Vous êtes sur la page 1sur 92

. OBJECTIVES OF PROJECT WORK: 1.

To provide students the knowledge regarding the application of theoretical concepts learnt (for the design or manufacturing of component) throughout the course of their study. 2. To make the student understand the manner in which a company/industry is organized to carry out different tasks involved in producing a product (hardware/software). 3. To equip the student with knowledge of how to be an entrepreneur to start their own company/industry. 4. To give the student a kind of orientation towards research and development activities in a particular area. RULES: 1. Students are advised to choose an area of their interest for the purpose of doing project work. 2. The minimum number of students allowed for a project is 1 and the maximum number is 2. 3. The students have to do the project work in the college itself, working with their respective allotted guides. 4. The students are advised to collect the information regarding the required material like text books, reference books, websites, and concerned journal papers from their respective guides. 5. After the allotment of the project, students have to meet their guides and submit a letter of registration duly signed with their allotted guides on or before 12-1- 12,failing the students will not be allowed for project work in this semester/year. 6. The attendance for the project work will be given from the date of registration as per JNTU regulation (8hrs/week). 7. The role of each team member should be clearly defined while submitting the synopsis of each seminar. 8. Students have to maintain a dairy/observation book for his day to day work and should get it signed by guide discussing the progress in the work which will be considered for the attendance. 9. A consolidated weekly status report is to be submitted by every student to the guide indicating the progress in the work. The weekly status report should be signed by the guide as well as HoD. Weekly Status Reports should be as per the given guidelines. 1

10. Each student is required to give 4 seminars during the course of the project work. 11. All seminars should be given using power point. The students have to submit synopsis copy as per the guidelines and copy of manuscript of the respective chapters two days prior to the date of presentation of the seminar. They should submit the hard and soft copy (C.D.) of PPT at the time of presentation. 12. The first seminar should be given after the allotment of the project as per the schedule, giving the overview of the work to be carried out in the form of an abstract. This abstract must be submitted in a file (Extra Thick office file). By 20- 1-12, students have to submit his abstract. If he fails to submit by 27th January he is not permitted to continue his project. 13. The student who is absent for two seminars of the Project Evaluation without proper prior permission and a genuine proof for absence, will not be permitted to attend END SEMISTER EVALUATION. Such student should re-register for the project work in the next academic year. If a student obtains prior permission from respective guide, student will be given a chance of ONE WEEK to give seminar with 10 marks deduction in INTERNAL EVALUATION 14. If his seminar is rejected/cancelled he will be given a re-seminar date by the HoD, guide. If his seminar for second time also gets rejected he is not permitted to continue his project work. 15. The second seminar should be given indicating the progress in the work, explaining implementation procedures to be followed with UML diagrams / Circuit diagram along with photos/demonstration of the working models being developed. 16. The third seminar should be given at the time of submission of the manuscript, about the total project work done. During this seminar, student has to clearly show the results of the project (working models/working software). 17. No project will be accepted unless working model/software (with code) with desired results is produced to the college. 18. 19. A certificate will be issued to all the students who successfully complete the project work within the campus as per the given guidelines. One best project will be selected from each section and a certificate of appreciation will be issued to the students who carried out such project. 20. The project evaluation will be done on the following basis

A. CONTINUOUS EVALUATION

Continuous Evaluation Procedure


Sl. No. Stage of Project Work Preliminary Stage i) Submission of Abstract ii) Abstract Presentation iii) Submission of the File iv) Submission of Soft & Hard copy of the Presentation v) Project Knowledge Test Design Stage i) Submission of synopsis of Literature Survey and Design part ii) Literature Survey & Design Presentation iii) Submission of Manuscript Copy of chapters 1 and 2 iv) Submission of Soft & Hard copy of the Presentation v) Project knowledge test Implementation Stage i) Submission of synopsis of partial output part ii) Presentation of Partial output iii) Submission of Manuscript Copy of chapters 3 and 4 iv) Submission of Soft & Hard copy of the Presentation v) Project Knowledge Test Evaluation Stage i) Submission of synopsis of complete project result i) Presentation of complete result of the project ii) Submission of Manuscript Copy of chapters 5 and 6 iii) Submission of Soft & Hard copy of the Presentation v) Project Knowledge Test Marks 05 20 05 10 05 15 10 -10 05 15 10 -10 05 15 10 -10

01

02

03

04

Note: The average of above 4 seminar marks will be taken for awarding continuous evaluation marks. B. END SEMESTER EVALUATION A) Project demonstration B) Project knowledge test C) viva-voce D) Documentation 40 marks 40 marks 40 marks 40 marks

ii. GUIDE LINES FOR ABSTRACT WRITING An abstract is a short summary of the project work. The entire abstract should be given in three paragraphs without any subheadings. Abstract should explain regarding Motivation: This section should include the importance of the work, the difficulty of the area, and the impact it might have if successful. Problem statement: Scope of the work (a generalized approach, or for a specific situation) Approach:Plan to go about solving or making progress/extension on a given problem using simulation, or analytic models, or prototype construction, or analysis of field data for an actual product. Explain the extent of the work. Explain the important variables to be controlled, ignore. (input for the project work). Results: The expected answers (output). Conclusions: The implications of the project and limitations if any.

iii. GUIDE LINES FOR SYNOPSIS WRITING: A synopsis is a brief overview of a reports most important points, designed to give readers a quick preview of the contents. Its often included in long informational reports dealing with technical, professional or academic subjects. Because its a concise representation of the whole report, it may be distributed separately to a wide audience; interested readers can then order a copy of the entire report. FORMAT OF SYNOPSIS A synopsis must have the following headings: TITLE: Should reflect the objectives of the study. INTRODUCTION: Should contain brief background of the selected topic. It must identify the importance of study, its relevance and applicability of results. It must clearly state the purpose of the study. OBJECTIVES: Objective should start with an action verb and be sufficiently specific, measurable, achievable, relevant and time bound (SMART). STUDY DESIGN: Mention the name of the appropriate study design. DURATION OF STUDY: How long the study have taken with dates.

ii. GUIDELINES FOR PROJECT REPORT WRITING

All the IV/IV B.Tech students are here by informed to follow the instructions given below in preparing the IV Year Project Report. I. Cover Page (See Proforma) II. Report Contents 1. 2. 3. 4. 5. 6. Title Page (See Proforma) Certificate signed by the Guide, HOD and Principal (SEE PROFORMA) Acknowledgement (up to Main Report use roman number as page number: (i, ii, iii) Abstract Content with page numbers. Main Report With Chapter-number and name in separate page Chapter 1: Introduction 1.1 Preamble of the Project 1.2 Objective of the Project Chapter 2: Problem Definitions 2.1 Previous methods 2.2 Project Approach / Motivation of the Project Literature Survey Design of the Project (Flowchart & Algorithm (If Any)) Implementation & Testing

Chapter 3: Chapter 4: Chapter 5:

Chapter 6: Results Chapter 7: Chapter 8: Conclusions and Future Scope User manual (Steps how to use the project along with the respective screen shots) A: Data Sheets or Simulation steps of Specification (if any) B: Acronyms C: Figure No Page No. D: Table No Page No.

Bibliography: (As specified in IEEE format) NOTE: Each Figure / Table should be given with number and name description.

Guide: N. KRISHNA CHYTHANYA


Designation: Associate Professor, Head, CSE Dept Project 1: Context Driven Search Engine (CDSE) Project 2: Gajendhra MokshamAn animated Movie. Project 3: Project to develop Non-Verbal Reasoning Question Paper

Project 4: Project for calculating Space and Time complexity of program.

. Project 1: Title:- Context Driven Search Engine (CDSE) Description:- The Context Driven Search Engine is an idea to refine the working of existing search engine such that the C.D.S.E. shall prompt the user with the relevant key words when searching based on the context of search. The context here in the sense that the prompting is based on the previous searched key word. The keyword should be divided into different categories and based on the previous search context corresponding keywords from the corresponding category can be prompted. Estimated Man Hours to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 8hrs Implementation 32hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 94.30hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies Suggested Readings i) Books: 1) ADO.NET za 21 dn, Dan Fox, Computer Press, Prague, Pearson Education, 2002 2) Visual C# .NET Krok za Krokem, John Sharp, Jon Jagger, Mobil Media, Microsoft Press, 2002 3) XML by v pkladech, Benoit Marchal, Computer Press, Prague ii) Journals: 1) Taha, K. Elmasri, R. XCDSearch: An XML Context-Driven Search Engine, Knowledge and Data Engineering, IEEE Transactions on Dec. 2010 Volume: 22 Issue: 12 On page(s): 1781 - 1796 2) Minjuan Zhong and Xingdong L. A Domain-Based Intelligent Search Engine Computational Intelligence Lecture Notes in Computer Science, 2006, Volume 4114/2006, 461-467, DOI: 10.1007/11816171_55 iii) Websites: 1) Google, Wikipedia are example websites 2) www.htmlgoodies.com/ 3) www.usernomics.com/user-interface-design-journals.html 4) www.desilva.biz/webdsn/ Project 2:

. Title:- Gajendhra MokshamAn animated Movie. Description::-Ghajendra Moksham is a small mythological story which is delivered by all raconteurs. This is a small story belonging to great epic BHAGHAVATHAM, written by Shri POTHANA. The story is all about how lord Vishnu saved the life of his ardent devotee An Elephant from the clutches of A Crocodile. The idea is to develop animated movie for the same story such that it can be sent to any Film Festivals. The purpose is to pass on the heritage to the forthcoming generations through latest technology. Estimated Man Hours to complete Project:Understanding Theme 10hrs Abstract Preparation 8hrs Literature Survey 20hrs Design Document 16hrs Learning Flash/MAYA 15hrs Implementation 35hrs Testing 12hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 128.30hrs per student. --------------------------------------. Platform (Suggested):- ADOBE FLASH technology or MAYA software Suggested Readings i) Books: 1) Bhaghavatham by Pothana 2) Procedural elements for computer graphics by David F. Rogers, McGrawHill, 1985 3) Hollywood 2D Digital Animation: The New Flash Production Revolution ii) Websites: 1) http://journal.animationstudies.org/ 2) http://www.animationjournal.com/ 3) http://www.informatik.uni-trier.de/~ley/db/journals/jvca/index.html 4) Journal of graphics tools 5) http://tv.adobe.com/show/flash-lite-distributable-player-tutorials/ 6) http://www.adobe.com/devnet/flashplayer/article-index.html 7) http://usa.autodesk.com/maya/ 8) www.youtube.com/watch?v=s0aLDwVmzGg 9)http://www.ehow.com/how_6766945_make-animated-movie-computer.html

10

. Project 3: Title:- Project to develop Non-Verbal Reasoning Question Paper. Description::- One of the easiest way to check the mental strength, sharpness of any job aspirant is to check his reasoning ability. The reasoning ability can be checked by questionnaire consisting of written question or of Non-Verbal questions i.e. Figures. The aim of the project is to develop a five figure non-verbal reasoning question paper that can be used by any organization at the time of recruitment drives to conduct preliminary test. Estimated Man Hours to complete Project:- 98hrs *2 students=194 hrs Understanding Domain 10hrs Abstract Preparation 8hrs Literature Survey 18hrs Design Document 12 hrs Implementation 40hrs Testing 8hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 98.30hrs per student. --------------------------------------. Platform (Suggested):- The project can be developed using .NET for GUI and Microsoft Tools for actual question paper preparation. Suggested Readings i) Books: 1) ADO.NET za 21 dn, Dan Fox, Computer Press, Prague, Pearson Education, 2002 2) Visual C# .NET Krok za Krokem, John Sharp, Jon Jagger, Mobil Media, Microsoft Press, 2002 3)Non-Verbal Reaosning by R.S.Agarval, Pearson Education. ii) Websites: 1) www.free-training-tutorial.com/ 2) www.infiniteskills.com/.../learning-microsoft-word-2011-for-the-mac.. 3) www.globalknowledge.net.in/mircosoft

11

. Project 4: Title:- Project for calculating Space and Time complexity of program. Description::- The best program is one which makes use of less memory of system and which utilizes CPU for less time but does the work efficiently. Identifying such programs is a daunting task. One mechanism is to calculate the Time & Space Complexity and based on comparison we can specify which program is best for the same logic to be implemented. Estimated Man Hours to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 10 hrs Implementation 30hrs Testing 8hrs Result analysis 8hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 83.30hrs per student. --------------------------------------. Platform (Suggested):- The project can be developed using .NET for GUI . Suggested Readings i) Books: 1) Introduction to Design and Analysis of Algorithms-by-R.C.T.Lee. pearson 2) ADO.NET za 21 dn, Dan Fox, Computer Press, Prague, Pearson Education, 2002 3) Design and Analysis of Algorithms-by- Ellis Horowitz,3rd edition, pearson 4) Data Structures and Algorithm Analysis-by-Allen weiss ,TMG hill. ii) Websites: 1) www.free-training-tutorial.com/ 2) www.slideworld.com/pptslides.../ 3) www.scuec.edu.cn/jsj/jpkc/algorithm/res/ppt 4) www.cs.iupui.edu/~xkzou/teaching/.../Introduction.ppt

12

Guide: A. UGENDHAR
Designation: Associate Professor,CSE Dept Project 1: Citizen Card System Project 2: Web Dynamics Project 3: Monitoring Online Tests through Data Visualization

13

. Project 1: Title:- Citizen Card System Description: The Project Citizen Card System gives us the information about the citizen in any country. A Citizen has unique Id to find out the personal information in each and every department or service wherever a citizen goes. This information can be found out by the unique Id of the citizen. If any citizen wants to utilize the services or utilities by the Government or Private organizations, he has to go to each and every department with different Id for that particular department. Instead, a citizen card helps in having all the utilities and services under one unique Id. This system not only helps us to know the information about the services or utilities but also it gives the information about the character of the citizen in credit rating. Estimated Man Hours Needed to complete Project:- 94hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 18hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 30min -------------------------------------Total (Approx) 94.15hrs per student. --------------------------------------. Platform (Suggested):- Microsoft Visual Studio .Net-2008 Suggested Readings i) Books: 1) Asp. Net Programming With C++ and SQL Serverby Don Gosselin,10th edition Cengage Learning 2) Web technologies by chrisbates 2nd edition, dreamtech wiley ii) Journals: Andersson, C., et al. (2005) "Trust in Prime". in IEEE International Symposium on Signal Processingand Information Technology, iii) Websites: 1) www.htmlgoodies.com/ 2) www.usernomics.com/user-interface-design-journals.html 3) www.desilva.biz/webdsn/

