Académique Documents
Professionnel Documents
Culture Documents
12. Session based Peak load management system for commercial web 15
server ( J2EE )
13. SNMP based Network Management Tool for Fault Isolation, 16
Detection and Recovery ( JAVA )
14. Web based Remote database Administration ( J2EE ) 17
1
22 Stegnography based on JPEG 2000 images ( JAVA ) 27
2
43 B2B Integration using Web Services ( J2EE ) 55
3
Integration of Watermarking and Cryptography Techniques for Electronic
Management of Copyright in Open-Networks
AREA: Network Security
ABSTRACT: The development of an Electronic Copyright Management System(ECMS)
to be used in open-network environments is becoming more and more urgent due to the
crucial role copyright protection plays in the diffusion of network multimedia services.
Watermarking is often invoked as a tool for the protection of Intellectual Property Rights
(IPR) of multimedia data distributed in digital form. A new system is presented which
integrates state-of-the-art water-marking with cryptography techniques to enable IPR
protection in open-network environments. Digital watermarking has recently been
proposed as an effective solution to copyright protection of multimedia data. A digital
watermark is unperceivable embedded into the data in such a way that a given piece of
information, which gives identity of the owner or of the authorized consumers, is
indissolubly tied to the data itself. Later on, such an information can be used to prove
ownership, to recognize the identity of a misappropriating person, to trace the
dissemination of the marked work through the network, or simply to inform users about
the identity of the rights-holder or the allowed use of data. The proposed system is a self-
contained one, in that, at any given time, the information needed to prove the legal/illegal
use of the data is hidden within the data itself, whereas no attempt is made to trace
previous abuses. Particular care is paid to grant to all the actors involved in the
distribution of the protected material the possibility of demonstrating the legitimate use of
the data in their hands. The proposed system uses both watermarking and cryptography
techniques to improve efficiency of the ECMS.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Applets, JDBC, J2EE
Web server : Tomcat 5.5
Operating System : Windows 2000
Backend Database :MS-Access
4
Lightweight Directory Access Protocol -Browsing And Access Management
System Using JNDI
ABSTRACT :
With rapid advancement in Technology, computer applications have become more
distributed, the efficient management and distribution of the information upon which they
depend becomes more and more of a problem. Directory service is a vital component of
network computing. By using a directory service, we can simplify applications and their
administration by centralizing the storage of shared information. As the use of the Java
programming language to write practical applications in a network environment increases,
the ability to access directory services will become essential. Directory services such as
LDAP (Lightweight Directory Access Protocol) address this problem. Lightweight Directory
Access Protocol (LDAP) is a fast growing technology for accessing common directory
information on a distributed network environment. LDAP has been embraced and
implemented in most network-oriented middleware. As an open, vendor-neutral standard,
LDAP provides an extendable architecture for centralized storage and management of
information that needs to be available for today’s distributed systems and services. The main
objective of the project is to develop a Client side Browser that can be connected to a
Directory server and access information that is organized in the directory. An important
application of this project is that User Specific Information can be retrieved in a very quick
way because directories are optimized for high volume lookup. The Project incorporates four
modules. They consist of a) Binding a Client to the server (With simple authentication), b)
Anonymous and Managerial User Functions, c) Search operations by adding various Filters
and for performing LDIF (LDAP data interchange format) operations like Importing and
exporting of data.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net.JNDI
Operating System : Windows 2000
5
Sustaining the availability of commercial Web Services against Distributed
Denial of Service attacks
Abstract : The objective of this project work is to design an effective and practical
counter measure that allows a victim system or network to sustain high availability
during such attacks. In particular, we propose a DDoS defense system for sustaining the
availability of web services. Protecting web services is of paramount importance because
the web is the core technology under-lying E-commerce and the primary target for DDoS
attacks. When a DDoS attack occurs, the proposed defense system When a DDoS attack
occurs, the proposed defense system ensures that, in a web transaction, which typically
consists of hundreds or even thousands of packets from client to server, only the very first
SYN packet may get delayed due to packet losses and retransmissions. Once this packet
gets through, all later packets will receive service that is close to normal level. This
clearly will lead to significant performance improvement. The basic idea behind the
proposed system is to isolate and protect legitimate traffic from huge volumes of DDoS
traffic when an attack occurs. Our first step is to distinguish packets that contain genuine
source IP addresses from those that contain spoofed addresses. Redirecting a client to a
new IP address and port number through a standard HTTP redirect message does this.
Part of the new IP address and port number will serve as a Message Authentication Code
(MAC) for the client’s source IP address. Packets from an attacker who uses spoofed IP
addresses will not have the correct MAC since the attacker will not be able to receive the
HTTP redirect message. This newly designed system that effectively sustains the
availability of web services even during severe DDoS attacks. Our system is practical and
easily deployable because it is transparent to both web servers and clients and is fully
compatible with all existing network protocols. Since the web is the core technology
underlying e-commerce and a primary target for recent DDoS attacks, this work offers a
practical solution to a very important security problem.
Software Requirements:
Language : Java JDK1.5,HTML
Java Technologies : Applets, JDBC, Servlets, JSP
Web server : Tomcat 5.5
Operating System : Windows 2000
6
Network Monitoring and Management using SNMP Protocol
Area : Network Management
The Simple Network Management Protocol (SNMP) is an application layer protocol that
facilitates the exchange of management information between network devices. It is part
of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP
enables network administrators to manage network performance, find and solve network
problems, and plan for network growth. An SNMP-managed network consists of three
key components: managed devices, agents, and network-management systems(NMS).A
managed device is a network node that contains an SNMP agent and that resides on a
managed network. Managed devices collect and store management information and make
this information available to NMS using SNMP. Managed devices, sometimes called
network elements, can be routers and access servers, switches and bridges, hubs,
computer hosts, or printers. An agent is a network-management software module that
resides in a managed device. An agent has local knowledge of management information
and translates that information into a form compatible with SNMP. An NMS executes
applications that monitor and control managed devices. NMSs provide the bulk of the
processing and memory resources required for network management. One or more NMSs
must exist on any managed network.
software specifications:
Language : Java JDK1.5
Java Technologies : Java.net
7
GUI Tool : NetBean 5.5
Operating System : Windows 2000
Project description
• Digital video enables quick and user friendly browsing of multimedia content,
thus is highly desirable in streaming video application. I propose to implement
efficient streaming video system over a distributed network.
• The success of peer-to-peer (P2P) applications in both commercial and research
fields received attention. The reduced bandwidth and caching cost for media
streaming thereby, provided a means for efficient streaming functionality.
• This concept relies on the Co-ordinator Node(CN) which is an edge router of the
network connecting to the p2p network i.e, Client Group
• Distributed Cache - sharing of the storage resources, thus the storage of one client
is made use by the needy in the group.
• The Co-ordinator Node takes care of the content distribution apart from normal
routing.
• During the first request of any media file, by any client, the CN obtains the video
segments from the server and places the segments in the distributed cache.
