable to find the images which they are looking for, by recruiting others to search in their place. When an image search engine user types a complete description of a desired image, his description can be fed to a currently active game of Phetch as a “bonus round.” In this round, all players act as Seekers and aim to find an image based

on the description given. Whenever they find an image that matches the description it can be sent back to the user. If the describing individual accepts one of these as the target of his search, the Seeker who found it wins the round.                Current image search engines employ one of two approaches: keyword based or content based image retrieval. Neither approach performs optimally. Keyword based search engines index images by using textual data such as file names, image captions and/or adjacent text on the Web page. Unfortunately, such data can be insufficient or even deceptive, making it hard to return accurate search results .  This may be due to the fact that when using traditional search engines which rely on a small number of tags for each image, specific queries lead to higher precision results than abstract queries . These findings suggest that by labelling images with natural language text we may be able to capture some of the semantic meaning of images and allow users to search using more abstract perceptual terminology.

              Content based image retrieval (CBIR) relies on image content extracted by computer vision methods instead of textual labels. Unfortunately, the performance of these systems does not match the needs of the average user . While users typically search for images that show a certain object or have a certain meaning, CBIR meta data relies on low level image features. Many people argue that the aim of content based methods must be to bridge this mismatch between the richness of user semantics and the simplicity of technology, which they term the semantic gap . Natural language captions for images could provide the missing semantics needed to close this gap.

 16.Human Identification and Recognition System using More Significant Hand   AttributesRequirement: Java

               Hand geometry is one among the first biometrics to find practical use across an assortment of real-world security applications. A hand geometry based recognition system works by acquiring the image of a hand to determine the geometry and metrics namely the finger length, width and other attributes. Some of the existing hand geometry biometrics systems measure different parameters for efficient recognition. An important aspect of geometry based approach is the assumption that an individual's hand does not drastically change after a certain age. Most of the existing systems use more number of attributes to describe a hand of which some like finger width may slightly vary over time. Including such attributes in the process of distance metric will notably reduce the accuracy of the system during practical implementation. So, we consider only some of the selected attributes which will not change significantly over short periods of time. 17. Lossless Steganography on AVI File using Swapping AlgorithmRequirement: Java/.NET

               Steganography is the art of communicating a message by embedding into multimedia data. The purpose is to send maximum hidden information while preserving security against detection byan unauthorized person. A steganographic system is perfectly secure when the statistics of the ‘cover data’ (multimedia file) and ‘stegodata’ (encrypted message) are identical. Experimental results with existing technology gave small video distortions after hiding some information. The proposed system is aimed without losing quality and size. In order to achieve this goal, in the proposed system we are using swapping algorithm and UTF-32 coding scheme for encryption. This paper explains the comparative analysis between Picture (JPEG) stegano and Video (AVI) stegano  by quality and size. The system proposes to increase the strength of the key by using UTF-32 encoding in the swapping algorithm and lossless stegano technique in the AVI file.

 18. Data MiningRequirement: Java/.NET 

 

              Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviours, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by retrospective tools typical of decision support systems. Data mining tools can answer business questions that traditionally were too time consuming to resolve. They scour databases for hidden patterns, finding predictive information that experts may miss because it lies outside their expectations.

              Most companies already collect and refine massive quantities of data. Data mining techniques can be implemented rapidly on existing software and hardware platforms to enhance the value of existing information resources, and can be integrated with new products and systems as they are brought on-line. When implemented on high performance client/server or parallel processing computers, data mining tools can analyze massive databases to deliver answers to questions

19. Matrix Randomization FunctionRequirement: Java/.NET 

               This is a new kind of way in which we can use graphical passwords for the information protection mechanism. In the existing scenario we use DAS, is a representative “drawing reproduction” scheme in which the password is a simple picture drawn on a grid. It is a purely graphical password scheme based on recall, and requires the user to create a free-form image on a drawing grid. The drawing is mapped to a sequence of coordinate pairs by listing the cells through which the drawing passes in the order in which it passes through them, with a distinguishing coordinate pair inserted in the sequence for each “pen up ” event, i.e., whenever the user lifts the stylus from the drawing surface.  DAS constitutes a much larger password space transfer              The proposed system can also prevent the brute force attacks effectively. The experiment results show that users tend to set a graphical password at the average length of 100. If the attackerwants to break the correct password by a brute force attack, in the worst case it may take approximate 8100 times for successful authentication, which is an impractical process. The proposed system obtains a good performance in resisting shoulder surfing.              Here the information that is to be sent is embedded in the image that has been cut into small pieces. These cluster of images are shuffled based on a key that is generated for the image shuffling purpose.  After shuffling the message is embedded in the image and the image is put back in the order. Now the image and the key are sent to the respective person, with the key encrypted using RSA encryption. On receiving the message the receiver can decrypt the key and retrieve the information that has been embedded in the image.s 20. A New Multi-path AODV Routing     Requirement: Java/.NET                                                     In the proposed system we have designed a new multi-path  AODV routing algorithm, the number of dropped packets will be decreased and indeed this will be happened with more balancing in the network. In this way the path congestion can be controlled and the efficiency of the network could be increased substantially. We could prevent the network from crashing and the data transaction will take place much more efficiently. The modules that are linked with this proposed system are. Scheduler:                         The scheduler is used to perform the scheduling operations. Here the scheduler is doing the scheduling based on the priority that is assigned on the paths if they are free or congested.

 Monitoring Entity:

                         The monitoring entity is used to monitor the path and thereby determine if the paths are congested or free. User Management System:                         It is used by the administrator for the purpose of monitoring the entire operation and to control it for better results. Packet Capturing:                                                      Here the packet analysis is done based on type and data. The packet analysis is done in order to determine the path of the packets.

21. Content Cognizant Data Dissemination

Requirement: Java/.NET

              This software provides a technique for retrieving dynamic data-such as real time weather forecasting information, share market information etc. It maintains the freshness of the data from source to client. For this we use some algorithm which is intelligent enough to recognize the changes made at the source.  In addition to recognizing it also transfers data from source to the users only at that time when the change is made instead of continuous transmission of data. This helps to improve the performance in terms of the bandwidth required.                           If the network lying in middle were intelligent enough to recognize when the data is changing so that it transfers the data from source to client only at that time, it would result in significant improve in performance in terms of bandwidth required and freshness of data. We use a adaptive proxy middle ware to simulate this. 22. Network Load BalancingRequirement: Java/.NET                Network Load Balancing is the act of transferring a process between two machines. It enables dynamic load distribution, fault resilience, eased system administration, and data access locality. Network Load Balancing gives network administrators excellent control, including the ability to remotely manage (with password protection) the cluster from any point on the network. Network administrators also have the ability to tailor clusters to specific services, with control defined on a port-by-port level. Hosts can be added to or removed from a cluster without interrupting services. In addition, they can upgrade software on cluster hosts without interrupting services to clients.              Network Load Balancing servers (also called hosts) in a cluster communicate among themselves to provide key benefits, including:

 

 

 

 

 

 

 

 

 

 

 

Mobile 

23. Content-Based Image Retrieval on Mobile DevicesRequirement:Java,J2ME Content-based image retrieval area possesses a tremendous potential for exploration and utilization equally for researchers and people in industry due to its promising results. Expeditious retrieval of desired images requires indexing of the content in large-scale databases along with extraction of low-level features based on the content of these images. With the recent advances in wireless communication technology and availability of multimedia capable phones it has become vital to enable query operation in image databases and retrieve results based on the image content. In this paper we present a content-based image retrieval system for mobile platforms, providing the capability of content-based query to any mobile device that supports Java platform. The system consists of light-weight client application running on a Java enabled device and a server containing a servlet running inside a Java enabled web server. The server responds to image query using efficient native code from selected image database. The client application, running on a mobile phone, is able to initiate a query request, which is handled by a servlet in the server for finding closest match to the queried image. The retrieved results are transmitted over mobile network and images are displayed on the mobile phone. We conclude that such system serves as a basis of content-based information retrieval on wireless devices and needs to cope up with factors such as constraints on hand-held devices and reduced network bandwidth available in mobile environments. 24.Remote File Storing in MobileRequirement: Java,J2ME 

 

              The project aims in implementing a software that helps a user to expand the memory level of a mobile i.e., our software helps a user to store data to a remote system and which can be later retrieved the user according to the need. The s/w also provides the user to store the audio & video or image captured by the mobile and can be later played by retrieving. For implementing the above mentioned concept first we develop a website which supports file sharing , video and audio sharing between users. Each user has to initially register with us . After registration process the user is provided with server space which an be used for storing video’s and audio. Now the user has the facility of uploading the files from a web client and then viewing it from the mobile side

The features in System Side1.      File Manipulation2.      S/W Download3.      User Log4.      File Log5.      Image management6.      Video management7.      Audio management

 Mobile Side

1.      Capture video/Audio/pic2.      Upload data3.      Download data4.      play media5.      send mail6.      File share settings

 

  25.  Bluetooth ExpansionRequirement: Java,J2ME 

               Bluetooth technology is fast becoming the worldwide standard for short-range wireless communication. Bluetooth can connect up to eight devices simultaneously, with all of those devices in the same 10-meter radius. Our project tries to overcome this main drawback of Bluetooth networks and expand the range of a Bluetooth wireless data transfer by involving intermediate Bluetooth devices between the source and destination devices. It implements ad-hoc networking, where network spontaneously forms networks that persist as long as they are needed. The project has been developed using J2ME, since Java language programming and platform appear to join Bluetooth technology to be the base of next generation wireless applications. 26. Mobile Web BrowserRequirement: Java,J2ME

               The proposed system is to bring the web browsers into small mobile hardware platforms that having same capability as desktop web browsers. The main objective is to make web browser application in mobile phones capable of GPRS connectivity.The other objectives of the system are

➢        to make a generic web browser application.➢        to bring consistent look and feel.➢        to be independent of the vendors.➢        to give the mobile phone users the freedom to access the internet as if they are using the desktop web browsers.➢        to develop a portable web browser application

to increase the cost effectiveness in the existing system 27. BLUEMOXERRequirement: Java,J2ME 

               Online Examination using mobile phones is a new form of m-Commerce enabling clients to write exams. Mobile Examination makes the mobile phone the media for conducting examination. The Java Online Examination Using Mobile Technology is a wireless enterprise application using Java technology. Using BLUEMOXER students are able to write exams using a mobile device such as a cell phone that Bluetooth enabled. The faculty members are able to add questions for the examinations. Here a student enters their details. The code entered by the user is validated with that in the database of the administrator. 

28. Mobile LibraryRequirement :Java/.Net               The objective of the project is to make an application to give the college library into our hand by a Mobile SMS from our mobile using GSM modem. This will help the users to know the status of a particular text in the Library by sending a single message from their mobile. The Application gives the user, ability to know whether the book is already there or not and also able to reserve one text for him as   they needed ,without going to the Library . Another objective of this project is to validate the books in the Library by reading QR code printed in the Books § and also able to validate the students by their QR Code. 29. Mobile Tracking Using GPRSRequirement: Java

              In the proposed system we have created an application by means of which  we can track the movement of the mobile phone of the desired user.. Each mobile phone has a unique Id and it is this ID that sets apart a mobile phone from other mobile phones. By means of this ID can identify each mobile and track the mobile phone anywhere we want .The central server tower will be the one that will be in contact with the mobile all the time and the one that will be monitoring it. The central server will play a major role in it because the central server will be the one which will be in between the user and the mobile phone that we are need. 30. Stock Exchange System Using Mobile TechnologyRequirement: Java,J2ME               The system is designed so that individual as well as institutional clients are able to watch the stock market live, place trading orders on-line, and view the position of their shares and also at the end of the day clients can be able to see the reports of transactions. Using this application trading of shares can be done through mobile and through the website, thus making the transactions more fast and accurate. 31. Mobile Based Bluetooth Enabled Music Control, Access And Playing SystemRequirement: Java               Bemused is a system which allows you to control your music collection from your phone, using Bluetooth. It requires a Series 60 or UIQ phone (e.g. Nokia 7650/3650, or Sony Ericsson P800/P900), and a PC with a Bluetooth adapter.

Features

➢        Browse your music collection on your phone➢        Play files in any format supported by Winamp-including MP3,CD,MIDI etc.➢        Control Winamp Version 2,3 and 5 Windows Media Player and Power Point Viewer.➢        Pause,Stop,Rewind,Fast-Forward etc.➢        Add Songs to the play list and use shuffle and repeat.➢        Browse and select songs in your play list.➢        Download songs to your phone (Supported formats:WAV and MIDI;plus MP3 for UIQ)➢        Customize the look of the system with skins.

 32. Remote Administration using MobileRequirement: Java,J2ME  

Objectives:

1.      This application is designed to provide the user easy capability to administer a PC access from his mobile device.2.      This project is to enable the mobile users to control his PC information at their finger tips.3.      The application must consider the limitations of mobile devices.4.      This project involves flow of data on the Wireless Application Protocol.5.      The application must work properly without problems on all targeted devices, power supply and network support.