14

. Project 2: Title:- Web Dynamics Description: Content Product Management System is providing services in the areas of providing information to the different areas such as Development, Business, Management, Technology etc. Content Product Management System is divided into two major halves. 1)Content Creation/Hosting 2) Content View This is administration section of the site where the content is created by a group of professionals possessing different specialization. This section is divided in four stages. i. Authoring ii. Editing iii. Approving iv.Deploying After going through these four phases of content management the content is available to the users. Each content is placed in one of the three different categories. The content to be view is divided into three halves. a)Developer Content b)Manager Content c) Protected Content The Protected content is login protected where as the other two are open to all. Estimated Man Hours Needed to complete Project:- 90hrs *2 students=180 hrs Abstract Preparation 8hrs Literature Survey 22hrs Design Document 8hrs Implementation 28hrs Testing 8hrs Result Analysis 6 hrs Document Preparation 8hrs Seminars (7*15min)= 1.30min Knowledge test 30min -------------------------------------Total (Approx) 90hrs per student. --------------------------------------. Platform (Suggested):- The project can be implemented ASP.Net (C# Code Behind) Suggested Readings i) Books: 1) Asp. Net Programming With C++ and SQL Serverby Don Gosselin,10th edition,Publisher: Cengage Learning 2) Web technologies by chrisbates 2nd edition,dreamtech wiley ii) Journals: 1) Web Semantics: Science, Services and Agents on the World Wide Web Copyright 2012 Elsevier B.V. All rights reserved Volume 9 (2011) Issue 4 - selectedpp. 347-504 (December 2011) special issue on Semantic Search iii) Websites: 1) www.htmlgoodies.com/ 2) www.usernomics.com/user-interface-design- journals.html 3) www.desilva.biz/webdsn/

15

. Project 3:Title: Monitoring Online Tests through Data Visualization Description: E-TESTING systems are widely adopted in academic environments, as well as in combination with other assessment means, providing tutors with powerful tools to submit different types of tests in order to assess learners knowledge. Among these, multiple- choice tests are extremely popular, since they can be automatically corrected. Estimated Man Hours Needed to complete Project:- 92hrs *2 students=194 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 92.25hrs per student. --------------------------------------. Platform (Suggested):- .NET Suggested Readings Suggested Readings i) Books: 1)Advanced Program -With Microsoft Visual BASIC Net / With 5 CDs (04) Bob Spear (Paperback | ISBN10: 0619213612; ISBN13: 9780619213619) ii) Journals: 1) J. Bath, Answer-changing behaviour on objective examinations, The Journal of Educational Research, no. 61, pp. 105107, 1967. 2) J. B. Best, Item difficulty and answer changing, Teaching of Psychology, vol. 6, no. 4, pp. 228240, 1979. 3) J. Johnston, Exam taking speed and grades. Teaching of Psychology, no. 4, pp. 148149, 1977. iii) Websites: 1) www.htmlgoodies.com/ 2) www.usernomics.com/user-interface-design- journals.html 3) www.desilva.biz/webdsn/

16

Guide: S.NARASIMHA RAO


Designation: Associate Professor,CSE Dept Project 1: Development of a Lost Articles and Letters Reconciliation System Project 2: Development of a feature-rich Employee Separation System (E-Separation System) Project 3: Development of a Web Based Meeting Scheduler

Project 4: Ranking Spatial Data by Quality Preferences

17

. Project 1: Title:- Development of a Lost Articles and Letters Reconciliation System Description:- A Post Office wants to improve its efficiency by delivering the lost letters and lost articles (which are sent in parcels) in a short period of time. Currently it takes about 3 months for a lost letter or a lost article to reach the correct destination. A machine reads addresses on letters. The ones, which could not be read by machine, are sorted by human intervention. Even after this, the address is not readable, it becomes a lost letter. Articles that fall out of the parcel become lost articles. When the sender/receiver calls up or contacts the post office for their letter/article, a manual note is made and then this note is sent to the warehouse where lost articles and lost letters are kept. The reconciliation process of finding the lost letter/article is manual and sometimes wrong letter/article(s) is sent. You have to develop a system, which captures the above functionality and reduce the turnaround time from 3 months to 10 working days. This is an Intranet application. Estimated Man Hours Needed to complete Project:- 95hrs *2 students=190 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 8hrs Implementation 32hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 92.30hrs per student. --------------------------------------. Platform (Suggested):- Java using MS-SQL server, Oracle Stored Procedures, Java Applets, HTML Suggested Readings i) Books: 1) Electronic Postage Systems,Technology&Security by Gerrit Bleumer , 1 edition (December 11, 2006); Springer; 2) Java 2: The Complete Reference,by Herbert Schildt; Fifth Edition; McGraw-Hill 3) Microsoft SQL Server 2005 Reporting Services by Brain Larson; 3 edition (August 21, 2008); McGraw-Hill ii) Journals: 1) Postal Journal Sources of the Postal Services Problems and Solutions to Explore by John Waller American Enterprise Institute November 4, 2011 iii) Websites: 1) www.indiapost.gov.in/ 2) www.javafile.com/ 3) www.sql-server-performance.com/2006/related-web-links/ 18

Project 2: Title:- Development of a feature-rich Employee Separation System (E-Separation System) Description:- The E-Separation System will facilitate the automation of the employee Separation process The application will automate the existing task of the employee to initiate the separation process and get clearance from all the departments online. Human Resource Development can process the separation online and provide the relieving letter once the clearance is obtained. This is also applicable to a college scenario where a student has to get a no-due certificate from various departments such as libraray, hostel, etc, before completion of the program. Estimated Man Hours Needed to complete Project:- 97hrs *2 students=194 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 10hrs Implementation 30hrs Testing 8hrs Result Analysis 10 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 96.30hrs per student. --------------------------------------. Platform (Suggested):- ASP.NET using DB2. Suggested Readings i) Books: 1) Employee Engagement: A Roadmap for Creating Profits, Optimizing Performance, and Increasing Loyalty by Federman; 1 Edn Jossey-Bass; 2) 25 Essential Lessons for Employee Management by Dennis L. DeMey ISBN-10: 1889150258; Facts on demand press. 3) Pro ASP.NET 4 in C# 2010 by Matthew MacDonald, Adam Freeman. 4 edition (June 30, 2010); Apress 4) DB2 Developer's Guide (4th Edtn) by S. Mullins; 4th Edn.(May2000); ii) Journals: 1) Journal of Management ,The Employee Separation Process : Criterion Related lssues Associated with Tenure and Turnover by Edward R Kernery SAGE, 1989 vol 15. No 3. 417- 424. iii) Websites: 1) www.asp.net/ 2) www.ibm.com/software/data/db2/ 3) http://pdx.edu/hr/separating-employees 19

. Project 3: Title:- Development of a Web Based Meeting Scheduler Description:- This project is aimed at developing a scheduler for group meetings. This is a web-based tool. Any user can call for a meeting and send the detailed co-ordinates of the meeting (location, date, time etc) to all invitees. This is useful for a small office, school or a department or for that matter any group who is interested to organise it effectively. Facility to book room and editing booked room are also available. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 8hrs Implementation 32hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 94.30hrs per student. --------------------------------------. Platform (Suggested):- .NET and using SQL Server Suggested Readings i) Books: 1) Pro ASP.NET 4 in C# 2010 by Matthew MacDonald, Adam Freeman.4th Edition; A Press. 2) Microsoft SQL Server 2005 Reporting Services by Brain Larson; 3rd edition (August 21, 2008); McGraw-Hill ii) Journals: 1) Preference-based meeting scheduler using ontology by Khan, M.A.; Nawaz, F.; Farooq Ahmad, H.; Latif, IEEE Computer, Control and Communication, 2009.IC4 2009 vol.12, (17-18 feb 2009)no.4, pg1-6 iii) Websites: 1) www.web-based-software.com/calendar-event-scheduling/ 2) www.asp.net/ 3) www.sql-server-performance.com/2006/related-web-links/

20

. Project 4: Title:- Ranking Spatial Data by Quality Preferences Description:-A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, using a real estate agency database of flats for lease, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g., restaurants, cafes, hospital, market, etc.) within their spatial neighborhood. Such a neighborhood concept can be specified by the user via different functions. It can be an explicit circular region within a given distance from the flat. Another intuitive definition is to assign higher weights to the features based on their proximity to the flat. In this project, we formally define spatial preference queries and propose appropriate indexing techniques and search algorithms for them. Extensive evaluation of our methods on both real and synthetic data reveals that an optimized branch-and-bound solution is efficient and robust with respect to different parameters. Estimated Man Hours Needed to complete Project:- 97hrs *2 students=194 hrs Abstract Preparation 8hrs Literature Survey 14hrs Design Document 10hrs Implementation 32hrs Testing 8hrs Result Analysis 10hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 96.30hrs per student. Platform (Suggested):- .NET and using SQL Server 2005 Suggested Readings i) Books: 1) Geographic Data Mining and Knowledge Discovery by Han; 2nd Edn Springer 2) Pro ASP.NET 4 in C# 2010 by MacDonald, Freeman.4th Edition; A Press. 3) Microsoft SQL Server 2005 Reporting Services by Brain Larson; 3rd edition (August 21, 2008); McGraw-Hill ii) Journals: 1)Ranking Spatial Data by Quality Preferences by Man Lung Yiu, et al ; IEEE transactions on knowledge and data engineering VOL. 23, NO. 3, MARCH 2011 pages: 433- 446 2) Distance Browsing in Spatial Databases", by G.R. Hjaltason and H. Samet ACM Trans. Database Systems, vol. 24, no. 2, pp. 265- 318, 1999. iii) Websites: 1) www.spatialdatamining.org/publications 2) www.asp.net/ 3) www.sql-server-performance.com/2006/related-web-links/ 21

Guide: K. SHARMILA REDDY


Designation: Associate Professor, CSE Dept Project 1: Bug Tracking System Project 2: Docket Chunk System Project 3: Data Centralization over Networks Project 4: Host-to-Host Congestion Control for TCP

22

. Project 1: Title:- Bug Tracking System Description: Bug Tracking System is an ideal solution to track the bugs of a product, solution or an application. Bug Tracking System allows individual or groups of developers to keep track of outstanding bugs in their product effectively. This can also be called as Defect Tracking System. The Bug Tracking System can dramatically increase the productivity and accountability of individual employees by providing a documented workflow and positive feedback for good performance. Some salient features are: Product and Component based, Creating & Changing Bugs at ease, Query Bug List to any depth, Reporting & Charting in more comprehensive way, User Accounts to control the access and maintain security, Simple Status & Resolutions, Multi-level Priorities & Severities, Targets & Milestones for guiding the programmers, Attachments & Additional Comments for more information, and Robust database back-end. Estimated Man Hours Needed to complete Project:Abstract Preparation 08 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 40 Hrs Testing 10 Hrs Result Analysis 10 Hrs Documentation Preparation 13 Hrs Seminars 04 Hrs Test : 01 Hr -------------------------------------Total (Approx) 109 hrs per student. --------------------------------------. Platform (Suggested):- .Net Frame work & visual Studio. Suggested Reading i) Books: 1) VB.Comparision of. C# and VB.Net By Sam Nasr October 26, 2004. 2) C# Programming Language ,4th Edition by Microsoft .NET Development Series by Anders Hejlsberg, Mads Torgersen, Scott Wiltamuth, Peter Golde 3) Software Testing Primer by Nick Jenkins. 4) Automated Software Testing by Elfriede and Jeff Rashka 13th printing, 2008. 5) Effective Methods for Software Testing, 2nd Edition , by William E. Perry ii) Journals: 1) Bug Tracking and Reliability Assessment System (BTRAS), Intl Journal of Software Engineering and Its Applications, Vol. 5 No. 4, Oct, 2011 by V.B. Singh, 2) International Journal of Open Source Software & Processes with Title: Tools for the Study of the Usual Data Sources found in Libre Software Projects by Gregorio. 3) International Journal of Software Engineering and Its Applications Vol. 5 No. 3, July, 2011 47 Disability-Aware Software Engineering for Improved System Accessibility and Usability by Julius T. Nganji and Shawulu H. Nggada iii) Websites: 1) www.software testinghelp.com 23

. 2) www.qualitytesting.info

24

. Project 2: Title: Docket Chunk System Description: The objective of this application is to manage an file sharing site. The Company can create a employee database, each one with his/her assigned folder. Within this folder, the employee can upload their files or download the one already in the folder already uploaded by the company itself. When the company uploads a file in an employee folder, the employee will receive an email alerting him of the new file and with a link to download it without logging in the File Sharing System. The employee can also log into the system any time and lock for previously uploaded files. Estimated Man Hours Needed to complete Project:Abstract Preparation 08 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 40 Hrs Testing 10 Hrs Result Analysis 10 Hrs Documentation Preparation 13 Hrs Seminars 04 Hrs Test : 01 Hr -------------------------------------Total (Approx) 109 hrs per student. Platform (Suggested):- .Net Suggested Reading i) Books: 1) Microsoft Press "Programming Microsoft visual C# The Language" by Donis Marshall, 2005 2) John Sharp - Microsoft Visual C# 2005 Step by Step Published on December 19, 2007, Length:704 Pages, 3) David Weller - Beginning .NET Game Programming in C# ,1ST Edition 4) Data and Computer Communications, Seventh Edition by William Stallings 5) Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition) by Radia Perlman ii) Journals: 1. Communication & Mass Media Complete (CMMC), Database and Data Communication Network Systems, Three-Volume Set Techniques and Applications By Cornelius T. Leondes, 952 pages, 2002, USD 1635.00, Elseiver. 2. A Taxonomy of IEEE 802.11 Wireless Parameters and Open Source Measurement Tools, by Turletti, Thierry; Dujovne, Diego; Filali, Fethi, Vol. 12, no. 2, 2010, IEEE transactions iii) Websites: 1) www.ebscohost.com 25

. Project 3: Title: Data Centralization over Networks Description: DATA CENTRALIZATION OVER NETWORKS (Data-CON) aims the centralization of data in different platforms. The data, which are based in different platforms, can be centralized in an unique server. The main peculiarity of the Data-CON is that the clients can use different platforms and databases. Data-CON can be used to synchronize data in different databases such as SQL, ORACLE, MYSQL, ACCESS, etc. It can be used as a backup tool. Data-CON aims to develop client and server tools to centralize over various networks. Data-CON can be used to centralize dates in both Internet and Intranet, and it can be used to synchronize data between different network points. Data-CON supports the communication between the clients in different platforms. It may also be used as a chat application. It allows both online and off-line communication. Data-CON can be used as a backup tool for taking file backup from network, Internet and local machine. Exiles, which are created in monitored folders, are copied over the network to the central folder, which can be used as backup .folder or central storage. Estimated Man Hours Needed to complete Project:Abstract Preparation Literature survey Design Documentation Implementation Testing Result Analysis Documentation Preparation Seminars Test : 08 Hrs 15 Hrs 08 Hrs 40 Hrs 10 Hrs 10 Hrs 13 Hrs 04 Hrs 01 Hr 109 hrs per student.