• Later when client requests for a streaming, the required frame segments are
provided by peer client as directed by the CN.
• Hence the network latency, network bandwidth, storage etc., are not significant
issues any more.
software specifications
Language : Java JDK1.5
Java Technologies : JDBC,Java.net,JMF2.0
GUI Tool : NetBean 5.5
8
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access
Software Requirements:
Language : Java JDK1.5, HTML
RDBMS : Oracle 9i
Development Methodologies : OOAD, UML &Unified process
Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1, JSP
Application Server : Weblogic8.1
Platform : WINDOWS NT/2000
9
Design and Implementation of a User-Centered Content Distribution
Network
Abstract: Content delivery networks are quite popular among administrators of large
Web sites. However, servers holding open-source content and small businesses may
prefer a cheaper, yet efficient, solution. We believe that such users are willing to
contribute their unused resources to the community in exchange for improved
performance for their own site. We propose a decentralized scheme where the owner of a
Web site can accept to host replicas from other sites, and obtain in return the ability to
deploy replicas of his own documents at remote places. This allows administrators to
independently organize a service similar to that of commercial CDNs. This approach is
attractive, since it allows one to acquire valuable remote resources in exchange for
relatively cheap local resources. Globule is a user-centered content delivery network that
our group is developing . It allows Web servers to host each other’s replicated Web
documents. To favor integration into existing Web systems, it is designed as a module for
the popular Apache server. This project presents the design and implementation of
Globule, together with performance measurements. Unlike most Web replication systems,
Globule does not apply a fixed replication policy to all documents. As we have shown in
previous research, there is no single policy that is best in all cases. This statement is true
even for simple Web documents that are constructed as a static collection of HTML files,
images, icons, and so on. As a consequence, Globule contains a multitude of replication
policies, and associates each document with the policy that suits it best. This is realized
with an object-based approach in which each document is encapsulated in an object that
is fully responsible for its own distribution. In other words, eachWeb document is
considered as an object which does not only encapsulate its state and operations, but also
the implementation of a replication policy by which that state is delivered to clients. This
allows a document to monitor its own access patterns and to dynamically select the
replication policy that suits it best.
Software Requirements:
Language : Java JDK1.4
10
Java Technologies : Servlet, JSP, JDBC and Tomcat Server
Operating System : Windows 2000
ABSTRACT : Now a days, the bank customer who is everything based on the
bank and can’t able to involve in the bank process. This Problem can be solved through
Internet and mobile System. The main aim of this project is to computerize the Bank
Process, which is used to reduce the customer transaction time as well as user can able to
access from anywhere using internet and mobile.
Internet and mobile banking people from every corner of the world can able to
view his account details. This system also used to transact money to another client over
the Internet and mobile. The user can verify his Cheque and demand draft details if
another person may pass a demand draft or cheque.
It provides a system for the user to access his bank account through his Internet
and mobile. The system also enables the user to pay his bill through the Mobile as well as
pay for some other services, which he has availed. The Internet and mobile banking
system is not just for payment but a user of the system can also transfer money through
the system. He can receive from his bank or from his business associates or friend or
other person who is also connected to the system.
software requirements
11
Distributed Heterogeneous database drive based on CORBA
Abstract:
The main goal of this project is creating the database driver for controlling remote
database using distributed object technology through Network. Distributed driver
supports various SQL commands like c
reate, insert, delete, update and view tables in a remote machine in user-friendly
manner. Using these driver users can flexibly change the database without changing the
driver. The concept used for creating and maintaining the remote database access using
CORBA. CORBA based driver is language and platform independent and it supports
different databases accessed from any remote locations within the internet. A CORBA-
based system is a collection
of objects that isolates the clients from the servers by a well-defined encapsulating
interface Implemented by Interface Definition Language.
The entire request is managed by the ORB. In other words, every invocation (whether it
is local or remote) of a CORBA object is passed to an ORB. CORBA based driver also
supports multiple heterogeneous databases so that it acts as database independent driver.
Since the driver is developed based on CORBA clients can be develop in any language
and platform supported by CORBA specification.
Software Requirements:
Language : JDK1.5
Java Technologies : Swing, JDBC and Java ORB
IDE : NETBEAN 5.5
Database : Oracle, MS-Sql Server, MS-Access
Operating System : Windows 2000/NT
12
Automata based Expert Knowledge Assessment System
Software Specification:
13
Advanced Data Preprocessing for Web Usage Mining
Abstract :
To design popular web sites, publishers must understand their user’s needs. So analyzing
user’s behavior recorded in web server log files are an important part of the design. Web
usage mining applies data mining procedures to analyze users access of web sites. As
with any knowledge discovery and data mining process, web usage mining contains three
main steps: preprocessing, knowledge extraction and results analysis. The concept of web
usage mining comes into play in case of networks where in there is an administrator
monitoring the activities of the user. Most servers have efficient methods for maintaining
the log information. But the drawback is in the representation of such details. The servers
monitor such logging information and maintain the details using special log files. These
files however represent information in form of raw textual data which is very difficult for
the users to understand.
The entire purpose is lost when the maintained files are in form of raw data,
which is extremely difficult to understand. Our tool will perform an efficient parsing on
the log file to store information onto convenient data structures in an explicit manner. The
GUI presents the user with an interface, which enables the user to query the information
stored in the log file. The user is allowed to specify filter variables on the basis of which
the entire domain of data is filtered and displayed to the user according to his need. Our
tool’s interface depicts a SQL command with graphical components such as buttons, text
fields, combo boxes, tables, etc. to perform the querying.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing
Web Server : Tomcat 5.5
IDE : NetBean 5.5
14
Operating System : Windows 2000/NT
Software Requirements:
15
SNMP based Network Management Tool for Fault Isolation, Detection and
Recovery
Abstract:
The main objective of this project is to design and development of network
management tool for network fault detection, isolation and recovery. The system uses
SNMP protocol to identify any fault occurs at any layer of internet protocol and this
model captures information related to the network Services, layers, nodes, and functions
in a systematic fashion. The use of a layered approach will precisely generate answers for
queries the operators typically have for quickly detecting, isolating and correcting faults.
A graphical interface model will automatically generate the related graphs to find out any
fault occurs within the network. Our model gives the user interface for presenting the
information generated from the graphs, at the operation time. A database also maintained
to store the details for future reference.
Network management allows a centralized network node, called the Network
Management System (NMS), to monitor and control other links and nodes of the
network. Monitoring is needed to detect any failures, to collect performance data to fine-
tune the network, and to provide resource usage information for billing purposes. Control
is needed to reconfigure the network and to take corrective steps, reacting to the various
failures. These corrective steps could be automated response from the NMS or human-
generated commands for diagnostics, tests, and resetting.
