Vous êtes sur la page 1sur 71

S.

NO Project Title Page


1. Integration of Watermarking and Cryptography Techniques for 4
Electronic Management of Copyright in Open-Networks ( J2EE )
2. Lightweight Directory Access Protocol -Browsing And Access 5
Management System Using JNDI ( J2EE )
3. Sustaining the availability of commercial Web Services against 6
Distributed Denial of Service attacks ( J2EE )
4. Network Monitoring and Management using SNMP Protocol 7
( JAVA )
5. Segment based Streaming proxy in an enterprise Environment 8
( JAVA )
6. Design and Implementation of J2EE Design Patterns in multi-tier 9
Enterprise Applications ( J2EE )
7. Content Distribution Networks (J2EE) 10

8. Internet and Mobile Banking System ( J2EE ) 11

9. Distributed Heterogeneous Database Driver based on Corba 12


( JAVA )
10. Expert Knowledge assessment system based on automata ( J2EE ) 13

11. Advanced Data Preprocessing for Web Usage Mining ( JAVA ) 14

12. Session based Peak load management system for commercial web 15
server ( J2EE )
13. SNMP based Network Management Tool for Fault Isolation, 16
Detection and Recovery ( JAVA )
14. Web based Remote database Administration ( J2EE ) 17

15. Image Pattern Search in a Distributed Database( JAVA ) 18

16. Open Grid Services Architecture for Healthcare ( J2EE ) 19

17. Single-Sign-On Authentication System( J2EE ) 20

18 E-Business Information Sharing using Extranet ( J2EE ) 21

19 Distributed Network services using jini ( JAVA ) 23

20 Distributed Message integrity protocol ( JAVA ) 24

21 Efficient video streaming based on cache Servers ( JAVA ) 27

1
22 Stegnography based on JPEG 2000 images ( JAVA ) 27

23 Integrated data migration ( JAVA ) 28

24 Dynamic and Temporal role based access control for enterprise 31


system ( J2EE
25 Secure E-Voting ( J2EE 33

25 Improving availability and performance with application specific 34


data replication ( J2EE )
27 Robust and Secure Secret Distribution system ( JAVA ) 35

28 A Data Mining Algorithm for Generalized Web Prefetching 36


( J2EE )
29 An expiration age based document replacement scheme for web 37
catching ( J2EE )
30 Efficient Dissemination of Personalized Information Using 38
Content-Based Multicast ( JAVA )
31 Database replication based on total order broadcasting ( JAVA ) 39

32 Reputation based Trust establishment in peer-to-peer electronic 40


systems (JAVA )
33 Learning Management System ( J2EE ) 41

34 Project Status Reporting and Auditing System( J2EE ) 44

35 Trust Management in E-Commerce ( J2EE ) 45

36 E-Police Crime Investigation System ( J2EE ) 46

37 Integrated on line Booking ( J2EE ) 48

38 Self-Organized Public-Key Management for Secure Mobile Ad 50


Hoc Networks ( JAVA )
39 Efficient and Flexible Digital Money Payment in Internet based 51
Online Transactions ( J2EE )
40 Querying Multimedia Database using Fuzzy Logic ( JAVA ) 52

41 Design and implementation advanced transactions in EJB 53


Component Model ( J2EE )
42 ATM Card Management System ( J2EE ) 54

2
43 B2B Integration using Web Services ( J2EE ) 55

44 Extended database security design and implementation ( JAVA ) 56

45 Active searching and browsing of compressed video database 57


( JAVA )
46 Efficient News Video Querying and Browsing Based on 58
Distributed News Video ( J2EE )
47 Distributed Resource Searching and Sharing on Peer-to-Peer 59
Networks ( JAVA )
48 Peer to Peer Video Distribution management system using JXTA 60
( JAVA )
49 User Centric transactions on web Database ( J2EE ) 61

50 Workload-Aware Load Balancing for Clustered Web Servers 62


( J2EE )
51 Building a Multiple-Criteria Negotiation Support System ( J2EE ) 64

52 .Resource Allocation for Session-Based Two-Dimensional Service 65


Differentiation on e-Commerce Servers ( J2EE )
.Relying on Safe Distance to Achieve Strong Partitionable Group 66
53 Membership in Ad Hoc ( JAVA )
54 Service-mining Based on the Knowledge and Customer Databases 67
( J2EE )
55 Stock monitoring using mobile ( J2M2 ) 68

56 Sales force automation system ( J2EE ) 69

57 Anti Money Laundering System – Detection and Solution ( J2EE ) 70

3
Integration of Watermarking and Cryptography Techniques for Electronic
Management of Copyright in Open-Networks
AREA: Network Security
ABSTRACT: The development of an Electronic Copyright Management System(ECMS)
to be used in open-network environments is becoming more and more urgent due to the
crucial role copyright protection plays in the diffusion of network multimedia services.
Watermarking is often invoked as a tool for the protection of Intellectual Property Rights
(IPR) of multimedia data distributed in digital form. A new system is presented which
integrates state-of-the-art water-marking with cryptography techniques to enable IPR
protection in open-network environments. Digital watermarking has recently been
proposed as an effective solution to copyright protection of multimedia data. A digital
watermark is unperceivable embedded into the data in such a way that a given piece of
information, which gives identity of the owner or of the authorized consumers, is
indissolubly tied to the data itself. Later on, such an information can be used to prove
ownership, to recognize the identity of a misappropriating person, to trace the
dissemination of the marked work through the network, or simply to inform users about
the identity of the rights-holder or the allowed use of data. The proposed system is a self-
contained one, in that, at any given time, the information needed to prove the legal/illegal
use of the data is hidden within the data itself, whereas no attempt is made to trace
previous abuses. Particular care is paid to grant to all the actors involved in the
distribution of the protected material the possibility of demonstrating the legitimate use of
the data in their hands. The proposed system uses both watermarking and cryptography
techniques to improve efficiency of the ECMS.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Applets, JDBC, J2EE
Web server : Tomcat 5.5
Operating System : Windows 2000
Backend Database :MS-Access

4
Lightweight Directory Access Protocol -Browsing And Access Management
System Using JNDI
ABSTRACT :
With rapid advancement in Technology, computer applications have become more
distributed, the efficient management and distribution of the information upon which they
depend becomes more and more of a problem. Directory service is a vital component of
network computing. By using a directory service, we can simplify applications and their
administration by centralizing the storage of shared information. As the use of the Java
programming language to write practical applications in a network environment increases,
the ability to access directory services will become essential. Directory services such as
LDAP (Lightweight Directory Access Protocol) address this problem. Lightweight Directory
Access Protocol (LDAP) is a fast growing technology for accessing common directory
information on a distributed network environment. LDAP has been embraced and
implemented in most network-oriented middleware. As an open, vendor-neutral standard,
LDAP provides an extendable architecture for centralized storage and management of
information that needs to be available for today’s distributed systems and services. The main
objective of the project is to develop a Client side Browser that can be connected to a
Directory server and access information that is organized in the directory. An important
application of this project is that User Specific Information can be retrieved in a very quick
way because directories are optimized for high volume lookup. The Project incorporates four
modules. They consist of a) Binding a Client to the server (With simple authentication), b)
Anonymous and Managerial User Functions, c) Search operations by adding various Filters
and for performing LDIF (LDAP data interchange format) operations like Importing and
exporting of data.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net.JNDI
Operating System : Windows 2000

5
Sustaining the availability of commercial Web Services against Distributed
Denial of Service attacks
Abstract : The objective of this project work is to design an effective and practical
counter measure that allows a victim system or network to sustain high availability
during such attacks. In particular, we propose a DDoS defense system for sustaining the
availability of web services. Protecting web services is of paramount importance because
the web is the core technology under-lying E-commerce and the primary target for DDoS
attacks. When a DDoS attack occurs, the proposed defense system When a DDoS attack
occurs, the proposed defense system ensures that, in a web transaction, which typically
consists of hundreds or even thousands of packets from client to server, only the very first
SYN packet may get delayed due to packet losses and retransmissions. Once this packet
gets through, all later packets will receive service that is close to normal level. This
clearly will lead to significant performance improvement. The basic idea behind the
proposed system is to isolate and protect legitimate traffic from huge volumes of DDoS
traffic when an attack occurs. Our first step is to distinguish packets that contain genuine
source IP addresses from those that contain spoofed addresses. Redirecting a client to a
new IP address and port number through a standard HTTP redirect message does this.
Part of the new IP address and port number will serve as a Message Authentication Code
(MAC) for the client’s source IP address. Packets from an attacker who uses spoofed IP
addresses will not have the correct MAC since the attacker will not be able to receive the
HTTP redirect message. This newly designed system that effectively sustains the
availability of web services even during severe DDoS attacks. Our system is practical and
easily deployable because it is transparent to both web servers and clients and is fully
compatible with all existing network protocols. Since the web is the core technology
underlying e-commerce and a primary target for recent DDoS attacks, this work offers a
practical solution to a very important security problem.
Software Requirements:
Language : Java JDK1.5,HTML
Java Technologies : Applets, JDBC, Servlets, JSP
Web server : Tomcat 5.5
Operating System : Windows 2000

6
Network Monitoring and Management using SNMP Protocol
Area : Network Management

The Simple Network Management Protocol (SNMP) is an application layer protocol that
facilitates the exchange of management information between network devices. It is part
of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP
enables network administrators to manage network performance, find and solve network
problems, and plan for network growth. An SNMP-managed network consists of three
key components: managed devices, agents, and network-management systems(NMS).A
managed device is a network node that contains an SNMP agent and that resides on a
managed network. Managed devices collect and store management information and make
this information available to NMS using SNMP. Managed devices, sometimes called
network elements, can be routers and access servers, switches and bridges, hubs,
computer hosts, or printers. An agent is a network-management software module that
resides in a managed device. An agent has local knowledge of management information
and translates that information into a form compatible with SNMP. An NMS executes
applications that monitor and control managed devices. NMSs provide the bulk of the
processing and memory resources required for network management. One or more NMSs
must exist on any managed network.

 Monitor & Manage the Network.


 Administrators are able to work more intelligently.
 User interface with dynamic views to show device status
 The network and its associated resources and distributed applications become
indispensable to the organization.
 Detection of Network Components
 Detection of Hardware details in a particular Win32 system.
 Retrieval of various SNMP parameters
 Report Generation
 Graphing all network components with its details

software specifications:
Language : Java JDK1.5
Java Technologies : Java.net

7
GUI Tool : NetBean 5.5
Operating System : Windows 2000

Segment based Streaming proxy in an enterprise Environment

ABSTRACT: In streaming video applications are commonly used by most clients to


watch video. The so far, implemented streaming functionality, however, presents
many technical challenges at the client, server and the network, that have not yet been
efficiently resolved. To provide efficient streaming to the client is the goal. The client
in a distributed environment is connected to the server through a network The edge
router called here as Co-ordinator Node (CN) of the network relieves the server of its
process and responds to the request for streaming as requested by the client.