-------------------------------------Total (Approx) --------------------------------------. Platform (Suggested):- .Net Suggested Reading

i) Books: 1) Microsoft Press "Programming Microsoft visual C# The Language" by Donis Marshall, 2005 2) John Sharp - Microsoft Visual C# 2005 Step by Step Published on December 19, 2007, Length:704 Pages, ISBN 13: 97807 35624306 3) David Weller - Beginning .NET Game Programming in C# ,Format: Kindle Edition, Length: 439 pages, Source ISBN: 1590593197, Publisher: March 5, 2004 4) Data and Computer Communications, Seventh Edition by William Stallings 5) Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition) by Radia Perlman

26

. ii) Journals: 1. Network Virtualization: Concepts and Performance Aspects by Aaron Falk Aug 26, 2009 in International Journal of Communication Networks and Distributed Systems (IJCNDS) ISSN (Online): 1754-3924 - ISSN (Print): 1754-3916 2. How to Deal with Replication and Recovery in a Distributed File Server by Itziar Arrieta-Salinas, J.R. Jurez-Rodrguez, J.E. Armendriz-igo, J.R. Gonzlez de Mendvil. The 4th International Conference on Software and Data Technologies (ICSOFT 2009), July 26 - 29, 2009, Sofia, Bulgaria. Vol. 2, pgs. 147-152. INSTICC Press. ISBN: 978-989-674-010-8. 3. Revising 1-Copy Equivalence in Replicated Databases with Snapshot Isolation by F.D. Muoz-Esco, Josep Maria Bernab-Gisbert, Rubn de Juan-Marn, J.E. Armendriz-igo, J.R. Gonzlez de Mendvil. The 11th International Symposium on Distributed Objects, Middleware, and Applications (DOA 2009) vol. 5870, pgs. 467-483, Springer Berlin / Heidelberg, ISSN: 0302-9743, ISBN: 978-3-642-05147-0. iii) Websites: 1) www.search.epnet.com 2) www.elsevier.com 3) www.books.google.co.in

27

. Project 4: Title: Host-to-Host Congestion Control for TCP Description: The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works. Performance characteristics of a particular version of TCP are defined by the congestion control algorithm. The proposed solutions focus on a variety of problems, starting with the basic problem of eliminating the phenomenon of congestion collapse, and also include the problems of effectively using the available network resources in different types of environments (wired, wireless, high-speed, long-delay, etc.). In a shared, highly distributed, and heterogeneous environment such as the Internet, effective network use depends not only on how well a single TCP-based application can utilize the network capacity, but also on how well it cooperates with other applications transmitting data through the same network. We describe each congestion control alternative, its strengths and its weaknesses. Estimated Man Hours Needed to complete Project:Abstract Preparation 08 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 45 Hrs Testing 15 Hrs Result Analysis 10 Hrs Documentation Preparation 13 Hrs Seminars 04 Hrs Knowledge Test 01 Hr ---------------------------------------------------------------Total (Approx) 119 hrs per student. --------------------------------------.--------------------------Platform (Suggested):- any of the platforms Suggested Reading i) Books: 1) Computer Networks (4th Edition) by Andrew S. Tanenbaum 2) Computer Networking: A Top-Down Approach Featuring the Internet by Keith Ross 3) Data and Computer Communications, Seventh Edition by William Stallings 4)Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd Edition) by Radia Perlman ii) Journals: 1) Host-to-Host Congestion Control for TCP by Alexander Afanasyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock, IEEE Transactions, Vol. 12, no. 3, 20102)

W.

28

. 2) H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz, "A comparison of mechanisms for improving TCP performance over wireless links," IEEE/ACM Trans. Netw., vol. 5, no. 6, pp. 756769, December 1997. An overview of routing optimization for internet traffic engineering by Ning Wang, Kin Hon Ho, George Pavlou and Michael Howarth, Vol. 10, no. 1, pp. 36-56, 2008 S. Low, F. Paganini, and J. Doyle, "Internet congestion control," IEEE Control Syst. Mag., vol. 22, no. 1, pp. 2843, February 2002. iii) Websites: 1) www.ieeeexplore.org 2) www.elsevier.com

3)

4)

29

Guide: K. SRINIVAS
Designation: Asst. Professor, CSE Dept Project 1: Computerized fee management system Project 2: Online Employee verification for certificate generation Project 3: Interactive House Rental Information System in 3D Project 4: Post-Intrusion Recovery Using Data Dependency Approach

30

. Project 1: Title:- Computerized fee management system Description:- This application Fee Management System is aimed at developing Fee system automation for an Educational Institution/distance education university/University. It provides Fee refunds, Miscellaneous Challan postings, fee adjustments, Mess Charges, student fee details, Dues Miscellaneous dues, Hostel adjustments, Miscellaneous adjustments. This integrated system contains processing user request and admin operations like adding/editing/updating/deleting master records. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 16hrs Design Document 6hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 30min -------------------------------------Total (Approx) 90.15hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies Suggested Readings i) Books: 1) Unleashed ASP.NET, Stephen Walther, 2nd Edition,Publisher:Stephen Walther. 2) Web Design: Navigation Julius Wiedemann, Publisher Taschen GmbH 3) Java How to Program Sixth Edition. by Deitel and Deitel, Publisher: Prentice Hall ii) Journals: 1) Kefeng Xuan, Geng Zhao, David Taniar, J.Wennyahayu,Maytham Safar, Bala Srinivasan,Viability of fee Based Services for Retail, Journal of Computer and System Sciences - JCSS , vol. 77, no. 4, pp. 637-651, 2011 iii) Websites: 1) www.cworks.com 2) www.doaj.org 3) www.lntechnologies.in

31

. Project 2: Title:- Online Employee verification for certificate generation Description:- This application Online Employee verification for certificate generation is aimed to generate caste certificate for a student using the parent employee information provided. It involves employee to have a unique identity in his field .Identity has to be created based on the personal information provided by the employee which includes even his monthly salary. This is to be continued for multiple departments. Using this created identity and with the personal identity card like voter-id/ration card no ,an certificate has to be generated which avoids frauds in fee reimbursements. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 6hrs Literature Survey 16hrs Design Document 8hrs Implementation 28hrs Testing 8hrs Result Analysis 6 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 86.25hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies Suggested Readings i) Books: 1) Unleashed ASP.NET, Stephen Walther, 2nd Edition, Publisher: Stephen Walther. 2) Java How to Program Sixth Edition. by Deitel and Deitel, Publisher: Prentice Hall 3) Web Design: Navigation Julius Wiedemann, 1st edition,Publisher Taschen GmbH ii) Journals: 1) Kirk, C. H. (2006) The effectiveness of a problem resolution and brief counseling EAP interventions. Journal of Workplace Behavioral Health, 22(1), 1-12. 2)Attridge, M. & Amaral T.M. (2002) Making the business case for EAPs with Core Technology. Paper presented at the annual conference of the Employee Assistance Professionals Association, Boston, MA, USA. iii) Websites: 1) www.eapassn.org 2) www.citehr.com

32

. Project 3: Title:- Interactive House Rental Information System in 3D Description:- Owning a house can be very expensive. Therefore, the only alternative is to rent a house. Before having a house for rent, people have to find house by surveying if there any advertisement regarding rental house. To find a house for rent is absolutely not an easy task. This process usually is time consuming and tiring. Thus, the Interactive House Rental Information System (HRIS) prototype to be developed in order to solve this problem. This web-based system is able to help potential house renter to find the available house by looking at the location on the interactive map. This system also provide mailbox for communication purpose between house renter and house owner. This even has to provide the internal view of the house in 3 dimensional giving the length, breadth & height of each room of the house where the potential renter will be benefited. This project will be helpful for the house owner who have house for rent and potential house renter who are intended to rent a house. This prototype will give benefit to potential house renter in finding and renting house Besides , the house owner will have a platform to advertise and rent out their house. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 20hrs Design Document 10hrs Implementation 40hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 14hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 110.25hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies Suggested Readings i) Books: 1) Unleashed ASP.NET, Stephen Walther, 2nd Edition, Publisher: Stephen . 2) Web Design: Navigation Julius Wiedemann , 1 edn, Taschen GmbH 3) Graphic Java 2: Mastering the JFC, David Geary, 3RD Edition, Prentice Hall 4) Graphic Design Theory: Readings from the Field Helen 1ST edn PH. ii) Journals: 1) P. T. Goeser, e.t.a.l.VIEW: A Virtual Interactive Web-based Learning Environment for Engineering,IEEE Advances in Engg Education Vol.2 2) D. M. Popovici, e.t.a.l. 3D Virtual Spaces Supporting Engineering Learning Activities, (IJCCC), Vol. 4(4) (ISSN 1841-9836) iii) Websites: 1) www.sparxsystems.com 2) www.eohw.horus.be 3) www.cwtfhc.org 33

. Project 4: Title:- Post-Intrusion Recovery Using Data Dependency Approach Description:- Recovery of lost or damaged data in a post intrusion detection scenario is a difficult task since database management systems are not designed to deal with malicious committed transactions. Few existing methods developed for this purpose heavily rely on logs and require that the log must not be purged. This causes the log grow tremendously and, since scanning the huge log takes enormous amount of time, recovery becomes a complex and prolonged process. In this, data dependency approach is used to divide the log into multiple segments, each segment containing only related operations. During damage assessment and recovery, identify and skip parts of log that contain unaffected operations. This accelerates the recovery process. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 10hrs Literature Survey 20hrs Design Document 12hrs Implementation 42hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 114.25hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies Suggested Readings: i) Books: 1)Unleashed ASP.NET, Stephen Walther2nd Edition, Publisher: Stephen Walther. 2) Java How to Program Sixth Edition. by Deitel and Deitel, Prentice Hall 3) Semantic Web Programming by John Hebeler, 1st edition, Wiley, John & Sons. 4) Web Design for Developers: A Programmers Guide to Design Tools and Techniques Brian Hogann ,1 edition,Publisher:Pragmatic Bookshelf ii) Journals: 1)A Column Dependency-based Approach for Static and Dynamic Recovery of Databases from Malicious Transactions by A. Chakraborty, Springer International Journal of Information Security, 9(1), pp. 51-67 (2010) 2) Data Dependency Based Recovery Approaches in Survival Database Systems by Jiping Zheng ,Xiaolin Qin ,Published in:Proceeding ICCS '07 Proceedings of the 7th international conference on Computational Science, Springer-Verlag Berlin, iii) Websites: 1) www.ewp.rpi.edu 2) www.citeseerx.ist.psu.edu 3) www.springerlink.com

34

Guide: D. RAJASHEKAR
Designation: Sr. Asst. Professor, CSE Dept

Project 1: Title: Spam Mail Filtering Using Bayesian Algorithm. Project 2: Title: Web Password Hashing. Project 3: Title: Data migration using XSLT Project 4: Document comparator using pattern matching

35

. Project 1: Title: Spam Mail Filtering Using Bayesian Algorithm. Description: Spam emails are causing major resource wastage by unnecessarily flooding the network links. Though many anti-spam solutions have been implemented, the Bayesian spam score approach looks quite promising. A proposal for spam detection algorithm is presented and its implementation using Java. We use the Bayesian calculation for single keyword sets and multiple keywords sets, along with its keyword contexts to improve the spam detection and thus to get good accuracy. E-mail spam slowly but exponentially grew for several decades to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users. The amount received by most e-mail users has decreased, mostly because of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets, networks of virus-infected computers, are used to send about 80% of spam. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising. Spam filters help us in our fight against spam and spammers. But there isnt a perfect filter. An ideal spam filter should generate a false positive and a false negative. Unfortunately this is hard to achieve, quite impossible actually. But its great to know that there are email delivery assurances systems which can help online marketers optimize their campaigns and mailings Keywords: -Spam mails; Bayesian approach; Spam corpus; Keyword sets; Context matching; Estimated man hours needed to complete project:- (94 * 2=188) Abstract preparation : 8 hrs Literature Survey : 16 hrs Design Document : 8 hrs Implementation : 32 hrs Testing : 8 hrs Result analysis : 8 hrs Document preparation : 12 hrs Knowledge test(8*15 min): 2 hrs ----------------------------------------------------Total(approx) : 94.3 hrs/student ----------------------------------------------------Platform (Suggested): Java 5.0.

Suggested Readings i) Books: 1) Data Mining - Han and Kamber ,second edition The Morgan Kaufmann 2) Data Mining A K Pujari, second edition Universities Press

ii) Journals: 1) A simple, configurable SMTP anti-spam filter: Greylists | Mendeley Issac, Wendy Japutra Jap and Jofry Hadi Sutanto-2009 International Conference on Computer Engineering and Technology

36

. 2) Avrim Blum , Tom Mitchell, Combining labeled and unlabeled data with co-training, Proceedings of the eleventh annual conference on Computational learning theory, p.92-100, July 24-26, 1998, Madison, Wisconsin, U.S ii) Websites: 1) www.en.wikipedia.org/spamfilter Project 2: Title: Web Password Hashing. Description: We describe a browser extension, PwdHash that transparently produces a different password for each site, proving web password security and defending against password phishing and other attacks. Since the browser extension applies a cryptographic hash function to a combination of the plaintext password entered by the user, data associated with the web site, and (optionally) a private salt stored on the client machine, theft of the password received at one site will not yield a password that is useful at another site. While the scheme requires no changes on the server side, implementing this password method securely and transparently in a web browser extension turns out to be quite difficult. We describe the challenges we faced in implementing PwdHash and some techniques that may be useful to anyone facing similar security issues in a browser environment. Estimated man hours needed to complete project: (94 * 2=188) Abstract preparation : 8 hrs Literature Survey : 16 hrs Design Document : 8 hrs Implementation : 32 hrs Testing : 8 hrs Result analysis : 8 hrs Document preparation : 12 hrs Knowledge test (8*15 min): 2 hrs -----------------------------------------------------Total (approx) : 94.3 hrs/student ---------------------------------------------------Platform (Suggested): Java 5.0.

i) Books: 1) Data Mining - Han and Kamber ,Pujari. ii) Journals/Conference papers: 1) Stronger Password Authentication Using Browser Extensions M. Abadi, L. Bharat, and A. Marais.System and method for generating unique passwords. US Patent 6,141,760, 1997. iii) Websites: 1) [APW] Anti-phishing working group. http://www.antiphishing.org.