Software Requirements
16
Operating System : Windows 2000
17
Database : Oracle, MS-Sql Server, MS-Access
Operating System : Windows 2000/NT
ABSTRACT:
18
Language : Java (JDK 1.5), JDBC 2.0
Database : Oracle 9i
GUI : Swing
IDE : NetBean 5.5
Software Specification:
19
Platform : Windows 2000/NT
Language : Java (JDK 1.5)
Server side Technologies : Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Web Services : XML,WSDL,SOAP and UDDI
Server : Weblogic 8.1
Database : Oracle 9i
Single Sign on authentication
ABSTRACT :
With the increasing use of distributed systems users need to access resources that
are often remote. Traditionally users have had to sign-on to multiple systems, each of
which may involve different usernames and authentication techniques. In contrast, with
single sign-on, the user needs to authenticate only once and the authenticated identity is
securely carried across the network to access resources on behalf of the user. To solve
these problems by letting individuals log in to many Internet services while
authenticating only once, or at least always in the same way.
Enterprise hope that single-sign-on protocols will significantly decrease customer-care
costs due to forgotten passwords and increase e-commerce transactions by enhancing the
user experience. Commercial interest centers on distributed enterprises and on small
federations of enterprises with existing business relationships, such as supply chains. To
use sign-on protocol, an individual registers with a so-called identity provider. The
identity provider will later be the only party to directly authenticate the user, either
globally or within a federation of enterprises. This confirms the user’s identity to the
other parties, or service providers.
Software Requirements:
Language : JDK1.5
Java Technologies : Swing, JDBC, Servlets
IDE : NETBEAN 5.5
Web Server : Tomcat5.5
Database : MS-Access
20
Operating System : Windows 2000/NT
An extranet is like a “private” business club. It provides a central location for forging
deals, collaborating with outside companies, and transacting business with existing
trading partners. In an extranet, however, the “club” operates on-line and, since it uses the
same user-friendly technology that has made the Internet a global network, its “members”
can include companies of all sizes located in virtually every corner of the world.
The Project “E-Business Information Sharing using Extranet “ is aimed at to
make Car Company business dealing with the various business partners like Supplier,
Distributor, banker etc. through extranet. This Project is a part of an ongoing web
application Project. This Project provides more reliable security for the e-business
contributors.
The proposed system overcomes the drawbacks of existing client/server by
implementing Multi-tier Architecture in which the Business logic is completely separated
from the client and it forms the middle layer between the client layer and the data access
layer. Since the business logic is separated from the client any changes that has to be
made to the business logic can be made easily within short span of time.
The system is, basically a multi-tier, distributed, enterprise oriented one. It has the
features of working in a heterogeneous network, i.e., all the branch offices of the
enterprise are globally connected to a centralized server in a secured network. The Project
is based on an extranet through the Internet. The communication between the client and
the server happens through the Internet but only the authenticated users i.e., the
employees of the company have access to the system. Hence the system is secured from
unauthorized access.
21
Since all the offices are globally connected the current status of any particular
company is available at any time, which is very helpful to make effective management
decisions thus offering a competitive edge over the other enterprises.
The proposed system perfectly suits the heterogeneous network of systems as it is
developed using the platform independent enterprise solution the Enterprise Java Bean
Technology.
software specifications
22
Distributed Services using JINI (Distributed Objects)
Abstract:
Jini is the name for a distributed computing environment, which can offer ``network
plug and play’’. A device or a software service can be connected to a network and
announce its presence, and clients that wish to use such a service can then locate it and
call it to perform tasks. Distributed systems require strategies to detect and recover from
failures. One commonly used strategy employs a leasing mechanism, where a node grants
a leaseholder access to a resource for a limited time (the lease period). If the resource is
needed beyond the original lease period, then the leaseholder can renew the lease by
requesting additional lease periods. Once the resource is no longer needed, the
leaseholder may relinquish its lease. If the leaseholder does not renew a lease before
expiration of the lease period, the lease grantor assumes leaseholder failure and
terminates the lease to prevent resource leaks. In any leasing system, questions arise
regarding how to select the lease period. Choosing an appropriate lease period requires
consideration of tradeoffs among resource utilization, responsiveness, and number of
leaseholders. Jini can be used for mobile computing tasks where a service may only be
connected to a network for a short time, but it can more generally be used in any network
where there is some degree of change. There are a large number of scenarios where this
would be useful.
project description:
In our project we are going to access files (resource) from the remote service present in
the network. We are using three processes for access the resource. File browsing is the
process used to search the required files from the network (list of files which are
23
available for distributed computing displayed in the client machine). Downloading
process is used to download the selected files from the network. Scanning process is used
to scan the ports that are to find out which port is in open mode. Scanning is used to
identify which port is busy and which are not.
software specification
Language : Java JDK 1.5
Operating system : windows 2000/NT
Java technologies : jini 2.0
Abstract :
Recently, Computer security has become an important issue. More
and more systems have added control to the access process for avoiding illegitimate
users reading sensitive information. Cryptography is a powerful tool for building
secure distributed systems, at substantial computational cost. This is especially true
for public key cryptography. Cryptography is an often misunderstood and misused
security tool. Today more than ever, privacy is a necessary part of business
communications. Conventional wisdom dictates that cryptography must be done
locally in order to be secure. Security of data in transit over the Internet/intranet
becomes increasingly necessary because of steadily growing data volume and
importance. Also some confidential data like the transactions involving credit cards
through internet needs security as an important criteria. This network architecture
amortizes the cost of special purpose cryptographic hardware across many users.
24
to make use of TCP as a communication layer to provide a reliable end-to-end secure and
authenticated connection between two points over a network (for example between the
service client and the server). The plan is to design and implement Message Digest
Protocol, which Provides security using RSA algorithm and One-Way Hash Functions.
The main objective of the Message integrity protocol is
• Authenticating the client and server to each other
• Ensuring data integrity
• Securing data privacy
In our project we ensure security by implementing RSA and MD5 algorithm together.
Basic operations of MESSAGE INTEGRITY PROTOCOL is
Both the sender and receiver are authenticated separately by the authentication
server.
The data is encrypted using RSA algorithm. Then hash function is generated.
The encrypted message and hash function together are transferred to the
destination.
At the receiver side, integrity of data is checked by generating hash function using
the encrypted message sent.
Then the hash function generated at the receiver is checked with hash function send from
the transmitter.
software specifications
Language : Java JDK1.5
Java Technologies : JDBC,Java.net,Javax.crypto
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access
25
Distributed encoded Video Streaming through Caches.
Abstract : The efficient distribution of stored information has become a major concern
in the internet which has increasingly become a vehicle for the transport of stored video.
Because of the highly heterogeneous access to the Internet, researchers and engineers
have argued for layered encoded video. In this project we deliver layered encoded video
using caches and heuristics to determine which video and which layers in the video
should be cached in order to maximize the revenue from the streaming service.
The revenue increases nearly logarithmically with the cache size and linearly with the
link bandwidth that connects the cache to origin servers.