Project description

• Digital video enables quick and user friendly browsing of multimedia content,
thus is highly desirable in streaming video application. I propose to implement
efficient streaming video system over a distributed network.
• The success of peer-to-peer (P2P) applications in both commercial and research
fields received attention. The reduced bandwidth and caching cost for media
streaming thereby, provided a means for efficient streaming functionality.
• This concept relies on the Co-ordinator Node(CN) which is an edge router of the
network connecting to the p2p network i.e, Client Group
• Distributed Cache - sharing of the storage resources, thus the storage of one client
is made use by the needy in the group.
• The Co-ordinator Node takes care of the content distribution apart from normal
routing.
• During the first request of any media file, by any client, the CN obtains the video
segments from the server and places the segments in the distributed cache.
• Later when client requests for a streaming, the required frame segments are
provided by peer client as directed by the CN.
• Hence the network latency, network bandwidth, storage etc., are not significant
issues any more.

software specifications
Language : Java JDK1.5
Java Technologies : JDBC,Java.net,JMF2.0
GUI Tool : NetBean 5.5

8
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access

Design and Implementation of J2EE Patterns in multi-tier Enterprise


Applications

Abstract : A J2EE design pattern describes a proven solution to a recurring design


problem, placing particular emphasis on the context and forces surrounding the problem,
and the consequences and impact of the solution. This project provides a palette of
patterns you can use in the context of designing Java 2 Platform, Enterprise Edition
(J2EE) applications. Patterns reflect the experience, knowledge and insights of
developers who have successfully used these patterns in their own work. Patterns
provide a ready-made solution that can be adapted to different problems as necessary.
Patterns provide a common vocabulary of solutions that can express large solutions
succinctly. It is important remember that patterns do not guarantee success. A pattern
description indicates when the pattern may be applicable, but only experience can
provide understanding of when a particular pattern will improve a design. Patterns can
be used effectively to improve the efficiency, performance, and user experience of a J2EE
application. Multitiered J2EE applications consist of components communicating across
tiers to access/change data. This often leads to remote calls between application
clients/JSPs/servlets and EJBs or between EJBs.The design patterns suggest good
solutions to minimize some of the performance costs in typical J2EE applications.

Software Requirements:
Language : Java JDK1.5, HTML
RDBMS : Oracle 9i
Development Methodologies : OOAD, UML &Unified process
Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1, JSP
Application Server : Weblogic8.1
Platform : WINDOWS NT/2000

9
Design and Implementation of a User-Centered Content Distribution
Network
Abstract: Content delivery networks are quite popular among administrators of large
Web sites. However, servers holding open-source content and small businesses may
prefer a cheaper, yet efficient, solution. We believe that such users are willing to
contribute their unused resources to the community in exchange for improved
performance for their own site. We propose a decentralized scheme where the owner of a
Web site can accept to host replicas from other sites, and obtain in return the ability to
deploy replicas of his own documents at remote places. This allows administrators to
independently organize a service similar to that of commercial CDNs. This approach is
attractive, since it allows one to acquire valuable remote resources in exchange for
relatively cheap local resources. Globule is a user-centered content delivery network that
our group is developing . It allows Web servers to host each other’s replicated Web
documents. To favor integration into existing Web systems, it is designed as a module for
the popular Apache server. This project presents the design and implementation of
Globule, together with performance measurements. Unlike most Web replication systems,
Globule does not apply a fixed replication policy to all documents. As we have shown in
previous research, there is no single policy that is best in all cases. This statement is true
even for simple Web documents that are constructed as a static collection of HTML files,
images, icons, and so on. As a consequence, Globule contains a multitude of replication
policies, and associates each document with the policy that suits it best. This is realized
with an object-based approach in which each document is encapsulated in an object that
is fully responsible for its own distribution. In other words, eachWeb document is
considered as an object which does not only encapsulate its state and operations, but also
the implementation of a replication policy by which that state is delivered to clients. This
allows a document to monitor its own access patterns and to dynamically select the
replication policy that suits it best.
Software Requirements:
Language : Java JDK1.4

10
Java Technologies : Servlet, JSP, JDBC and Tomcat Server
Operating System : Windows 2000

INTERNET AND MOBILE BANKING SYSTEM

ABSTRACT : Now a days, the bank customer who is everything based on the
bank and can’t able to involve in the bank process. This Problem can be solved through
Internet and mobile System. The main aim of this project is to computerize the Bank
Process, which is used to reduce the customer transaction time as well as user can able to
access from anywhere using internet and mobile.
Internet and mobile banking people from every corner of the world can able to
view his account details. This system also used to transact money to another client over
the Internet and mobile. The user can verify his Cheque and demand draft details if
another person may pass a demand draft or cheque.
It provides a system for the user to access his bank account through his Internet
and mobile. The system also enables the user to pay his bill through the Mobile as well as
pay for some other services, which he has availed. The Internet and mobile banking
system is not just for payment but a user of the system can also transfer money through
the system. He can receive from his bank or from his business associates or friend or
other person who is also connected to the system.

software requirements

Language Java JDK 1.5


Browser Nokia Simulator 4.0/Internet Explorer 5.0
Server side programming JSP, JDBC and Servlets
IDE NetBean 5.5
Database MS-Access
Client side scripting HTML,WML, WML-Script
Web Server Apache Tomcat 5.5

11
Distributed Heterogeneous database drive based on CORBA

Abstract:

The main goal of this project is creating the database driver for controlling remote
database using distributed object technology through Network. Distributed driver
supports various SQL commands like c
reate, insert, delete, update and view tables in a remote machine in user-friendly
manner. Using these driver users can flexibly change the database without changing the
driver. The concept used for creating and maintaining the remote database access using
CORBA. CORBA based driver is language and platform independent and it supports
different databases accessed from any remote locations within the internet. A CORBA-
based system is a collection
of objects that isolates the clients from the servers by a well-defined encapsulating
interface Implemented by Interface Definition Language.
The entire request is managed by the ORB. In other words, every invocation (whether it
is local or remote) of a CORBA object is passed to an ORB. CORBA based driver also
supports multiple heterogeneous databases so that it acts as database independent driver.
Since the driver is developed based on CORBA clients can be develop in any language
and platform supported by CORBA specification.

Software Requirements:

Language : JDK1.5
Java Technologies : Swing, JDBC and Java ORB
IDE : NETBEAN 5.5
Database : Oracle, MS-Sql Server, MS-Access
Operating System : Windows 2000/NT

12
Automata based Expert Knowledge Assessment System

Abstract: : A teacher assesses a student’s knowledge in a specified field by posing a


suitable first question from that field to the student by checking whether or not the
student’s answer is correct, and by selecting a new question dependent on the student’s
answer. The teacher selects all further questions corresponding to the student’s answers to
previous questions. In that manner, questions, which are too difficult or too easy for the
individual student, are avoided. The querying stops whenever the teacher has sufficient
information on the student’s state of knowledge.
In this project can be applied to construct efficient algorithms for the adaptive
assessment of the student’s knowledge. The problem of knowledge assessment is a
special case of the problem of assessing the state of a system. The assessment procedure
poses questions to individual students and determines the student state of knowledge. At
each step of the procedure, a questioning rule is used to select the next item to be tested.
Depending on the student’s performance, state of the assessment system is changed using
an update rule. Evaluation system uses the framework of the theory of finite automata.
These results are obtained suggesting a new assessment algorithm whose formal
equivalence to previously suggested assessment algorithms is proven.

Software Specification:

Platform : Windows 2000/NT


Language : Java (JDK 1.5)
GUI : Java Applets, HTML
Server side Technologies : Java Servlets 2.1, JDBC 2.0, JSP
Server : Tomcat 5.5
Database : Oracle 9i

13
Advanced Data Preprocessing for Web Usage Mining
Abstract :
To design popular web sites, publishers must understand their user’s needs. So analyzing
user’s behavior recorded in web server log files are an important part of the design. Web
usage mining applies data mining procedures to analyze users access of web sites. As
with any knowledge discovery and data mining process, web usage mining contains three
main steps: preprocessing, knowledge extraction and results analysis. The concept of web
usage mining comes into play in case of networks where in there is an administrator
monitoring the activities of the user. Most servers have efficient methods for maintaining
the log information. But the drawback is in the representation of such details. The servers
monitor such logging information and maintain the details using special log files. These
files however represent information in form of raw textual data which is very difficult for
the users to understand.
The entire purpose is lost when the maintained files are in form of raw data,
which is extremely difficult to understand. Our tool will perform an efficient parsing on
the log file to store information onto convenient data structures in an explicit manner. The
GUI presents the user with an interface, which enables the user to query the information
stored in the log file. The user is allowed to specify filter variables on the basis of which
the entire domain of data is filtered and displayed to the user according to his need. Our
tool’s interface depicts a SQL command with graphical components such as buttons, text
fields, combo boxes, tables, etc. to perform the querying.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing
Web Server : Tomcat 5.5
IDE : NetBean 5.5

14
Operating System : Windows 2000/NT

Session based Admission Control: Peak Load Management of Commercial


Web Sites
Area: Internet
Abstract: As the internet matures, companies are implementing mission critical
applications. These applications provide dynamic content, integrate with database, and
offer secure commercial transactions. Customers are becoming increasingly reliant on
this complex business application for services such as banking, product purchase, and
stock trading. These new services make great demands on web servers at a time when
traffic is increasing rapidly, making it difficult to ensure an adequate level of service.
Commercial applications impose a set of additional service level expectations.
Access to webs service occurs in the form of a session consisting of many individual
request. Placing an order through the web site involves further request relating to
selecting a product , providing shipping information, payment arrangement and finally
receiving a conformation. So in this project we show that an overloaded web server can
experience a severe loss of throughput as a number of completed sessions compared
against the server throughput measured ser second. Statistical analysis of completed
sessions reveals that the overloaded web server discriminate against longer sessions. To
improve the QoS for commercial web servers we implement session based admission
control to prevent a web server from becoming overloaded and to ensure that longer
session can be completed. This provides a fair guarantee of completion.

Software Requirements:

Language : Java JDK1.5,HTML


Java Technologies : Applets, JDBC,Servlets, JSP
Web server : Tomcat5.5
Operating System : Windows 2000

15
SNMP based Network Management Tool for Fault Isolation, Detection and
Recovery
Abstract:
The main objective of this project is to design and development of network
management tool for network fault detection, isolation and recovery. The system uses
SNMP protocol to identify any fault occurs at any layer of internet protocol and this
model captures information related to the network Services, layers, nodes, and functions
in a systematic fashion. The use of a layered approach will precisely generate answers for
queries the operators typically have for quickly detecting, isolating and correcting faults.
A graphical interface model will automatically generate the related graphs to find out any
fault occurs within the network. Our model gives the user interface for presenting the
information generated from the graphs, at the operation time. A database also maintained
to store the details for future reference.
Network management allows a centralized network node, called the Network
Management System (NMS), to monitor and control other links and nodes of the
network. Monitoring is needed to detect any failures, to collect performance data to fine-
tune the network, and to provide resource usage information for billing purposes. Control
is needed to reconfigure the network and to take corrective steps, reacting to the various
failures. These corrective steps could be automated response from the NMS or human-
generated commands for diagnostics, tests, and resetting.