37

38

. Project 3: Title:- Data migration using XSLT Description:- Data migration is the process of transferring data between different formats. Data migration is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. It is required when organizations or individuals change computer systems or upgrade to new systems, or when systems merge (such as when the organizations that use them undergo a merger or takeover).To achieve an effective data migration procedure, data from one format is mapped to the new format providing a design for data extraction and data loading. The design relates old data formats to the new system's formats and requirements. Programmatic data migration may involve many phases but it minimally includes data extraction where data is read from the old system and data loading where data is written to the new system by making use of XSLT. Estimated Man Hours Needed to complete Project:- 90hrs *2 students=180 hrs Abstract Preparation 7hrs Literature Survey 16hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min) 1.45hrs Knowledge test 40min -------------------------------------Total (Approx) 90.30hrs per student. --------------------------------------. Platform (Suggested):- Java and using Web Technologies (XML) Suggested Readings i) Books: 1) XML Bible XML Bible, second Edition, Harold, Elliote Rusty,Publisher, John Wiley & Sons, Inc. New York, NY, USA 2001 ... 2) Web technologies third edition,by chris bates, Publisher: Wiley Publications 3) Complete Reference on XML,by heather,TMH ii) Journals/conference: 1) Database and expert system applications,proceedings-seventh international workshop, Zurich , Switzerland, ISBN: 0-8186-7662-0. iii) Websites: 1) Google, Wikipedia are example websites 2) www.w3school.com 3) www.en.wikipedia.org/wiki/XSLT Project 4: 39

Title:- Document comparator using pattern matching Description:-Document comparision is a computer process by which changes are identified between two versions of the same document for the purposes of document editing and review. Document comparison is a common task in the legal and financial industries.The softwarebased document comparison process compares a reference document with a target document with pattern matching, and produces a result report (graphs,pie charts,etc) which indicates how much the files are similart. Common documents formats for comparison include word processing documents (e.g. Microsoft Word), spreadsheets, presentations (e.g. PowerPoint), and Portable Document Format(PDF,JPEG,BMP) documents. Estimated Man Hours Needed to complete Project:- 89hrs *2 students=178 hrs Abstract Preparation 7hrs Literature Survey 16hrs Design Document 9hrs Implementation 30hrs Testing 8hrs Result Analysis 6 hrs Document Preparation 12hrs Seminars (7*15min) 1.45hrs Knowledge test 40min -------------------------------------Total (Approx) 89.30hrs per student. --------------------------------------. Platform (Suggested):- .NET framework. Suggested Readings i) Books: 1) Unleashed ASP.NET 3.5 stephen walther,sams publication. 2) Complete Reference on ASP.NET- Matthew MacDonald-first edition,TMH ii) Journals/conference: 1) Robust image based document comparison using attributed relational graphs Proceeding SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications conducted by ACM, ISBN: 978-0-88986-718-5 iii) Websites: 1) www.w3school.com 2) www.en.wikipedia.org/wiki/Comparison_of_file_comparison_tools

40

Guide: T. SRIKANTH
Designation: Asst. Professor, CSE Dept Project 1: Cyclomatic complexity

Project 2: Ranking of Web Documents Project 3: Test case prioritization

Project 4: Predicting Missing Item in Shopping Cart

41

. Project 1: Title: Cyclomatic complexity Description: Cyclomatic complexity (or conditional complexity) is software metric (measurement). It is used to indicate the complexity of a program. It directly measures the number of linearly independent paths through a program's source code. The concept, although not the method, is somewhat similar to that of general text complexity measured by the FleschKincaid Readability Test. Cyclomatic complexity is computed using the control flow graph of the program: the nodes of the graph correspond to indivisible groups of commands of a program, and a directed edge connects two nodes if the second command might be executed immediately after the first command. Cyclomatic complexity may also be applied to individual functions, modules, methods or classes within a program. Estimated Man Hours needed to complete: Abstract Preparation 8 Hrs Literature Survey 16 Hrs Design Documentation 8 Hrs Implementation 36 Hrs Result Analysis 8 Hrs Document Preparation 12 Hrs Seminars 120 Minutes Knowledge Test 40 Minutes --------------------------------------------------Total (Approx) 91 Hrs The Total Estimated time for two members of project is 91*2= 182 Hrs Platform (Suggested): Java, C++. Suggested Reading: i) Books: 1) Roger S. Pressman, Software engineering a practitioners approach 6/e,2005 TMH. 2) Software Testing Techniques by Boris Beizer, DreamTech 2nd Ed. 3) UML, User Guide by Grady Booch, Ivar Jacobson, James Rumbaugh 2nd Edition, Addison-Wesley Professional. 4) The Complete Reference Java J2SE 5th Edition by Herbert Schildt, TMH 5) Data Structures, Algorithms and Applications in C++ S.Sahini, University Press, 2nd Edition. 6) DBMS by Raghurama Krishnan, Johannes Gehrke, TMH, 3rd Edition. ii) Journals: 1) A Complexity Measure (McCabe's original paper in IEEE Transactions on Software Engineering Vol. 2, No. 4, p. 308 (1976) 2) Stein et al; Cox, Glenn; Etzkorn, Letha (2005). "Exploring the relationship between cohesion and complexity". Journal of Computer Science: 137144 iii) Websites: 1) http://hissa.nist.gov 2) http://thescipub.com 3) http://www.enerjy.com

42

Project 2: Title: Ranking of Web Documents Description: The project is used to assign ranking of websites in particular domain depending upon the number of page hits. Estimated Man Hours needed to complete Project: Abstract Preparation 8 Hrs Literature Survey 16 Hrs Design Documentation 8 Hrs Implementation 16 Hrs Result Analysis 8 Hrs Document Preparation 12 Hrs Seminars 120 Minutes Knowledge Test 40 Minutes --------------------------------------------------Total (Approx) 78 Hrs ---------------------------------------------------The Total Estimated time for two members of project is 78*2= 156 Hrs Platform (Suggested): Java and Web Technologies. Suggested Reading: i) Books: 1) Roger S. Pressman, Software engineering a practitioners approach 6/e, TMH. 2) Core Servlet and JSP volume 1: Core Technologies by Marty Hall; Pearson. 3) UML, User Guide by Grady Booch, 2nd Edition, Addison-Wesley Professional. 4) The Complete Reference Java J2SE 5th Edition by Herbert Schildt, TMH 5) Web Programming, Building Internet Applications, Chris Bates 2nd Edition, Wiley 6) DBMS by Raghurama Krishnan, Johannes Gehrke, TMH, 3rd Edition ii) Journals: 1) Adaptive Hypermedia and adaptive Web-Based systems in Computer Science, 2004, Volume 3137/2004, 264-285, 2) Learning diverse rankings with multi-armed bandits Authors: Filip Radlinski, Robert Kleinberg, and horsten Joachims Pages 784-791 ACM 3) Improvement of HITS-based algorithms on web documents Longzhuang Li, Yi Shang, Wei Zhang pages 527 535 ACM iii) Websites: 1) http:// www.sun.java.com 2) http://w3schools.com 3) http:// www.influxwebtechnologies.com 4) http:// www.technologyreview.com

43

. Project 3: Title: Test case prioritization Description: Test case prioritization techniques involve scheduling over test cases in an order that improves the performance of regression testing. It is inefficient to re execute every test cases for every program function if once change occurs. Test case prioritization techniques organize the test cases in a test suite by ordering such that the most beneficial are executed first thus allowing for an increase in the effectiveness of testing. One of the performance goals i.e. the fault detection rate, is a measure of how quickly faults are detected during the testing process. In this paper I present a new test case prioritization algorithm, which calculates average faults found per minute. I present the results illustrating the effectiveness of algorithm with the help of APFD metric. The main aim of my paper is to determine the effectiveness of prioritized and non-prioritized case with the help of APFD. Estimated Man Hours needed to complete Project: Abstract Preparation 8 Hrs Literature Survey 20 Hrs Design Documentation 8 Hrs Implementation 40Hrs Result Analysis 8 Hrs Document Preparation 12 Hrs Seminars 120 Minutes Knowledge Test 40 Minutes --------------------------------------------------Total (Approx) 99 Hrs -------------------------------------------------The Total Estimated time for two members of project is 99*2= 198 Hrs. Platform (Suggested): Java and Web Technologies. Suggested Reading: i) Books: 1) Roger S. Pressman, Software engineering a practitioners approach 6/e, 2005 2) Aditya P.Mathur, Foundation of software testing, Pearson Education 1st edition. 3) Core Servlet and JSP volume 1: Core Technologies by Marty Hall Pearson. 4) UML, User Guide by Grady Booch, 2nd Edition, Addison-Wesley Professional. 5) The Complete Reference Java J2SE 5th Edition by Herbert Schildt, TMH. 6) Web Programming, Building Internet Applications, Chris Bates 2nd Edition, Wiley 7) DBMS by Raghurama Krishnan, Johannes Gehrke, TMH, 3rd Edition. ii) Journals: 1) G. Rothermel, e.t.a.l. Prioritizing Test Cases for Regression Testing, IEEE Trans. SoftwareEng., vol. 27, no. 10, pp. 929-948, Oct. 2001. iii) Websites: 1) http:// www.sun.java.com 2) http://w3schools.com 3) http:// www.aptest.com. 4) http:// www.influxwebtechnologies.com 5) http:// www.technologyreview.com 44

. Project 4: Title: Predicting Missing Item in Shopping Cart Description: In this project we are going to find the missing items in shopping carts. In previous approach is that association mining. It has been derived mainly on the basis of advance search for frequently sub groups of items in shopping cart. Estimated Man Hours needed to complete Project: Abstract Preparation 8 Hrs Literature Survey 20 Hrs Design Documentation 8 Hrs Implementation 40 Hrs Result Analysis 8 Hrs Document Preparation 12 Hrs Seminars 120 Minutes Knowledge Test 40 Minutes ----------------------------------------------------Total (Approx) 99 Hrs ----------------------------------------------------Estimated time for two members of project is 99*2= 198 Hrs Platform (Suggested): .Net, SQL Server. Suggested Readings i) Books: 1) Unleashed ASP.NET, Stephen Walther, 2nd Edition, Stephen Walther. 2) Web Design: Navigation Julius Weidman, Publisher Taschen GmbH 3) Microsoft SQL Server 2005 Reporting Services Brain Larson. 4) Roger S. Pressman, Software engineering a practitioners approach 6/e, 2005 5) UML, User Guide by Grady Booch, 2nd Edition, Addison-Wesley Professional. 6) Web Programming, Building Internet Applications, Chris Bates 2nd Edition, Wiley 7) DBMS by Raghurama Krishnan, Johannes Gehrke, TMH, 3rd Edition. 8) Data Mining- Concepts and Techniques by Jiawei Han Elsevier 2nd Edition. ii) Journals: 1) A.Rozspyal and M. Kubat Association Mining in Time-Varying Domains Intelligent Data Analysis , vol 9,pp 273-288. 2) J . Gherke V Gauti and R .Ramakrishna Detecting change in categorical data mining contrast sets ACM Sigmodsignt symp. Principles of Data base System pp 126-137. iii) Websites: 1) http:// www.asp.net 3) http:// www.sql-server-performance.com 3) http:// www.datamystic.com 4) http:// www.kdnuggets.com 5) http:// www.mozenda.com 45

Guide: A. LEELA SRAVANTHI


Designation: Asst. Professor, CSE Dept Project 1: Query Tracking System Project 2: Two-Factor Authentication Project 3: Mobile plug-in Positive software Project 4: Email Tracker

46

. Project 1: Title:- Query Tracking System Description: The Query Tracking System is a solution designed to allow fast and easy tracking of inquiries.The secret to maintaining a good query log is not the time and energy you spend working, sorting and organizing the data. The secret is getting the data in the first place!! - i.e. making it simple and fast enough that employees actually use the application designed to accumulate the data. As far as gathering, sorting and organizing, the QTS does that for you. Simply with the a few clicks you have generated numerous graphs and reports ready for printing or presenting. Estimated Man Hours Needed to complete Project: - 96:25hrs *2 students=182:50Hrs Abstract Preparation 06 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 96.25 Mins Platform (Suggested):- ASP.Net with C# and SQL Server 2005 Suggested Readings i) Books: 1) The Complete Reference Java, By Herbert Schildt, Seventh Edition, McGraw-Hill Professional, 01-Dec-2006. 2) The Complete Reference ASP.Net, by Matthew MacDonald, Tata McGrawHill Edition, 2002.Internet and World Wide Web- How to program, Dietel and Dietel, Fifth Edition. Pearson Education International, 2009 3) Oracle Coherence 3.5 by Aleksandar Seovic, Mark Falco, Patrick Peralta, ISBN: 1847196128 Packt Publishing ii) Journals: 1) George Cybenko, Vincent H. Berk, Valentino Crespi, Robert S. Gray and Guofei Jiang, "An Overview of Process Query Systems", in Proceedings of the SPIE Vol. 5403, Sensors, and Command, Control, Communications, & Intelligence (C3I) Technologies for Homeland Security and Homeland Defense 2) Modeling and Management of Firewall Policies. IEEE Transactions on Network and Service Management, 1(1), 2004.... iii) Websites: 1) http://ieeexplore.ieee.org 47 2) http://code project.com