 

33. Mobile Based Mail Application SystemRequirement: Java,J2ME  Mobile Mail is a very fast email application for GMail, Yahoo, Hotmail, POP3, IMAP and other common web mail email services. Messages are compressed by up to 10x, saving you data charges and typically taking about 10 seconds to download 10 full messages. Default mobile mail applications that are integrated into most mobile phones are frustratingly slow and cumbersome to use. Mobile Mail downloads your email up to ten times faster then most comparable default applications and provides a fast, easy to use service that you can finally take full use of. Mobile Mail scans your email and relays it to your mobile phone. The service understands your mobile phone and optimizes the email for that phones specific display capabilities, maximizes the available resources of the phone, and ensures an effective quality mobile mail experience. GMail users MUST enable POP option in their Gmail settings before using this application. 34. Mobile Fractal Image DecompressionRequirement: Java,J2ME               Multimedia are becoming one of the most important elements of the user interface with regard to the acceptance of modern mobile devices. The multi-modal content that is delivered and available for a wide range of mobile telephony terminals is indispensable to bind users to a system and its services. Currently available mobile devices are equipped with multimedia capabilities and decent processing power and storage area. The most crucial factors are then the bandwidth and costs of media transfer. This is particularly visible in mobile gaming, where textures represent the bulk of binary data to be acquired from the content provider. Image textures have traditionally added visual realism to computer graphics. The realism increases with the resolution of textures. This represents a challenge to the limited bandwidth of mobile-oriented systems.              The challenge is even more obvious in mobile gaming, where single image depicts a collection of shots or animation cycles for sprites and a backdrop scenery. In order to increase the efficiency of image and image texture transfer, a fractal based compression scheme is proposed. The main idea is to use an asymmetric server-client architecture. The resource demanding compression process is performed on the server side while the client part decompresses highly packed image data. The method offers a very high compression ratio for pictures representing image textures for natural scenes. It aims to minimize the transmission bandwidth that should speed up the downloading process and minimize the cost and time of data transfer. The paper focuses on the implementation of fractal decompression schemes suitable for most mobile devices, and opens a discussion on fractal image models for limited resource applications.

35. Mobile Motion Tracking using On-board CameraRequirement: Java,J2ME

 This project describes the motivation, background information, experiments done and problem encountered. The objective of this project is to use camera phone as an innovative input method for different applications on Symbian.

Firstly, we will introduce the idea of this project – using motion tracking as an innovative input method. Following is the introduction of Symbian OS, the major operating system used in mobile phone nowadays, in the aspects of highlighted feature on how image manipulations can be done in Symbian phone. Next we will talk about the two testing platforms on PC and Symbian that we have developed. After that, we will discuss the common algorithms used in motion tracking and our proposed algorithms. These motion tracking algorithms would play an important role in our project.              Since we aim to develop a real-time motion tracking application on the mobile phone, both the speed and precision of algorithms are very important. The report will include the experimental results that we have done to evaluate the performance of different algorithms. Moreover, we performed investigations and experiments to find all possible ways so as to improve the accuracy and speed of the motion tracking.             Motion Tracking              Motion tracking is the process of determining the values of motion vector. Given set of images in time which are similar but not identical, motion tracking identify  the motion that has occurred (in 2D) between different images.  36. Moides - Mobile Image DescriptionRequirement: Java,J2ME

 Rapid improvements in the domain of mobile devices have enabled the processing of multimedia data on mobile camera phones. In this context, new applications and scenarios for these devices have been developed. This project introduces Moides as a system for mobile camera phones which enables a user to take a picture, use some feature extraction algorithms (e.g., an object recognition algorithm and/or an edge detection algorithm) and send the extracted meta-data in form of a MPEG-7 document to a server which returns semantic information about the content of the image (e.g., a specific building has been detected, etc.).The ongoing development in the domain of mobile camera phones let us experience multimedia in a new dimension. On the one side, the device itself provides better performance through better displays, advanced CPU power and enhanced RAM, and on the other side, new technologies for transferring data between devices and/or server have been established (e.g. UMTS, Bluetooth, etc.). In addition, new and/or improved add-ons such as cameras, microphones, etc. for mobile phones have been introduced.              Strongly related to the processing (viewing, recording, etc.) of multimedia data is its enhancement with meta-data. Meta-data are descriptive data about multimedia content. These could be semantic information, as for instance which car appears in an image or information on color characteristics (e.g., the color histogram). In this context, the Moving Picture Experts Group (MPEG) introduced in 2002 a new meta-data standard, called MPEG-7 [Martinez, 2003, Martinez et al., 2002], for describing high- and low-level features of multimedia data. 37. Mobile Based Network GameRequirement: Java,J2ME

               This Project is all about to make a multilayer Bluetooth game in J2ME and the players will be connected using Bluetooth. It must be able to run on all mobiles having Bluetooth and also the mobiles supporting java. 38. Live TV In MobileRequirement: Java,J2ME

               The software aims at creating an application that enables live video streaming on mobile phones. The project intends to create an application  that streams tv channels on to mobile phones. It also implements a video on demand feature ,that allows users to view videos uploaded on the site, on

their mobile phones. In addition, live videos captured by a webcam on user side can also be streamed   on to the mobile phones.The application consists of three modules              1: Mobile Module               2: Web server Module              3: Network and streaming module.

               Mobile module deals with providing the basic user interface and a media player for playing the media files streamed into the mobile phones. It is implemented in J2ME.              The web server module deals with user management, media management and service management. The application is implemented using the web architecture. The architecture is supported by JSP technology which is a java technology that allows to dynamically generate HTML documents in response to a Web client request. The storage is realized using MySQL architecture which allows creation, manipulation of   a number of databases relating to user data, and media files              A web- side   video streaming application is created to stream TV channels on to the website hosted. To enable live video streaming using web cam, the request is sent to a local server which establishes a TCP/RTP connection with the home PC system . It streams the videos captured on web cam to  the hosted site. The video is then streamed on to the mobile phones. If video on demand feature is selected, the video requested is identified and streamed on to the mobile phone. The videos from the web server are streamed on to the mobile phone via GPRS.GPRS the General Packet Radio Service (GPRS) is a service that allows Mobile Phones to be used for sending and receiving data over an Internet Protocol (IP)-based network. 39.Autonomous Mobile Robot Navigation using Smart phonesRequirement: Java,J2ME

               The world of Robotics is one of the most exciting areas that has been through constant innovation and evolution. Robotics are interdisciplinary and have become more and more a part of our lives. They are no longer a vision for the future but a reality of the present. In our day to day lives, robots _ll many important parts from mowing the lawn, securing our uninhabited houses, feeding our pets or building our cars. It is visible that they are everywhere and as time passes they will be more and more present. Within robotics, special attention is given to mobile robots, since they have the capability to navigate in their environment and are not fed to one physical location. The tasks they can perform are endless and the possibilities for them to contribute to our lives are countless (e.g., unmanned aerial vehicles, autonomous underwater vehicles).This project focuses on the development of a navigation system composed by a mobile robot and a smart phone. We are motivated in providing mobile phone solutions to the main areas in mobile robot navigation. In this system, the mobile robot is controlled by the smart phone, where navigation algorithms are processed, generating controls that are transmitted back to the mobile robot using Bluetooth communication. The robot platform used is Lego's NXT Mind storms [Lego, 2008b], a versatile well equipped set that enables fast and easy construction of different prototypes. For the smart phone, Nokia's N80 [Nokia, 2008a] and N95 [Nokia, 2008b] mobile  phones are used. Both Nokia models are very powerful smart phones for today's standards providing us with good performance, capacity and functionality. 40. Content Interaction and Formatting for Mobile DevicesRequirement: Java,J2ME

 In this project we present an experimental content adaptation system for mobile devices. The system enables the presentation of multimedia content and considers the problem of small screen display of mobile terminals. The approach combines structural and media adaptation with the content formatting and proposes a system that handles the user interaction and the content navigation.

The adaptation system is designed on top of the NAC architecture. The main components of NAC are the proxy and the profiles repository. The proxy intercepts content access requests from heterogeneous clients, passes them to the corresponding server and adapts the original content according to some client properties. The properties of the context (hardware, software and user characteristics) are stored in the form of profiles written in UPS: a description model based on CC/PP and RDF. The profiles are accessed, maintained and updated using a set of Web services exposed by the repository. Our adaptation system enriches NAC with two components: an adaptation component at  the proxy side and a formatter module at the client side. The adaptation component processes the interaction requests of the user and applies a structural and media adaptation on the original content. The result of the adaptation is transmitted to the client formatter that presents the different parts of the adapted content.

 

 

 

Networking Topics

41. A-Trac -Wireless Satellite Tracking System Using GPSRequirement: Java 

 

              This project examines the use of Global Positioning System (GPS) in real time tracking for both fleet management and private use. The aim of this project is to develop a Wireless Satellite Tracking System that allows a user to track a given target via the web. This project aims to develop a prototype for a Global Positioning Satellite application, which will allow a user to track a given target (truck, car, person) in real time via the Web. The user will be able to locate their target by logging onto the web page to display the location and movements of a given target on a detailed map. 

42. LAN ManagerRequirement :Java/.Net/PHP /Python               File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video) documents. It may be implemented in a variety of storage, transmission, and distribution models .The aim of the project is to develop web based software solution for accessing files from the server. This project includes entertainments like chatting, gaming, hearing music and viewing videos.             Administrator can upload files, delete files from the server.  User can register in the site and search for uploaded files,  upload new  files ,download files. For entertainment the user can chat with other users who are on line , also the user can hear music, view videos uploaded in the server. The extra feature provided by the site is gaming. By logging in user can play games that is provide by the site. Modules:

·        Registration·        Managing Files·        Chatting·        Gaming 

43. Wireless Virtual Network ComputingRequirement: Java,J2ME  

WVNC (Wireless Virtual Network Computing) software makes it possible to view and fully-interact with one computer from mobile device anywhere on the Internet. VNC software is cross-platform, allowing remote control between different types of computer. For ultimate simplicity, there is even a Java viewer, so that any desktop can be controlled remotely from within a browser without having to install software. VNC has a wide range of applications including system administration, IT support and help desks. It can also be used to support the mobile user, both for hot desking within the enterprise and also to provide remote access at home, or on the road. The system allows several connections to the same desktop, providing an invaluable tool for collaborative or shared working in the workplace or classroom. Computer support within the geographically spread family is an ever popular use. 44. Proactive System To Identify Intruder In Wifi NetworkRequirement: Java/.Net                The project WIDS is a proposal for identifying an intruder in a wireless network. It also proposes a pro-active defence mechanism that identifies if there is a chance of an intrusion. It also has a analysing system that analyses the intruder.The project has the following features:

1.      Network load analysis2.      MAC address spoofing identification3.      Anomaly analysis4.      Packet sniffing5.      Honey Pot6.      Firewall7.      Encryption

 45. Federated Database Management SystemRequirement: Java/.Net         The project Federated Data Base Management System is a  software for multi-system-multi-database architecture. Our software integrates the different RDBMS to work as a single unit there-by  helping database administration. This is needed when a project is developed in different environments. But need to be integrated as single entity. The database administrator can check this with the help of our software which will integrate all the RDBMS as single one virtually.The project has the following modules:

1)     Data Base Pool2)     Query Handler3)     Query Analyser4)     XML parsing5)     Network [Client/ Server]6)     Data Handler7)     Data Base Log

46.  Hybrid Honeypot

Requirement: Java/.Net

              Honeypots are an exciting new technology with enormous potential for the security community. Honeypots are neither like Firewalls that are used to limit or control the traffic coming into the network and to deter attacks neither is it like IDS (Intrusion Detection Systems) which is used to detect attacks. However it can be used along with these. Honeypots does not solve a specific problem as such, it can be used to deter attacks, to detect attacks, to gather information, to act as an early warning or indication systems etc. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the

latest in on-line credit card fraud. It is this flexibility that gives honeypots their true power. It is also this flexibility that can make them challenging to define and understand. 47. Cluster Based Advanced network Search and IndexingRequirement: Java/.Net               The LAN Search is Application Software, which help us to search a file(s) on LAN. The main advantage of this software is that a user can sit on one computer and can search for files on different computers connected to it as well as the result will be getting to the same user who requested for a search. The LAN Search will do this work for the you. There is no need of knowing where the file is present. Just give the file name and select the computers on which searching are to be done. Then click the search button. The result is in front of you. This project aims at implementing software which is OS independent. The project follows client-server architecture and the server is the system which accepts the search queries posted by the clients. Each client forwards their search to a server and the server forwards the search to corresponding systems. Once the searching is done the result is posted back to server and server returns it to the respective client.  48. DBM in Peer-Peer NetworksRequirement: Java/.Net               The phrase ‘Data Mining’ generally portrays a picture of analysing huge databases, mostly in the form of large tables, for useful patterns. On the other hand, P2P networks remind us mostly of well known, file sharing networks based on a point-to-point connection, without any central server. With the advent of high speed network connectivity and cheap digital storage/data recording devices, these types of server-less networks are growing very fast. Peer-to-peer computing didn't spring into existence in its current form. Rather, it is the child of a number of different parents. Let's consider two of the most significant. First and most important, P2P computing is the natural result of decentralizing trends in software engineering intersecting with available technology.