This project improves the efficiency of distributed video from servers to end users. As
with web content, it clearly makes sense to insert intermediate cache between the server
and client. This will allow users to access much of the stored video content from near by
servers, rather than accessing the video from a potentially distant server.
software specifications
26
Operating System : Windows 2000
RDBMS : Oracle9i/MS-Access
ABSTRACT:
software specifications
Language : Java JDK1.5
Java Technologies : Java.net
GUI Tool : NetBean 5.5
Operating System : Windows 2000
27
INTEGRATED DATA MIGRATION
Abstract:
Integrated data migration is a semi enterprise application which provides data transfer
between two applications along with data format conversion, platform independence.
Server Operations
Displays the menu
Creates the new Instance of a server when requested
User Authentication is done in server
User Management is a main Operation of server
Accepts the User information and connects to the database and checks for a valid
user
If valid user Client gui will be displayed for futher actions
If not, an error message will be displayed
Receives the user details and registers the user as an valid user
Option is provided to edit user details after registration
Administrator can view the user details
If required, administrator can also delete the user
28
Mysql connection-Provides access to MySQL
Oracle connection -Provides access to Oracle
Client Operations
Displays the client Main Menu
If “Select” menu item is selected you are provided with two panels
You can enter the database name and save the data in the text file if you have
choosen TextFile panel
You can choose Database File panel if you need to convert from one data format
to another (for ex oracle to mysql)
If DataBaseFile panel is choosen we enter the database name,the available table
will be displayed
You can choose any table that needed to be converted
Once you choose the table, the content of the table will be displayed along with
options to convert the table to required format
Once the table is selected the data in the table are copied in to text file and the
fields are seperated using the delimiter %
You can choose any type of conversion
According to the option the details of conversion and required format should be
provided
Advantages
29
Avoids Manual Insertion of Data into the Database
software specifications
The Project “E-Business Information Sharing using J2EE “ is aimed at to make Car
Company business dealing with the various business partners like Supplier, Distributor,
banker etc. through extranet. This Project is a part of an ongoing web application Project.
This Project provides more reliable security for the e-business contributors.
The proposed system overcomes the drawbacks of existing client/server by
implementing Multi-tier Architecture in which the Business logic is completely separated
from the client and it forms the middle layer between the client layer and the data access
layer. Since the business logic is separated from the client any changes that has to be
made to the business logic can be made easily within short span of time.
30
The system is, basically a multi-tier, distributed, enterprise oriented one. It has the
features of working in a heterogeneous network, i.e., all the branch offices of the
enterprise are globally connected to a centralized server in a secured network. The Project
is based on an extranet through the Internet. The communication between the client and
the server happens through the Internet but only the authenticated users i.e., the
employees of the company have access to the system. Hence the system is secured from
unauthorized access.
Since all the offices are globally connected the current status of any particular
company is available at any time, which is very helpful to make effective management
decisions thus offering a competitive edge over the other enterprises.
The proposed system perfectly suits the heterogeneous network of systems as it is
developed using the platform independent enterprise solution the Enterprise Java Bean
Technology.
software specifications
31
RDBMS : Oracle 9i
Abstract : The Role based access control consists of four basic components: a set of
users Users, a set of roles Roles, a set of permissions Permissions, and a set of sessions
Sessions. A user can be a human being or an autonomous agent. A role is a collection of
permissions needed to perform a certain function within an organization. A permission
refers to an access mode that can be exercised on an object in the system and a session
relates a user to possibly many roles. In each session, a user can request activation of
some of the roles he is authorized to assume. Such request is granted only if the
corresponding role is enabled at the time of the request and the user is entitled to activate
the role at that time. In the RBAC model, for four sets, namely, Users, Roles,
Permissions, and Sessions, several functions are defined. The user role assignment and
the role permission assignment functions model the assignment of users to roles and the
assignment of permissions to roles, respectively. The user function maps each session to a
single user, whereas the role function establishes a mapping between a session and a set
of roles activated by the corresponding user in the session. In many practical real time
applications, users may be restricted to assume roles only at predefined time periods.
roles may only be invoked on pre-specified intervals of time depending upon when
certain actions are permitted. However, the TRBAC model addresses the role enabling
constraints only. In this project, we propose a Generalized Temporal Role-Based Access
32
Control model capable of expressing a wider range of temporal constraints. In particular,
the model allows expressing periodic as well as duration constraints on roles, user-role
assignments, and role-permission assignments. In an interval, activation of a role can
further be restricted as a result of numerous activation constraints including cardinality
constraints and maximum active duration constraints The main features of this model
include periodic enabling of roles and temporal dependencies among roles which can be
expressed through triggers. A role is said to be enabled if assumed by a user. Priorities are
associated with role events, which in conjunction with a set of precedence rules, are used
to resolve conflicts. TRBAC also allows an administrator to issue runtime requests for
enabling and disabling a role.
This project has been implemented based on Enterprise Banking System. Enterprise
Banking System is developed in intranet environment using web interfaces.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Applets, JDBC, J2EE
Operating System : Windows 2000
WebServer : Tomcat 5.5
Database : MS-Access/Oracle 9i
SECURE E-VOTING
Abstract: With a rapid growth in computer networks, many people can access the
network through the Internet and therefore an electronic voting can be a viable alternative
for conducting an election. An electronic voting system must attempt to achieve at least
the same level of security as ordinary elections. We have developed an electronic voting
system, E-voting for a general election. The E-voting system employs cryptographic
techniques to overcome the security issues in the election process. In this system, voter's
privacy is guaranteed by using a blind signature for confidentiality and voter's digital
signature for voter's authentication. E-voting is implemented by employing Java
technology and cryptography provider. The provider, which is an open source library, is
used to provide the secure communication channel. Using password-based encryption
33
with SHA and DSA algorithm so that only valid voter can use it protects the voter’s
private key for digital signature.
Software Specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP, JDBC, JNDI, Servlets, Javax.crypto
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Browser : Internet Explorer 5.1 & Netscape Navigater
Operating System : Windows 2000
34
We take advantage of application-specific semantics to design distributed objects that
each manages a specific subset of shared information using simple and effective
consistency models. Our experimental results show that by slightly relaxing consistency
within individual distributed objects, our application realizes both high availability and
excellent performance.
Software Requirements:
Platfrom : Windows9x/2000
Language : Java JDK1.5, J2EE.
Web server : Tomcat Server 5.5.
35
Authentication and Authorization
Integrity
Fault-Tolerance
Attack-Tolerance
Software Requirement :
Platform : Windows 2000/NT
Language : Java (JDK 1.5)
Java Tech : Java.net, JDBC
Database : MS-Access
GUI : Swing
IDE : NetBean5.5
36
algorithm outperforms existing ones by combining their advantages without presenting
their deficiencies.