. Project 2: Title:- Two-Factor Authentication Description: Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and something they have. This method delivers a higher-level of authentication assurance, which is essential for online banking security. Many banking systems have satisfied the2FA requirements by sending a One Time Password (OTP), something possessed, through an SMS to the user's phone device. Unfortunately, international roaming and SMS costs and delays put restrictions on this system reliability. This paper presents a novel two-factor authentication scheme whereby a user's device produces multiples OTPs from an initial seed using the proposed production scheme. The initial seed is produced by the communications partners' unique parameters. Applying the many from one function to a certain seed removes the requirement of sending SMS-based OTPs to users, and reduces the restrictions caused by the SMS system. Estimated Man Hours Needed to complete Project: - 95:25hrs *2 students=180:50Hrs Abstract Preparation 06 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 12 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 95.25 Mins ----------------------------------------------------Platform (Suggested): Project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) Digital Signature-Based Image Authentication by Der-Chyuan Lou, JiangLung Liu and Chang-Tsun Li, ISBN13: 9781591401926. 2) Biometric Authentication: A Machine Learning Approach By: S. Y. Kung; M. W. Mak ; S. H. Lin; Prentice Hall. ISBN-13: 978-0-13-147824-4 ii) Journals: 1) International Journal of Computer Applications, P.A. Henry, Two-factor authentication - a look behind the headlines. Network Security, 2006pp.18-19 2) B. Schneier, Two-factor authentication: too little, too late. Communications of the ACM, 48 4 (2005), p. 136. iii) Websites: 1) www.ijcaonline.org/volume12/number9/pxc3872295.pdf 2) http://www.doaj.org/doaj?func=Description&id=677835 3) http://www.ijcaonline.org/archives/volume12/number9/1713-2295

48

. Project 3: Title:- Mobile plug-in Positive software Description: Mobile coupon is an electronic ticket solicited and delivered by mobile phones that can be exchanged for a financial discount or rebate when purchasing products or services. The convenience of digital coupons is appealing to a new crop of shoppers, many of whom would not dream of carrying around a crumpled pile of paper coupons just to get a nominal financial discount. About one third of the users never used paper coupons, according to a study done on coupons. Our proposed project is a plug-in for existing Point of Sales Application for wholesale/retail showrooms to enable mobile coupons. Estimated Man Hours Needed To Complete Project: - 94:25hrs * 2 students = 188.50Hrs Abstract Preparation 06 Hrs Literature survey 14 Hrs Design Documentation 07 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 94.25 Mins ----------------------------------------------------Platform (Suggested): ASP.Net with C# and SQL Server 2005 i) Books: 1) The Complete Reference JAVA Programming , Herbert Shield 2) Fundamentals of Computer Algorithms , Horowitz ,Sahani 3) Java How to Program, Deitel & Deitel ii) Journals: 1) E. Nardelli, G. Proietti, and P. Widmayer, Finding All the Best Swaps of a Minimum Diameter Spanning Tree Under Transient Edge Failures, Journal of Graph Algorithms and Applications, vol. 5, no. 5, pp. 3957, 2001. 2) M. Bui, F. Butelle, and C. Lavault, A Distributed Algorithm for Constructing a Minimum Diameter Spanning Tree, Journal of Parallel and Distributed Computing, vol. 64, pp. 571577, 2004. iii) Web Sites: 1) www.graphytheory.com 2) www.ics.uci.edu 3) www.cs.princeton.edu . Project 4: 49

Title:- Email Tracker Description:- Objective of this system is to illustrate the use of Tracking. Email Tracker is an application, which is used to trace the mails send by the users. There may be many employees in any organization it is very difficult to maintain them to restrict in not using the mail servers, so this proposed TRACKER is going to keep track of all the transactions of any user. If anyone sends an email, then as well as the message itself, they include the recipient's email address. The mail transmission system uses the address to route the message to the recipient's this is just a computer system equipped for storing and providing access to email. The mail server holds the message until the recipient connects to it and checks the mail. Estimated Man Hours Needed To Complete Project: - 94:25hrs * 2 students = 188.50Hrs Abstract Preparation 06 Hrs Literature survey 14 Hrs Design Documentation 07 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 94.25 Mins ----------------------------------------------------Platform (Suggested): .Net Frame work and visual Studios i) Books 1) ADO.NET za 21 dn, Dan Fox, Computer Press, Prague, Pearson Education, 2002 2) Visual C# .NET Krok za Krokem, John Sharp, Jon Jagger, Mobil Media, Microsoft Press, 2002 3) XML v pkladech, Benoit Marchal, Computer Press, Prague, 4) Network Security, Volume 2005, Issue 12, December 2005, Pages 4-7 Mark Sunner 5) Tolley's Managing Email & Internet Use (Second Edition), 2004, Pages 307-320 Lynda AC Macdonald ii) Journals 1) Email overload: Exploring the moderating role of the perception of email as a businesscriticaltool International Journal of Information Management, Volume 31, Issue 5, October 2011, Pages 407-14 David Sumecki,e.t.a.l. iii) Websites: 1) www.freelancer.com 2) www.searchhealthit.com 3) www.ibm.com 4) www.sourcecodeonline.com 5) www.code.google.com

50

Guide: R. VARUN
Designation: Asst. Professor, CSE Dept Project 1: Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission Project 2: Hacker Detection in Wireless sensor network Project 3: Chat Server

Project 4: Vehicle Identification System

51

. Project 1: Title: Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission Description: We consider using simultaneous Multiple Packet Transmission (MPT) to improve the downlink performance of wireless networks. With MPT, the sender can send two compatible packets simultaneously to two distinct receivers and can double the throughput in the ideal case. We formalize the problem of finding a schedule to send out buffered packets in minimum time as finding a maximum matching problem in a graph. We should also calculate the time taken by sequence file transfer as well as simultaneous file transfer. Estimated man hours needed to complete a project Abstract Preparation 06 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 96.25 Hrs per student ----------------------------------------------------Platform (Suggested):- .Net and using visual Studios. Suggested Readings i) Books: 1) Network security Essentials William stalings ,3rd ,5th edition. 2) Cryptography and Network security William stalings , 4th edition ii) Journals: 1) Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission by Zhenghao Zhang; Yuanyuan Yang; Miao Zhao;Dept. of Comput. Sci., Florida State Univ., Tallahassee, IEEE Transactions on Computers, Issue Date: May 2009 ,Volume: 58 Issue:5,ISSN: 0018-9340 . iii) Websites: 1) http://ieeexplore.ieee.org 2) http://google.co.in 3) http://codeproject.com 4) http://w3schools.com 5) http://msdn.com 6) http://c#corner.net

52

. Project 2: Title: Hacker Detection in Wireless sensor network Description: Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider two sensing detection models: single-sensing detection and multiple-sensing detection... Our simulation results show the advantage of multiple sensor heterogeneous WSNs. Estimated man hours needed to complete a project Abstract Preparation 06 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 96.25 Hrs per student ----------------------------------------------------Platform (Suggested): .Net and using visual Studios. Suggested Readings: i) Books: 1) Network security Essentials William stalings ,3rd ,5th edition. 2) Cryptography and Network security William stalings , 4th edition ii) Journals: 1) Insider Attacker Detection in Wireless Sensor Networks byFang Liu; Xiuzhen Cheng; Dechang Chen; George Washington Univ., Washington INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE Issue Date: 6-12 May 2007 ,On page(s): 1937 1945,ISSN: 0743-166X ,Print ISBN: 1-4244-1047-9 References Cited: 30 ,Cited by : 2 iii) Websites: 1) http://ieeexplore.ieee.org 2) http://w3schools.com 3) http://msdn.com

53

. Project 3: Title: Chat Server Description: Chat Server is a cross platform network solution with in an organization that adapts Internet technologies for better and easy communication. World wide, the most common Internet technologies put to use within the organization. Chat Server is completely runs by Webs hypertext system. Estimated man hours needed to complete a project Abstract Preparation 06 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 14 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 97.25 Hrs per student ----------------------------------------------------Platform (Suggested):- The project can be implemented either in .Net or in JAVA. Suggested Readings i) Books: 1) Network security Essentials William stalings ,3rd edition. 2) Internet and world wide web Dietel and Dietel , 4th edition ii) Journals: 1) Chat server By Greg Schulz - Sr. Advisor StorageIO, IEEE Transactions on Computers, Issue Date: May 2010 ,Volume: 45 Issue:5, ISSN: 0018-9432 . iii) Websites: 1) http://codeproject.com 2) http://w3schools.com

54

. Project 4: Title: Vehicle Identification System Description: The main intention of introducing WEB-BASED VEHICLE IDENTIFICSTION SYSTEM Sis to identifying vehicle and owner information using the Identifying mechanism, It is helpful in police theft checking and reduction, Vehicle workshop use it for providing better customer services ,Insurance Companies use it keep tracking vehicle, owner details and physical verification of the vehicle etc. In the automative service industry, two factors are essential for success outstanding customer service and For and operational effiencies .Through outstanding customer service, automative service companies can gain customer loyality, increase the number of customer referrals and provide more customer s with lucrative preventive maintanace services .To assist its service staff in retrieving information needed for their work and to meet the heighend service Expectation of its customers, the client Web enabled its Internal information system etc. Estimated man hours needed to complete a project Abstract Preparation 05 Hrs Literature survey 15 Hrs Design Documentation 08 Hrs Implementation 33 Hrs Testing 10 Hrs Result Analysis 09 Hrs Documentation Preparation 13 Hrs Seminars (7*15 Mins) 01:45 Mins Knowledge Test 00:40 Mins ----------------------------------------------------Total (Approx) 97.25 Hrs per student Platform (Suggested): The project can be implemented either in .Net or in JAVA. Suggested Readings i) Books: 1) Internet and world wide web , Dietel and Dietel , 4th edition 2) Wireless Sensor Networks: An Information processing approach Feng Zheo, 3) Wireless Sensor Networks Volume 1, Berlin, Holger Karl, Andreas Willing ii) Journals: 1) Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems by Chao Lv; e.t.a.l.DOI: 10.1504/IJRFITA.2012.044646 2) A rules based RFID-enabled supply chain process monitoring system by Chiao-Tzu Huang; e.t.a.l. DOI: 10.1504/IJRFITA.2012.044647 28 48 3) Approaches to fast sequential inventory and path following in RFIDenriched environments by Arne Bosien;DOI: 10.1504/IJRFITA.2012. 49 66 4) Thin film HF RFID tag deposited on paper by thermal evaporation Camille Ramade; e.t.al. DOI: 10.1504/IJRFITA.2012.044648 67 101 5)Cell phone-based mobile RFID: models, mechanisms and its security Namje Park,DOI: 10.1504/IJRFITA.2012.044650 iii) Websites: 1) http://ieeexplore.ieee.org 2) http://codeproject.com 3) http://w3schools.com 55

Guide: A. SRAVANTHI Designation: Asst. Professor, CSE Dept Project 1: Hiding Sensitive Association Ruleswith Limited Side Effects Project 2: An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature Project 3: Dynamic Authentication for Cross-Realm SOA-Based Business Processes Project 4: BinRank

56

. Project 1: Title: Hiding Sensitive Association Rules with Limited Side Effects Description: Data mining techniques have been widely used in various applications. However, the misuse of these techniques may leadto the disclosure of sensitive information. Researchers have recently made efforts at hiding sensitive association rules. Nevertheless,undesired side effects, e.g., nonsensitive rules falsely hidden and spurious rules falsely generated, may be produced in the rule hidingprocess. In this paper, we present a novel approach that strategically modifies a few transactions in the transaction database todecrease the supports or confidences of sensitive rules without producing the side effects. Since the correlation among rules can makeit impossible to achieve this goal, in this paper, we propose heuristic methods for increasing the number of hidden sensitive rules andreducing the number of modified entries. The experimental results show the effectiveness of our approach, i.e., undesired side effectsare avoided in the rule hiding process. The results also report that in most cases, all the sensitive rules are hidden without spuriousrules falsely generated. Moreover, the good scalability of our approach in terms of database size and the influence of the correlationamong rules on rule hiding are observed. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 10hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 93.30hrs per student. Platform suggested: ASP.Net with C# and SQL Server 2005 i) Books: 1) Data Mining Concepts and Techniques by Jaiwei Han and Micheline Kamber Morgan Kaufmann Publishers 2) Microsoft SQL Server 2005 Reporting Services by Brain Larson; 3 edition McGraw-Hill 3) Pro ASP.NET 4 in C# 2010 by Matthew MacDonald, Adam Freeman.4 edition Apress ii) Journals 1) D. Agrawal On the Design and Quantification of Privacy Preserving Data Mining Algorithms, Proc. ACM Symp. Principles of Database Systems, 2) R. Agrawal, Mining Association Rules between Sets of Items in Large Databases, Proc. ACM Conf. Management of Data, pp. 207-216, 1993. iii) Websites 1) ieeexplore.ieee.org 2) selab.iecs.fcu.edu.tw/course 3) www.cs.princeton.edu 57

Project 2: Title: An Abuse Free Fair Contract Signing Protocol Based on the RSA Signature Description: A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a fair way, so that either each of them obtains the others signature, or neither party does. Based on the RSA signature scheme, a new digital contract signing protocol is proposed in this paper. Like the existing RSA-based solutions for the same problem, our protocol is not only fair, but also optimistic, since the third trusted party is involved only in the situations where one party is cheating or the communication channel is interrupted. Furthermore, the proposed protocol satisfies a new property, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. Technical details are provided to analyze the security and performance of the proposed protocol. In summary, we present the first abuse-free fair contract signing protocol based on the RSA signature, and show that it is both secure and efficient. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 10hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 93.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) Computer Networks (4th Edition) by Andrew S. Tanenbaum,Pearson Edition. 2) O. Goldreich. A simple protocol for signing contracts.In: CRYPTO83, pp. 133-136. Plenum Press, 1984. 3) Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Feb. ii) Journals: 1) Guilin Wang; Sch. of Comput. Sci., Univ. of Birmingham, Birmingham, UK, This paper appears in: Information Forensics and Security, IEEE Transactions on An Abuse Free Fair Contract Signing Protocol Based on the Signature Issue Date: March 2010 Volume: 5 Issue:1 ,On page(s): 158 - 168 ,ISSN: 1556-6013 , Date of 58

RSA

. Publication: 06,November 2009 ,Date of Current Version: 17 February 2010 , Sponsored by: IEEE Signal Processing Society . iii) Websites: 1) www.acunetix.com/websitesecurity/sql-injection.htm 2) http://www.symantec.com/connect/articles/detection-sql-injection-andcross-site-scripting-attacks 3) http://www-cse.ucsd.edu/users/mihir/papers/