Software Requirements

Language : Java JDK1.5


Java Technologies : Java.net, Swing
IDE : NetBean 5.5

16
Operating System : Windows 2000

WEB BASED REMOTE DATABASE SERVER ADMINISTRATION


Abstract:
Web based remote database server administration is a complete database server
access system from any location around the globe over the internet. The main
functionality of the software is as follows,
 Remote login enable the admin to access the database from any location.
 Create, insert, delete, update and view tables could be done in a remote machine
in user-friendly manner.
 Multiple database support – Oracle, MS-SQL, MySQL
 Mandatory access control policy is supported to restrict the user access level.
There are three access levels a) Operation level b) Table level c) Database level
 It can be used to technical person to fix the problems on web server without
appear on that machine.
 Remote Database Administration (DBA) services, as a means to reduce IT
expenses is the order of the day.
 Remote rendering of DBA services results in improved system performance,
enabling high efficiency and lower cost of operation. Gain a predictable annual
budget for database administration
 Reduce DBA expenses: salary increases, benefits, recruiting, and training
Software Requirements:
Language : JDK1.5
Java Technologies : Swing, JDBC, Servlets
IDE : NETBEAN 5.5
Web Server : Tomcat5.5

17
Database : Oracle, MS-Sql Server, MS-Access
Operating System : Windows 2000/NT

Image Pattern search in distributed Image Database

ABSTRACT:

The main objective of this project is to treat image as a basic


component of information interchange. An image database system is a
combination of three basic components. First is the extraction of information from
physical images, the second one is responsible for the storage and management of
original images and the extracted information. The third component concerns
querying the database. An image is associated with two kinds of descriptors, viz.,
information about its content and information related to the spatial arrangements
of its pictorial elements. To make the image database flexible, the spatial
knowledge embedded in images is preserved by the data structures used to store
them. Retrieving pictures that satisfy high-level spatial queries is an important
issue of this project. Retrieve images based on the patterns in distributed
databases. Pattern will be searched in Multiple database in a networked
environment Image processing facilities also be included to store and retrieve
analysed data

Software used in the project:


Platform : Windows 2000/NT

18
Language : Java (JDK 1.5), JDBC 2.0
Database : Oracle 9i
GUI : Swing
IDE : NetBean 5.5

Open Grid Services Architecture for Healthcare ( J2EE )


Abstract:
The Internet is still used primarily for person-to-person communications, with computers
storing and delivering information that is meaningful only to humans. Emerging Web
services provide a framework for application-to-application interaction that grants access
to business-to-business, e-science, and e-government services over the Internet. These
services will allow a more extensive use of the Web’s functionality by supporting
automated processes involving machine-to-machine cooperation and interaction. In the
meantime, a significant network infrastructure for exchanging programs and computing
services as well as data is emerging.

This infrastructure – the Grid – supports the creation of integrated computing


environments in which distributed organizations can share data, programs, and computing
nodes to implement decentralized services in science and business. In short, we can
consider the Web an “information Grid” and the Grid an “extended Web“ that goes
beyond information sharing to allow users to share computer resources. Just as the Web
grew from an infrastructure for scientific collaboration to a major communication
medium for e-business, the Grid might find its main arena in commercial distributed
applications (business-to-business, e-commerce, enterprise computing, and so on).
OGAS( Open Grid Services Architecture) is based on web services WSDL,UDDI, SOAP
and XML. This project implements medical grid.

Software Specification:

19
Platform : Windows 2000/NT
Language : Java (JDK 1.5)
Server side Technologies : Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Web Services : XML,WSDL,SOAP and UDDI
Server : Weblogic 8.1
Database : Oracle 9i
Single Sign on authentication
ABSTRACT :
With the increasing use of distributed systems users need to access resources that
are often remote. Traditionally users have had to sign-on to multiple systems, each of
which may involve different usernames and authentication techniques. In contrast, with
single sign-on, the user needs to authenticate only once and the authenticated identity is
securely carried across the network to access resources on behalf of the user. To solve
these problems by letting individuals log in to many Internet services while
authenticating only once, or at least always in the same way.
Enterprise hope that single-sign-on protocols will significantly decrease customer-care
costs due to forgotten passwords and increase e-commerce transactions by enhancing the
user experience. Commercial interest centers on distributed enterprises and on small
federations of enterprises with existing business relationships, such as supply chains. To
use sign-on protocol, an individual registers with a so-called identity provider. The
identity provider will later be the only party to directly authenticate the user, either
globally or within a federation of enterprises. This confirms the user’s identity to the
other parties, or service providers.

Software Requirements:

Language : JDK1.5
Java Technologies : Swing, JDBC, Servlets
IDE : NETBEAN 5.5
Web Server : Tomcat5.5
Database : MS-Access

20
Operating System : Windows 2000/NT

E-Business Information Sharing using Extranet

An extranet is like a “private” business club. It provides a central location for forging
deals, collaborating with outside companies, and transacting business with existing
trading partners. In an extranet, however, the “club” operates on-line and, since it uses the
same user-friendly technology that has made the Internet a global network, its “members”
can include companies of all sizes located in virtually every corner of the world.
The Project “E-Business Information Sharing using Extranet “ is aimed at to
make Car Company business dealing with the various business partners like Supplier,
Distributor, banker etc. through extranet. This Project is a part of an ongoing web
application Project. This Project provides more reliable security for the e-business
contributors.
The proposed system overcomes the drawbacks of existing client/server by
implementing Multi-tier Architecture in which the Business logic is completely separated
from the client and it forms the middle layer between the client layer and the data access
layer. Since the business logic is separated from the client any changes that has to be
made to the business logic can be made easily within short span of time.
The system is, basically a multi-tier, distributed, enterprise oriented one. It has the
features of working in a heterogeneous network, i.e., all the branch offices of the
enterprise are globally connected to a centralized server in a secured network. The Project
is based on an extranet through the Internet. The communication between the client and
the server happens through the Internet but only the authenticated users i.e., the
employees of the company have access to the system. Hence the system is secured from
unauthorized access.

21
Since all the offices are globally connected the current status of any particular
company is available at any time, which is very helpful to make effective management
decisions thus offering a competitive edge over the other enterprises.
The proposed system perfectly suits the heterogeneous network of systems as it is
developed using the platform independent enterprise solution the Enterprise Java Bean
Technology.

The following are some of the advantages of the proposed system:


•Platform independence.
•Highly secured.
•Suits well for distributed enterprise application.
•To control traffic replication of middle-tier can be done.
•Re-compilation of the components not needed.
•High processing speed.
•Simultaneous access of shared data.

software specifications

Language : JDK1.5 , HTML


Java Technologies : Applets,JDBC,JNDI,Servlets & EJB
Application Server : Weblogic 8.1
Designing Tool : Rational Rose 2000
GUI Tool : NetBean 5.5
Browser : Internet Explorer 5.1 & Netscap Navigater
Operating System : Windows 2000
RDBMS : Oracle 9i

22
Distributed Services using JINI (Distributed Objects)
Abstract:
Jini is the name for a distributed computing environment, which can offer ``network
plug and play’’. A device or a software service can be connected to a network and
announce its presence, and clients that wish to use such a service can then locate it and
call it to perform tasks. Distributed systems require strategies to detect and recover from
failures. One commonly used strategy employs a leasing mechanism, where a node grants
a leaseholder access to a resource for a limited time (the lease period). If the resource is
needed beyond the original lease period, then the leaseholder can renew the lease by
requesting additional lease periods. Once the resource is no longer needed, the
leaseholder may relinquish its lease. If the leaseholder does not renew a lease before
expiration of the lease period, the lease grantor assumes leaseholder failure and
terminates the lease to prevent resource leaks. In any leasing system, questions arise
regarding how to select the lease period. Choosing an appropriate lease period requires
consideration of tradeoffs among resource utilization, responsiveness, and number of
leaseholders. Jini can be used for mobile computing tasks where a service may only be
connected to a network for a short time, but it can more generally be used in any network
where there is some degree of change. There are a large number of scenarios where this
would be useful.
project description:
In our project we are going to access files (resource) from the remote service present in
the network. We are using three processes for access the resource. File browsing is the
process used to search the required files from the network (list of files which are

23
available for distributed computing displayed in the client machine). Downloading
process is used to download the selected files from the network. Scanning process is used
to scan the ports that are to find out which port is in open mode. Scanning is used to
identify which port is busy and which are not.
software specification
Language : Java JDK 1.5
Operating system : windows 2000/NT
Java technologies : jini 2.0

DESIGN AND IMPLEMENTATION OF MESSAGE INTEGRITY PROTOCOL

Abstract :
Recently, Computer security has become an important issue. More
and more systems have added control to the access process for avoiding illegitimate
users reading sensitive information. Cryptography is a powerful tool for building
secure distributed systems, at substantial computational cost. This is especially true
for public key cryptography. Cryptography is an often misunderstood and misused
security tool. Today more than ever, privacy is a necessary part of business
communications. Conventional wisdom dictates that cryptography must be done
locally in order to be secure. Security of data in transit over the Internet/intranet
becomes increasingly necessary because of steadily growing data volume and
importance. Also some confidential data like the transactions involving credit cards
through internet needs security as an important criteria. This network architecture
amortizes the cost of special purpose cryptographic hardware across many users.

Cryptography helps provide:


Authentication, Data Integrity, Privacy and Non-Repudiation. The aim of our
project is to ensure security of data transported and routed through high application layers
by implementing the message integrity protocol. Message integrity protocol is designed

24
to make use of TCP as a communication layer to provide a reliable end-to-end secure and
authenticated connection between two points over a network (for example between the
service client and the server). The plan is to design and implement Message Digest
Protocol, which Provides security using RSA algorithm and One-Way Hash Functions.
The main objective of the Message integrity protocol is
• Authenticating the client and server to each other
• Ensuring data integrity
• Securing data privacy
In our project we ensure security by implementing RSA and MD5 algorithm together.
Basic operations of MESSAGE INTEGRITY PROTOCOL is
 Both the sender and receiver are authenticated separately by the authentication
server.
 The data is encrypted using RSA algorithm. Then hash function is generated.
 The encrypted message and hash function together are transferred to the
destination.
 At the receiver side, integrity of data is checked by generating hash function using
the encrypted message sent.
Then the hash function generated at the receiver is checked with hash function send from
the transmitter.

software specifications
Language : Java JDK1.5
Java Technologies : JDBC,Java.net,Javax.crypto
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access

25
Distributed encoded Video Streaming through Caches.
Abstract : The efficient distribution of stored information has become a major concern
in the internet which has increasingly become a vehicle for the transport of stored video.
Because of the highly heterogeneous access to the Internet, researchers and engineers
have argued for layered encoded video. In this project we deliver layered encoded video
using caches and heuristics to determine which video and which layers in the video
should be cached in order to maximize the revenue from the streaming service.
The revenue increases nearly logarithmically with the cache size and linearly with the
link bandwidth that connects the cache to origin servers.