 49. Ultimate ServerRequirement: Java/.Net           The basic concept is to assure at least one server will be up always. In real world there will be multiple servers and if one server fails or become overloaded  the request will be bypassed to another server. But the user will not feel any difference in this switching. Also when the failed server is up again , it should also be added to the list of available servers Also there should be a centralized monitoring and controlling utility to do all these things. 50. Implementation Of A Cluster Environment For Resource SharingRequirement: Java

              The project deals with the simulation of Distributed Operating System in a Centralized kernel. In a centralized OS, there is a global memory and a set of clients that request services from a server. But in DOS, there is no server as such. There are a set of clients that have their own memory and communication hardware. Each client performs some control functions of the operating system. In distributed operating system, there are set of clients. Resource sharing is one of the major advantages. 51. Hybrid Database Analysis And Management SystemRequirement: Java/.Net               It is increasingly important for organizations to achieve additional coordination of diverse computerized operations. To do so, it is necessary to have database systems that can operate over a

distributed network and can encompass a heterogeneous mix of computers, operating systems, communications links, and local database management systems.              Distributed Database Management System (DDMS) is specially developed for Heterogeneous Database Platforms. ‘Distributed Database Management System’ focus mainly on heterogeneous distributed data management. It is a system for managing databases stored on multiple computers in a network. 52. Peer-to-Peer media File SharingRequirement: Java/.Net               The aim of this project was to develop an application that allowed the ‘sharing’ of media files across a peer-to-peer network.  Any machine can elect to act as a designated server storing records of other Peers and their audio files marked for sharing. Currently there are no facilities to allow users on a network to share their media files and other files to other users across a network without using a central server specifically set aside for the task

53. Implementation Of Link State Routing (Shortest Path) Algorithm Used For Network  Modelling And GIS Systems

Requirement: Java/.Net 

              In a link state algorithm or Dijkstra’s algorithm, the network topology and all link costs are known; that is, available as input to the link state algorithm. In practice this is accomplished by having each node broadcast the identities and costs of its attached links to all other routers in the network. This link state broadcast can be accomplished without the nodes having to initially know the identities of all other nodes in the network. A node need only know the identities and costs to its directly attached neighbours; it will then learn about the topology of the rest of the network by receiving link state broadcasts from other nodes. The result of the nodes' link state broadcast is that all nodes have an identical and complete view of the network. Each node can then run the link state algorithm and compute same set of least-cost paths as every other node. 54. Protected Data ChannelizingRequirement: Java/.Net

               This project is aimed at developing a Protected Data Channelizing for Fast and secures file transmission, Security for data transfer. This is an Intranet based application. , it encrypts both commands and data, preventing passwords and sensitive information from being transmitted in the clear over the network. The features are Modules of the project

1)     Login/ User Authentication2)     File Management/Folder Management3)     Upload Module4)     Download Module5)     Encryption Module6)     Decryption Module7)     User Management8)     FingerPrint Authentication   

              

Technology

55. Completely Automated Public Turing Test To Tell Computers and Humans Apart For BlindRequirement: Java/.Net               Nowadays the Internet users are from different ages and groups. The disabled people also use the Internet. Some websites are especially created for disabled people. Many Internet sites offers services for human users, but unfortunately some computer programs are designed which abuse these services. As a result some systems namedCAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) have been introduced to tell apart human users and computer software.              In this project, a new CAPTCHA method is introduced which can be used by blind people. In this method a simple mathematical problem is created according to predefined patterns and converted to speech using a Text-To-Speech (TTS) system. Then the sound is played for the user and he/she must enter the answer of the question. Because answering this problem requires recognizing the speech, understanding the problem, and solving the problem, only a human user can answer this question and present computer programs are unable to solve it. In addition, answering the question is easy for blind people, because the question is consists a number of natural language sentences and the answer is a number, which can be entered easily. 56. Wireless Virtual Network ComputingRequirement: Java,J2ME               The project aims to introduce wireless control of the clients in a network by the usage of a mobile device and hence access the various applications of the clients via the mobile device.  The system developed will allow the user to access details (here, student details) using a mobile device, stored in a client in a network.              By the implementation of our project we intend to allow a user (student/teacher) to access details of students like the session marks and attendance details over a mobile device. REQUIREMENTSThe following requirements were set forward by the users,

1.      Facility to access applications on a client over a mobile device.2.      Access details of the session marks and attendance details of students.3.      Facility to enter data via mobile to the target client.

 

              The system establishes a connection to the network via Bluetooth. Thus the mobile device gains control over the clients connected to the server in that network. The following features will be incorporated in our system as a part of the project implementation, 

1.      System ON/OFF2.      File Search/Management3.      User Attendance4.      Desktop view5.      Usage of CMD prompt 

57. Voice Message Transfer Using Personalized Repository based Speech-Coding techniqueRequirement: Java/.Net

 The project involves building a system for exchanging voice messages over a network, using very high speech compression. The implementation is as follows. The sender will record his voice message and transform it into the coded, compressed file using the encoder module. The coded file is transferred through the network. The receiver passes the attached file through the decoder module which reproduces the original speech.The project has the following modules.1. Encoding          The module deals with compression of the audio stream with the voice database and then the generation of the encoded file. The encoding procedure is done by a detailed pattern matching analysis. It also involves removal of repeating pattern. Each removal pattern location and pattern is identified so that it can be used in the decoding module.

2.    Decoding          This module has the job of recoding the audio from an encoded form. The audio can be regenerated to the same tone or to a neutral voice, i.e. either male voice/female voice or a computer generated voice. It uses the voice database for tone generation.

3.    Voice Repository              The module comprises of the client/server architecture. Ie the module deals with capturing of audio and then streaming it in a network. The application can be used for dealing with audio messages passed through emails attachments or can be used where audio streaming is involved. By implementing this concept it is easier to transfer audio as it gets lighter and compressed at the exit point and at the next received point gets again converted to audio.

58. Blind BrowserRequirement: Java/.Net

               The main objective of the proposed system is to make internet accessible to the blind by overcoming all the difficulties that we witnessed before. In our proposed system “Blind Browser” we have made it possible for the blind to easily access the internet without any difficulty. Here we have created software that integrates GUI with efficiency. We just have to install the software just like any other programme in the machine before we can start working with it.  The main advantage is the ease with which this software can be accessed by the blind. The other main attractive feature here is that all the URL will be stored in a database as a matter of which the user will not have to remember them which has proven rather difficult.

59. Remote Accumulation SystemRequirement: Java/.Net

              Remote Accumulation System is software that allows users to take back up for specified folder. The backup may be scheduled or Requested back up. In Scheduled back up the it is made in a particular time interval in the case of requested back up it is possible to make back up according to user.Functional components of the project1) Client Details2) Client status3) Scheduled back up and Crash back up4) File Transfer5) Directory Traversing6) Desktop Viewing        

60.  Fractal Image Compression

Requirement: Java

              With the ever increasing demand for images, sound, video sequences, computer animations and volume visualization, data compression remains a critical issue regarding the cost of data storage and transmission times. While JPEG currently provides the industry standard for still image compression, there is ongoing research in alternative methods. Fractal image compression is one of them. It has generated much interest due to its promise of high compression ratios at good decompression quality and it enjoys the advantage of very fast decompression. Another advantage of fractal image compression is its multi resolution property, i.e. an image can be decoded at higher or lower resolutions than the original, and it is possible to _ zoom-in_ on sections of the image. These properties made it a very attractive method for applications in multimedia: it was adopted by Microsoft for compressing thousands of images in its Encarta multimedia encyclopaedia 61. Automatic Identification And Data Capture TechniqueRequirement: Java/.Net                A Automatic Identification And Data Capture Technique is a matrix code (or two-dimensional bar code) created by Japanese corporation Denso-Wave in 1994. The "QR" is derived from "Quick Response", as the creator intended the code to allow its contents to be decoded at high speed. Automatic Identification And Data Capture Technique are most common in Japan, and are currently the most popular type of two dimensional code in Japan.              Although initially used for tracking parts in vehicle manufacturing, Automatic Identification And Data Capture Technique are now used for inventory management in a wide variety of industries. More recently, the inclusion of QR Code reading software on camera phones in Japan has led to a wide variety of new, consumer-oriented applications, aimed at relieving the user of the tedious task of entering data into their mobile phone. Automatic Identification And Data Capture Technique storing addresses and URLs are becoming increasingly common in magazines and advertisements in Japan. The addition of Automatic Identification And Data Capture Technique on business cards is also becoming common, greatly simplifying the task of entering the personal details of a new acquaintance into the address book of one's mobile phone.

62. Messenger in mobile devicesRequirement: Java,J2ME               Everything in this world is going to be smaller and smaller. So we will try to implement a messenger in mobile devices. As the J2ME can send only web request so we can do the server side in J2EE and the client side in j2me. The server is capable for handling web request from mobiles. The web request may be of different types login request, logout request, message from one client to another etc 63. Home Control Using MobileRequirement: Java/.Net

 

It is J2ME Project that controls all the Home equipment. The purpose of the project is to provide the mobile users a service that facilitates them to control the devices by an SMS from their mobile. We aim at creating a system which enables us to control the devices at home. The proposed system is a combination of both hardware and software. The hardware is like a GSM modem where a SIM Card is inserted. This unit is connected to the CPU where the software is installed. The SMS Manager provides a Mobile number to the client, where they can access their PC by sending an SMS to the software.              In the mobile phone we will have a virtual room application. By using this virtual room application the user can create the layout of the room. That is the user can recreate his/her room and the position of the devices that he intent to control in the mobile phone. There are two ways in which the user can communicate with the devices at home. The user can communicate with the devices by using either GPRS or by sending an SMS.If the user were to communicate with the devices in the house using GPRS then the mobile application communicates with a web server and the web server in turn communicate with the PC at home and thereby controls the devices at home. If the user were to communicate using SMS then he/she just need to send the SMS to the GSM modem connected with the PC at home and thereby control the devices.  64. Wireless AIRequirement: Java AI Talk is a MIDlet that allows a user to talk with an intelligent robot, called Anna. It takes input from the user and sends it to an Anna Web server. Anna will reply to the user and the conversation will continue as long as the user does not exit the application.

65. Proxy-Firewall-Internet Monitoring

Requirement: Java/.Net               This a utility that allows you to monitor the sites users are browsing and what files they are downloading – in REAL TIME. In addition it can block access to adult sites as well as performing anti-virus scanning on all downloads ,is the perfect solution to transparently exercise a degree of access control over users’ browsing habits and ensure legal compliance – in a manner that will not alienate your network users.Modules

1.      Proxy Server2.      Firewall3.      URL Parser4.      User Management5.      System Management6.      URL Settings7.      Ftp Download Manager8.      Scheduler

 66. The Remote Host Monitoring SystemRequirement: Java/.Net               This helps us to monitoring the clients remotely on LAN. The main advantage of this software is that an administrator can sit on server computer and can view the details about the client computers connected to it. In this system the server is provided with the privileges to monitor any of its client systems. The server will have the following facilities: a) User Information b)User Attendance c)  Client Processes d) User commands e) User Desktop.

67. Remote Home PC MonitoringRequirement: Java/.Net               It is the fast, easy and secure way to access your PC from any web browser or wireless device in real time.

·        Access files, programs, email and network.·        Increase your flexibility and productivity.·        Work on your office PC from home·        Travel and use your PC remotely

Remote Home PC Monitoring Personal allows you to remotely access your computer from any other Internet-connected computer in the world with almost any operating system through a secure, private connection 68. Intruder DetectionRequirement: Java/.Net               “Intruder Detection”, is designed to allow system administrators and curious individuals to scan large networks to determine which hosts are up  and  what  services  they  are  offering. “Intruder Detection” supports a large number of scanning techniques such as: UDP, TCP connect(), TCP SYN (half open),ICMP (ping sweep), FIN, ACK sweep, Xmas Tree, SYN sweep, IP Protocol, and Null scan.  The  result  of  running “Port Scanner” is a list of interesting ports on the machine(s) being scanned (if any). Port scanning means to scan the target system to obtain a list of open ports, which are listening for connections, or in other words , a list of open ports, that have a certain services or daemons running.

69. SMS Based System Scheduler

Requirement: Java/.Net               SMS Based System Scheduler is software specially designed for accessing a remote system using mobile through SMS. It is a combination of both hardware and software. The hardware is like a GSM modem or a Mobile phone where a SIM Card is inserted. This unit is connected to the CPU where the software is installed. SMS Based System Scheduler is software designed for sending mail, downloading the web content, setting reminders, system file management, device control.The various modules described in this project are:

1.      Sending Mail2.      Web content download3.      Setting reminders4.      System file management5.      Running application/Command execution6.      Setting Message alert7.      Device Control

 70. Venture MateRequirement: Java/.Net               Venture Mate is a software specially designed for high tech retail shops for SMS based home delivery. It is a combination of both hardware and software. The hardware is like a GSM modem or a Mobile phone where a SIM Card is inserted. This unit is connected to the CPU where the software is installed. The Venture Mate provides a Mobile number to the members of the organization where they can purchase items by sending an SMS to the software.Venture Mate  is  a software designed for ordering items , purchasing in modern supermarket or in a retail shop. The main feature of the software is

that the registered customers can order for a particular item by an SMS which comprises of id for that item. 71. WebgrabberRequirement: Java/.Net               Web Grabber is a high speed, multi-threading website download and viewing project. By making multiple simultaneous server requests, the program can quickly download entire website or part of a site including HTML, graphics, Java Applets, sound and other user definable files ,and saves all the files in the hard drive in their native format. After downloading, all links within the website are reconstructed creating a complete hard drive copy of the site that you can view at your own place without being connected to the internet.It has the following features. 