Software Requirements:
Language : Java JDK1.5,HTML
Java Technologies : Applets, JDBC, Servlets, JSP
Web server : Tomcat 5.5
Operating System : Windows 2000
Abstract : The popularity of the Internet and World Wide Web continues to grow. So
does the number of users accessing information on the Web. This leads to continued
increase of both network load and server load. One way to meet this challenge is to try to
scale network and server bandwidth to keep up with the client demand, which is an
expensive strategy. An alternative is caching, which reduces network bandwidth and
server load by migrating server files closer to those clients that use the files. Caching can
be done either at a client (by Web browser) or in the network between clients and content
servers (by proxy servers) Cooperative caching the sharing and coordination of cache
state among multiple caching proxies has been recognized as one of the most important
techniques to reduce Web traffic and alleviate network bottlenecks.
In this project, we propose a simple and yet effective scheme to limit the replication of
documents within a group. We view the aggregate disk space of the cache group as a
global resource of the cache group and introduce the concept of cache expiration age to
measure the disk space contention of caches. The new scheme is based on the expiration
37
ages of individual caches in the group, referred to as the Expiration Age-based scheme
(EA scheme for short). The EA scheme effectively reduces the replication of documents
across the cache group, while ensuring that a copy of the document always resides in a
cache where it is likely to stay for the longest time. Further, the implementation does not
involve any extra communication overheads when compared with the ad hoc scheme
used in many existing cooperative-caching protocols.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Tomcat Server
Operating System : Windows 2000
38
computation required at the sources and sinks. In this paper, we evaluate the situations in
which CBM is advantageous. The benefits of CBM depend critically upon how well
filters are placed at interior nodes of the IP multicast tree and the costs depend upon
those introduced by filters themselves. Further, we consider the benefits of allowing the
filters to be mobile so as to respond to user mobility or changes in user interests and the
corresponding costs of filter mobility. The criterion that we consider is the total network
bandwidth utilization.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, Java.net, JDBC
Operating System : Windows 2000
39
Certification decides if transaction t can commit or must abort. This technique shares the
communication requirements with active replication: Only one total order broadcast is
needed per transaction. This technique does not have the drawbacks of active replication:
It can handle interactive transactions. On the other hand, this technique is optimistic:
Conflicting transactions might be processed only to be aborted at the certification phase.
This means such techniques are effective in low-conflict situations.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC
Database : Oracle9i
Operating System : Windows 2000
Peer Trust
40
today’s online communities, we introduce Peer-Trust model with five important
parameters and a general trust metric combining these parameters for evaluating the
trustworthiness of a peer in an evolving P2P community. We also present the trust
information dissemination architecture, the usage of the trust model, and the design and
implementation considerations of PeerTrust.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC, JXTA
Operating System : Windows 2000
ABSTRACT:
The main aim of this project is to design and implement an Intranet Portal
for a university department using Java 2 Enterprise Edition (J2EE) technologies. We will
develop the system for the Computer Science department of the University.
As most other university departments, the CS department has a traditional and static
webpage. It displays the general information about the department, such as the programs/
courses offered, faculty / staff directory, and student organizations. This type of webpage
suffers from two shortcomings: First, it does not serve as an interactive media for the
students and faculties in the department. That is, it does not provide any facilities for a
student, a faculty member, a research group, or a student club, to communicate or
collaborate with the others in the same department. Second, it needs webmaster’s manual
effort to present the up-to-date information about the department, such as news and
events-to-come. In today’s world, it is difficult to rely on a single webmaster to present
frequently updated information. If anybody eligible in the department can upload new
information, information will be shared in a more efficient way.
41
To address these problems, we propose to develop an Intranet portal that provides the
following functionalities:
A user (faculty or student) belonging to the respective home department can log in
using his/her ID and Password. Then depending on the type of the user, the portal will
present information that is relevant to that particular user and his/her specific request.
The faculty and students can be given different access rights to the various resources
presented.
The faculty members can upload their research work, post lecture notes, and make
announcements.
The students can search, view and download online material posted by faculty.
A user can send messages to another user or a group of users.
The faculties and students can participate in text-based discussion forums which is
viewable to everyone.
Data collection techniques such as Surveys and Polls can be implemented to collect
information from different groups of users. This data can further be analyzed to get a
perception of the aspects of a user or a group of users. This will make the portal more
interesting and informative.
We propose to use J2EE to implement this system. Using J2EE the entire system can be
developed following a 3-tier architecture model. This is known as MVC2 (Model-View-
Controller) architecture in which an application's data model, user interface, and control
logic are separated into three distinct components so that modifications to one component
can be made with minimal impact to the others.
Software Requirements:
Web Server : Tomcat 5.5
Server side scripting : JSP
Database : MS-Access
Language : Java JDK1.5,HTML
42
Technologies : JSP,JDBC, Servlets,
GUI tool : NetBeans 5.5
Monitor : SVGA(M)
This status reporting tool allows the managers to predict the accuracy with which
the employees are working. This is important because an accurate forecast is the key for
having the right product, in the right place, at the right time. By providing an accurate
forecast, the correct product can be delivered to the customers at the right time. The
proposed project aims to design an application by which it is possible for the managers to
predict the performance of the employees. The system permits only authenticated users
who have been assigned access rights to work with the application.
On login, the system validates the user and displays he various working links. The
user can then select the necessary link to work upon. But there is some restriction on the
access of the various links. The employees are only allowed to enter their daily timesheet
and are not allowed to access other links or even view other employee’s details. The
employees can only enter the working details and are not allowed to modify the details
but are allowed to modify their personal details. The entry of the daily working hours is
done on weekly basis.
The project leaders are can view the details of the employees only under their
projects. The Project leader has to enter the details of the umber of resources, training
details for particular project.
43
The project managers can have access to almost all the employees in the
company. The project manager is the one who can allocate projects to the employees. For
this project manager must look upon the projects on which the employees are working so
that any employee is not overloaded. The project allocates the projects and decides the
project leader and the employees for that particular project.
The Group leader can view and even modify the employee details. It is only the
Group leader who can have access to the overall company aspects regarding the resources
and the other billing details in the form of an excel sheet. Thus only the Group leader can
access to all the links.
User and Group level security is implemented in this status reporting tool.
The benefits of this tool are:
Saves time for managers. The Timesheet entry module handles most of the
details involved with the total working hours of each employee.
Software Requirements:
44
Trust Management in E-Commerce
Abstract: The Internet changed the way people do business and communicate with each
other. Since many of the resources on the Internet are private and not public, protection
mechanisms are necessary to control the access to those resources. Various security
mechanisms are deployed to protect private or commercial digital information accessible
through the Internet. However, even when a secure and confidential channel is
established between two entities, the concern about the trustworthiness of the participants
in a transaction remains. Trust or reputation management is an important issue in e-
commerce, where traders might have never met and know nothing about each other’s
trustworthiness. This lack of information about traders’ reputations causes uncertainty
and mistrust, which influences the e-market’s economic efficiency. The access control
mechanisms used in traditional security infrastructures have been proven inadequate,
inflexible, and difficult to apply to the Internet of today. In this work, we have proposed a
general purpose, application-independent Distributed Trust Management System
(DTMS). In DTMS, access rights are directly associated with a trust value. The trust
values are further classified into direct trust values, indirect trust values and trust
authorization levels. We have calculated and expressed each type of the trust values into
explicit numerical numbers.