59

. Project 3: Title: Dynamic Authentication for Cross-Realm SOA-Based Business Processes Description: Modern distributed business applications are embedding an increasing degree of automation and dynamism, from dynamic supply-chain management, enterprise federations, and virtual collaborations to dynamic service interactions across organizations. Such dynamism leads to new challenges in security and dependability. In Service-Oriented Architecture (SOA), collaborating services may belong to different security realms but often need to be engaged dynamically at runtime. A potential solution to this problem is to generate a trust relationship across security realms so that a user can use the credential in the local security realm to obtain the credentials to access resources in a remote realm. In this paper, we propose a new crossrealm authentication protocol for dynamic service interactions. This protocol does not require credential conversion or establishment of authentication paths. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 10hrs Result Analysis 8 hrs Document Preparation 12hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 93.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) W.Stallings,Cryptography and Network Security(2nd ed),Prentice Hall,1999. 2) Scalable secure file sharing on untrusted storage, in Proc. of FAST03, 2003. 3) J. Li, N. Li, and W. H. Winsborough, Automated trust negotiation using cryptographic credentials, in Proc. of CCS05, 2005. ii) Journals: 1) Xu, J; Zhang, D; Liu, L; Li, X; This paper appears in: Services Computing, IEEE Transactions , Dynamic Authentication for Cross-Realm SOA-Based Business Processes, Volume: PPIssue: 99 ,On page(s): 1 1, ISSN: 1939-1374. iii) Websites: 1) http://www.service-architecture.com/web-services/articles 2) www.rgoarchitects.com/Files/SOA.ppt 3) http://www.sourcefordgde.com Project 4: 60

Title: Bin Rank Description: Dynamic authority-based keyword search algorithms, such as ObjectRank and personalized PageRank, leverage semantic link information to provide high quality, high recall search in databases, and the Web. We introduce BinRank, a system that approximates ObjectRank results by utilizing a hybrid approach inspired by materialized views in traditional query processing. We materialize a number of relatively small subsets of the data graph in such a way that any keyword query can be answered by running ObjectRank on only one of the subgraphs. The intuition is that a subgraph that contains all objects and links relevant to a set of related terms should have all the information needed to rank objects with respect to one of these terms. We demonstrate that BinRank can achieve subsecond query execution time on the English Wikipedia data set, while producing high-quality search results that closely approximate the results of ObjectRank on the original graph. The Wikipedia link graph contains about 10^8 edges, which is at least two orders of magnitude larger than what prior state of the art dynamic authority-based search systems have been able to demonstrate. Our experimental evaluation investigates the trade-off between query execution time, quality of the results, and storage requirements of BinRank. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 89.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) Oracle Coherence 3.5 by Aleksandar Seovic, Mark Falco, Patrick Peralta, ISBN: 1847196128 Packt Publishing 2) Distributed Computing and Internet Technology: 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings by Tomasz Janowski, Hrushikesha Mohanty; Springer, 2010; ISBN: 3642116582, 9783642116582 ii) Journals: 1)Heasoo Hwang Balmin, A. Reinwald, B. Nijkamp, E. Dept. of Comput. Sci. & Eng., Univ. of California, San Diego, La Jolla, CA, USA , This appears in: Knowledge and Data Engineering, IEEE Transactions on Bin Rank, Volume:PP Issue:99 ,On page(s): 1 1,ISSN:1041-4347,Date of Current Version: 24 June 2010 61

iii) Websites: 1)http://www2007.org/papers/paper216.pdf 2) http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.6667 3) http://rapidlibrary.com/files/query-planning-for-continuous-aggregationqueries-over-a-network-of-data-aggregators-pdf_ul9zvzcwzzi89on.html

62

Guide: S. SUNIL KUMAR


Designation: Asst. Professor, CSE Dept

Project 1: IDENTIFICATION OF TEXT IMAGE AND IMAGE TEXT (ITI OR IT) Project 2: E-CLASS ROOM SYSTEM (E-C RS)

63

. Project 1: Title:- IDENTIFICATION OF TEXT IMAGE AND IMAGE TEXT (ITI OR IT) Description:- The idea of identification image and text is essential. when ever the image is click the text data has to be displayed . When data is sending the text message to AB the A as to be converted to text to image , B has to receive the original image by clicking the image text should be displayed. There should be a authentication for sending and receiving. These process as to done by taking the image. Estimated Man Hours Needed to complete Project:- 81hrs *2 students=162 hrs Abstract Preparation 6hrs Literature Survey 13hrs Design Document 7hrs Implementation 33hrs Testing 7hrs Result Analysis 9 hrs Document Preparation 13hrs Seminars (7*15min)= 1.45min Knowledge test 45min -------------------------------------Total (Approx) 81.30hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies and image processing technology. Suggested Readings i) Books: 1) The Complete Reference Java, By Herbert Schildt, Seventh Edition, McGraw-Hill Professional, 01-Dec-2006. publishers by Matthew MacDonald, Tata McGraw-Hill 3rd edition 2) The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset by Jon Mundy published by Oxford University Press, 2009 ii) Journals: 1) Impact of Decentralization and Privatization on the Quality of Education in Sub-Saharan Africa: By Charles B. U. Uwakwe and Ajibola O. Falaye European Journal of Social Sciences Volume 7, Number 1 (2008). Pages 1-12 iii) Websites: 1) www.dwinfocenter.org/

64

. Project 2: Title:- : E-CLASS ROOM SYSTEM (E-C RS) Description:- The idea is to improve the technology to form e- class room system. In the EClass finding the original image of the student which is present in the class room. It is to be identified using the webcam and ip address, and finding the duplicate image in the E-Class network no two images are to find with same ip or different ip in a network.. If it is finding the duplicate image like. This find the number of students available in class when the lecturer. Lecturer is the main login authentication is provided in the e-class room in the network. This may help in taking the attendance that should be recorded in the server. Estimated Man Hours Needed to complete Project:- 81hrs *2 students=162 hrs Abstract Preparation 6hrs Literature Survey 13hrs Design Document 7hrs Implementation 33hrs Testing 7hrs Result Analysis 9 hrs Document Preparation 13hrs Seminars (7*15min)= 1.45min Knowledge test 45min -------------------------------------Total (Approx) 81.30hrs per student. --------------------------------------. Platform (Suggested):- .NET and using Web Technologies and image processing technology. Suggested Readings i) Books: 1) The Complete Reference Java, By Herbert Schildt, fourth Edition, McGrawHill Professional,. 2) The Complete Reference SQL, by Matthew MacDonald, Tata McGraw-Hill Edition, 2006. ii) Journals: 1) Banking and Commerce system, by Dube T, Chitura T, Runyowa Journal of Internet Banking and Commerce, April 2010, vol. 15, no. pages 1-22 iii) Websites: 1) en.wikipedia.org/wiki/Collective_business_system 2) www.netmba.com/

65

Guide: K. NARAHARI
Designation: Asst. Professor, CSE Dept

Project 1: Web Based Online Exam Management

Project 2: Web Scrapper

Project 3: Blog Popularity Identification

Project 4: Identification of Phishing Websites

66

. Project 1: Title: - Web Based Online Exam Management Description: The Online Exam system is a new testing system that allows for dynamic generation of exams. These exams are assumed to have significant content and support for this content is provided. The questions delivered in the exam system may contain content which is generated on-the-fly by the web server. To remove the requirement for human intervention in secure online exam management and to capitalize on the advantages of online processes, this system proposes a solution to the issue of network failures for online exams. In the event a person loses his Internet connection while downloading a site, the Resume Session allows him to pick up a session. This system addresses the problem of administering an online exam at any time with the random questions for all examinees, but without restricting the physical location of the examinees. Estimated Man Hours Needed To Complete Project: - 96hrs * 2 students = 192 hours Abstract Preparation Literature Survey Design Document Implementation Testing Result Analysis Document Preparation 10hrs Seminars (7*15 min) Knowledge Test Total (Approx.) 8hrs 16hrs 8 hrs 35hrs 8hrs 8hrs 1hr 45 min 45 min 95 hrs 30 min per student

Platform Suggested: This project can be implemented either using Java or .Net Suggested Readings: i) Books: 1) The Complete Reference Java, By Herbert Schildt, Seventh Edition, McGrawHill Professional, 01-Dec-2006. 2) The Complete Reference ASP.Net, by Matthew MacDonald, Tata McGraw-Hill Edition, 2002. 3) Internet and World Wide Web- How to program, Dietel and Dietel, Fifth Edition. Pearson Education International, 2009 ii) Journals: 1) A novel based online examination system for computer science education, 33rd ASEE/IEEE Frontiers in Education Conference, November 5-8, 2003, Boulder, Yuan Zhenming, Zhang Liang, Zhan Guohua. 2) Web based secure online non-choice based examination system using cryptogry by R.Sheshadri, T. Chalama Reddy, International Journal on Computer Science Engineering, Vol 3,No 10, October 2011. iii) Web Sites: 1) www.w3schools.com 2) www.sourceforge.net 3) www.exforsys.com 67

Project 2: Title: - Web Scrapper Description: The Web Scrapper is a tool which is used for extracting the information from the web page. By using this tool, search engines extract the information such as images, text, different file formats etc. and index them in order to provide the best relevant results for the user query in an efficient manner. The Logic behind this project is, this tool has to retrieve all files under the given url, reads the source of existing web pages and checks for different types of tags, such as, anchor tags, image tags and paragraph tags etc. and extract the data from those tags and stores into database. If the Internet connection lost while scrapping the website, the resume session allows picking up the old session and continues. Estimated Man Hours Needed To Complete Project: - 96hrs * 2 students = 192 hours Abstract Preparation 8hrs Literature Survey 18hrs Design Document 8 hrs Implementation 34hrs Testing 8hrs Result Analysis 7hrs Document Preparation 10hrs Seminars (7*15 min) 1hr 45 min Knowledge Test 45 min -----------------------------------------------------------------------Total (Approx.) 95 hrs 30 min per student -----------------------------------------------------------------------Platform Suggested: This project can be implemented either using Java or .Net Suggested Readings: i) Books: 1) The Complete Reference Java, By Herbert Schildt, Seventh Edition, McGraw-Hill Professional, 01-Dec-2006. 2) The Complete Reference ASP.Net, by Matthew MacDonald, Tata McGrawHill Edition, 2002. 3) Internet and World Wide Web- How to program, Dietel and Dietel, Fifth Edition. Pearson Education International, 2009 ii) Journals: 1) Scrapers Dig deep for data on the web, The Wall Street Journal, October 2010. 2) Information Extraction using web usage mining, Web Scrapping and Semantic Annotation, Malik, Sanjay Kumar, IEEE International Conference on Computational Intelligence and Communication Networks,7-9Oct,2011, pp.465-469.

68

. 3) AgentMat: Framework for data scraping and semantization, IEEE Third International Conference on Research challenges in Information Science, 2224 April, 2009, pp 225-236. iii) Web Sites: 1) www.codeproject.com 2) www.w3schools.com 3) www.sourceforge.net 4) www.devshed.com

69

. Project 3: Title: - Blog Popularity Identification Description: In last few years, blogging has become a useful way for people to publish information on the Web, which contains blog posts, comments, trackbacks, description of events, and other material such as graphics or videos. As several blogs have sprung up on the internet, the blog readers have the problem to identify which of the blogs contain useful information & data. This project suggests an approach to ranking blogs, which on the face of it appears similar to ranking general web pages, but blogs in blogosphere is not suitable to rank using general Web ranking algorithms. This approach is based on social relationship network between bloggers, interactions among bloggers and popularity ranking method could help in assessing blog quality. Estimated Man Hours Needed To Complete Project: - 96hrs * 2 students = 192 hours Abstract Preparation 7hrs Literature Survey 18hrs Design Document 8 hrs Implementation 35hrs Testing 8hrs Result Analysis 7hrs Document Preparation 10hrs Seminars (7*15 min) 1hr 45 min Knowledge Test 45 min -----------------------------------------------------------------------Total (Approx.) 95 hrs 30 min per student Platform Suggested: Java or .Net Suggested Readings: i) Books: 1) The Complete Reference Java, By Herbert Schildt, Seventh Edition, McGraw-Hill Professional, 01-Dec-2006. 2) The Complete Reference ASP.Net, by Matthew MacDonald, Tata McGrawHill Edition, 2002. 3) Internet and World Wide Web- How to program, Dietel and Dietel, Fifth Edition. Pearson Education International, 2009 4) Blogging for Fame and Fortune, by Jason R. Rich, First Edition, MillerWorks Enterprenuer Press. ii) Journals: 1) On popularity in the Blogosphere, IEEE Internet Computing, Vol 14 Issue 3, May-June 2010, pp 42-49. 2) Utilizing Social Relationships for Blog Popularity Mining, Chih-Lu Lin,Hung-Yu Kao, Springer Lecture Notes in Computer Science, Vol 5839/2009, 409-419. 3) Blog Popularity Mining Using Social Interconnection Analysis, IEEE Internet Computing, Vol 14 Issue 4, Jul-Aug 2010, 41-49. iii) Web Sites: 1) http://doi.acm.org/10.1145/1190183.1190193. 2) http://webtrends.about.com/od/socialnetworking/a/social-network.htm 70

Project 4: Title: - Identification of Phishing Websites Description: Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, or password data to what they think is their service providers website. The concept of this project is to find the phishing emails, sent by the phisher to grasp the information of the end user, by utilizing the generic characteristics of the hyperlinks in phishing attacks . Each end user is implemented with this character based technique. After doing so the end user recognizes the phishing emails and can avoid responding to such mails. Estimated Man Hours Needed To Complete Project: - 96hrs * 2 students = 192 hours Abstract Preparation 8hrs Literature Survey 16hrs Design Document 8 hrs Implementation 32hrs Testing 8hrs Result Analysis 8hrs Document Preparation 10hrs Seminars (7*15 min) 1hr 45 min Knowledge Test 45 min -----------------------------------------------------------------------Total (Approx.) 92 hrs 30 min per student -----------------------------------------------------------------------Platform Suggested: This project can be implemented either using Java or .Net Suggested Readings: i) Books: 1) Cryptography and Network Security, by William Stallings, Fourth Edition, Pearson Education Inc, 2006. 2) The Complete Reference Java, by Herbert Schildt, Seventh Edition, McGraw-Hill Professional, 01-Dec-2006. 3) Internet and World Wide Web- How to program, Dietel and Dietel, Fifth Edition. Pearson Education International, 2009. ii) Journals: 1) R. Suriya , K. Saravanan , Arunkumar Thangavelu, An integrated approach to detect phishing mail attacks: a case study, Proceedings of the 2nd international conference on Security of information and networks, October 0610, 2009, Famagusta, North Cyprus. 2) Guang Xiang , Jason Hong , Carolyn P. Rose , Lorrie Cranor, CANTINA: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites, ACM Transactions on Information and System Security (TISSEC), vol.14 no.2, p.1-28, September 2011 iii) Web Sites: 1) https://www.securityforum.org/ 71

. 2) www.w3schools.com

Guide: M. DEEPIKA
Designation: Asst. Professor, CSE Dept Project 1: Multithreaded TCP Network Server Project 2: Advanced FTP Server Project 3: Data Migration over Network Project 4: Location Based Service for Handheld Devices.