·        Download Accelerator·        Offline Browsing·        URL Parsing·        URL Reconstruction·        Network Settings·        Remote Download·        Timed Download·        Proxy Server

72. Search Engine with Web CrawlerRequirement: Java/.Net               A web crawler (also known as a Web spider or Web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. This process is called Web crawling or spidering. Search engines use spidering as a means of providing up-to-date data. Web crawlers Download and will index web pages to provide fast searches. A Web crawler starts with a list of URLs to visit, called the seeds. As the crawler visits these URLs, it identifies all the hyper links in the page and adds them to the list of URLs to visit, called the crawl frontier. URLs from the frontier are recursively visited according to a set of policies.The behaviour of a Web crawler is the outcome of a combination of policies: 

·        selection policy that states which pages to download.·        re-visit policy that states when to check for changes to the pages.·        politeness policy that states how to avoid overloading websites.·        parallelization policy that states how to coordinate distributed web crawlers.

 

73. Blind System AccessRequirement: Java/.Net

             The project is concerned with converting the web page texts to speech (audible form). This enables the blind people to access any sites and hear the contents of the current page and the links. This is made possible using the Linux festival package, which is a text to speech converter.              Festival offers a full text to speech system with various APIs, as well an environment for development and research of speech synthesis techniques. Besides research into speech synthesis, festival is useful as a stand-alone speech synthesis program. It is capable of producing clearly understandable speech from text.

 74. Text to voice engineRequirement: Java/.Net

               The text to voice engine is a simulated engine which converts written text to speech signals or sound signals. This application is targeted for blind people who cannot use computer, instead of reading the text by himself, the provided engine will convert the text chosen to voice signals              The system consist of 3 parts .The part will parse the chosen text or selected text into sound signals ,the parser must be precise because there are words which differ a lot in pronunciation but little in spelling .The second part works as user interface in this default mode will be terminal mode or non GUI, and a more advanced GUI mode .The third part consists of outing the parsed text into sound form using soundcard and speaker, system  buzzer cannot be used. 75. PodcasterRequirement: Java,J2ME

              A podcast is a multimedia file distributed over the Internet using syndication feeds, for playback on mobile devices and personal computers. Usually a website is used to act as the podcaster. Though podcasters web sites may also offer direct download or streaming of their content, a podcast is distinguished from other digital audio formats by its ability to be downloaded automatically using software capable of reading feed formats such as RSS or Atom.   76. Virtual TutorRequirement: Java/.Net/PHP

               The project entitled Virtual tutor is developed with the intention to create software for the e-learning process. The objective of Virtual tutor is to improve access to advanced educational experience by allowing students and instructors to participate in remote learning communities using personal computers at home or at work. The project is to implement Virtual It uses collaborative learning process that emphasizes group or co operative efforts among faculty and students, active participation and interaction in the part of both students and instructors and new knowledge that emerges from an active The modules for the proposed system are, 

●        User/Student Management: Techniques for preventing unauthorized access from on-line users.●        Subject/Timing Management: Grouping students for particular time period will reduce complexity . ●        White Board Sharing: White Boards are visible to students as teacher starts lecturing on particular topic. ●        Report Generation : For the purpose of examinations and attendance register, report generation module provides student vice detail.                         ●        User Interface: Concerning as a web teaching tool, it should have an interface that can be easily setup by any user.

77. IR Cutting

Requirement: Java/.Net

               The objective of the project is to make an Intrusion detection system based on Infra-red technology. This will help the users to enabling security to their property by implementing this security system. The Application gives an ability to the user to implement a security system with very cheap cost. If once an intrusion detected, the system will store the snapshots of the place and sent an SMS to owners mobile number. 

78. Live TVRequirement: Java,J2ME

                           Mobile devices have become more different and storage of data for every client is not an option. Furthermore, the growing dissimilarity of the more and more reduced devices eliminates the possibility of finding a standard for all items. Hence, our project addresses the problem of dealing with the data, which are sent to the client by a server. We will present an adaptive service that processes the data to the client and administers functions such as storing, pre-fetching, retrieving, and adapting of media content .To combine the presentability with a practical example, we focused our project on video streaming applications. 79. RF TrackingRequirement: Java             A RF tracking system is an electronic device installed in a vehicle to enable the owner or a third party to track the vehicle's location. Most modern vehicle tracking systems use Radio Frequency(RF) modules for accurate location of the vehicle. Many systems also combine a communications component such as cellular or satellite transmitters to communicate the vehicle’s location to a remote user. Vehicle information can be viewed on electronic maps via the Internet or specialized software.80. Smart SecurityRequirement: Java/.Net

          This will help the users to enabling security to their property by implementing this security system. The The Application gives an ability to the user to implement a security system with very cheap cost. If once an intrusion detected, the system will store the snapshots of the place and save in the system.         This Project is all about to provide easily affordable security system for a office or house or bank or any important room where you want to have security by connecting IR Transmitter and Receiver at the entrance of the room. If anytime, the Ir Rays are cut, The PC is intimated abut the same. This application allows the mobile user to track the activities, happening at a particular location. 81. SMS ManagerRequirement: Java/.Net

               SMS Manager is a combination of both hardware and software. The hardware is like a GSM modem where a SIM Card is inserted. This unit is connected to the CPU where the software is installed. The SMS Manager provides a Mobile number to the client, where they can access their ward’s Marks, Attendance etc by sending an SMS to the software.

              The user can enter the data in the software and also the parents/guardians/students mobile numbers are stored. So when the parent sends a keyword ‘marks’ it will hit the software and the concerned wards is send back in his mobile. In short a parent can view his ward’s mark only.

              This application is also capable of fetching vital information from school through a simple SMS. Even if the mobile is switched off, the message can be delivered when it is switched on again.

 82. Toll ManagementRequirement: Java The main aim of this project is to locate vehicles passing through the toll.  Here we are using RFID technology for locating vehicles passing through the toll. An alternative for Radio Frequency Tags is used here. For that we fix RF receiver towers in predefined positions. That towers always receives RF signals from the vehicles concerned and communicates to the server. 83. Virtual DriveRequirement: Java/.Net

               Virtual Drive is intended for PC users who want to protect, hide and lock their local, network, Floppy and USB drives, and disable the Auto Run feature for them to ensure both security and privacy. This software lets you apply a range of security options to individual drives ranging from hiding options to access security restrictions.              To make drive virtually means when we open the MY computer, the drive cannot be seen, it is secured by a s/w. That is a advanced drive protector, it prevents unauthorized access to our drives. 84. Anti PhishingRequirement: Java/.Net

               Many anti-phishing approaches face the same problem as anti-spam solutions: incremental solutions only provoke an ongoing arms race between researchers and adversaries. This typically gives the advantage to the attackers, since researchers are permanently stuck on the defensive. As soon as researchers introduce an improvement, attackers analyse it and develop a new twist on their current attacks that allows them to evade the new defences. Instead, we need to research fundamental approaches for preventing phishing. . Most anti-phishing techniques strive to prevent phishing attacks by providing better authentication of the server. However, phishing actually exploits authentication failures on both the client and the server side. Initially, a phishing attack exploits the user’s inability to properly authenticate a server before transmitting sensitive data.               However, a second authentication failure occurs when the server allows the phisher to use the captured data to login as the victim. A complete anti-phishing solution must address both of these failures: clients should have strong guarantees that they are communicating with the intended recipient, and servers should have similarly strong guarantees that the client requesting service has a legitimate claim to the accounts it attempts to access. 85. Campus BuddyRequirement: Java/.Net/PHP

               Here we have created a system that led to the automation of all the work that is taking place in a college. The main advantage here is that as it is web based all the details could be known from anywhere. The proposed system could be used by the office staff, students, teachers, HOD and principle. That is we have created a system in which all the people who are associated with a college are taken into account and could use the benefits of the system.               The proposed system is designed in such a way that it is easy to use and all the data will be stored securely. The most striking feature is that there are different level of authentication within this system. For example students can view there marks but cannot alter them, only the respective teacher who entered the mark can alter them and no other teacher could alter them. In this way we have created

certain levels which are only accessible to certain privileged individuals and not everyone can access them. 86. Multimedia CommunityRequirement: Java/.Net

              The proposed system is called “multimedia community”. Here we have a central server to which the multimedia content are uploaded. We can download the the multimedia content from the server any time we want. During the uploading of the multimedia content the server automatically compresses the media and during the download the content is decompressed. Here we are implementing the compression by means of ZIP files.

              The multimedia content contains both images and videos. We have a system side application for viewing both the image and the video. This makes our system both a web side and system side application. By means of the video player we can watch the video that we want and we can see the images by means of a image viewer that we provide. By uploading the multimedia content each person can become a part of the multimedia community. In this way by uploading the multimedia content on the central system the users can create a large collection of multimedia that will be unique  and will have a vivid collection compared to the other existing websites.

87. Network Antivirus

Requirement: Java/.Net

              Here we have designed an antivirus software that is basically intended for the client server architecture. Here in the proposed system the user needs to install the antivirus software on the server machine only. The antivirus software is designed in such a way that it will monitor the client machines and determine if any virus programes are active, and if it find's programs that it suspects to be virus programms take necessary actions to secure the system. In this way we can use the antivirus program installed on the server to scan and find virus programms on the client machine. The other advantage we have here is that as the antivirus program is installed on the server only there is only need to update the antivirus program on the server machine only.                           The virus programms are identified by the signature of the virus programms that we have provided in the antivirus programme. The signature of the virus programmes are kept in the antivirus programme in a database. There are other antivirus programmes that can be used in this manner but all of these programms become useless when the network is down or experiencing technical  difficulties. This is where our proposed  system sets aside antivirus programmes that work in the same way in a client server architecture. Even when the network is down the proposed system still continues to work at an efficiency that other antivirus softwares do not provide. In this way our proposed system protects the network of  virus programs

 88. Hybrid DatabaseRequirement: Java/.Net

              The very idea of having a system which can be used for free flow of data, no matter whichever source it is from. A faster flow of data can lead to the early completion of task which can thus result in reduced cost of production and an increase in the overall efficiency. This idea when applied in the case of databases gives rise to a Agent Based Query Optimization System Using Time And Space Complexity On Hybrid Database , consisting of databases of different origin and types, distributed over different systems in a network. 

              Here we propose a software that can be used to allow interaction of heterogeneous data residing in heterogeneous databases located in different systems in a network               Here, in this project, we aim to create software that analyses  the queries that we use in different databases so that we can find a query that works more efficiently compared to the other queries, in such a way that the least system resources are utilized and works at a higher speed . This is done by

calculating the time and space complexity of each queries and finding the most effective  and efficient query among them.  The software acts as a gateway through which the user can access different databases and transfer the data between databases of similar or different types. 

             

 

Web Technology 89 . Global DepictionRequirement: Java/.Net

               The objective of the project is to provide the user easy capability to search one position in the world map like country, city name, place etc using GPRS or WED SERVICE & J2ME technology from his system or from mobile. This will help the users to locate our system or mobile; can access the road map of the place with the help of a web service. The Application gives the user, ability to locate or edit one position on the map manually. If a connection is established the user can access the world map from the wed service. This application also helps the users to search one position in the world map by giving Geographical position co-ordinates of the place.

Aim

●        This application is designed to provide the user easy capability to search one position in the world map like city name, place etc using a Web service.

●        This project is to enable the users to search one position in the world map by giving Geographical position co-ordinates of the place.

●        This application helps the users to record or map on position in the world map with the help of a web service.

●        This application is also designed to provide the user easy capability to search the position of a place in the map using the Web service.

●        The application must work properly without problems on all targeted devices.