45
Reputation value is within the range of (0, 3000). A new user is assigned 0, the minimum
value. A current user’s reputation is always higher than a new user’s. Two users can only
rate each other once. If two users interact multiple times, Sporas only accepts the latest
rating. This helps avoid the problem of two users intentionally increasing their reputation
value by frequent interactions. It changes the reputation value of users with very high
reputation values more slightly. A distributed trust management broker framework for e-
services, such as e-commerce has introduced in this project. In their framework, each user
(a client or a trader) is associated with a broker, which collects trust ratings of any service
providers for its users. The trust-management framework consists of users, brokers, and
reputation authorities. A broker maintains a database, which collects and stores trust
information for the users that it’s associated with. When a client needs a trader’s trust
information, it first contacts its broker. The broker’s reputation manager component
processes requests from clients associated with the broker. If it can’t handle a request, it
passes the request to the broker’s connection manager. The connection manager sends the
request to other brokers and processes their replies. If no broker can provide the required
information, it sends the request to the reputation authority. The reputation authority is
designed as a universal database. It collects trust information from the public in a
voluntary way and stores trust information for all users.
Software Requirements:
46
E-Police-crime Investigation management system
Abstract: The institution is the Police. The proposed system applies to Police
Institutions all across the country and specifically looks into the subject of Crime Records
Management. It is well understood that Crime Prevention, Detection and Conviction of
criminals depend on a highly responsive backbone of Information Management. The
efficiency of the Policing function and the effectiveness with which it tackles crime
depend on what quality of information it can derive from its existing records and how fast
it can have access to it. It is proposed to centralize Information Management in Crime
for the purposes of fast and efficient sharing of critical information across all Police
Stations across the territory. Initially, the system will be implemented across Cities and
Towns and later on, be interlinked so that a Police detective can access information across
all records in the state thus helping speedy and successful completion to cases. The
System would also be used to generate information for pro-active and preventive
measures for fighting crime. The project has been planned to be having the view of
distributed architecture, with centralized storage of the database. The application for the
storage of the data has been planned. Using the constructs of MS-SQLServer2000 and all
the user interfaces has been designed using the JSP technologies. The database
connectivity is planned using the “SQL Connection” methodology. The standards of
security and data protective mechanism have been given a big choice for proper usage.
The application takes care of different modules and their associated reports, which are
47
produced as per the applicable strategies and standards that are put forwarded by the
administrative staff.
software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : MS-Access
This project used to develop the facilities for online booking system for employees. The
employee can able to search details like the portal for the best deals for air-fare, hotels,
rent car and package tours. The employee can able to booking the online transaction like
air tickets, hotel accommodation, rent cars and package tours. The queries/transactions
should be made from a database of travel-sites, where the air- fare, hotel, car rental and
tour information are stored, for every travel site.
software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML
Server : Tomcat 5.5
GUI Tool : NetBean 5.5
Operating System : Windows 2000
RDBMS : Oracle 9i
48
Efficient and Flexible E-Cash payment to prevent blackmailing
Abstract : Recent advances in the Internet and WWW have enabled rapid development
in e-commerce. More and more businesses have begun to develop or adopt e-commerce
systems to support their selling/business activities. While this brings convenience for
both consumers and vendors, many consumers have concerns about security and their
private information when purchasing over the Internet, especially with electronic
payment or e-cash payment. This project proposes a practical payment protocol with
scalable anonymity for Internet purchases. The protocol uses electronic cash for payment
transactions. It is an offline payment scheme that can prevent a consumer from spending
a coin more than once. Consumers can improve anonymity if they are worried about
disclosure of their identities to banks. An agent provides high anonymity through the
issue of a certification. The agent certifies re-encrypted data after verifying the validity of
the content from consumers, but with no private information of the consumers required.
With this new method, each consumer can get the required anonymity level, depending
on the available time, computation, and cost. This system spends less computational
resources and reduces network communication. No one can trace consumers from cash.
However, the identity of a consumer can be found if he/she uses a coin twice. This project
also prevents blackmailing by modifying existing e-cash system. A new online electronic
cash scheme to prevent blackmailing is present by using group blind signature technique.
The blackmailed cash was marked by an entity, called supervisor, so that the bank can
distinguish it from the valid cash. Our scheme not only has all the advantages of existing
49
scheme, but also overcomes its some drawbacks such as inefficiency and impractical
assumptions.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 2000
50
scheme, every intermediate node may check the 1- and 2-hop neighbor’s digital
signatures, which guarantee that no single node may modify the public key certificate
information during the distribution process. Our proposed scheme can be operated in a
fully self-organized manner without relying on any central administration or CA.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 200
Efficient and Flexible Digital Money Payment in Internet based Online
Transactions
Abstract : Recent advances in the Internet and WWW have enabled rapid development
in e-commerce. More and more businesses have begun to develop or adopt e-commerce
systems to support their selling/business activities. While this brings convenience for
both consumers and vendors, many consumers have concerns about security and their
private information when purchasing over the Internet, especially with electronic
payment or digital money payment. This project proposes a practical digital money
payment protocol with scalable anonymity for Internet purchases. The protocol uses
electronic cash for payment transactions. It is an offline payment scheme that can prevent
a consumer from spending a coin more than once. Consumers can improve anonymity if
they are worried about disclosure of their identities to banks. An agent provides high
anonymity through the issue of a certification. The agent certifies re-encrypted data after
verifying the validity of the content from consumers, but with no private information of
the consumers required. With this new method, each consumer can get the required
anonymity level, depending on the available time, computation, and cost. This system
spends less computational resources and reduces network communication. No one can
trace consumers from cash. However, the identity of a consumer can be found if he/she
uses a coin twice.
51
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC and Crypto
Web Server : Tomcat 5.5
Operating System : Windows 2000
Abstract:
In multimedia age, new functionalities and capabilities are needed for managing new
kind of data: images, sounds, text, video data, and their combination into composite
objects .The special and temporal, retrieval, browsing, Integration and presentation
requirements of multimedia data significantly differ from traditional data. Fuzzy Logic is
known for providing a convenient tool for interfacing linguistic categories with numerical
data and for expressing user’s performance in a gradual and qualitative way. Fuzzy set
methods have been already applied to the representation of flexible queries and to the
modelling of uncertain pieces of information in databases systems, as well as in
information retrieval. This methodology seems to be even more promising in multimedia
databases which have a complex structure and from which documents have to be
retrieved and selected not only from their contents, but also from “the idea” the user has
of their appearance, through queries specified in terms of user’s criteria. This project
provides a preliminary design of the potential applications of fuzzy logic in multimedia
databases. The problem of comparing Semi-structured document is first discussed.