This project improves the efficiency of distributed video from servers to end users. As
with web content, it clearly makes sense to insert intermediate cache between the server
and client. This will allow users to access much of the stored video content from near by
servers, rather than accessing the video from a potentially distant server.

software specifications

Language : Java JDK1.5


Java Technologies : JDBC,Java.net,JMF2.0
GUI Tool : NetBean 5.5

26
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access

Steganography in JPEG 2000 Compressed Images

ABSTRACT:

Information hiding in JPEG2000 compressed images is investigated in this


project. JPEG2000 is an upcoming still image coding standard. This standard
complements JPEG by providing several important features such as resolution, better
resilience to bit errors, etc. it is believed JPEG2000 will be used widely and its rich
features will benefit many emerging applications.
The challenges of covert communication in this state -of-the-art image codes are
analyzed and a steganographic scheme is then proposed to reliably embed high-volume
data into JPEG 2000 bit stream. The project is concerned with the development
application to hide data into JPEG2000 bit stream. Cryptographic techniques extend the
security of the hidden data. The application should be easy to use and should run on
multiple platforms.

software specifications
Language : Java JDK1.5
Java Technologies : Java.net
GUI Tool : NetBean 5.5
Operating System : Windows 2000

27
INTEGRATED DATA MIGRATION
Abstract:
Integrated data migration is a semi enterprise application which provides data transfer
between two applications along with data format conversion, platform independence.

Server Operations
 Displays the menu
 Creates the new Instance of a server when requested
 User Authentication is done in server
 User Management is a main Operation of server
 Accepts the User information and connects to the database and checks for a valid
user
 If valid user Client gui will be displayed for futher actions
 If not, an error message will be displayed
 Receives the user details and registers the user as an valid user
 Option is provided to edit user details after registration
 Administrator can view the user details
 If required, administrator can also delete the user

Connection Establishment through JDBC

 Ms-Access connection-Provides access to MS-Access Database

28
 Mysql connection-Provides access to MySQL
 Oracle connection -Provides access to Oracle

Client Operations
 Displays the client Main Menu
 If “Select” menu item is selected you are provided with two panels
 You can enter the database name and save the data in the text file if you have
choosen TextFile panel
 You can choose Database File panel if you need to convert from one data format
to another (for ex oracle to mysql)
 If DataBaseFile panel is choosen we enter the database name,the available table
will be displayed
 You can choose any table that needed to be converted
 Once you choose the table, the content of the table will be displayed along with
options to convert the table to required format

Client [Middle Format Data Conversion]

 Once the table is selected the data in the table are copied in to text file and the
fields are seperated using the delimiter %
 You can choose any type of conversion
 According to the option the details of conversion and required format should be
provided

Advantages

 Enables the data in one database format [MYSQL, Oracle ,MS-Access] to be


transferred to another database [MYSQL, Oracle, MS-Access]
 Enables the data to be transferred across two different platforms

29
 Avoids Manual Insertion of Data into the Database

software specifications

Language : Java JDK1.5


Java Technologies : JDBC
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access

E-Business Information Sharing using J2EE

An extranet is like a “private” business club. It provides a central location for


forging deals, collaborating with outside companies, and transacting business with
existing trading partners. In an extranet, however, the “club” operates on-line and, since it
uses the
same user-friendly technology that has made the Internet a global network, its “members”
can include companies of all sizes located in virtually every corner of the world.

The Project “E-Business Information Sharing using J2EE “ is aimed at to make Car
Company business dealing with the various business partners like Supplier, Distributor,
banker etc. through extranet. This Project is a part of an ongoing web application Project.
This Project provides more reliable security for the e-business contributors.
The proposed system overcomes the drawbacks of existing client/server by
implementing Multi-tier Architecture in which the Business logic is completely separated
from the client and it forms the middle layer between the client layer and the data access
layer. Since the business logic is separated from the client any changes that has to be
made to the business logic can be made easily within short span of time.

30
The system is, basically a multi-tier, distributed, enterprise oriented one. It has the
features of working in a heterogeneous network, i.e., all the branch offices of the
enterprise are globally connected to a centralized server in a secured network. The Project
is based on an extranet through the Internet. The communication between the client and
the server happens through the Internet but only the authenticated users i.e., the
employees of the company have access to the system. Hence the system is secured from
unauthorized access.
Since all the offices are globally connected the current status of any particular
company is available at any time, which is very helpful to make effective management
decisions thus offering a competitive edge over the other enterprises.
The proposed system perfectly suits the heterogeneous network of systems as it is
developed using the platform independent enterprise solution the Enterprise Java Bean
Technology.

The following are some of the advantages of the proposed system:


•Platform independence.
•Highly secured.
•Suits well for distributed enterprise application.
•To control traffic replication of middle-tier can be done.
•Re-compilation of the components not needed.
•High processing speed.
•Simultaneous access of shared data.

software specifications

Language : JDK1.5 , HTML


Java Technologies : Applets,JDBC,JNDI,Servlets & EJB
Application Server : Weblogic 8.1
GUI Tool : NetBean 5.5
Operating System : Windows 2000

31
RDBMS : Oracle 9i

A Dynamic and Temporal Role-Based Access Control for Enterprise


System

Abstract : The Role based access control consists of four basic components: a set of
users Users, a set of roles Roles, a set of permissions Permissions, and a set of sessions
Sessions. A user can be a human being or an autonomous agent. A role is a collection of
permissions needed to perform a certain function within an organization. A permission
refers to an access mode that can be exercised on an object in the system and a session
relates a user to possibly many roles. In each session, a user can request activation of
some of the roles he is authorized to assume. Such request is granted only if the
corresponding role is enabled at the time of the request and the user is entitled to activate
the role at that time. In the RBAC model, for four sets, namely, Users, Roles,
Permissions, and Sessions, several functions are defined. The user role assignment and
the role permission assignment functions model the assignment of users to roles and the
assignment of permissions to roles, respectively. The user function maps each session to a
single user, whereas the role function establishes a mapping between a session and a set
of roles activated by the corresponding user in the session. In many practical real time
applications, users may be restricted to assume roles only at predefined time periods.
roles may only be invoked on pre-specified intervals of time depending upon when
certain actions are permitted. However, the TRBAC model addresses the role enabling
constraints only. In this project, we propose a Generalized Temporal Role-Based Access

32
Control model capable of expressing a wider range of temporal constraints. In particular,
the model allows expressing periodic as well as duration constraints on roles, user-role
assignments, and role-permission assignments. In an interval, activation of a role can
further be restricted as a result of numerous activation constraints including cardinality
constraints and maximum active duration constraints The main features of this model
include periodic enabling of roles and temporal dependencies among roles which can be
expressed through triggers. A role is said to be enabled if assumed by a user. Priorities are
associated with role events, which in conjunction with a set of precedence rules, are used
to resolve conflicts. TRBAC also allows an administrator to issue runtime requests for
enabling and disabling a role.
This project has been implemented based on Enterprise Banking System. Enterprise
Banking System is developed in intranet environment using web interfaces.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Applets, JDBC, J2EE
Operating System : Windows 2000
WebServer : Tomcat 5.5
Database : MS-Access/Oracle 9i

SECURE E-VOTING
Abstract: With a rapid growth in computer networks, many people can access the
network through the Internet and therefore an electronic voting can be a viable alternative
for conducting an election. An electronic voting system must attempt to achieve at least
the same level of security as ordinary elections. We have developed an electronic voting
system, E-voting for a general election. The E-voting system employs cryptographic
techniques to overcome the security issues in the election process. In this system, voter's
privacy is guaranteed by using a blind signature for confidentiality and voter's digital
signature for voter's authentication. E-voting is implemented by employing Java
technology and cryptography provider. The provider, which is an open source library, is
used to provide the secure communication channel. Using password-based encryption

33
with SHA and DSA algorithm so that only valid voter can use it protects the voter’s
private key for digital signature.

Software Specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP, JDBC, JNDI, Servlets, Javax.crypto
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Browser : Internet Explorer 5.1 & Netscape Navigater
Operating System : Windows 2000

Improving Availability and Performance with


Application-Specific Data Replication

ABSTRACT: Improving availability and latency is crucial for business critical e-


commerce servers. This project explores distributed object architecture to build an edge
service data replication system for an e-commerce application, which simulates an online
bookstore. Our goal is to build an edge service replication architecture using application-
specific distributed objects for e-commerce applications.
Standard e-commerce Implementations allows business logic to access the central
databases directly. However, if business logic were distributed, accesses to a central
database would become costly remote operations. Therefore, our edge service
architecture replicates both business logic and data to edge servers by encapsulating the
service’s shared data within application-specific distributed objects that manage this
distributed state. As we deploy business logic, distributed objects, a database, and a
messaging layer on a set of distributed servers that are accessed by clients via standard
HTTP front ends. The distributed objects interpose between the business logic and the
local database to control data access. They also communicate with other instances of the
distributed objects through the persistent messaging layer to manage data replication and
consistency.

34
We take advantage of application-specific semantics to design distributed objects that
each manages a specific subset of shared information using simple and effective
consistency models. Our experimental results show that by slightly relaxing consistency
within individual distributed objects, our application realizes both high availability and
excellent performance.

Software Requirements:
Platfrom : Windows9x/2000
Language : Java JDK1.5, J2EE.
Web server : Tomcat Server 5.5.

Authentic and Secure Secret Distribution System


ABSTRACT : Secure secret distribution system stores secrets for subsequent access by
authorized clients. It also is a vehicle for exploring the generality of a relatively new
approach to building distributed services that are both fault-tolerant and attack-tolerant. It
is a distributed service for storage and dissemination of secrets. It was designed to be one
of the components in a secure publish/subscribe communications infrastructure,
providing the support for storing secret keys used to encrypt published information
objects and ensuring that authorized subscribers retrieve those secret keys. The system
binds secrets to names. Bindings are write once only a single value is ever bound to each
name. The three system operations enable clients to manipulate and retrieve bindings:
Create introduces a new name, Write associates a (presumably secret) value with name,
and Read returns the value associated with a name. Having create and write be distinct
rather than single compound operation provides the flexibility to separate the
administration of a secret from associating value with that secret. We expect distinct
principals will be concerned with these two kinds of operations, and we expect the
operations to occur at different times. Clients of the system can expect the following
security properties to hold:
Confidentiality
Secrecy

35
Authentication and Authorization
Integrity
Fault-Tolerance
Attack-Tolerance
Software Requirement :
Platform : Windows 2000/NT
Language : Java (JDK 1.5)
Java Tech : Java.net, JDBC
Database : MS-Access
GUI : Swing
IDE : NetBean5.5

A Data Mining Algorithm for Generalized Web Prefetching


Abstract : The popularity of the Internet and World Wide Web continues to grow. So
does the number of users accessing information on the Web. This leads to continued
increase of both network load and server load. Since the Internet capacity is not keeping
pace, the net effect of this growth was a significant increase in the user perceived latency,
that is, the time between when a client issues a request for a document and the time the
response arrives. Potential sources of latency are the Web server’s heavy load, network
congestion, low bandwidth, bandwidth underutilization, and propagation delay. To
improve the situation, the technique of pre-fetching has been investigated. Pre-fetching
refers to the process of deducing a client’s future requests for Web objects and getting
those objects into the cache, in the background, before an explicit request is made for
them. The Predictive Web pre-fetching refers to the mechanism of deducing the
forthcoming page accesses of a client based on its past accesses. The main advantages of
employing pre-fetching is that it prevents bandwidth underutilization and hides part of the
latency. In this project, a new algorithm called WMo has been proposed, which is based
on data mining and is proven to be a generalization of existing ones. Wmo is the
generalization of Dependency Graph and k-order PPM algorithm. An extensive
analytical and experimental comparison of all algorithms, indicates that the proposed

36
algorithm outperforms existing ones by combining their advantages without presenting
their deficiencies.