 90.  Image SpamRequirement: Java/.Net/Python

 

Email spam has been around for more than a decade, with many covert companies offering mass emailing services for product advertisements. It has become usual for people to receive more spam email than relevant email. Spam message volumes have doubled over the past year and now account for about 80% of the total messages on the Internet. The design of the SMTP protocol is one main reason for email spam: it is possible to send millions of fake email messages via computer software without any authentication. Today, spam has taken on a whole new look. It’s more colourful, often appears grainy, contains less text, and sometimes is slightly askew. This relatively new phenomenon is known as image spam—junk email that contains pictures rather than just text. Although current anti-spam technologies are quite successful in filtering text-based spam emails and it do not detect image-spam in email.Nowadays, spam filters are widely deployed and various anti-spam techniques have been developed. Many anti-spam systems also use a combination of white lists, and blacklists. Filters for text-based spam, including plain text and HTML e-mail, have been employed a variety of statistical techniques, particularly Bayesian inference; these statistical filters appear to classify text-based e-mail well.Image based spam has been around for some time, recent report and anecdotal evidence suggest that there has been significant growth both in the volume f image based spam and in the percentage of spam that uses image attachments to convey its message. Although traditional spam filters that rely on analysis of sender, message header and various other information can detect some of the image spasm without looking into the image itself, other image spasm still pass through the spam filter.   91. On line Image EditorRequirement: PHP

               In conventional image editing tools normally we are using application softwares like Photoshop or Gimp which we are pre-installed in our system.  By using this project, 'Online Image Editor' we need not install any application software in our system. We can use this 'Online Image Editor' for image editing and water marking of  JPEG, PNG and GIF images. This project aims at having a photo editor online with which you can edit pictures and store them online itself. In the current photo editing tools available, like Photoshop, the software needs to be installed and used, which can prove to be very costly. Also it requires memory space. As the online editor is available on the net, all your pictures, styles and templates are stored online. The picture which has to be edited can be uploaded from our system or can be browsed from a photo gallery provided. Pictures need to be downloaded to our system only when it is needed. Hence this concept helps in effective memory utilization on our systems. It has all the capabilities you need and can replace expensive and troublesome desktop editors.

 Modules 1.              User Accounts2.              Image Albums3.              Image editing4.              Water Marking 

 92. PHP Image Manipulation ProgramRequirement: PHP

 PHP Image Manipulation Program is web site provides users to edit images by online .The client do not have installed image editor software’s they can go to this site and upload the image and edit. This site provides 17 features for user . 1.  Cropping parts of images

2.  Resizing images numerically and graphically [ie 50% size or as per mouse selection]3.  Converting the image to gray scale.                          4.  Changing the format of image from gif <-> jpg <-> png etc.5.  Create animated gif images from a number of uploaded images.6.  Watermark images.7.  Create thumbnails of images.8.  Create animated flash movies from images [swf files].9.  Create pie charts and bar graphs from dynamic data from mysql database.10.Create advanced captchas [animated/from Databases/random type/numerical type].11.Image flip, rotation, tiling, clipping.12.Insert text in specified font, style and size into an image.

         [so you can transfer malayalam text to a computer that does not have malayalam fonts                      installed]

13.Insert copyright notes into images.14.Add effects: shadow, transition effects etc.15.Split animated images to multiple components.16.Color replacement.17.Convert Microsoft Excel data [in CSV format] to image slides.  93. Information Extraction and AI Search EngineRequirement :Java/.Net/Python               Information Extraction (IE) deals with extracting structured information from an unstructured document. An IE process includes learning an extraction model from a set of documents, labeled with relevant information to be extracted. Once a model is learned, it is used to extract information from a new, unseen document. Learning from a training set requires a set of sample documents, which are labeled manually or by some program. For the best accuracy, the training set should be a representative sample of the set of all possible documents. Many a times it is difficult to create such a training set and their might be erros in the training set due to manual labeling. Relational database stores huge amount of structured information and many of the IE applications aim to populate such a structured database from unstructured documents. Such a relational database of structured information is a rich knowledge base, which can be used to learn an information extraction model instead of using a labeled set of documents. A recently introduced approach to learning is to train a model against a single relation of structured information. The rich semantic constraints in a normalized database (a set of related relations) can be exploited to improve state-of-the-art information extraction techniques instead of using a single relation. The aim of the project is to learn an information extraction model from a database, and this model can later be used to extract structured information from an unstructured document. 94. Forecasting using ANNRequirement :Java               This project involves building a neural network so that it can be used to forecast various economic parameters like sales, stocks, etc. The current target is to forecast only sales, though the final target of achieving a generic method independent of the kind of series is what I have in mind. As part of this project, I plan to develop a program which will read in the time series from a file, analyse it, and forecast the next k values in future. The entire process of analysing is to be automated. 95. Image Classification Using CBIRRequirement :.Net

               In this paper, we present survey regarding classification of remote sensed images using various methods. These classification techniques include useof CBIR. Here we discuss the advantages and disadvantages of different techniques. We begin with introduction to the above said areas and the way

these are used in image classification. We also give details about how CBIR integration can be used for aggregating the multiple criteria for making a decision. 96. Build CraftRequirement :Java/.Net/PHP /Python               This is a website that is mainly created for the construction companies which include supervisors, laborers, vehicles , payment of the wages, work hours of employees etc. 97. Live Media Streaming, Converging, Transmitting And Video Conferencing Using RTPRequirement :Java

               Live Media can be transmitted from one computer (System to which Camera is attached) using RTP protocol.  The main part is to transmit the media from this system to other system. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task.  It allows to stream media containing any number of tracks to a number of different hosts/clients on the network simultaneously. Media can be received from the Server to which the Camera is attached and live images are captured.  Sitting in different place, we can view what’s going on in another place.  The main use may be in places where cash transaction is going on. Setting up RTP sessions with several distributed clients and streams can be a tedious and complicated task.

98. Intelligent Interactive System With Natural Language ProcessingRequirement :Java/.Net               A Intelligent Interactive System With Natural Language Processing is a type of conversational agent, a computer program designed to simulate an intelligent conversation with one or more human users via auditory or textual methods. Queries are made by speech which will be displayed as the corresponding text. The chatter bot scans for keywords within the input and pulls a reply with the most matching keywords or the most similar wording pattern from a local database .

99. MingRequirement :Java/.Net             The project aims at creating a client side software for gmail & orkut. This will be a desktop software which will have the following features :

·        Gmail fetching·        Gmail Forwarding·        Folder/File View·        Orkut Integration·        Active Friends·        Chat

Modules Involved are:1.      Application Interface2.      SMPT[Simple Mail Transport Protocol]3.      Chat Application4.      Orkut Communication5.      HTML Analyzer

 100. Web Lan ExpressRequirement :Java/.Net 

              The objective of the project is to implement a system that can access a LAN securely using internet from any part of the world. The system is developed to access the files of users which are stored at the Local Area Network of their organization or Institution .The user will be allowed to access the LAN by entering their username and password, and they are only allowed to access the files belonging to that particular user and the files that are common to all users.. Each user need to have a unique username and password to access the files in that network and this provides the required security to each user.

              All the files in the system for the user will be listed in the interface. Options to delete the files, download the files and upload the files etc will be provided for each user. Thus , complete user management is provided by this project. 

Compression & Encryption techniques,  helps the data to be sent in a faster and secure manner. ZIP Compression algorithm and RSA Security algorithm is used in this project.

101. Employee Separation SystemRequirement :Java/.Net/PHP /Python               The E-Separation System will facilitate the automation of the employee Separation process The application will automate the existing task of the employee to initiate the separation process and get clearance from all the departments on line. Human Resource Development can process the separation on line and provide the relieving letter once the clearance is obtained

Features1.      Separation  Initiation2.      Separation Approval/Rejection3.      Separation Clearance4.      Separation Closure5.      Reminder Mails

 102. Bug Tracking SystemRequirement :Java/.Net/PHP /Python               A bug tracking system is a software application that is designed to help quality assurance and programmers keep track of reported software bugs in their work. A major component of a bug tracking system is a database that records facts about known bugs. Facts may include the time a bug was reported, its severity, the erroneous program behaviour, and details on how to reproduce the bug; as well as the identity of the person who reported it and any programmers who may be working on fixing it.Features

1)     Search by Project, Assigned Person, Priority, Status2)     Sorting by any of the columns3)     Administration of Priorities4)     Administration of Projects5)     Administration of Statuses 

103. Speed Cash System (POS)Requirement :Java/.Net/PHP /Python               This The Speed Cash System is used to transfer money from one place to another within a day. This is basically used to speed up the money transfer. The necessary information for the money transfer from the source bank to the destination bank is sent in the form of file on daily basis. This file contains the information like remitter details, beneficiary details and DD (Demand Draft) details, etc. 104. On line Sales and Inventory Management SystemRequirement :Java/.Net/PHP /Python

               This project is aimed at developing an on line Sales and Inventory Management System (SIMS) for a departmental store. This system can be used to store the details of the inventory, update the inventory based on the sale details, produce receipts for sales, generate sales and inventory reports periodically etc. This is one integrated system that contains both the user component (used by salespersons, sales managers inventory managers etc) and the admin component (used by the administrators for performing admin level functions such as adding new items to the inventory, changing the price of an item etc). 105. Training TrackerRequirement :Java/.Net/PHP /Python               Training Tracker is a secure on line portal that allows users to manage and control all facets of the training and knowledge of employees through one easy to use system, immediately reducing time consuming administration costs. Training Tracker provides a web-based interface and supports tasks such as on-line registration, work flow and self-service training programs. A web based tracking and collaboration system for administrators, trainers, course delegates and their nominated colleagues. The administrators can set up the details of each training program and this information can be accessed online by the trainers and delegates. Course delegates can provide and receive information. Nominated colleagues can provide appraisals of the delegates. Trainers can assess data provided by the delegates and their nominated colleaguesModules

1.      Recording Personnel Details2.      Course Details3.      Online Booking4.      Training Detail5.      System Administration6.      Reporting

 106. Budget Approval SystemRequirement :Java/.Net/PHP /Python               This project is aimed at developing a system by which the employees in the organization submit the bills to their managers. The bills could of various types and also of various amounts. The employee after submitting the bill will automatically provide the manager’s name to which the bill will be submitted. The bill will pass through a work flow process and the owner of the bill can view the status of the bill at any time. An email will be sent to the concerned people to let them know about the status of the bill. 107. On Line BankingRequirement :Java/.Net/PHP /Python               This project aims at creation of a secure Internet banking system. This will be accessible to all customers who have a valid User Id and Password.Features

1.      Balance Enquiry2.      Funds Transfer to another account in the same bank3.      Request for cheque book/change of address/stop payment of cheques4.      Viewing Monthly and annual statements.

 108. Agent-based information push mechanismRequirement :Java/.Net

               Information push mechanism is a way of pushing the information to the user who would be interested in that. This technique is widely used in web-site advertising (showing the advertisements that a user with a certain profile would be interested in, yahoo! sites for example). This technique can also be applied in other areas wherein a user with a known profile interacts with an information system (such as a website). Based on the profile and on the history of activities of the user, a behavioural profile of that user could be determined and this behavioural profile will help the information push system in determining the content that the particular user would like to view.              This project is aimed at developing an agent-based information push mechanism. In this system, an agent program would be monitoring the user’s activities (like what he types on a word document, for example) and then propose to get him some help to perform his activity in a better and easier way. This could be something like searching a repository for the documents that would help the user in preparing his current document and then providing him those documents. 109 Appraisal TrackerRequirement :Java/.Net/PHP /Python               This project is aimed at developing an Appraisal Tracker that is of importance to either an organization or a college. This Appraisal Tracker system is used to track the performance of an individual. An individual’s performance is rated by himself and his superior in the organization. The tasks for the next 6 months are set by the superior. The performance rating is done based on several attributes (like the timeliness, quality of work, communication skills etc).

110. Campaign Information System

Requirement :Java/.Net/PHP /Python 

              An insurance company wants to start campaigns for its new products to be sold to the prospective customers. Campaign means advertising of the products through channels like Tele marketing, letters, signboards, TV Commercials, etc. There are different campaigns for different products and there is a specific period for each campaign.              Before the campaign starts, estimates are made on sales to be achieved, budget allocation for each campaign and variance allowed (%) both for sales and budget. When the actual data is captured, the actual variance(%) is calculated. The difference between the actual and the estimated variance gives the insurance company an insight into their estimation and it helps in making strategic decisions about budgets and campaign periods. You have to develop the system, which captures the above functionality. It is an intranet application. 111. Change Request Tracker systemRequirement :Java/.Net/PHP /Python               This project is aimed at developing a tool for tracking the change request for any project. This tool will be an Intranet based application used by various people to track the change requests. This will have additional features like cost, mail notification, Reports per CR etc must be included in this system. Say for example the project has been estimated and being executed with 15% buffer already than if the CR are exceeding the 15% buffer than the notification of re-negotiation must be send. 112. Complaint Management SystemRequirement :Java/.Net/PHP /Python               An organization’s customers may have complaints about its products. They will be given an email id for each product, where they can send an email when they have a complaint to register. The emails will get converted to complaints and get assigned to the persons handling that product. The

complaints can be assigned to different persons and will get tracked to closure. The person handling the complaint will have the facility to communicate with the customer via emails through the system. 113. Defect Tracking SystemRequirement :Java/.Net/PHP /Python               This project is aimed at developing an on line defect tracking system useful for applications developed in an organization. The Defect Tracking System (DTS) is a web based application that can be accessed throughout the organization. This system can be used for logging defects against an application/module, assigning defects to individuals and tracking the defects to resolution. There are features like email notifications, user maintenance, user access control, report generators etc in this system. 114. Employee Cubicle Management SystemRequirement :Java/.Net/Python               This project is aimed at tracking and having the view of the cubicle and the person sitting in it. Assuming there is already system that has the cubicle numbers and the telephone number data, at the same time this system will also need to take the floor plan as input and maintain the cubicle plan and the seat numbers. The floor plan input is needed to make system more robust and adaptable to the new buildings coming up.  115. Employee Transfer ApplicationRequirement :Java/.Net/PHP /Python               Develop an Intranet Application for ABC Technologies Ltd. for maintaining information related to its employees transfer and generating the transfer related documents. This application would be facilitating the system administrator (Higher Management) to search the employees transfer record, make new transfers and also amend the allowances offered to the employee which usually depends on the post of the employee and the type of transfer he is getting.