Querying issues are then more particularly emphasized. We distinguish two types of
request, namely, those which can be handled within some extended version of an SQL-
like language and those for which one has to elicit user’s preference through examples.
52
Software Requirements:
Language : JAVA JDK 1.5
Java Technologies : JDBC
IDE : NetBeans 5.5
Database : ORACLE 9i
Operating System : Windows2000/NT
Abstract:
Enterprise Java Beans (EJB) is a new technology that aims at supporting
distributed transactional component-based applications written in Java. One of the main
goals of EJB is the support of electronic transactions on the Internet. In EJB, distributed
flat transactions are supported with no means for supporting long-lived or cooperating
transactions. In recent years, a lot of new advanced software applications have arisen,
which have new requirements for transaction processing. Since EJB is modern concept
that deals with transactions, the project analyze the support of EJB for those requirements
for advanced transactions and identifies weaknesses of transactions in EJB. The project
also implements an extension of the current transactional concepts in EJB, which can be a
remedy for some of the weaknesses identified. The extension, called Bourgogne
transactions, allows a transaction to delegate bean objects to other transactions, to share
bean objects with other transactions, and to establish flow control dependencies between
transactions. Implementation issues together with pitfalls of the proposed extension are
also analyzed.
Software Requirements:
Language : Java JDK1.5, HTML
RDBMS : Oracle 9.0
Development Methodologies : OOAD, UML &Unified process
53
Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1
Application Server : Weblogic8.1
Platform : WINDOWS NT/2000
54
dynamic execution, data abstraction and hiding, faster execution, reusability, easier
debugging etc.,
Software Specification:
Platform :Windows 2000/NT
Language :Java (JDK 1.5)
GUI :Java Applets, HTML
Server side Technologies : Java Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Server :Weblogic 8.1
Database :Oracle 9i
55
a Web Services standard, to describe their public and private Web Services and publish
their Web Services either to a private or public repository and directory using UDDI.
software specifications
Language : Java JDK1.5 , HTML
Java Technologies : JSP,JDBC,JNDI,Servlets,XML,SOAP,UDDI
Application Server : Weblogic 8.1
GUI Tool : NetBeans 5.5
Operating System : Windows 2000
RDBMS : Oracle 9i
Abstract: Protection of data against unauthorized disclosure has been the major issue in
database systems. As organizations increase their adoption of database systems as the key
data management technology for day-to-day operations and decision making, the security
of data managed by these systems becomes crucial. Damage and misuse of data affect not
only a single user or application, but may have disastrous consequences on the entire
organization. Hence the confidentiality and integrity is required to prevent unauthorized
disclosure and modification. The proposed system implements Discretionary Access
Control and Mandatory Access Control. Access control mechanisms of current DBMSs
are based on discretionary policies governing the accesses of a subject to data based on
the subject’s identity and authorization rules. These mechanisms are discretionary in that
they allow subjects to grant authorizations on the data to other subjects. Because of such
flexibility, discretionary policies are adopted in many application environments and this
is the reason that commercial DBMSs adopt such policies. An important aspect of
discretionary access control is thus related to the authorization administration policy.
Authorization administration refers to the function of granting and revoking
authorizations. Mandatory access control policies regulate accesses to data by subjects
on the basis of predefined classifications of subjects and objects in the system. Objects
are the passive entities storing information, such as relations, tuples in a relation, or
56
elements of a tuple. Subjects are active entities performing data accesses. The
classification is based on a partially ordered set of access classes, often referred to as
labels, that are associated with every subject and object in the system. A subject is
granted access to a given object if and only if the access classes of the object and the
subject satisfy some order relationship, depending on the access mode. This system also
detects any intrusion in database.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Swing, java.net, JDBC
Operating System : Windows 2000
A Compressed Video Database Structured for Active Browsing and Search
Abstract—In this project, we describe a unique new paradigm for video database
management known as ViBE (video indexing and browsing environment). ViBE is a
browseable / searchable paradigm for organizing video data containing a large number of
sequences. The system first segments video sequences into shots by using a new feature
vector known as the Generalized Trace obtained from the DC-sequence of the
compressed data. Each video shot is then represented by a hierarchical structure known as
the shot tree. The shots are then classified into pseudo-semantic classes that describe the
shot content. Finally, the results are presented to the user in an active browsing
environment using a similarity pyramid data structure. The similarity pyramid allows the
user to view the video database at various levels of detail. The user can also define
semantic classes and reorganize the browsing environment based on relevance feedback.
We describe how ViBE performs on a database of MPEG sequences.
Software Environment
57
GUI : Swing
IDE : NetBeans 5.5
58
video web servers and provides a querying/browsing interface. Each news video story is
represented by its story abstract, which consists of key sentences and key frames
generated from news script and news video stream, respectively. Especially, the
visualized scanning of key frames facilitates the quick understanding of a news video
story. Preprocessing server summarizes the story abstract based on the classification and
generates metadata based on the content of the news video and key frame. Once a user
find out his concerned news story, he could click the provided link to access the whole
video of this news story stored in its corresponding news video web server.
Software Requirements:
Language : Java JDK1.5
Java Technologies : Servlet, JSP, JDBC, Java.net
Webserver : Tomcat 5.5
Operating System : Windows 2000
This project is aiming at logically dividing the network into differnt groups based
upon its significance.
There is a server running in the network which is keeping track of all the available
computers connected in the network.
A computer connected in the network is not knowing about other machines
available in the network.
The machine which is looking for a resource (client)is making a query to the server
in the form of request.
The server will acknowledge the request and broadcast this query to all machines
connected in a particular Group.
The server will wait until it receives response from each nodes in the network.
This response will be sent to the machine which had asked for the resource.
The response basically contains the IP address of the machines in the network
which contains the requested resource. Once the IP address is known, the client
machine can directly contact the machine which has the resource directly bypassing
the server.
59
The various functionalities supported by this architecture are-
FILE LISTING
FILE DOWNLOADING
KEYWORD SEARCH
INSTANT MESSAGING
SOFTWARE SPECIFICATIONS
Language : Java JDK1.5
Abstract :
PEER-TO-PEER (P2P) computing has recently attracted a great deal of
research attention. In a P2P system, a large number of nodes can potentially be
pooled together to share their resources, information, and services. Many file-
based P2P systems have already been deployed. The JXTA platform provides
developers with a flexible, standards-based set of protocols and reference libraries
using java programming. Using JXTA, developers can focus on implementing
their collaborative applications rather than on the specifics of P2P technology. The
JXTA platform is the next stage of development in the maturing P2P arena, a
fundamental shift in the way people use the Internet. Using JXTA, developers can
create new applications that will communicate with any number of distributed
peers, providing distributed search, file sharing, and collaboration services without
relying on the traditional client/server hierarchy. The result is more robust and
reliable applications that enable users to fully realize the communication
capabilities of the Internet. This project is designed to search and locate the video
shared among the peer group. This project has the capability of serving multimedia
60
resources with high availability at a much lower cost while maximizing the use of
resources from every peer connected to the P2P network. It also provides
ownership of media files, any peer accessing video can be played by the peer and
can not be redistributed or copied into the local system. JXTA Platform has been
extensively used to develop the project.