Software Requirements:
Language : Java JDK1.5,HTML
Java Technologies : Applets, JDBC, Servlets, JSP
Web server : Tomcat 5.5
Operating System : Windows 2000

An Expiration Age-Based Document Placement Scheme for Cooperative Web


Caching

Abstract : The popularity of the Internet and World Wide Web continues to grow. So
does the number of users accessing information on the Web. This leads to continued
increase of both network load and server load. One way to meet this challenge is to try to
scale network and server bandwidth to keep up with the client demand, which is an
expensive strategy. An alternative is caching, which reduces network bandwidth and
server load by migrating server files closer to those clients that use the files. Caching can
be done either at a client (by Web browser) or in the network between clients and content
servers (by proxy servers) Cooperative caching the sharing and coordination of cache
state among multiple caching proxies has been recognized as one of the most important
techniques to reduce Web traffic and alleviate network bottlenecks.

In this project, we propose a simple and yet effective scheme to limit the replication of
documents within a group. We view the aggregate disk space of the cache group as a
global resource of the cache group and introduce the concept of cache expiration age to
measure the disk space contention of caches. The new scheme is based on the expiration

37
ages of individual caches in the group, referred to as the Expiration Age-based scheme
(EA scheme for short). The EA scheme effectively reduces the replication of documents
across the cache group, while ensuring that a copy of the document always resides in a
cache where it is likely to stay for the longest time. Further, the implementation does not
involve any extra communication overheads when compared with the ad hoc scheme
used in many existing cooperative-caching protocols.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Tomcat Server
Operating System : Windows 2000

Efficient Dissemination of Personalized Information Using Content-Based


Multicast
Abstract :
Future information systems will increasingly need to deliver the results of diverse
applications to a growing number of users. While the information can be unicast to all
the users, it is clear that multicasting the information offers a better alternative
Considering the commonality in the information desired by various subscribers.
Therefore, we believe that multicast will increase in importance at all levels of
information and networking systems. Along with this increase in the use and importance
of multicast, we also observe a need to generalize the notion of multicast to bring its
advantages to bear on more sophisticated and specialized uses. Traditional or basic IP
multicast consists of a set (or group) of participants, one of whom is typically the source
whereas the others are sinks; any information generated by the source is delivered to the
rest of the group by setting up a multicast tree.
IP multicast services do not consider the structure and semantics of the
information in the multicast process. We propose the use of Content-Based Multicast
(CBM) where extra content filtering is performed at the interior nodes of the IP multicast
tree; this will reduce network bandwidth usage and delivery delay, as well as the

38
computation required at the sources and sinks. In this paper, we evaluate the situations in
which CBM is advantageous. The benefits of CBM depend critically upon how well
filters are placed at interior nodes of the IP multicast tree and the costs depend upon
those introduced by filters themselves. Further, we consider the benefits of allowing the
filters to be mobile so as to respond to user mobility or changes in user interests and the
corresponding costs of filter mobility. The criterion that we consider is the total network
bandwidth utilization.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, Java.net, JDBC
Operating System : Windows 2000

Database Replication Techniques Based on Total Order Broadcast


ABSTRACT :
Database replication is traditionally handled in two ways, either with eager
replication or with lazy replication. Eager replication implies an atomic commitment
protocol and is slow and deadlock prone. Lazy replication is efficient, but does not
enforce consistency between the replicas. To address this problem, replicated databases
based on group communication have been proposed for some time. Those techniques,
which typically replace the two-phase commit protocol, promise better performance.
Techniques based on group communication typically rely on a primitive called
total order broadcast. This primitive ensures that messages are delivered reliably and in
the same order on all replicas. While most techniques described in the literature use total
order broadcast, they do not use it in the same way. Some techniques use a single total
order broadcast, while others need, additionally, a reliable broadcast. Moreover, some
techniques do the broadcast at the start of the transaction and some others do it at the end.
To avoid ambiguities with active replication technique, we call it certification-based
replication. When the delegate server sd receives a transaction t from a client c, the server
sd executes transaction t but delays the write operations. When commit time is reached,
transaction t is broadcast to all servers using a total order broadcast. Upon delivering the
message that contains t, each server executes a deterministic certification phase.

39
Certification decides if transaction t can commit or must abort. This technique shares the
communication requirements with active replication: Only one total order broadcast is
needed per transaction. This technique does not have the drawbacks of active replication:
It can handle interactive transactions. On the other hand, this technique is optimistic:
Conflicting transactions might be processed only to be aborted at the certification phase.
This means such techniques are effective in low-conflict situations.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC
Database : Oracle9i
Operating System : Windows 2000

Peer Trust

PEER-TO-PEER (P2P) online communities can be seen as truly distributed computing


applications in which peers communicate directly with one another to exchange
information, distribute tasks, or execute transactions. In E-Commerce settings, P2P
communities are often established dynamically with peers that are unrelated and
unknown to each other. Peers have to manage the risk involved with the transactions
without prior experience and knowledge about each other’s reputation. One way to
address this uncertainty problem is to develop strategies for establishing trust and develop
systems that can assist peers in assessing the level of trust they should place on an
eCommerce transaction. Trust is critical in such electronic markets as it can provide
buyers with high expectations of satisfying exchange relationships. The challenge of
building such a reputation based trust mechanism in a P2P system is how to effectively
cope with various malicious behavior of peers such as providing fake or misleading
feedback about other peers. Another challenge is how to incorporate various contexts in
building trust as they vary in different communities and transactions. we develop
PeerTrust, a P2P reputation-based trust supporting framework. This project has a number
of unique contributions. First, by analyzing a variety of common problems encountered in

40
today’s online communities, we introduce Peer-Trust model with five important
parameters and a general trust metric combining these parameters for evaluating the
trustworthiness of a peer in an evolving P2P community. We also present the trust
information dissemination architecture, the usage of the trust model, and the design and
implementation considerations of PeerTrust.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC, JXTA
Operating System : Windows 2000

E-LEARNING MANAGEMENT SYSTEMS

ABSTRACT:
The main aim of this project is to design and implement an Intranet Portal
for a university department using Java 2 Enterprise Edition (J2EE) technologies. We will
develop the system for the Computer Science department of the University.
As most other university departments, the CS department has a traditional and static
webpage. It displays the general information about the department, such as the programs/
courses offered, faculty / staff directory, and student organizations. This type of webpage
suffers from two shortcomings: First, it does not serve as an interactive media for the
students and faculties in the department. That is, it does not provide any facilities for a
student, a faculty member, a research group, or a student club, to communicate or
collaborate with the others in the same department. Second, it needs webmaster’s manual
effort to present the up-to-date information about the department, such as news and
events-to-come. In today’s world, it is difficult to rely on a single webmaster to present
frequently updated information. If anybody eligible in the department can upload new
information, information will be shared in a more efficient way.

41
To address these problems, we propose to develop an Intranet portal that provides the
following functionalities:

 A user (faculty or student) belonging to the respective home department can log in
using his/her ID and Password. Then depending on the type of the user, the portal will
present information that is relevant to that particular user and his/her specific request.
 The faculty and students can be given different access rights to the various resources
presented.
 The faculty members can upload their research work, post lecture notes, and make
announcements.
 The students can search, view and download online material posted by faculty.
 A user can send messages to another user or a group of users.
The faculties and students can participate in text-based discussion forums which is
viewable to everyone.
 Data collection techniques such as Surveys and Polls can be implemented to collect
information from different groups of users. This data can further be analyzed to get a
perception of the aspects of a user or a group of users. This will make the portal more
interesting and informative.
We propose to use J2EE to implement this system. Using J2EE the entire system can be
developed following a 3-tier architecture model. This is known as MVC2 (Model-View-
Controller) architecture in which an application's data model, user interface, and control
logic are separated into three distinct components so that modifications to one component
can be made with minimal impact to the others.

Software Requirements:
 Web Server : Tomcat 5.5
 Server side scripting : JSP
 Database : MS-Access
 Language : Java JDK1.5,HTML

42
 Technologies : JSP,JDBC, Servlets,
 GUI tool : NetBeans 5.5
 Monitor : SVGA(M)

Project status reporting and auditing

This status reporting tool allows the managers to predict the accuracy with which
the employees are working. This is important because an accurate forecast is the key for
having the right product, in the right place, at the right time. By providing an accurate
forecast, the correct product can be delivered to the customers at the right time. The
proposed project aims to design an application by which it is possible for the managers to
predict the performance of the employees. The system permits only authenticated users
who have been assigned access rights to work with the application.
On login, the system validates the user and displays he various working links. The
user can then select the necessary link to work upon. But there is some restriction on the
access of the various links. The employees are only allowed to enter their daily timesheet
and are not allowed to access other links or even view other employee’s details. The
employees can only enter the working details and are not allowed to modify the details
but are allowed to modify their personal details. The entry of the daily working hours is
done on weekly basis.
The project leaders are can view the details of the employees only under their
projects. The Project leader has to enter the details of the umber of resources, training
details for particular project.

43
The project managers can have access to almost all the employees in the
company. The project manager is the one who can allocate projects to the employees. For
this project manager must look upon the projects on which the employees are working so
that any employee is not overloaded. The project allocates the projects and decides the
project leader and the employees for that particular project.
The Group leader can view and even modify the employee details. It is only the
Group leader who can have access to the overall company aspects regarding the resources
and the other billing details in the form of an excel sheet. Thus only the Group leader can
access to all the links.
User and Group level security is implemented in this status reporting tool.
The benefits of this tool are:

 Saves time for managers. The Timesheet entry module handles most of the
details involved with the total working hours of each employee.

 Improves customer service. This tool as describes the employees performance at


the right time helps the managers to keep track of the work being carried out so as
to provide the customers with the product they want, when they want it.