 116. Equity Trading Portfolio managerRequirement :Java/.Net/PHP /Python 

              Equity Trading Portfolio (ETP) manager is assistant software for traders who normally do the trading though some stock brokers. These traders mostly track the share prices using News channels or news papers and place the order for stock buy or sell to stock broker. Stock broker actually does the buy or sell action on behalf of such traders. ETP manager keeps the track of share prices offline (if time permits this can be made online) and provides charts and analysis of the particular companies’ share with available data. At End of Day, the broker will update the closing stock rates to database. Similarly at Day’s open the broker will update the opening stock rates (if time permits this can be made online).   It also keeps the records of buy and sell done by the trader. This system facilitates the traders to see the DMAT allocations of trader with current price. Equity Trading Portfolio (ETP) manager is a true assistant to those traders who do not have electronic trading facility and do trading through brokers.

117. Insurance Agent’s Samurai

Requirement :Java/.Net/PHP /Python 

              The Insurance Premium calculator is a major component in the electronic Systems of Insurance Companies. The Insurance agent’s Samurai is the system meant for insurance agent that helps to

automated most of the functionalities in the insurance policy related activities. This system should have the facility to enter the customer details who wants to take an insurance scheme. The system should be able to provide necessary illustrations and calculate the premium amount. This system should also provide the facility to show the specification of premium term as per the choice of premium value to be paid. If the customer decides to go for the selected insurance plan, the system should be able to generate the filled application form in MS word format. This system an also be implemented for standalone machines. 118. Knowledge Management SystemRequirement :Java/.Net/PHP /Python               This project is aimed at developing an online intranet knowledge mgmt system that is of importance to either an organisation or a college. The system (KMS) is an Intranet based application that can be accessed throughout the organisation or a specified group/Dept. This system can be used as a knowledge/information mgmt system for the college. Students/Staff logging should be able to upload any kind of technical information. Students/staffs logging in may also access/search any information put up by others. KMS should facilitate knowledge sharing from the grass root level like project teams to the entire college. 119. Library Management SystemRequirement :Java/.Net/PHP /PythonThis project is aimed at developing an online Library Management System (LiMS) for the college library. This is an Intranet based application that can be accessed throughout the campus. This system can be used to search for books/magazines, reserve books, find out who is having a particular book, put in requests to buy a new book etc. This is one integrated system that contains both the user component and the librarian component. There are features like email notifications/reminders, report generators etc in this system. 120. On line Help DeskRequirement :Java/.Net/PHP /Python               This project is aimed at developing an Online Help Desk (OHD) for the facilities in the campus. This is an Intranet based application that can be accessed throughout the campus. This system can be used to automate the work flow of service requests for the various facilities in the campus. This is one integrated system that covers different kinds of facilities like class-rooms, labs, hostels, mess, canteen, gymnasium, computer centre, faculty club etc. Registered users (students, faculty, lab-assistants and others) will be able to log in a request for service for any of the supported facilities. These requests will be sent to the concerned people, who are also valid users of the system, to get them resolved. There are features like email notifications/reminders, addition of a new facility to the system, report generators etc in this system. 121. On line leave management systemRequirement :Java/.Net/PHP /Python               This project is aimed at developing an online leave management system that is of importance to either an organization or a college. The Leave Management System (LMS) is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the work flow of leave applications and their approvals. The periodic crediting of leave is also automated. There are features like email notifications, cancellation of leave, automatic approval of leave, report generators etc in this system. 122. Lost Articles and Letters Reconciliation SystemRequirement :Java/.Net/PHP /Python

 

              A Post Office wants to improve its efficiency by delivering the lost letters and lost articles (which are sent in parcels) in a short period of time. Currently it takes about 3 months for a lost letter or a lost article to reach the correct destination. A machine reads addresses on letters. The ones, which could not be read by machine, are sorted by human intervention. Even after this, the address is not readable, it becomes a lost letter. Articles that fall out of the parcel become lost articles. When the sender/receiver calls up or contacts the post office for their letter/article, a manual note is made and then this note is sent to the warehouse where lost articles and lost letters are kept. The reconciliation process of  finding the lost letter/article is manual and sometimes wrong letter/article(s) is sent.Modules are

➢        User and Group Master➢        Lost Articles Master➢        Lost Letter Master➢        Complaints Handling➢        Complaint Reconciliation➢        Printing Module➢        Help

 123. On line storeRequirement :Java/.Net/PHP /Python               Project captures activities performed by different roles in a real life on line store. The project gives real life understanding of an on line store and activities performed by various roles in the supply chain.Functional components of the project

·        Store·        Customer·        Store Manager·        Delivery

 124. On line Testing SystemRequirement :Java/.Net/PHP /Python               This project is aimed at developing an On line Testing System (OTS) that is of importance to either an organization or a college. On line Testing System is an Intranet based application that can be accessed throughout the organization or a specified group/Department. This system can be used to conduct tests on various topics. The system should be able to generate graphical results for better analysis. 125. On line Tickets reservation systemRequirement :Java/.Net/PHP /Python               This project is aimed at developing an online ticket reservation system for Cinema Halls. The Ticket Reservation System is an Internet based application that can be accesses throughout the Net and can be accessed by any one who has a net connection. This application will automate the reservation of tickets and Enquiries about availability of the tickets. This application includes email confirmation for the tickets. 126. Order Management SystemRequirement :Java/.Net/PHP /Python 

              A customer can have a set of digital photographs in his desktop which he/she wants to print. He/she can provide the application the path to the folder where the photographs are stored and can choose the photos that he/she wants to print and choose the size of the prints. The application will calculate the price after downloading the price information from the database for the different print sizes and show it to the user. The user will enter his/her credit card/other payment option (or choose any other mode of payment) and shipping information if he/she wants to go ahead with the order. If the credit card information is found correct, the photos are uploaded to the server and a purchase order is created in the database. 127. Patient Billing SoftwareRequirement :Java/.Net/PHP /Python

               This project is aimed at developing a patient billing software system that is of importance to a hospital. The PBS is a local software system. This system can be used to maintain the location (bed no.) of each patient either in the ward or the ICU. Information about the patient and the charges to be paid is also stored. 128. Payroll processingRequirement :Java/.Net/PHP /Python

               Consider a medium sized IT establishment which manages its own payroll requirements. This project will aim to develop an automated system to pay employees their monthly wages.              The system should store employee salary details and leave allowance. At the end of the month the system should automatically credit the employee’s bank account with their salary. Income tax and loan payments should be deducted at source and appropriate accounts credited. Salary slips should also be generated. 129. Prison management systemRequirement :Java/.Net/PHP /Python This project is aimed at developing a prison management system that is a collection of registers and reports for the effective management of prisons. This system should contain the modules like nominal roll, case register, parole register, Interview requests, In-out register and an automated release diary generator.

1.      Nominal Roll: The details of the prisoner and his/her demographic details should be captured. A digital photo comprising different views of the prisoner and the list of articles surrendered by prisoner during nominal roll are to be recorded.2.      Case register: All the details of the cases against the prisoner should be captured. This must include the sentence details, remand/conviction details, etc.3.      Automated release diary generator: This report should be display the list of prisoners to be released on a day, the next day, the next week, the next month, or any given duration of time.4.      Parole register: This module should track all prisoners on parole and provide necessary reports on this data.5.      Interview requests and In-out register: All interview requests by the relatives of the prisoners need to be recorded and tracked. An in-out register will track all prisoners and others who move in and out for various reasons6.      Various status reports and demographical analysis reports are to be generated. 

130.Recruitment Process SystemRequirement :Java/.Net/PHP /Python

 

              This project is aimed at developing a web-based and central Recruitment Process System for the HR Group for a company. Some features of this system will be creating vacancies, storing Applicants data, Interview process initiation, Scheduling Interviews, Storing Interview results for the applicant and finally Hiring of the applicant. Reports may be required to be generated for the use of HR group.Functional components of the projectThe requirements are as follows:

1.      Generic:2.      HR group:3.      Interviewer:4.      Other details:5.      Exception Allowed to the above functionalities. If email notification is not possible, then make a link in the employees (HR/Interviewer) login where all the (email) messages for them are stored. Should have the facility of reading the message and deleting them.

131. Repository and Search Engine for Alumni of College

Requirement :Java/.Net/PHP /Python                           This project is aimed at developing a repository for the alumni of the college, which is of importance to a college. The Repository and Search Engine (RASE) is an Internet based application that can be accessed throughout the World. Any one can access the search Engine to know about any Alumni of that college but can’t able to add. Alumni can only update the database when they are in the college. 132.Resume Builder ApplicationRequirement :Java/.Net/PHP /Python

               Develop an Intranet Application for Winner Technologies Ltd. for automating the process of Resume Writing. This would be facilitating the employees to make and print their resumes in a proper format. In addition, it will be facilitating the higher management to search the employees depending upon their skills sets and other attributes.              The Basic Requirement is to have a centralized repository of all the skill-holders in the organization so that an employee with a particular skill set can be immediately found in case of urgent requirement.  133. Sales and Inventory Management SystemRequirement :Java/.Net/PHP /Python

               This project is aimed at developing an online Sales and Inventory Management System (SIMS) for a departmental store. This system can be used to store the details of the inventory, update the inventory based on the sale details, produce receipts for sales, generate sales and inventory reports periodically etc. This is one integrated system that contains both the user component (used by salespersons, sales managers inventory managers etc) and the admin component (used by the administrators for performing admin level functions such as adding new items to the inventory, changing the price of an item etc).              This system runs on multiple terminals, offers a GUI interface to its users and connects to a common database(s).Main Modules are

1.      Sales person2.      Inventory manager3.      Sales manager4.      Administrator

 134.Training and Placement Dept. of the collegeRequirement :Java/.Net/PHP /Python

               This project is aimed at developing an on line application for the Training and Placement Dept. of the college. The system is an on line application that can be accessed throughout the organization and outside as well with proper login provided. This system can be used as an application for the TPO of the college to manage the student information with regards to placement. Students logging should be able to upload their information in the form of a CV. Visitors/Company representatives logging in may also access/search any information put up by Students. 135. Training Portal ApplicationRequirement :Java/.Net/PHP /Python

               Develop an Intranet Application for ABC Technologies Ltd. for automating the process of conducting Trainings.The Application has the following types of users:

1.      System Administrator2.      Instructor3.      Employee/Student (Trainee)4.      Approver

              The System Administrator can add a Course, add a schedule, modify a course, add a feedback and modify a feedback. The Instructor can generate attendance, update attendance, view feedback, view schedule, change schedule.              This would be facilitating the employees to register for the training online, Unregister; add a feedback for a particular training, View list of all the trainings attended. The Approver can approve/disapprove a particular Training. 136. Web Based Meeting SchedulerRequirement :Java/.Net/PHP /Python

               This project is aimed at developing a scheduler for group meetings. This is a web-based tool. Any user can call for a meeting and send the detailed co-ordinates of the meeting (location, date, time etc)  to all invitees. This is useful for a small office, school or a department or for that matter any group who is interested to organize it effectively. Facility to book room and editing booked room are also available.  137. Web based school administration systemRequirement :Java/.Net/PHP /Python

               This project is aimed at developing a school administration system which can streamline the administration of school. It’s often felt that the school management is chaotic  in nature. It involves many administrative work and co-ordination. This project is to develop and deploy a web based application so that the different aspects of a school administration become easy to handle. 138. Web based Stationery Management SystemRequirement :Java/.Net/PHP /Python

               This project is aimed at developing a tool for tracking the Stationery request for any Institution. Normally in any institution the request for the stationery is tracked via an e-mail or via excel sheets or

registers and this leads to tremendous wastage of resources. For example: - there may be scenarios where the quantity kept in the godown or store of the item may be more than needed and the supply of few items may be less than needed. This system will thus help in reducing the wastage at the same time look into generating reports to give a high level view to the higher management for the benefit of the organization. 139. Work PlannerRequirement :Java/.Net/PHP /Python

               Manager should be able to assign task, approve task set by team members and authorize the progress of tasks. Team members should be able to see that tasks assigned by manager, add new tasks, mark progress of assigned tasks. 140. On line AnalyserRequirement :Java/.Net/PHP /Python

               The On line Analyser includes three components namely web tracker, hit counter and real-time detailed web statistics. Just by inserting a simple piece of code on a web page it will be possible to analyze and monitor all the visitors to the website in real-time. When someone visits the website, the small piece of code is executed and the visitor's public details (ip address, browser, operating system, referrer, page title and URL etc) are analyzed and stored for reporting to the website owner later. The website owner has control on which pages he/she wants to track just by placing the code in required pages. The hit counter displays a counter on the web page. The web master has the option to choose between displaying unique visitors or page loads and also to customize the appearance such as the background and digit color for the counter to blend in perfectly with the website. 141. Office Automation ToolsRequirement :Java/.Net/PHP /Python

               The proposed system consists of the following modules

1.      Communication Utilities - Discussion Forum, Chat Utility, E-mail System2.      File Tracking System      -file moving, creating new files, attaching a file as note, sorting and searching files based on file number, date, priority and content.3.      Payroll - data collection by entering category and BP, hra, da, pf etc of each category, adding details of employee, department, designation, storing the details of all employees, storing allowances, the system should give a printable format of the pay slip.