Software Requirements:
Language : Java JDK1.4
61
A User Centric Transaction Management system uses the Load Balancing controller the
feedback control mechanism and it relies on an admission control algorithm along with a
new update frequency modulation scheme in order to maximize user satisfaction metric.
The QAC uses Adaptive Allocation Algorithm to decide upon whether to accept or reject
the query. The Update frequency modulation uses Lottery Scheduling based upon the
frequency to decide whether to accept or reject the updation.
Software Requirements:
Language : Java JDK1.4
62
workload is a promising approach. It advocates dedicating servers to requests of
similar size, with the aim of reducing the average job slowdown through
separation of long and short jobs. The policy is based on the empirical distribution
of the workload resource demands, i.e., the request sizes and their frequencies. The
policy is examined under a workload that changes dramatically across time and
uses knowledge of the history of request distribution to allocate incoming requests
and to adjust its balancing parameters on-the-fly. Workload aware load balancing
tends to assign requests for the same file to the same server, thus it achieves a high
cache hit ratio and low slowdowns. Unlike location-aware policies, though, it does
not have to maintain the status of each server’s cache.
SOFTWARE REQUIREMENTS:
Abstract: Electronic marketplaces have recently been built that allow many types
of multiple-criteria bargaining schemes. Within these marketplaces, systems have
been constructed to enable bargaining between a single buyer and a single seller,
which is known as bilateral bargaining; forward auctions that involve many buyers
and one seller and reverse auctions that involve one buyer and many sellers, which
are known as multilateral bargaining; and dynamic exchanges between many
buyers and many sellers, which are termed double-sided bargaining. However,
63
recent developments in information technology have enabled the creation of a
single platform that can aggregate many buyers and sellers with various pricing
schemes through the use of such technologies as mobile agents, which combine
the demands of buyers to solicit better offers from sellers. This project proposes a
negotiation support system that uses the utility function to model the preferences
and strategies of negotiators. The proposed system is an active collaboration and
negotiation framework that uses an active document that consists of data and
software, data and macros, or data and scripts that can be manipulated
interactively. The document can initiate complex actions when certain form fields
are completed, which allows business logics or business rules to be embedded and
adapted to different collaborative strategies. An active collaboration and
negotiation framework is a negotiation support system to support decision-making
and group collaboration. This project proposes an active collaboration and
negotiation framework for the construction of a semi-automated negotiation
process in which a utility function depicts the preferences of the negotiators. A
semi-automated approach is used because human preferences and behavior are
very complex, and it is difficult to completely and precisely model internal
reference prices, reference prices, and different types of negotiation strategies.
This study allows human involvement in the determination of bargaining strategies
and utility functions, but the negotiation process is fully automated through the use
of mobile agents and stationary agents. Mobile agents are used because they can
carry active documents between the negotiators while the stationary agents process
the activities locally.
Software Requirements:
Language : Java JDK1.4
64
Session based Admission Control and Quality of Service Differentiation on e-
Commerce Server
65
longer session can be completed without disconnections. The term web quality of
service to describe the service levels needed to complete web sessions. A web
server that ensures a fair opportunity and guarantee of completion for all sessions,
independent of session length, exhibits good web quality of service. To satisfy the
web quality of service requirements, a session-based admission control mechanism
for a server handling a session-based workload would be implemented.
Software Requirements:
Language : Java JDK5
66
group state information is membership in the group, i.e., who is and who is not in
the working group.
The design of ad Hoc mobile applications often requires the availability of
the application state among the participating hosts. Such views are important
because they simplify both the programming and verification tasks. Our ultimate
goal is to provide application developers with the ability to maintain a consistent
global data structure in a setting in which mobile hosts come and go as they please
and engage in reliable transient collaborative activities. The group membership
service needs to provide an accurate snapshot of the membership view all the time,
and a message entrusted in a view shall be, guaranteed to be delivered to members,
given appropriate system assumptions. This property is preserved over time
despite movement and frequent disconnections. The protocol splits and merges
groups and maintains a logical connectivity graph based on a notion of safe
distance. We provide the specification for a partitionable group membership
service supporting ad Hoc mobile applications and propose a protocol for
implementing the service.
Software Requirements:
Language : Java JDK1.5
67
opportunity is totally depend on the products condition. Service-mining is based
on customer service database, through analysis and statistics tool to obtain each
customer’s consumption characteristic or use habit of a certain specific product,
combining with relevant expert knowledge and service guideline issued by
products maker. The service mining system, which is based on knowledge and
customer database, can be applied to CRM. From the service mining to self-
improving of service quality, the system implements intellectual services through
the whole process automatically. This project implements service mining for
vehicle maintenance. The system contains three layers Data, Reasoning and
Application. It can predict a suitable time and the item of service through the
behaviors of a customer. The knowledge to predict is based on the data processing
from customer databases, and the knowledge can be amended by the system itself
as the new service records are added into customer databases. It provides the
solution to its users by reckon from knowledge and the records of customer
database.
Software Requirements:
Language : Java JDK1.5
68
portfolio he is monitoring, keep tab on number of stocks sold, calculate total profit
on the basis of his stock holding at any point of time, check the performance of a
script as per its movement in the market.
Software Requirements:
Language : Java JDK1.5 / j2ME
Abstract
Sales Teams Automation (STA) capabilities allow you to manage the entire
selling process, including sales order entry, post-sale follow-up and support, as
well as up selling opportunities. Unlike our competitors, Net Suite provides
complete customer purchase histories, which enable your sales representatives to
serve your customers better, improve customer satisfaction and increased
profitability.
On the Internet, E-Commerce is the selling of products, services, or
information between businesses. The companies buying from and selling to each
other online. But there's more to it than purchasing.. In traditional sales, the buyer
and/or the salesman are the active party. In one case, the buyer initiates the
purchase by either going to the store to buy or calling on the phone and making an
order. Due to increase in number of users on internet, many people want to attack
other system resources. Competitors also want to make their web site more
popular than others. So they want to attack the service of other’s web site. They
keep on logon to a particular web site more times, and then service provided by
the web server performance keeps degraded. In another situation, the salesman
69
goes to the home or place of business to make the sale, or he calls on the phone to
make the sale. A third method combines action from both parties.
Software Requirements:
Language : Java JDK1.5
Abstract
70
entity, including damage to its reputation, market capitalization, as well as its
customer perception and loyalty. The implementation of this software, that relies
on sophisticated behavior detection techniques to correctly assess an
organization’s current level of risk exposure, and ensure complete regulatory
compliance for all of their financial operations.
Software Requirements:
Language : Java JDK1.5
71