Software Requirements:

Language : Java JDK1.5,HTML


Java Technologies : Applets, JDBC,Servlets, JSP
Web server : Tomcat 5.5
Operating System : Windows 2000

44
Trust Management in E-Commerce

Abstract: The Internet changed the way people do business and communicate with each
other. Since many of the resources on the Internet are private and not public, protection
mechanisms are necessary to control the access to those resources. Various security
mechanisms are deployed to protect private or commercial digital information accessible
through the Internet. However, even when a secure and confidential channel is
established between two entities, the concern about the trustworthiness of the participants
in a transaction remains. Trust or reputation management is an important issue in e-
commerce, where traders might have never met and know nothing about each other’s
trustworthiness. This lack of information about traders’ reputations causes uncertainty
and mistrust, which influences the e-market’s economic efficiency. The access control
mechanisms used in traditional security infrastructures have been proven inadequate,
inflexible, and difficult to apply to the Internet of today. In this work, we have proposed a
general purpose, application-independent Distributed Trust Management System
(DTMS). In DTMS, access rights are directly associated with a trust value. The trust
values are further classified into direct trust values, indirect trust values and trust
authorization levels. We have calculated and expressed each type of the trust values into
explicit numerical numbers.

45
Reputation value is within the range of (0, 3000). A new user is assigned 0, the minimum
value. A current user’s reputation is always higher than a new user’s. Two users can only
rate each other once. If two users interact multiple times, Sporas only accepts the latest
rating. This helps avoid the problem of two users intentionally increasing their reputation
value by frequent interactions. It changes the reputation value of users with very high
reputation values more slightly. A distributed trust management broker framework for e-
services, such as e-commerce has introduced in this project. In their framework, each user
(a client or a trader) is associated with a broker, which collects trust ratings of any service
providers for its users. The trust-management framework consists of users, brokers, and
reputation authorities. A broker maintains a database, which collects and stores trust
information for the users that it’s associated with. When a client needs a trader’s trust
information, it first contacts its broker. The broker’s reputation manager component
processes requests from clients associated with the broker. If it can’t handle a request, it
passes the request to the broker’s connection manager. The connection manager sends the
request to other brokers and processes their replies. If no broker can provide the required
information, it sends the request to the reputation authority. The reputation authority is
designed as a universal database. It collects trust information from the public in a
voluntary way and stores trust information for all users.

Software Requirements:

Language : Java JDK1.5


Java Technologies : Servlet, JSP, JDBC
Web Server : Tomcat Server 5.5
Operating System : Windows 2000

46
E-Police-crime Investigation management system

Abstract: The institution is the Police. The proposed system applies to Police
Institutions all across the country and specifically looks into the subject of Crime Records
Management. It is well understood that Crime Prevention, Detection and Conviction of
criminals depend on a highly responsive backbone of Information Management. The
efficiency of the Policing function and the effectiveness with which it tackles crime
depend on what quality of information it can derive from its existing records and how fast
it can have access to it. It is proposed to centralize Information Management in Crime
for the purposes of fast and efficient sharing of critical information across all Police
Stations across the territory. Initially, the system will be implemented across Cities and
Towns and later on, be interlinked so that a Police detective can access information across
all records in the state thus helping speedy and successful completion to cases. The
System would also be used to generate information for pro-active and preventive
measures for fighting crime. The project has been planned to be having the view of
distributed architecture, with centralized storage of the database. The application for the
storage of the data has been planned. Using the constructs of MS-SQLServer2000 and all
the user interfaces has been designed using the JSP technologies. The database
connectivity is planned using the “SQL Connection” methodology. The standards of
security and data protective mechanism have been given a big choice for proper usage.
The application takes care of different modules and their associated reports, which are

47
produced as per the applicable strategies and standards that are put forwarded by the
administrative staff.

software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : MS-Access

Integrated Online Booking Services

This project used to develop the facilities for online booking system for employees. The
employee can able to search details like the portal for the best deals for air-fare, hotels,
rent car and package tours. The employee can able to booking the online transaction like
air tickets, hotel accommodation, rent cars and package tours. The queries/transactions
should be made from a database of travel-sites, where the air- fare, hotel, car rental and
tour information are stored, for every travel site.

software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : Oracle 9i

48
Efficient and Flexible E-Cash payment to prevent blackmailing

Abstract : Recent advances in the Internet and WWW have enabled rapid development
in e-commerce. More and more businesses have begun to develop or adopt e-commerce
systems to support their selling/business activities. While this brings convenience for
both consumers and vendors, many consumers have concerns about security and their
private information when purchasing over the Internet, especially with electronic
payment or e-cash payment. This project proposes a practical payment protocol with
scalable anonymity for Internet purchases. The protocol uses electronic cash for payment
transactions. It is an offline payment scheme that can prevent a consumer from spending
a coin more than once. Consumers can improve anonymity if they are worried about
disclosure of their identities to banks. An agent provides high anonymity through the
issue of a certification. The agent certifies re-encrypted data after verifying the validity of
the content from consumers, but with no private information of the consumers required.
With this new method, each consumer can get the required anonymity level, depending
on the available time, computation, and cost. This system spends less computational
resources and reduces network communication. No one can trace consumers from cash.
However, the identity of a consumer can be found if he/she uses a coin twice. This project
also prevents blackmailing by modifying existing e-cash system. A new online electronic
cash scheme to prevent blackmailing is present by using group blind signature technique.
The blackmailed cash was marked by an entity, called supervisor, so that the bank can
distinguish it from the valid cash. Our scheme not only has all the advantages of existing

49
scheme, but also overcomes its some drawbacks such as inefficiency and impractical
assumptions.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 2000

Self-Organized Public-key Management for Secure Mobile Ad Hoc Networks


Abstract : A mobile adhoc network is an autonomous collection of mobile nodes that
communicate over the wireless link. Due to node mobility, the network topology may
change rapidly and unpredictably over time. Each node can act as a router and host.
Wireless ad hoc networks are dynamic because the nodes may move randomly and join
or leave the network any time at their will. As a result, the neighborhood and trust
relationship may also change accordingly. Conventional public key management is
implemented with public key infrastructure, in which a trusted third party holds the
public key certificates of all participating entities and acts as an online Certificate
Authority to provide a public key verification service. In mobile adhoc network
implementing public key management is more challenging. The self-organizing public-
key management system that allows users to create, store, distribute, and revoke their
public keys without the help of any trusted authority or fixed server. The main motivation
for taking this approach comes from the self-organized nature of mobile ad hoc networks,
and from the need to allow users to fully control the security settings of the system. As
such this approach is developed mainly for “open” networks, in which users can join and
leave the network without any centralized control. In this project the broadcasting
property of radio communications and self-signed public key certificates to propose a
flexible public key management scheme for wireless ad hoc networks, which is able to
overcome the above challenges. In the proposed system every node is able to hold
dynamically two hops neighbours self-signed public certificates and distribute the public
key certificates through multi-hop communication on demand in a verifiable way. In our

50
scheme, every intermediate node may check the 1- and 2-hop neighbor’s digital
signatures, which guarantee that no single node may modify the public key certificate
information during the distribution process. Our proposed scheme can be operated in a
fully self-organized manner without relying on any central administration or CA.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 200
Efficient and Flexible Digital Money Payment in Internet based Online
Transactions
Abstract : Recent advances in the Internet and WWW have enabled rapid development
in e-commerce. More and more businesses have begun to develop or adopt e-commerce
systems to support their selling/business activities. While this brings convenience for
both consumers and vendors, many consumers have concerns about security and their
private information when purchasing over the Internet, especially with electronic
payment or digital money payment. This project proposes a practical digital money
payment protocol with scalable anonymity for Internet purchases. The protocol uses
electronic cash for payment transactions. It is an offline payment scheme that can prevent
a consumer from spending a coin more than once. Consumers can improve anonymity if
they are worried about disclosure of their identities to banks. An agent provides high
anonymity through the issue of a certification. The agent certifies re-encrypted data after
verifying the validity of the content from consumers, but with no private information of
the consumers required. With this new method, each consumer can get the required
anonymity level, depending on the available time, computation, and cost. This system
spends less computational resources and reduces network communication. No one can
trace consumers from cash. However, the identity of a consumer can be found if he/she
uses a coin twice.

51
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 2000

Querying Multimedia Database using Fuzzy Logic Techniques

Abstract:
In multimedia age, new functionalities and capabilities are needed for managing new
kind of data: images, sounds, text, video data, and their combination into composite
objects .The special and temporal, retrieval, browsing, Integration and presentation
requirements of multimedia data significantly differ from traditional data. Fuzzy Logic is
known for providing a convenient tool for interfacing linguistic categories with numerical
data and for expressing user’s performance in a gradual and qualitative way. Fuzzy set
methods have been already applied to the representation of flexible queries and to the
modelling of uncertain pieces of information in databases systems, as well as in
information retrieval. This methodology seems to be even more promising in multimedia
databases which have a complex structure and from which documents have to be
retrieved and selected not only from their contents, but also from “the idea” the user has
of their appearance, through queries specified in terms of user’s criteria. This project
provides a preliminary design of the potential applications of fuzzy logic in multimedia
databases. The problem of comparing Semi-structured document is first discussed.
Querying issues are then more particularly emphasized. We distinguish two types of
request, namely, those which can be handled within some extended version of an SQL-
like language and those for which one has to elicit user’s preference through examples.

52
Software Requirements:
Language : JAVA JDK 1.5
Java Technologies : JDBC
IDE : NetBeans 5.5
Database : ORACLE 9i
Operating System : Windows2000/NT

Design and implementation advanced transactions in EJB Component Model

Abstract:
Enterprise Java Beans (EJB) is a new technology that aims at supporting
distributed transactional component-based applications written in Java. One of the main
goals of EJB is the support of electronic transactions on the Internet. In EJB, distributed
flat transactions are supported with no means for supporting long-lived or cooperating
transactions. In recent years, a lot of new advanced software applications have arisen,
which have new requirements for transaction processing. Since EJB is modern concept
that deals with transactions, the project analyze the support of EJB for those requirements
for advanced transactions and identifies weaknesses of transactions in EJB. The project
also implements an extension of the current transactional concepts in EJB, which can be a
remedy for some of the weaknesses identified. The extension, called Bourgogne
transactions, allows a transaction to delegate bean objects to other transactions, to share
bean objects with other transactions, and to establish flow control dependencies between
transactions. Implementation issues together with pitfalls of the proposed extension are
also analyzed.