 142. News PortalRequirement :Java/.Net/PHP /Python

               The project entitled ‘News Portal’ aims at establishing a comprehensive portal for providing news. This portal is an organized conduit and on line,for providing up-to-date news information on the Internet. The portal will consist of sections addressing different information needs. It informs,provides extensive resources, and services on line for the general public. It provides a vast range of new opportunities for feedback,customization of content,instant publishing,(hyper)linking,articles etc. It is concerned with the development of a system that is simple and easy to use yet a powerful web application for sharing,managing and controlling the news items in a secured manner.  143. Ad ServerRequirement :Java/.Net /Python

 

                The project Ad Server implements business directory service and automated hosting of advertisement in various websites. This mainly includes site promotion of small scale or medium scale industries and services. Ad Server provides both free and premium service. In free service the companies can only view their advertisements on the websites that are registered in this server. There is no option for click or registering their advertisements. The Ad Server will host their ads on websites according to the keyword that matches the category in which the company belongs to. 144. On line crime reportingRequirement :Java/.Net/PHP /Python

               The aim of the project is to develop an on line crime reporting and management system which is accessible by the public, the police department and the administrative department. The main use of on line is the public can give their report any time when the incident has occurred through on line. 145.  Web Frame WorkRequirement :Java/.Net/PHP /Python

               The project aims at facilitating the website programmer a framework where he can create web pages both static and dynamic. Our framework takes input from an xml in which the user requirements is specified in user tags. We will pass this xml file and based on the info we will create the pages needed The user has the choice of mentioning different O/P languages. It can be php, jsp or Asp.              The project will be implemented as follows. Initially we create a website. A user who needs to use our facility needs to register with our site. Once that is done he can login and upload an xml file or use the settings page to his requirements, and once he submits it,  a folder is created and provided to him. He can download the folder and can use the files for his application.. 146. Web PortalRequirement :Java/.Net/PHP /Python A portal is a user facing aggregation point where multiple, potentially unrelated functionalities and services are housed. Usually, portals are used as a gateway to consumer type of offerings such as searching, news, weather information, electronic mail, and stock prices. Portals provide a single location that users can  turn to when they are looking for information and services. Instead of spending  a lot of time searching through multiple locations, portals aggregate the relevant information at a single, easy-to-remember location.  This project represents an evolution in the portal technology, using the revolutionary Web services for its development. The proposed portal system aggregate application functionality in the form of Service-Oriented Processes (SOPs) or web services. 147.Entity Recognition on the WebRequirement :Java/.Net/PHP /Python

               Searching for information about a particular entity is the most frequent activity performed on the Web. Many a times, it's also needed to integrate information available from various online sources. The presence of multiple entities with the same name makes it difficult for a user to browse through the results. In such cases, it's often useful to be able to determine when two referents (pages) are referring to the same physical entity. But, since the web hosts massive amount of information, it's desirable to automate this process, and allow a machine to make such a distinction. In this project, we address this problem by finding suitable methods from the field of Information Extraction. The solution should be such that given the name of the entity the user is searching for, and a number of web documents obtained as a result of the search query for that name, the machine should be able to cluster together all the documents referring to same physical entity. 148..Semantic WEB

Requirement :Java/.Net 

              We need to make our websites more meaningful and understandable by machines. Internet is great source of information today. But this information is available in user readable form. Robots, search engines cat just make search over that data but they can not interpret any semantics out of that data. We want to create some client tools which can be used for annotating web sites and HTML pages with the semantics which can be read by robots. We will also look on the robots which can understand these semantics and can dynamically generate new pages and statistics using the information in annotated pages 149.Work Flow Management SystemRequirement :Java/.Net/PHP /Python               The system provides on line task management to the employees of the organization and paperless outward entries. 150.Friend FinderRequirement :Java/.Net/PHP /Python

               The Project named Friend Finder is a social networking application like Orkut, My space and Hi5 etc. The backbone of maintaining relationship between our friends, classmates and colleagues is communication between them. But today’s fastest world wants the communication between people become also fast. In this scenario social networking application, Friend Finder has to do a lot of for helping people to find their friends and maintain relationship between them. The main features of Friend Finder are  Features

1)     Mobile Alerts2)     Scrap Book3)     Chatting4)     Vacation Response

 151.Ad-Manager      Requirement :Java/.Net

                        

              The project “Ad-Manager” is a general-purpose application that is dedicated to those corporate agencies that is focused to News agency and publishing Media. In this system, the system administrator has the rights to register a new customer and modify or delete an existing customer. The customers can request for a space in any reserved publications in the software, reserve for specially positions to publish his advertisements, engage in an enquiry.

The project starts with the registration of the customer and the publishing media. Once the entire information of the client and the media is saved, it would become very handy to the media agency to track any details that that required.  Aging analysis can be generated for identifying the pitfalls with each customer.  With frequent communication, the media agency can even improve the rapport with the existing clients.Another feature of this system is the preparation of the Release orders.  While a pre formatted Release Order helps the publication to easily identify from which agency this Release Orders came from, the agency is on an advantage that Release orders can be generated at a very fast pace.  This option will feature aspects like the number of insertions to be made based on one Release order, the amount that is to be calculated based on the advertisement page and position as per the Release order, the subjective tax calculation, the amount the customer is to pay in case of split billings. 

152. AI Search EngineRequirement :Java/.Net               A meta search engine supports unified access to multiple component search engines. To build a very large-scale meta search engine that can access up to hundreds of thousands of component search engines, one major challenge is to incorporate large numbers of autonomous search engines in a highly effective manner. To solve this problem, we propose automatic search engine discovery, automatic search engine connection, and automatic search engine result extraction techniques. Experiments indicate that these techniques are highly effective and efficient. 153.College  Office automation SystemRequirement :Java/.Net/PHP /Python               College office automation System(COAS) is computer software that is used in the  College for the automation  of student enquiry,admission, payment of fees, Pending payments etc. Currently all the activities are carried out manually. The workload is very high and it takes more time to enter data in the respective books. The modules of the proposed system are as give below.              Currently all the activities are carried out manually. The workload is very high and it takes more time to enter data in the respective books.          1)Login and User Management          2)Student Module          3)Fees          4)Reports 154. Cost TrackingRequirement :Java/.Net/PHP /Python In major companies an undertaken project or an activity is divided into modules and each module is handled by different staffs at different time periods. Therefore here it is unable to calculate or predict the total effort (time of work) involved. That is difficult to calculate the estimated cost and real cost of a project or an activity.              The aim of this project is to reduce the complexity in calculating the cost of a project. The administrator can allocate each projects to his employee while doing that he can able to specify the time limit. Customer can able to register his project. Employee can able to view allotted project and able to submit daily activity              This project is aimed at developing an Cost Tracking System  for any the Organization. This is an Intranet based application that can be accessed throughout the organization. This system can be used to defining a work, staff and assign staff to a particular work and then calculate the cost of production etc. User can estimate the cost of the project at any time of its progress. To solve this problem we make use of ‘Cost Tracking’ Software. 155. Design ContextRequirement :Java/.Net/Python               Establishing the design context is very important. The context determines what is in and what is external to the system being designed.156. Development of a Budget Approval SystemRequirement :Java/.Net/PHP /Python               This project is aimed at developing a system by which the employees in the organization submit the bills to their managers. The bills could of various types and also of various amounts. The employee after submitting the bill will automatically provide the manager’s name to which the bill will be submitted.

The bill will pass through a work flow process and the owner of the bill can view the status of the bill at any time. An email will be sent to the concerned people to let them know about the status of the bill. 157. e-UniversityRequirement :Java/.Net/PHP /Python                                     The project deals with Online Virtual University. The site will provide features which are required by the Universities. The functionalities include Online Application for joining the courses of the university, Verification of the Student  Applications and finalization of the admission,  Facility to download online course materials, Provision for  Applying for the exams online and issue of Hall Tickets to the students ,Publishing  results, Maintenance of Alumni Details, Publication of Online News Letters etc. The main modules in the project are:                                                            1)Master Data Creation Module                         2) Application Processing Module                         3) Creation of Online Course Materials                           4) Alumni Students Module                         5) News Letter Publishing Module                         6) Administration Module 158. IP TVRequirement :Java                                     Here an approach for modeling live Interactive TV shows that support the definition of synchronization constraints related to events not known at authoring time. These events are structured in objects, using an object oriented paradigm, and broad casted to TV receivers as way to assure the synchronization relations 159. Knowledge BankRequirement :Java/.Net/PHP /Python               Knowledge Bank is a dedicated online site for teachers and other educators to share, discuss and collate innovative ideas and examples of "next" practices, especially those from Victorian schools. Knowledge Bank's aim is to be a credible and trusted resource for teachers and others in the emerging world of digitally-based teaching and learning. It is also a place for Victorian teachers and others, to contribute their authentic experiences, expertise and insights into educational innovations              Knowledge Bank offers Victorian teachers the means to showcase their innovative practices in teaching and learning to other teachers and educators, both in Victoria and beyond. It is also a place which facilitates pathways to professional dialogue through sponsoring events such as online conferencing, emerging technologies trials or by highlighting the latest research exploring the educational value of innovation. 160. Online ExaminationRequirement :Java/.Net/PHP                  The Online Examination System is a web based application developed in MySQL and PHP. This customized software has been developed for any students for all the courses conducted by them. This is run from an In–House Apache Web server on their internal network.                           The examination consists of different types of multiple choice questions. The questions are selected at random keeping the proper weightage for the various topics. The answers are evaluated and the marks obtained for each along with the answer given by the student are stored in the database.

                           The examiner can get the results immediately in various forms -- the general marklist, the detailed mark list where the marks obtained by the student in each topic of the subject is shown as well as the answer sheet of each student.161. Payroll SystemRequirement :Java/.Net/PHP /Python               Aim of Payroll System is to design and implement a payroll system that should accept employee hours worked, compute net pay and record all the payroll data for subsequent processing. The system should prepare pay cheque and a payroll ledger, and maintain data on a sequential payroll file. Non-statutory deductions such as union dues and pension plans to be made.“The payroll data are employee number, employee name, pay rate, and union member flag.  The year-to-date total should contain earnings, federal tax, pension plan, and union dues”. 162. Proxy FirewallRequirement :Java/.Net/Python               This a utility that allows you to monitor the sites users are browsing and what files they are downloading – in REAL TIME. In addition it can block access to adult sites as well as performing anti-virus scanning on all downloads ,is the perfect solution to transparently exercise a degree of access control over users’ browsing habits and ensure legal compliance – in a manner that will not alienate your network users. 163. Real Estate SolutionsRequirement :Java/.Net/PHP /Python               Real Estate Solutions provides a common platform for Indian property owners, potential buyers & property dealers in India so that they could do  there business in a much efficient and productive way. 164. Remote Back Up SystemRequirement :Java/.Net/Python               Remote Back up System is software that allows users to take back up for specified folder. The backup may be scheduled or Requested back up. In Scheduled back up the it is made in a particular time interval in the case of requested back up it is possible to make back up according to user.              Remote storage is a service that runs on a  Server. Remote storage constantly monitors each file’s access date. Whenever a user hasn't accessed a file for a specific length of time, it’s moved to a tape. What makes this technique so unique is that even though files that reside in remote storage exist on tape, they’re still accessible by the users. The user still sees an icon for the file in its normal location. Therefore, it appears as though the file never moved. 165. Social NetworkingRequirement :Java/.Net/PHP /Python                                     The Project named Social networking is a social  application like Orkut, My space , Face Book and Hi5 etc. The backbone of maintaining relationship between our friends, classmates and colleagues is communication between them. But today’s fastest world wants the communication between people become also fast In this scenario social networking application, Friend Finder has to do a lot of for helping people to find their friends and maintain relationship between them. 166. Taxi Booking SystemRequirement :Java/.Net/PHP /Python

              It is a software that is used for the automation of taxi booking which also provides the details about the taxi and the details about the distance. Here we can choose our own taxi based on the luxury cars or ordinary cars, according to our will. 167. Tech-MateRequirement :Java/.Net/PHP               The proposed system is called “Mobile Tech-Mate”. In the proposed system there are strictly technical persons. In existing system,there are group of friends who may or may not be technicals. But in the case of technical community,there are group of technical experts who share their knowledge with each other.This system provide the facilities such as