72

. Project 1: Title: Multithreaded TCP Network Server Description: This project, Multithreaded TCP Network Server is a server which is used to used for multithread client connection handling and collective management for client connection . This application software Uses TCP Protocol to interact with the clients. The main task of this application is to check the status of client and interact with them.This application software is used for intranet systems to monitor various hosts or clients connected to the server. The main task is to check the connected host to the server and sent message across the network in the intranet system. This application software is used for getting the System/hardware configuration of the connected hosts or client to the TCP network server. It also shows the running a.... Estimated man hours needed to complete a project Abstract Preparation : Literature survey : Design Documentation : Implementation : Testing : Result Analysis : Documentation Preparation : Seminars (7*15 Mins) : Knowledge Test : -------------------------------------Total (Approx) 06 Hrs 15 Hrs 08 Hrs 33 Hrs 10 Hrs 09 Hrs 13 Hrs 01:45 Mins 00:40 Mins 96.25 Mins.

Platform (Suggested):- .Net and using visual Studios and java. Suggested Readings i) Books: 1) The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference Charles M. Kozierok 2) The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Series in Networking) Walter Goralski 3) TCP/IP Sockets in Java Bundle: TCP/IP Sockets in Java, Second Edition: Practical Guide for Programmers (The Practical Guides) Kenneth L. Calvert 4) Computer Networks: Protocols, Standards &Interface 2nd Edn D. Black 5) A Simple Multi-threaded TCP/UDP Server and Client V2.By Patrick Lam September 24, 2001 6) TCP/IP Illustrated, Volume 2: The Implementation, Addison-Wesley, 1995. 7) TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994. ii) Journals: 1) The design and implementation of Modbus/TCP communication on WinCE platform Chen Shuo; Li Chun-Long; Han Shun-Cheng; Pan Feng; Control Conference (CCC), 2011 30th Chinese ;Issue Date: 22-24 July 2011 ; 4710 4713. iii) Websites: 1) http://ieeexplore.ieee.org 2) http://cscjournals.org 3) www.c-sharpcorner.com Project 2: 73

. Title: Advanced FTP Server Description: There are lots of FTP server applications that are available free of cost. But those applications do not provide the facility to control the server remotely and some provide this facility by installing the required software in the remote machine which may not be possible all the times. But this provides a simple, user friendly web interface, where you can connect from a remote machine through a browser. This enables control over the application from remote machines. You can add new Users by setting their root paths remotely. This enables to allow others to use your system with restrictions for certain actions and specific path. As soon windows starts up, a service named AdvFtpSvr starts and it executes FTP Server.exe from the installed path. Once the application is started, the process ends by itself as there is no work to do with the process. Here you may ask why use a Windows Service as the application can be started directly? The reason is the Windows service starts as soon as Windows is started and any process started by a Windows service has full access over the system which enables access to all the files and folders. There is an another way which we can use instead of Windows service which is Windows Scheduled task, but the disadvantage with this is that the scheduled task might had been disabled in some systems and is not the fully automated way of doing things. Estimated man hours needed to complete a project Abstract Preparation Literature survey Design Documentation Implementation Testing Result Analysis Documentation Preparation Seminars (7*15 Mins) Knowledge Test : : : : : : : : : 06 Hrs 15 Hrs 08 Hrs 33 Hrs 10 Hrs 09 Hrs 14 Hrs 01:45 Mins 00:40 Mins 97:25 Hrs per Student Platform (Suggested):- .Net and using visual Studios and java. Suggested Reading i) Books: 1) Remote Access Essentials. Margaret Robbins. AP Professional, Boston, MA, 1995. ISBN: 0126914109. 2) ISDN Networking Essentials. Ed Tittel, Stephen N. James, and Dave Smith. AP Professional, Boston, MA, 1995. ISBN: 0126913927. 3) Building Windows NT Web Servers. Ed Tittel, Mary Madden, and David B. Smith. IDG Books Worldwide, Indianapolis, IN, 1996. ISBN: 0764580043. 4) Guide to TCP/IP. Ed Tittel and Laura Chappell. Course Technology, Boston, MA, 2001. ISBN: 0619035307. ii) Journals:

74

. 1) Ross, Nancy; Wolfram, Dietmar (2000). "End user searching on the Internet: An analysis of term pair topics submitted to the Excite search engine". Journal of the American Society for Information Science 51 (10): 949958. 2) Xie, M. et al. (1998). "Quality dimensions of Internet search engines". Journal of Information Science 24 (5): 365372. 3) James E. White (JEW) NIC: 14948 March 8, 1973 Use of FTP by the NIC Journal :1-6 4) framework for firewall processors ee, T.K.; Yusuf, S.; Luk, W.; Sloman, A.; Lupu, E.; Dulay, N.; Field-Programmable Technology, 2002Development. (FPT). Proceedings. 2002 IEEE International Conference on;Issue Date: 16-18 Dec. 2002 page(s): 352 - 355 . 5)An Load Balancing Strategy of FTP Server-Cluster Based on JXTA Linlan Liu; Jian Shu; Binquan Chen; Shuangjian Liang; Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE ;Issue Date: 9-12 Dec. 2008 ; page(s): 707 - 711 .

iii) Websites 1) www.freelancer.com 2) www.searchhealthit.com 3) www.ibm.com 4) www.sourcecodeonline.com

75

. Project 3: Title: Data Migration over Network Description: This project aims to bring up the idea of automation of transfer of data structure (table) designs as well as data (records) from one DBMS to another (possibly different type of) DBMS across the network. The system has a source side (client) and destination side (server) parts. At the source side, the user selects a given RDBMS (say Oracle, MS SQL server, DB2, Sybase etc.) and interrogates to get a list of tables present in.... Estimated man hours needed to complete a project Abstract Preparation : Literature survey : Design Documentation : Implementation : Testing : Result Analysis : Documentation Preparation : Seminars (7*15 Mins) : Knowledge Test : 96:25 Mins Platform (Suggested):- .Net and using visual Studios. Suggested Reading i) Books : 1) .NET Security And Cryptography, Peter Thorsteinson, G. Gnana Arun Ganesh, www.phptr.com, 2004 2) .NET Framework Security, Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price, Addison-Wesley, 2002 3) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Bruce Schneier, John Wiley & Sons, 1995 4) ASP.NET Security, Brady Gaster, Dan Kent, Doug Seven, Enrico Sabbadin, Richard Conway, Russ Basiura, Sitaraman Laksminarayanan, Srinivasa Sivakumar, www.wrox.com, 2002 5) Cost-Based Oracle Fundamentals: v. 1 (Experts Voice in Oracle) By Jonathan Lewis (Author) ii) Journals: 1) Combinatorial Algorithms for Data Migration to Minimize Average Completion Time; Gandhi, Rajiv and Mestre,Juli; Algorithmica, Springer;1/Nov/2009;no-1,vol54;pages-54-71 2) Database migration: a new architecture for transaction processing in broadband networksHara, T.; Harumoto, K.; Tsukamoto, M.; Nishio, S.; Knowledge and Data Engineering, IEEE Transactions on ; Sep/Oct 1998;Volume: 10 ; 839 - 854 . iii) Websites: 1) http://ieeexplore.ieee.org 06 Hrs 15 Hrs 08 Hrs 33 Hrs 10 Hrs 09 Hrs 13 Hrs 01:45 Mins 00:40 Mins

76

. Project 4: Title: Location Based Service for Handheld Devices. Description: The requirement of quality applications and application developers for mobile industry is very high. Some studies showing that the mobile users are very active on social networks than the ordinary PC users. Here we are going to discuss about a J2ME application that provides location based service to a hand held device. To discover the location of the device, LBS must use real-time positioning methods. Accuracy depends on the method used. Locations can be expressed in spatial terms or as text descriptions. A spatial location can be expressed in the widely used latitude-longitude-altitude coordinate system. Latitude is expressed as 0-90 degrees north or south of the equator, and longitude as 0-180 degrees east or west of the prime meridian, which passes through Greenwich, England. Altitude is expressed in meters above sea level. A text description is usually expressed as a street address, including city, postal code, and so on. Applications can call on any of several types of positioning methods. Using the mobile phone network: The current cell ID can be used to identify the Base Transceiver Station (BTS) that the device is communicating with and the location of that BTS. Clearly, the accuracy of this method depends on the size of the cell, and can be quite inaccurate. A GSM cell may be anywhere from 2 to 20 kilometers in diameter. Other techniques used along with cell ID can achieve accuracy within 150 meters. Estimated man hours needed to complete a project Abstract Preparation : Literature survey : Design Documentation : Implementation : Testing : Result Analysis : Documentation Preparation : Seminars (7*15 Mins) : Knowledge Test : 96:25 Mins 06 Hrs 15 Hrs 08 Hrs 33 Hrs 10 Hrs 09 Hrs 13 Hrs 01:45 Mins 00:40 Mins

Platform (Suggesed):- .Net and using visual Studios and java. Suggested Reading i) Books: 1) Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan. 27-31, 2) Remote Access Essentials. Margaret Robbins. AP Professional, Boston, MA,1995. ISBN: 0126914109. 3) Guide to Networking Essentials, Second Edition. Ed Tittel and David Johnson. Course Technology, Boston, MA, 2001. 4) Advanced Java Networking, by Prashant Sridharan (Prentice-Hall) 5) Java Networking and Communications, by Todd Courtois (Prentice-Hall) 77

. 6) Java Networking and AWT API SuperBible, by Nataraj Nagaratnam, Brian Maso, and Arvind Srinivasan (Waite) 7) Practical .NET 2.0 Networking Projects Wei-Meng Lee (Author) 8) Network Programming for the Microsoft .NET Framework (ProDeveloper) Jim Ohlund, Lance Olson Anthony Jones (Author) ii) Journals: 1) P. Papadimitratos and Z.J. Haas, Secure Message Transmission in Mobile Networks, Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, Jan/Feb/March 2003. 2) Adams P, Ashwell G and Baxter R (2003) Location-based services an overview of the standards. BT Technology Journal 21(1): 34-43 3) Integration of multimedia and location-based services on mobile phone tour guide system Xiehao Bao; Hongxia Bie; Mingxiao Wang;Sch. of Inf. & Commun. Eng., Network Infrastructure and Digital Content, 2009. IC-NIDC 2009. IEEE International Conference ; 6-8 Nov. 2009 ; page(s): 642 646. 4) A distributed approach to GIS systems and location-based service for internet-enabled handheld mobile devices .; Mitra, A.; Bhattacharya, H.; Shibasis Biswas; Das, P.K.;journal on Wireless, Mobile and Multimedia Networks, 2008.; 11-12 Jan. 2008 page(s): 192 - 195 . 5)Location-based services provisioning using WSN Harroud, H.; Berrado, A.; Boulmalf, M.; Karmouch, A.; Alakhawayn Univ. in Ifrane, Ifrane, Morocco journal on Microwave Symposium (MMS), 2009 Mediterrannean ; 15-17 Nov. 2009 page(s): 1 - 5 iii) Websites: 1) http://ieeexplore.ieee.org 2) www.ics.uci.edu 3) www.cs.princeton.edu

78

Guide: MOHAMMED ALI SHAIK


Designation: Asst. Professor, CSE Dept Project 1: Detecting and Prevent SQL Injection Attacks in Database Using Web Service Project 2: Data Leakage Detection Project 3: Integration of Sound Signature in Graphical Password Authentication System Project 4: Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators

79

. Project 1: Title: Detecting and Prevent SQL Injection Attacks in Database Using Web Service Description: Injection Attacks occur when an attacker is able to insert a series of SQL statements in to a query by manipulating user input data in to a web-based application, attacker can take advantages of web application programming security flaws and pass unexpected malicious SQL statements through a web application for execution by the backend Database. We need to design a mechanism that prevents all Forms of SQL injection attacks by using the innovative technique Web Service Oriented XPATH Authentication Technique. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation Literature Survey Design Document Implementation Testing Result Analysis Document Preparation Seminars (7*15min)= Knowledge test Total (Approx) 8hrs 15hrs 8hrs 30hrs 10hrs 8 hrs 12hrs 1.45min 40min 93.30hrs per student.

Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) SQL injection attacks and defense by Justin Clarke, 1st Edition; Syngress publications, ISBN: 13:978-1-59749-424-3 2) SQL Injection Defenses by Marty Nystrom, 1st Edition; O'Reilly Media, Inc, ISBN: 9780596529642 3) Security monitoring by Chris Fry, Martin Nystrom, 1st Edition; O'Reilly Media, Inc., ISBN: 978-0-596-51816-5 ii) Journals: 1) Indrani Balasundaram, Dr. E. Ramaraj; An Approach to Detect and Prevent SQL Injection Attacks in. Database Using Web Service IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.1,January 2011,Pages: 197-205 2) Indrani Balasundaram, Dr. E. Ramaraj; Automated Ditection System for SQL Injection Attacks International Journal of Computer Science and Security (IJCSS), October 2010, Volume (4): Issue (4) pages: 426-435 iii) Websites: 1) www.acunetix.com/websitesecurity/sql-injection.htm 2)http://www.symantec.com/connect/articles/detection-sql-injection-and-crosssite-scripting-attacks 3) https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet Project 2: Title: Data Leakage Detection 80

Description: Generally data distributors give sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebodys laptop). The distributor needs to know from where the data is leaked that is from one or more agents. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 32hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 91.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) A Survey of Data Leakage Detection and Prevention Solutions, by Asaf Shabtai , Yuval Elovici , Lior Rokach; Edition 1, SpringerBriefs; ISBN13: 978-1461420521 2) Digital Watermarking and Steganography by Morgan Kaufmann , 1st Edition, ELSEVIER ISBN978-0-12-372585-1 3) Techniques and applications of digital watermarking and content protection by Michael Konrad Arnold, Martin Schmucker, Stephen D. Wolthusen, 2nd Edition, Artech House publisher, ISBN: 1580531113, 9781580531115 4) Multimedia security: steganography and digital watermarking techniques for protection of intellectual property by Chun-Shien Lu, 1st Edition, Idea Group Inc (IGI), 2005; ISBN 1591401933, 9781591401933 ii) Journals: 1) Panagiotis Papadimitriou and Hector Garcia-Molina; Data REVIEW ON DATA LEAKAGE DETECTION , International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 3, pages: 1088-1091. 2) Panagiotis Papadimitriou and Hector Garcia-Molina; Data Leakage Detection IEEE Transactions On Knowledge And Data Engineering, VOL. 23, NO. 1, JANUARY 2011 pages: 51 - 63 iii) Websites: 1)http://searchfinancialsecurity.techtarget.com/tip/Data-leakage-detection-andprevention 2) http://www.scribd.com/doc/47725408/DATA-LEAKAGE-DETECTION 3) www.symantec.com

81

. Project 3: Title: Integration of Sound Signature in Graphical Password Authentication System Description: A graphical password system must be developed which must suppor sound signature to increase the remembrance of the password. A click-based graphical password scheme called Cued Click Points (CCP) must be used in the system where a password must consist of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to click point this sound signature will be used to help the user to login. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 11hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 90.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) Digital Signature-Based Image Authentication by Der-Chyuan Lou, JiangLung Liu and Chang-Tsun Li, ISBN13: 9781591401926. 2) Biometric Authentication: A Machine Learning Approach By: S. Y. Kung; M. W. Mak; S. H. Lin; Prentice Hall. ISBN-13: 978-0-13-147824-4 3) Multimedia security: steganography and digital watermarking techniques for protection of intellectual property by Chun-Shien Lu, Idea Group Inc (IGI), 2005 ISBN 1591401933, 9781591401933 ii) Journals: 1) Saurabh Singh, Gaurav Agarwal; Integration of Sound Signature in Graphical Password Authentication System; Journal of Computer Applications, Volume 12 No.9, January 2011; pages: 11-13 iii) Websites: 1) www.ijcaonline.org/volume12/number9/pxc3872295.pdf 2) http://www.doaj.org/doaj?func=Description&id=677835 3) http://www.ijcaonline.org/archives/volume12/number9/1713-2295 Project 4: 82

Title: Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators Description: Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some aggregation function over distributed data items. In these queries a client specifies a coherency requirement as part of the query. We must design low-cost, scalable technique to answer continuous aggregation queries using a network of aggregators of dynamic data items. Our technique must involve decomposing a client query into sub-queries and executing subqueries on the chosen data aggregators with their individual sub-query incoherency bounds. Estimated Man Hours Needed to complete Project:- 96hrs *2 students=192 hrs Abstract Preparation 8hrs Literature Survey 15hrs Design Document 8hrs Implementation 30hrs Testing 8hrs Result Analysis 8 hrs Document Preparation 10hrs Seminars (7*15min)= 1.45min Knowledge test 40min -------------------------------------Total (Approx) 89.30hrs per student. --------------------------------------. Platform (Suggested):- project can be implemented in ASP.Net with C# and SQL Server 2005 Suggested Readings: i) Books: 1) Oracle Coherence 3.5 by Aleksandar Seovic, Mark Falco, Patrick Peralta, ISBN: 1847196128 Packt Publishing 2) Distributed Computing and Internet Technology: 6th International Conference, ICDCIT 2010, Bhubaneswar, India, February 15-17, 2010, Proceedings by Tomasz Janowski, Hrushikesha Mohanty; Springer, 2010; ISBN: 3642116582, 9783642116582 ii) Journals: 1) Gupta, R. Ramamritham, K. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators; IEEE Transactions on Knowledge and Data Engineering, Manuscript Id: 1-14 2) Rajeev Gupta, Krithi Ramamritham , Optimized query planning of continuous aggregation queries in dynamic data dissemination networks; ACM publications Pages: 321 - 330 iii) Websites: 1) http://www2007.org/papers/paper216.pdf 2) http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.6667

83

Guide: K. RAJASHAKAR
Designation: Asst. Professor, CSE Dept Project 1: Development of a HTTP Caching Proxy Server Project 2: visualization - Interpreting Learners behavior by Monitoring Online test through Data

Project 3: Development of a Network packet sniffer Project 4: Development of an Online Course Portal for a campus

84

. Project 1: Title: - Development of a HTTP Caching Proxy Server Description: A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. Specifically, caching HTTP Proxy Servers are intermediate servers, which maintain a cache of Internet objects like html files, image files, etc which are obtained via HTTP. Estimated Man hours: - (To complete the project by one student ) Abstract Preparation 6 Literature Survey 11 Total Estimated time Design Document 8 (98.45 hrs* 2) =196.90 hrs. Implementation 15 Testing 4 Platforms(Suggested) : - .Net Result analysis 5 or Java on Windows xp. Documentation 8 Preparation Suggested Readings: Seminar ( 7 * 15 Min) 1.45 i) Books: Knowledge Test 0.40 1) 1 Unix network programming by Total 98.45 Richard Stevens Prentice Hall, 1990,. (ISBN 0-13-949876-1) 2) The Unified Modeling Language user guide by Grady Booch Addison Wesley. First Edition 3) Data communications and networking , Behrouz A Forouzan Publisher: Maidenhead : McGraw-Hill Education, 2003 ii) Journals: 1) Gaurav Banga, Fred Douglis, and Michael Rabinovich. Optimistic deltas for WWW latency reduction. In Proceedings of 1997 USENIX Technical Conference, pages 289303, Anaheim, CA, January 1997 2) Vardangalos, G.; Christophoros, A.; Anagnostou, M.; Functional description and engineering of the Dolmen HIB proxy server. Electro technical Conference, 2000. MELECON 2000.Volume : 1 Print ISBN: 0-7803-6290-X iii) Websites: 1) http://objectclub.esm.co.jp/Jude/ - For UML tool for Detailed Design 2) http://argouml.tigris.org/ - Another UML tool 3) www.w3.org/Protocols/rfc2616/rfc2616.html 4) http://www.javaworld.com/javaworld/jw-12-1996/jw-12-sockets.html 5) http://pont.net/socket/java/

85

. Project 2: Title: Visualization - Interpreting Learners behavior by Monitoring Online test through Data Description:-The aim of this project is to study the behavior of the learner(s) and test quality. This method includes storing useful data related to learner interaction with the system during the test time and highlights the information with visualization patterns. We can analyze behavioral patterns of learners and conceptual relationships among test items, for this Attribute Oriented Induction method is used. This project helps the mentor or tutor to improve the whole assessment process used to train the candidate and excel his/her knowledge and perform well in online examinations. The knowledge discovery strategies are used to extract knowledge from raw data Here raw data is nothing but large collection of data and knowledge is nothing but required small amount of data to be used in analysis. It also aims at identifying the difficulty of the question paper based on the behavior of the learner during the examination, analyzing the data visualization charts; we have detected several previously unknown test strategies used by the learners. Estimated Man Hours: - (To complete the project by one student ) Abstract Preparation 6 Literature Survey 15 Design Document 5 Implementation 15 Testing 4 Result analysis 3 Documentation 8 Preparation Seminar ( 7 * 15 Min) 1.45 Knowledge Test 0.40 Total 97.45 Total Estimated time ( 97.45 hrs * 2) = 195.30 hrs. Platform(Suggested): Java with jdk 1.6 and above. Winodws Xp with service pack 2 or above. Ms- access as back-end. Suggested Reading: i) Books: 1) Data Mining Concepts and Techniques by Jaiwei Han and Micheline Kamber Morgan Kaufmann Publishers 2) Data mining the Web: Uncovering Patterns in Web Content, Structure, and Usage Zdravko Markov and Daniel T. Larose ii) Journals: 1) j.Bath, Answer-Changing Behaviour on Objective Examinations,J. Educational Research, no. 61, pp. 105-107, 1967. 2) D.A. Keim, Information Visualization and Visual Data Mining, vol. 8, no. 1, pp. 1-8, Jan.-Mar. 2002. iii) Website: 1) www.the-data-mine.com/ Project 3: 86

Title:- Development of a Network packet sniffer Description :-This project is aimed at developing a packet sniffer on HTTP protocol. This sniffer should be able to monitor and save files transiting over network . This project should be scalable to support other protocols like FTP, POP3 etc. The practical purpose of the project is providing monitoring ability for the administrator of a network. This can be deployed in home PC by parents to monitor the internet access, also. This has to build over any interface provided by freely available libraries for capturing packets on TCP/IP. Man Power in Hours : - (To complete the project by one student ) Abstract Preparation Literature Survey Design Document Implementation Testing Result analysis Documentation Preparation Seminar ( 7 * 15 Min) Knowledge Test Total . Totala estimated time ( 93.45 hrs * 2) = 197.30 hrs Platform (Suggested): Linux ( Debian, Mandrake, Knoppix any flavour), Llibpcap.0.8.3 library set freely downloadable from http://www.tcpdump.org/ Suggested Readings: i) Books: 1) Linux for Beginner by Machtelt Garrels Custom Books Publishing 2007 , ISBN/ASIN: 1434800873 2) Data communications and networking , Behrouz A Forouzan Publisher: Maidenhead : McGraw-Hill Education, 2003 3) Computer Networks. Fourth Edition Author: Andrew S. Tanenbaum Publisher: Prentice Hall ii) Journals: 1) Ansari, S.; Rajeev, S.G.; Chandrashekar, H.S.; Packet sniffing: a brief introduction. Potentials, IEEE On page(s): 17 19 .ISSN : 0278-6648 2) Qadeer, M.A.; Zahid, M.; Iqbal, A.; Siddiqui, M.R. Network Traffic Analysis and Intrusion Detection Using Packet Sniffer Communication Software and Networks, 2010. ICCSN '10. 313 317 iii) Websites: 1) http://www.tcpdump.org 2) http://www.mandrakelinux.com 87 8 12 4 12 3 3 10 1.45 40 93.45

. Project 4: Title:- Development of an Online Course Portal for a campus Description:- This project aims at creating a Courses portal for a campus/organization. This allows registered users of the system to join a course available in the site and access the materials published for the course. People can register themselves as students of a course or Faculty for a course. When a person registers himself as a Faculty, an approval mechanism should be triggered which sends an email to the Administrator for approving the person as a Faculty. There will be an admin approval page where admin can approve the faculty members for the course. The course home page should contain the title of the course and a brief description. There will be a discussion board for each course where students can interact, an announcement section, which contains the latest announcements, and a course content section which gives the links for the material available for the course. For faculty members there will be an extra link for uploading the course content in a zip file format. The course content should be html pages, which should be uploaded in the zip file format. There should be a mechanism for the faculty members to create a test for the course specifying the test title and a set of multiple-choice questions and duration of time of the test. Estimated Manpower in Hours: ( To complete the project by one student ) Abstract Preparation Literature Survey Design Document Implementation Testing Result analysis Documentation Preparation Seminar ( 7 * 15 Min) Knowledge Test Total 12 9 4 15 5 3 10 1.45 0.40 99.45

Total Estimated time ( 99.45 hrs * 2) = 199.30 hrs. Platform(Suggested): -JDK 1.4 or above, Oracle , Tomacat 6 . Windows xp operating system. Suggested Readings: i) Books:1) Complete referece J2SE, 5th Edition by Herbert Schildt TMH Publishing Company Ltd 2) ditel and ditel java by BARBARA JOHNSTON Publisher McGraw-Hill 3) Mastering Oracle PL/SQL: Practical Solutions by CHRISTOPHER BECK published by Apress

88

. ii) Journals: 1) Dan Gu; Jing Chen; Wandong Pu; Online course quality maturity model based on evening university and correspondence education(OCQMM) Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on Digital Object Identifier: 10.1109/ICCSN.2011.6013763 Publication Year: 2011 , Page(s): 5 - 9 2) Han Lihua; Chang Ying; Duan Juncui; Study and practice for the strategy of higher education reform based on online ourseComputer Science and Education (ICCSE), 2010 5th International Conference on Digital Object Identifier: 10.1109/ICCSE.2010.5593608 Publication Year: 2010 , Page(s): 1652 - 1656 iii) Websites: 1) www.java.com/getjava/ 2) tomcat.apache.org/ 3) www.beginner-sql-tutorial.com/

89

PROFORMA FOR COVER PAGE


a) TITLE OF THE PROJECT (Alignment Center) Font: Times New Roman Size: 14 Font Font Style: Bold b) After the Title of the Project the following, should be included. (Alignment Center) A Project Report submitted to (Font size: 10, Normal) Jawaharlal Nehru Technological University, Hyderabad (Font size: 10, Bold) In partial fulfillment for the requirement for the award of B.Tech Degree in Computer Science and Engineering (Font size: 10 Normal) By Name of the Student 1 Name of the Student 2 ) Under the Guidance of Guide & Designation (Font size: 12 Normal) (Font size: 12 Normal) (Bold) (Bold) (Capital + Center + Normal) Roll. No Roll. No (Font size: 10 Bold

LOGO (12 size)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


RAMAPPA ENGINEERING COLLEGE (Accredited by NBA and Affiliated to JNTU, Hyderabad) Hunter road, Warangal 506001

90

. PROFORMA OF THE CERTIFICATE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING (12 Bold) RAMAPPA ENGINEERING COLLEGE (14 Bold)
Hunter Road, Hanamkonda,Warangal (12 Bold)

(Colour)

CERTIFICATE (16 Bold)


This is to certify that the Project entitled ------------------ (project name in Bold) is submitted by ---------- (both the names of the students in Italics + bold) bearing (both the Hall ticket numbers ) in partial fulfillment of the requirements for the award of the Degree in Bachelor of Technology in ______(name of the department) during the academic year 20__--__. Guide (12 font size, normal, 1 in the space) Format of Certificate Page Head of the Department External Examiner Principal

NOTE:
The report must contain a C.D. consisting of installation process and complete code . They have to submit 4(number of students in batch +Guide copy + Copy for University) hard bound copies of the report. All the Main Headings must be in 14 font size, Bold, Times New Roman. All the Side Headings must be in 12 font, Bold, Times New Roman. Content must be in 12 font size, normal, with 1 line spacing, Times New Roman. Spacing between sub heading & Paragraph: -3 lines. All the students have to submit rough copy to the corresponding Guide 15 days prior to the last date of submission of the report.

91

. PROFORMA OF THE WEEKLY STATUS REPORT

Date of Submission: Week:- From Name of the Student: Roll no Title of Project:Guide Name:Report:: To

Student Signature

Guide Signature

HoD Signature

92

Vous aimerez peut-être aussi