Software Requirements:
Language : Java JDK1.5, HTML
RDBMS : Oracle 9.0
Development Methodologies : OOAD, UML &Unified process

53
Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1
Application Server : Weblogic8.1
Platform : WINDOWS NT/2000

ATM card back office management system


Abstract: ATM-CMS is a card processing system, which provides full operations for
issuing ATM cards and maintaining them by financial institutions. ATM-CMS offers a
complete back-office solution, including merchant application scoring and screening,
card management, credit management, cardholder billing and collection, merchant set-up,
merchant deposits and payments, and risk management. Support for front-end transaction
processing authorization is also provided, and is integrated with the any ATM switch.
ATM-CMS provides a powerful management system for card products that
enables financial institutions to define new products and services in response to
market trends.
 The core features of ATM-CMS are as follows:
 Card Issuing.
 Card Maintenance.
 Card Transactions.
 Account Information.
ATM-CMS is an application that allows financial institutions to create, modify,
and terminate the cards they issue. ATM-CMS also facilitates card production
(embossing). System administrators may use ATM-CMS to configure and maintain all
aspects of card issuance, such as card replacement, renewal and conversion.
Administrators may also use ATM-CMS to identify stolen cards and terminated cards.
Since ATM-CMS project is developed mainly using JAVA platform, OOPs
concepts are widely used, some of the advantages in using OOPs are better security,

54
dynamic execution, data abstraction and hiding, faster execution, reusability, easier
debugging etc.,
Software Specification:
Platform :Windows 2000/NT
Language :Java (JDK 1.5)
GUI :Java Applets, HTML
Server side Technologies : Java Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Server :Weblogic 8.1
Database :Oracle 9i

Enterprise Business Integration Using Web Services

ABSTRACT : B2B integration or B2Bi is basically about the secured coordination of


information among businesses and their information systems. It promises to dramatically
transform the way business is conducted between partners, suppliers and customers or
buyers. All companies (large, medium, small, or new) can experience increased growth
and success through tightly integrated partnerships. Companies, from across a variety of
industries, are embracing B2Bi and realizing the enormous competitive advantage it
provides, through faster time to market, reduced cycle times, and increased customer
service. Through integration of business and technical processes, companies are able to
strengthen relationships with partners and customers, achieve seamless integration inside
and outside the enterprise, gain real-time views of customer accounts, increase
operational efficiencies, and reduce costs.Web Services, which are based on XML
standards, are a boon to the world of B2B, as we discussed in the previous section that
XML-based standards hold the key for the success of dynamic B2Bi and its wide spread
adoption by companies of all sizes. Web Services are based on the following open
standards: Web Services Description Language (WSDL - to describe), Universal
Description, Discovery and Integration (UDDI - to advertise and syndicate), Simple
Object Access Protocol (SOAP - to communicate) and Web Services Flow Language
(WSFL - to define work flows). Thus, Web Services use SOAP based messages to
achieve dynamic integration between two disparate applications. Companies use WSDL,

55
a Web Services standard, to describe their public and private Web Services and publish
their Web Services either to a private or public repository and directory using UDDI.

software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML,SOAP,UDDI
Application Server : Weblogic 8.1
GUI Tool : NetBeans 5.5
Operating System : Windows 2000
RDBMS : Oracle 9i

Extended database security design and implementation

Abstract: Protection of data against unauthorized disclosure has been the major issue in
database systems. As organizations increase their adoption of database systems as the key
data management technology for day-to-day operations and decision making, the security
of data managed by these systems becomes crucial. Damage and misuse of data affect not
only a single user or application, but may have disastrous consequences on the entire
organization. Hence the confidentiality and integrity is required to prevent unauthorized
disclosure and modification. The proposed system implements Discretionary Access
Control and Mandatory Access Control. Access control mechanisms of current DBMSs
are based on discretionary policies governing the accesses of a subject to data based on
the subject’s identity and authorization rules. These mechanisms are discretionary in that
they allow subjects to grant authorizations on the data to other subjects. Because of such
flexibility, discretionary policies are adopted in many application environments and this
is the reason that commercial DBMSs adopt such policies. An important aspect of
discretionary access control is thus related to the authorization administration policy.
Authorization administration refers to the function of granting and revoking
authorizations. Mandatory access control policies regulate accesses to data by subjects
on the basis of predefined classifications of subjects and objects in the system. Objects
are the passive entities storing information, such as relations, tuples in a relation, or

56
elements of a tuple. Subjects are active entities performing data accesses. The
classification is based on a partially ordered set of access classes, often referred to as
labels, that are associated with every subject and object in the system. A subject is
granted access to a given object if and only if the access classes of the object and the
subject satisfy some order relationship, depending on the access mode. This system also
detects any intrusion in database.

Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC
Operating System : Windows 2000
A Compressed Video Database Structured for Active Browsing and Search

Abstract—In this project, we describe a unique new paradigm for video database
management known as ViBE (video indexing and browsing environment). ViBE is a
browseable / searchable paradigm for organizing video data containing a large number of
sequences. The system first segments video sequences into shots by using a new feature
vector known as the Generalized Trace obtained from the DC-sequence of the
compressed data. Each video shot is then represented by a hierarchical structure known as
the shot tree. The shots are then classified into pseudo-semantic classes that describe the
shot content. Finally, the results are presented to the user in an active browsing
environment using a similarity pyramid data structure. The similarity pyramid allows the
user to view the video database at various levels of detail. The user can also define
semantic classes and reorganize the browsing environment based on relevance feedback.
We describe how ViBE performs on a database of MPEG sequences.

Software Environment

Platform : Windows 2000/NT


Language : Java (JDK 1.5), JDBC 2.0
Database : Oracle 9i

57
GUI : Swing
IDE : NetBeans 5.5

News Video Querying and Browsing on Content Based Multi-Tier Distributed


News Video Server Architecture
Abstract: The recent proliferation of digital images and video has brought new
opportunities to end-users that now have a large amount of resources when searching for
content over Internet. Due to the rapidly changing nature of modern society, watching
news has become a part of daily life. Keeping up with the news has already become
essential for modern people to catch up the rapidly changing times. With the massive use
of the World Wide Web, a great many TV stations also build their own news video web
servers, which allow users to watch news video through the Internet. It is therefore
essential to develop a search engine integrating the news video information in all news
video web servers so that users can find out their concerned news video stories in a short
time. In recent years there has been a great interest in designing and building systems that
organize and search news video data based on its content form distributed news video
servers. This project proposes efficient news video browsing system based on distributed
news video servers that share news video with the clients. Hence a multi-tier architecture
has been proposed to browse news video form the global news video content. The
proposed system applies efficient summarization and content-based retrieval technique to
search news video. The system has been divided into four-layer architecture, which
composed of client side visual browser/viewer, query processing server, Preprocessing
server and news video server. This system processes all the news video provided by news

58
video web servers and provides a querying/browsing interface. Each news video story is
represented by its story abstract, which consists of key sentences and key frames
generated from news script and news video stream, respectively. Especially, the
visualized scanning of key frames facilitates the quick understanding of a news video
story. Preprocessing server summarizes the story abstract based on the classification and
generates metadata based on the content of the news video and key frame. Once a user
find out his concerned news story, he could click the provided link to access the whole
video of this news story stored in its corresponding news video web server.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC, Java.net
Webserver : Tomcat 5.5
Operating System : Windows 2000

Distributed Resource Sharing on peer to peer

Peer-to-Peer networks have excellent decentralized architecture and with


enable distributed technology they could easily harvest the resources in each peer. Hence
these networks are gaining importance in networking world.

 This project is aiming at logically dividing the network into differnt groups based
upon its significance.
There is a server running in the network which is keeping track of all the available
computers connected in the network.
 A computer connected in the network is not knowing about other machines
available in the network.
The machine which is looking for a resource (client)is making a query to the server
in the form of request.
The server will acknowledge the request and broadcast this query to all machines
connected in a particular Group.
The server will wait until it receives response from each nodes in the network.
This response will be sent to the machine which had asked for the resource.
 The response basically contains the IP address of the machines in the network
which contains the requested resource. Once the IP address is known, the client
machine can directly contact the machine which has the resource directly bypassing
the server.

59
The various functionalities supported by this architecture are-

FILE LISTING
FILE DOWNLOADING
KEYWORD SEARCH
INSTANT MESSAGING

SOFTWARE SPECIFICATIONS
Language : Java JDK1.5

Java Technologies : Java.net

GUI Tool : Netbean 5.5

Operating System : Windows 2000

Peer-to-peer video distribution management system using JXTA

Abstract :
PEER-TO-PEER (P2P) computing has recently attracted a great deal of
research attention. In a P2P system, a large number of nodes can potentially be
pooled together to share their resources, information, and services. Many file-
based P2P systems have already been deployed. The JXTA platform provides
developers with a flexible, standards-based set of protocols and reference libraries
using java programming. Using JXTA, developers can focus on implementing
their collaborative applications rather than on the specifics of P2P technology. The
JXTA platform is the next stage of development in the maturing P2P arena, a
fundamental shift in the way people use the Internet. Using JXTA, developers can
create new applications that will communicate with any number of distributed
peers, providing distributed search, file sharing, and collaboration services without
relying on the traditional client/server hierarchy. The result is more robust and
reliable applications that enable users to fully realize the communication
capabilities of the Internet. This project is designed to search and locate the video
shared among the peer group. This project has the capability of serving multimedia

60
resources with high availability at a much lower cost while maximizing the use of
resources from every peer connected to the P2P network. It also provides
ownership of media files, any peer accessing video can be played by the peer and
can not be redistributed or copied into the local system. JXTA Platform has been
extensively used to develop the project.

Software Requirements:
Language : Java JDK1.4

Java Technologies : Swing, java.net, JXTA

Operating System : Windows 2000

Unified User Satisfaction based Transaction Management in Web-Database


Systems

Introduction: As the Internet matures, companies are implementing mission critical


Internet applications. These applications provide dynamic content, integrate with
databases and offer secure commercial transactions. Customers are becoming
increasingly reliant on these complex business applications for services such as banking,
product purchases and stock trading. These new services make greater demands on web
databases and servers at a time when traffic is increasing rapidly, making it difficult to
ensure adequate level of service. Web-based database systems of today manage time
sensitive data and must comply with several requirements such as freshness and
deadlines. This project has been designed to improve overall user satisfaction level in
web based database transactions. A framework is proposed to measure the overall
effectiveness of the Web-database system and a unified User Satisfaction Metric for Web-
database that incorporates multiple factors and can be tailored to the users’ needs and
preferences. Two algorithms have been developed to perform admission control and
update frequency modulation to balance the query and update workload. A User Centric
Transaction Management system uses the feedback control mechanism and it relies on an
admission control algorithm along with a new update frequency modulation scheme in
order to maximize user satisfaction metric.

61
A User Centric Transaction Management system uses the Load Balancing controller the
feedback control mechanism and it relies on an admission control algorithm along with a
new update frequency modulation scheme in order to maximize user satisfaction metric.
The QAC uses Adaptive Allocation Algorithm to decide upon whether to accept or reject
the query. The Update frequency modulation uses Lottery Scheduling based upon the
frequency to decide whether to accept or reject the updation.
Software Requirements:
Language : Java JDK1.4

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

Workload Aware Load Balancing Scheme for Replicated Web Servers

Abstract: Serving the ever-increasing and diversified customer population in web


systems while ensuring high availability in a cost-effective way is a challenge.
Service replication is the obvious vehicle to achieve scalability and availability,
but this requires robust load balancing policies, especially given the complexity of
the workload characteristics experienced by a Web cluster. Contemporary servers
provide not only static and read-only information, but also personalized dynamic
pages created on demand. This, in conjunction with bursty client request rates that
fluctuate dramatically even within short periods of time and the wide disparity of
per-request CPU and I/O resource requirements, further complicates resource
allocation in Web server clusters. Being able to swiftly adapt the scheduling policy
to the workload without human intervention is critical for the commercial success
of Web sites. An effective load balancing policy must self-adjust its parameters as
the arrival and service characteristics of the incoming workload changes. This
project proposed a new policy work load aware load balancing and gave a proof of
concept that dynamically readjusting its parameters based on the monitored

62
workload is a promising approach. It advocates dedicating servers to requests of
similar size, with the aim of reducing the average job slowdown through
separation of long and short jobs. The policy is based on the empirical distribution
of the workload resource demands, i.e., the request sizes and their frequencies. The
policy is examined under a workload that changes dramatically across time and
uses knowledge of the history of request distribution to allocate incoming requests
and to adjust its balancing parameters on-the-fly. Workload aware load balancing
tends to assign requests for the same file to the same server, thus it achieves a high
cache hit ratio and low slowdowns. Unlike location-aware policies, though, it does
not have to maintain the status of each server’s cache.