●        Categories the members into three groups-Platinum, Golden & Silver●        Add new member●        Submit articles●        Discussion forum●        Changing passwords●        Bidding●        Searching●        Blogs●        Member voting 

        The proposed  ‘Mobile Tech-Mate’ has  been developed in C# and SQL server 2005 .The system has been designed to have a community for  technical so that they can communicate with each other and share their works  and doubts with experts of that field so that they can do their work  more efficiently and gain more knowledge. 168. Text To SpeechRequirement :Java/.Net/Python               This project aims in creating a text to speech engine  using Java as the language. The software is to be promoted as a tool to learn the pronunciation of words and letters in English. And it can also be used as a tool to help the blind learn each letter positioning by hearing the words rather with the help of a person. 169. Vehicle Insurance ManagementRequirement :Java/.Net/PHP /Python               The aim of the project is to create a web application which performs the core processes of insurance (underwriting and rating) for the insurer. 170. Real Time Control, Monitoring And Quality Assurance Of Granite Production System                                                                                                                                                                                                               Requirement :Java/.Net/PHP /Python               The Real Time control, monitoring and quality assurance of Granite production system is a client-server application designed by keeping in view the various activities that are performed at Granite business organization. A Granite business organization which deals with Thousands of customers, called

consignee, selling granite blocks with different sizes needs a system that quickly provide services which could enhance the day to day activities of the business with efficiency and correctness.               This system is a user friendly, GUI based client/server application that will automate the different activities involved in the day-to-day activities of the business.               This Real Time control, monitoring and quality assurance of Granite production System facilitates to handle activities like production, purchases, sales, Employee management and Finance issues. This handles various quarry offices located at various places including various quarry sites and different materials.               An application for completely automating the different activities of the various departments or sections and maintain the status of different processes. The system generates Marking List report, Proforma Invoice report, Invoice report, Shipping invoice report, Packing List report, Purchase reports and various other reports. 171. Logging And Tracking Leads Generated By Campaign For An OrganizationRequirement :Java/.Net/PHP /Python               The Logging and Tracking Leads Generated By Campaign for an Organization project concentrate about the basic and necessary needs of the call-center processes as the means of service providers. That can able to maintain a complete database of its actions and utilizations. And it has an ability to manage the processes and how to assign it to the employees. It also records the responsibilities of each actions and Interactions. This project handles the processes from the campaign registration process to the report generation process. Actually this project includes the modules as Campaign module, Account module, Leads module, Task module, Import module, Admin module and Report module.               When one campaign have willing to subscribe the organizations’ services, the organization employee create the new account with their complete details for the corresponding campaign. And collect the leads from the Campaign and records as the actions and interactions. Each Campaign may have more than one lead. After entry of leads, the leads are analyzed and categorized by its service mode. Then the employee of the service provider’s organization services the leads based on the service mode. Here, they also maintain the status of each and every leads’ actions and interactions. By using the Report module, they also monitoring the campaign leads and their status easily.               As the means of the administrator point of view, the admin person have the full rights to making the decisions like who are all the users and who have the admin rights and creating the Categories, Statuses, Views, Sales Stages, Account Types, Interaction Types, Industry varieties and Print-Export rights, which are all used in the account creation process. 172 .Customer Care And Billing System For Gsm Network Operators Throughout The WorldRequirement :Java/.Net/PHP               Here the billing and customer care is automated by our system so as to make the system easy and efficient. 173. Multi Level MarketingRequirement :Java/.Net/PHP               MLM is like owning a “micro-franchise” without having to pay a huge franchising fee. Its very low cost of entry with the potential for large income. In our proposed system at first the person who wants to

join must register in the website. Registration fee is only for the first time. For rest all times, amount will be credited without any loss. Every user is identified by 9 digit unique number and the Password can be a random 6 digit number. Here only the business volume will be shown. Based on the registration membership is classified into

              a) Silver – 220B V (200 in to their account, 20 for registration)            b) Gold - 520 B V (500 in to their account, 20 for Registration)            c) Platinum -1020B V (1000 in to their account, 20 for registration)            d) Diamond – 2020 B V (2000 in to their account, 20 for Registration)

              Here we have classified the users like a binary tree. For easy communication we can call main person as Parent Node and its left person as Left Node and its right person as Right Node Parent Node can also called as SPONSOR or PLACEMENT. If the new person is added as left or left side of the parent node, in that case sponsor and placement will be the same. It is only the privilege of the sponsor to add a new member under him or placement. But the member should active only after the approval by the admin. Once the membership is approved by the admin, E-mail should send to that new member with his unique number and password. For the first login,  the member is asked to fill the bank details before further proceedings. It is possible to enter multiple bank account details. 15% is the return on every month for the investment .

174.On line OSRequirement :Java               In the proposed system we have created an Operating System that we can access by means of the internet and use it according to our need. In this way we can use the benefits of an another operating system. Here we have tried to take a small step that will change the entire view of operating system for a machine in the near future. We have created an Operating System with limited applications.               Here we have an operating system that will be in a central server. By using an internet connection and a PC he can  access that operating system and use its benefits in the same way h is using the operating system on his machine. He will have operational access to manipulating the files and folders, he will be able to use the command prompt as in XP, he can have access to office as in Linux in our designed operating system. Our proposed system will be an operating system that will be in the same way as that of other OS but the major difference that will set it aside fro another operating System is that unlike another operating system it will not have to be installed on a machine for use, we could access it from the internet. And us its features for performing operations 175. Content Management System (CMS)Requirement :Java/.Net/PHP               The Content Management System (CMS) is content management system software, implemented as a Web application, for creating and managing HTML content. It is used to manage and control a large, dynamic collection of Web material (HTML documents and their associated images). The Web CMS facilitates content creation, content control, editing, and many essential Web maintenance functions.     1.Registration  & login Module

2.Content management system module      3. Text Chat utility, and services like

4.Blog5.Poll6.Live cricket scores

  

176. IPL BidderRequirement :Java/.Net/PHP               IPL Bidder is a web based software which can be implemented in internet or intranet for bidding for a match.The employers of the organisationcan join the community and participate in bidding. If he win the bidding he willget back the money according to his percentage of contibution. The will be credicted to his account. After reaching a minimum amount he can give a request for withdrawing money.                         The administrator can post the match in the site. After the match is over the administrator will post the result of the match. The administrator can also post any special events or notices in the site so that it will be visible to all the users.                         The employers can view all the matches for today in their home pages itself. The administrator only have the privilege to post a match. If the employers are intrested they can place the bid for the matches. The employers also have the privilege to view the events posted by the administrator. Employees can request for withdraw cash from their account only after reaching a minimum amount. The main modules are listed below.

Registration and user managementmatch updatingEvents postingreportsaccounts

 177. Job PortalRequirement :Java/.Net/PHP /Python             A Job Portal is a website that facilitates job hunting. These sites are more commonly known as job boards and range from large scale generalist boards to niche job boards for job categories such as engineering, legal, social work, teaching . Users can typically deposit their resumes and submit them to potential employers, while employers can post job ads and search for potential employees. The success of jobs search engines in bridging the gap between job seekers and employers has spawned thousands of job sites, many of which list job opportunities in a specific sector, such as education, health care, hospital management, academics and even in the non-governmental sector.                                     This website is providing employees to register in the site and search for new jobs, upload their resume. The employers can post new openings and search employees in the sites, view resumes of employees, send mails etc. The users of the site are administrator, employees,  employer.   The major modules are:

 RegistrationMail notificationSearchReportsUpload

 178. On line TempleRequirement :Java/.Net/PHP /Python The website is mainly aiming the keralites who are living outside of Kerala. This site will provide giving Online Hindu Puja or Pooja and  other Puja related services to all devout around the world. The venture was started for providing Puja or Pooja services to those persons who due to any reason (may be for the matter of distance) can not reach those temples frequently but needs to offer Puja there.The website will provide users to offer Poojas at some of the most sacred temples in Kerala. The After- Puja- Upachars

will be sent to  user  address,if you live at a distant place or if it is not possible for you to come at the temple physically. The temples can register in the site and give the details about the poojas and its expenses. While the user is logging in the site he can view the poojas and he can book for poojas .The amount for the pooja will be reduced from his accounts.                                The major modules are: 

RegistrationUser ManagementTemple Management Pooja ManagementAccounts

 179. Rend a CoderRequirement: Java/.Net/PHP /Python               Rent a coder is a web based software to help freelance programmers to get projects. The free lance programmers can register in this site and bid for the various projects that are posted by various persons/organisations. The organisation will review all the bids for their post and select one and handover the project. This web site will act as an intermediate between freelance programmers and organisations.  This site will help the organization to find free lance programmers to do their projects.               Finding the right professionals to work on project or business has never been easy or cheap until now. The Organisation is free to post as many projects as they want, totally free. Post project, choose the bid, and get that work done. Organizations can manage the project easily using this web based software.               Register for free in as many categories as freelancer want. Bid on as many as they want.Modules 

·        Registration and login·        projects administration·        Forum·        chat·        user management

 180. Student Quality ManagerRequirement: Java/.Net/PHP /Python The project entitled Student Quality Manager is a web based application. Student Quality Manager deals with entire monitoring procedures of Kites Innovative Solutions which is a sister concern of KITES Softwares Pvt. Ltd. This system has its own salient features like online enquiry for students, staff registration, student registration, attendance for student, work assessment for staffs etc.The important goals of Student Quality Manager are, 

●        Enquire about projects●        Online registration for students●        Attendance report for HODs●        Posting reports about the works by staffs●        All information can be easily updated●        Minimize the time span

●        Chat Facility for student/staff●        Send Mail/SMS to students

 181. Tour De WorldRequirement :Java/.Net/PHP /Python

               The website is  for tourists or travellers that provides details about a geographic location, tourist destination. It will usually include details, such as phone numbers, addresses, prices, and reviews of hotels and other lodgings, restaurants, travels, airlines and activities.  Administrator will approve requests from different type of users like hotels, travels, airlines. User will be able to search the locations, schedule of travels, availability of seats etc. The website have the power to manage schedules effectively. Users like hotels, airlines, travels will request to the administrator telling about their terms and conditions, expense for travelling etc. After the administrator will satisfy with the terms and conditions, then only he will approve the requests and give their login details via e-mail.                            The major modules are:

●        Registration

●        Search

●        User Management

●        Schedule Management

182. I-Max OnlineRequirement :Java/.Net/PHP /Python              I-Max Online is a website used for Online cine ticketing system. The website will  provide user entertainment-related information, pricing, availability and reservations for cinema ticket  across cities and rural areas throughout Kerala. In this site user can register and reserve tickets,rate movies,post comments and also request for fan clubs. Administrator can manage theaters,movies,reservation details and fan club requests. Users may elect to submit their opinions regarding movies found on the website typically, this is done in the context of chat rooms, forum discussions. These Users’ comments or opinions are meant to be informative for fellow Users who elect to read or use them.The major modules are:

·        Registration·        Reservation·        Administration·        Discussion forum·        Movie Rating

 183. CORE BANKINGRequirement :Java/.Net/PHP /Python               Core Banking solutions are banking applications on a platform enabling a phased, strategic approach that lets people improve operations, reduce costs, and prepare for growth. Implementing a modular, component-based enterprise solution ensures strong integration with your existing technologies. An overall service-oriented-architecture (SOA) helps banks reduce the risk that can result from multiple data entries and out-of-date information, increase management approval, and avoid the potential disruption to business caused by replacing entire systems. Core banking is all about knowing customers' needs. Provide them with the right products at the right time through the right channels 24 hours a day, 7 days a week using technology aspects like Internet, Mobile ATM.

Core Banking Solutions is new jargon frequently used in banking circles. The advancement in technology, especially internet and information technology has led to new ways of doing business in banking. These

technologies have cut down time, working simultaneously on different issues and increasing efficiency. The platform where communication technology and information technology are merged to suit core needs of banking is known as Core Banking Solutions. Here computer software is developed to perform core operations of banking like recording of transactions, passbook maintenance, and interest calculations on loans and deposits, customer records, balance of payments and withdrawal are done. This software is installed at different branches of bank and then interconnected by means of communication lines like telephones, satellite, internet etc. It allows the user (customers) to operate accounts from any branch if it has installed core banking solutions. This new platform has changed the way banks are working.

 

184.E-LibraryRequirement :Java/.Net/PHP /Python              Libraries inform their users of what materials are available in their collections and how to access that information. Before the computer age, this was accomplished by the card catalogue— a cabinet containing many drawers filled with index cards that identified books and other materials. In a large library, the card catalogue often filled a large room. The emergence of the Internet however, has led to the adoption of electronic catalogue databases , which allow users to search status from any location with out going to library. E-Library is a web based software application used for  knowing status of Library  through Internet .  Administrator can enter the record of new books and retrieve the details of books available in the library, issue the books to the users and maintain their records and can also check how many books are issued and stock available in the library. In this project we can maintain the late fine of users who returns the issued books after the due date.User can search books and reserve books through Internet . When the due date is coming it will send alerts to user.Modules:1.      Registration2.      Search3.      Mail alerts4.      User administration5.      Managing books  

     Project List                              70