SOFTWARE REQUIREMENTS:

Platform :Windows 2000


Language : Java JDK1.5,
Java Technologies: J2EE.
Web server : Tomcat Server.

Design and Implementation of Multiple-Criteria Negotiation Support


System

Abstract: Electronic marketplaces have recently been built that allow many types
of multiple-criteria bargaining schemes. Within these marketplaces, systems have
been constructed to enable bargaining between a single buyer and a single seller,
which is known as bilateral bargaining; forward auctions that involve many buyers
and one seller and reverse auctions that involve one buyer and many sellers, which
are known as multilateral bargaining; and dynamic exchanges between many
buyers and many sellers, which are termed double-sided bargaining. However,

63
recent developments in information technology have enabled the creation of a
single platform that can aggregate many buyers and sellers with various pricing
schemes through the use of such technologies as mobile agents, which combine
the demands of buyers to solicit better offers from sellers. This project proposes a
negotiation support system that uses the utility function to model the preferences
and strategies of negotiators. The proposed system is an active collaboration and
negotiation framework that uses an active document that consists of data and
software, data and macros, or data and scripts that can be manipulated
interactively. The document can initiate complex actions when certain form fields
are completed, which allows business logics or business rules to be embedded and
adapted to different collaborative strategies. An active collaboration and
negotiation framework is a negotiation support system to support decision-making
and group collaboration. This project proposes an active collaboration and
negotiation framework for the construction of a semi-automated negotiation
process in which a utility function depicts the preferences of the negotiators. A
semi-automated approach is used because human preferences and behavior are
very complex, and it is difficult to completely and precisely model internal
reference prices, reference prices, and different types of negotiation strategies.
This study allows human involvement in the determination of bargaining strategies
and utility functions, but the negotiation process is fully automated through the use
of mobile agents and stationary agents. Mobile agents are used because they can
carry active documents between the negotiators while the stationary agents process
the activities locally.
Software Requirements:
Language : Java JDK1.4

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

64
Session based Admission Control and Quality of Service Differentiation on e-
Commerce Server

Abstract: A session is a sequence of individual requests of different types made


by a single customer during a single visit to an e-Commerce site. During a session,
a customer can issue consecutive requests of various functions such as browse,
search, select, add to shopping cart, register, and pay. It has been observed that
different customers exhibit different navigation patterns. An e-Commerce session
contains a sequence of requests for various functions in different states. Requests
in different states have different opportunities to turn themselves to be profitable.
A scalable e-Commerce server should also provide different levels of QoS to
requests in different states in each session so that profitable requests like order and
checkout can be completed in a timely manner. Service differentiation is to treat
client requests differently based on clients’ needs and servers’ resource limitations.
Because clients are different in their visiting patterns, receiving devices and
service payments, a scalable e-Commerce server needs to provide different levels
of QoS to different clients.
In this project, a 2D service differentiation model has been proposed for
session-based e-Commerce applications, namely, inter-session and intra-session
differentiation. It proposes a processing rate allocation scheme for the objective of
achieving 2D proportional slowdown differentiation to the clients. Based on a
resource allocation optimization, then proposed a square-root proportional rate
allocation scheme that optimizes a system-wide QoS to the server and also
provides square-root proportional slowdown differentiation to the clients. The
results have shown that both schemes can consistently achieve predictable,
controllable, and fair 2D service differentiation in the short time scales and long
time scales. The square-root proportional rate allocation scheme provides 2D
service differentiation at a minimum cost of service slowdown. To improve the
web Quality of Service for web servers, a session-based admission control has
been introduced to prevent a web server from becoming overloaded and ensure the

65
longer session can be completed without disconnections. The term web quality of
service to describe the service levels needed to complete web sessions. A web
server that ensures a fair opportunity and guarantee of completion for all sessions,
independent of session length, exhibits good web quality of service. To satisfy the
web quality of service requirements, a session-based admission control mechanism
for a server handling a session-based workload would be implemented.
Software Requirements:
Language : Java JDK5

Java Technologies : Applets, Servlets, JSP, JDBC

Web Server : Tomcat 5.1

Operating System : Windows 2000

Backend Database :MS-Access

Relying on Safe Distance to Achieve Strong Partitionable Group Membership


in Ad Hoc
Abstract: Group membership has been an important problem in the area of fault-
tolerant distributed computing. Solving the problem requires the provision of a
service that establishes and maintains some kind of agreement over time among
participating components about who is currently in the group, despite the presence
of failures in the corresponding distributed system. Such a group membership
service simplifies the development of many fault-tolerant distributed applications
and is widely used for supporting reliable group communications. We encountered
a group membership problem in our attempt to support group computation in ad
hoc mobile environments. Peer-to-peer or group cooperation are common
scenarios for ad hoc mobile applications. When two or more mobile hosts come
together to form a group working on the same problem, it is sometimes essential
for all of them to have the same view of the joint computation state when they start
working or when some of the members leave the group. One important piece of

66
group state information is membership in the group, i.e., who is and who is not in
the working group.
The design of ad Hoc mobile applications often requires the availability of
the application state among the participating hosts. Such views are important
because they simplify both the programming and verification tasks. Our ultimate
goal is to provide application developers with the ability to maintain a consistent
global data structure in a setting in which mobile hosts come and go as they please
and engage in reliable transient collaborative activities. The group membership
service needs to provide an accurate snapshot of the membership view all the time,
and a message entrusted in a view shall be, guaranteed to be delivered to members,
given appropriate system assumptions. This property is preserved over time
despite movement and frequent disconnections. The protocol splits and merges
groups and maintains a logical connectivity graph based on a notion of safe
distance. We provide the specification for a partitionable group membership
service supporting ad Hoc mobile applications and propose a protocol for
implementing the service.
Software Requirements:
Language : Java JDK1.5

IDE : Netbean 5.5

Operating System : Windows 9x/2000 ,NT

Service-mining Based on the Knowledge and Customer Databases


Abstract: Nowadays, the application systems run in many companies such as
Enterprises Resource Planning(ERP), Customer Relationship Management(CRM)
are lack of the capability to mining from their database with some special service
guideline to find the best service opportunity and the best item of service for their
customers. Although, technology of Data mining provide us a way to find the
relevant knowledge from massive data, it is not suitable to those companies who
must provide their service by a fixed regulation but the service providing

67
opportunity is totally depend on the products condition. Service-mining is based
on customer service database, through analysis and statistics tool to obtain each
customer’s consumption characteristic or use habit of a certain specific product,
combining with relevant expert knowledge and service guideline issued by
products maker. The service mining system, which is based on knowledge and
customer database, can be applied to CRM. From the service mining to self-
improving of service quality, the system implements intellectual services through
the whole process automatically. This project implements service mining for
vehicle maintenance. The system contains three layers Data, Reasoning and
Application. It can predict a suitable time and the item of service through the
behaviors of a customer. The knowledge to predict is based on the data processing
from customer databases, and the knowledge can be amended by the system itself
as the new service records are added into customer databases. It provides the
solution to its users by reckon from knowledge and the records of customer
database.
Software Requirements:
Language : Java JDK1.5

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

Stock monitoring using mobile


The world is rapidly moving towards a mobile content revolution with services,
commerce and transactions available on mobile. This unique innovation, “Stocks
on Mobile” will empower mobile customers to stay in touch with their stock and
portfolio on a real time basis. Mobile customers would open the Stock applications
through GPRS connecting to retrieve and view the latest data from NSE. Now the
customer would be able to add, modify, delete, and search the stocks of the

68
portfolio he is monitoring, keep tab on number of stocks sold, calculate total profit
on the basis of his stock holding at any point of time, check the performance of a
script as per its movement in the market.
Software Requirements:
Language : Java JDK1.5 / j2ME

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

Sales Teams Automation

Abstract

Sales Teams Automation (STA) capabilities allow you to manage the entire
selling process, including sales order entry, post-sale follow-up and support, as
well as up selling opportunities. Unlike our competitors, Net Suite provides
complete customer purchase histories, which enable your sales representatives to
serve your customers better, improve customer satisfaction and increased
profitability.
On the Internet, E-Commerce is the selling of products, services, or
information between businesses. The companies buying from and selling to each
other online. But there's more to it than purchasing.. In traditional sales, the buyer
and/or the salesman are the active party. In one case, the buyer initiates the
purchase by either going to the store to buy or calling on the phone and making an
order. Due to increase in number of users on internet, many people want to attack
other system resources. Competitors also want to make their web site more
popular than others. So they want to attack the service of other’s web site. They
keep on logon to a particular web site more times, and then service provided by
the web server performance keeps degraded. In another situation, the salesman

69
goes to the home or place of business to make the sale, or he calls on the phone to
make the sale. A third method combines action from both parties.
Software Requirements:
Language : Java JDK1.5

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

ANTI-MONEY LAUNDERING COMPLIANCE SYSTEM

Abstract

Anti-money laundering (AML), these solutions worked by establishing


fixed rules-based monetary thresholds and detecting specific money laundering
patterns and user scenarios that breached those thresholds. These “intelligent
enterprise systems” are able to learn and adapt, comprehending new money
laundering schemes as they arise. With their enterprise-wide approach, they are
able to analyze both the client profile and all of the transactions that are
undertaken by them, helping the financial institution prevent money laundering
schemes in a much more effective and efficient manner. By analyzing financial
data, AML solutions allow the financial establishment to deter potential money
launders before they are able to proceed, providing protection in the form of full
compliance as part of a strategic anti-money laundering technology plan within
today’s financial organizations.
Failure to meet these anti-money laundering (AML) regulations or to allow
suspicious transactions to go undetected can have a severe impact on any financial

70
entity, including damage to its reputation, market capitalization, as well as its
customer perception and loyalty. The implementation of this software, that relies
on sophisticated behavior detection techniques to correctly assess an
organization’s current level of risk exposure, and ensure complete regulatory
compliance for all of their financial operations.
Software Requirements:
Language : Java JDK1.5

Java Technologies : Servlet, JSP, JDBC

Web Server : Tomcat Server

Operating System : Windows 2000

71

Vous aimerez peut-être aussi