Academic Projects

Lowest
Highest
Complexity
New Project
Wireless sensor networks (WSNs) continue to evolve as one of the most exciting and challenging research areas. There are many applications of wireless sensor networks that collect and disseminate sensitive and important information. For successful operation of many of the sensor node applications, it is necessary to maintain the privacy and security of the data stored in the sensor nodes and of th. more....
Lookup engines for various network protocols can be implemented as tree-like search structures. Mapping such search structures onto static random addressable memory (SRAM) -based pipeline architectures has been studied as a promising alternative to ternary content addressable memory (TCAM) for high performance lookup engines in next generation routers. Incremental update and memory balancing are. more....
This paper firstly introduces the characteristics of the current E-Learning, and then analyzes the concept and characteristics of cloud computing, and describes the architecture of cloud computing platform; by combining the characteristics of E-Learning and learning from current major infrastructure approach of cloud computing platform, this paper structures a relatively complete set of integratio. more....
Wireless networks have made great gains in usability and popularity. However, inherent limitations on cell capacity and coverage still exist. There are also dead-spots and hotspots problems in these networks. Ad hoc multi-hop relaying enhances cell capacity and coverage, alleviates the dead-spots problem, and helps to ease congestion in hotspots. However, multi-hopping also increases packet delay.. more....
In the traditional model for wireless mesh networks, a two-tiered architecture classifies nodes into mesh routers or clients. Such an approach, based on strong separation of roles, is interesting when an administrative entity deploys and controls the network. Nevertheless, in spontaneous and self-organized networks, where there is no administrative entity behind the network formation, this model d. more....
Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption, we introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that significantly reduces the numb. more....
M-health is an emerging area of research and one of the key challenges in future research in this area is medical video streaming over wireless channels. Contrasting requirements of almost lossless compression and low available bandwidth have to be tackled in medical quality video streaming in ultrasound and radiology applications. On one side, compression techniques need to be conservative, in or. more....
Peer-to-peer (P2P) networks have been emerging as one of the most promising approaches to improve the scalability of video-on-demand (VoD) service over Internet. Although a number of architectures and streaming protocols have been proposed in pastyears, there is some work to study the practical performance of P2P-based VoD service especially considering the real user behavior, which actually has s. more....
Platform : JAVADOMAIN : TRANSACTIONS ON NETWORK more....
Proving ownerships rights on outsourced relational database is a crucial issue in today's internet based application environments and in many content distribution applications. In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We formulate the watermarking of relational databases as a constrained optim. more....
The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to provide an efficient dissemination and at the same time assuring content integrity and confidentiality. Our approach is based on the notion of encrypted postorder numbers that support the integrity and confidentiality requirements . more....
The conditional access system (CAS) is an essential part of digital pay-TV systems for controlling access to the program services. Conventionally, due to the restrictions of bandwidth and computational capability, a CAS only supports period subscription services that are charged on a monthly basis. In this paper, based on the concept of hierarchical key assignment, we propose three key distributio. more....
Spam has become a very necessary topic of discussion these days. It is especially assuming alarming proportions due to the fact that genuine emails get buried in the horde of Spam. More so that in recent days free email service providers like yahoo are considering ways to charge the senders of emails to preferred accounts.The problem with Spam is that one doesn’t know it’s a Spam until. more....
The main aim of this project is how to describe the monitoring and reporting feature, which is offered by RTP, and emphasize how they can be used to enhance subscriber QoE. And also isolate the problem efficiently and how to overcome to produce QoS.Platform : JAVADOMAIN : TRANSACTIONS ON NETWORKmore....
High sophistication & Damage potential of internet worms are in great increase due to which unavoidable threats are caused. To Identify those threat the payload of propagation pattern for Internet – scale behavior describes the overall behavior of the worm. The impact of dynamic network conditions on the correctness of the model, considering Network congestion, Bandwidth variability, Int. more....
To Manage video Streaming on heterogeneous networks with a video streaming platform on a continuous multimedia service at any time in any location with any computing device.One of the major challenge is particular is how to design a session handoff control scheme. The main aim is to how to produce the seamless services for the user under various conditions.Platform : JAVALanguage : J2SE 1.5DOMAIN . more....
A conditional access system (CAS) proposed by Sun et al. has a critical security weakness in its inability to preserve Backward secrecy; a former subscriber can still access programs despite his or her change in status. This weakness in Sun et al.’s CAS originates because 1) no change is made to a group key after a new member arrives, and 2) updates of group keys are done in an insecure mann. more....
Wireless networks have made great gains in usability and popularity. However, inherent limitations on cell capacity and coverage still exist. There are also dead-spots and hotspots problems in these networks. Ad hoc multi-hop relaying enhances cell capacity and coverage, alleviates the dead-spots problem, and helps to ease congestion in hotspots. However, multi-hopping also increases packet delay.. more....
Speech recognition and speech synthesis can improve computing accessibility for users with disabilities and can reduce the risk of repetitive strain injury and other problems caused by current interface.Voice Enabled Browser is one that performs all the activities of the Browser and includes the advanced technology mentioned above to have a fast and easy operation of Internet.Our project aims at d. more....
Audio Steganography•Sun Micro Systems has provided the solution for this problem. Here we can use Java with Swing for converting the text file into wave file.•Java utile package can used to convert the text file into zip-formatted file. AdvantagesThe main feature of this project is to protect a secrete information from other user. At the time of conversion we can set a password to each . more....
“Adsoft”, which is used to automate the internal works of an office through intranet application. This software allows originations to generate pay slips and salary register based on the attendance of the employees taking care of leaves, loans and other standard deductions like P.F, Professional Tax, Income Tax etc.Platform : JAVA & J2EEBack End : MysqlDOMAIN : WEB APPLICATIONmore....
The main aim of the project is to mobilize the Bank Process that is used to reduce the customer transaction-time as well as user can able to access from anywhere through mobile. Mobile banking enable customer to access the information from his personal mobile and can able to view his account details.This system also used to transact money to another client through the mobile itself. The user can a. more....
Money laundering is the process by which criminals attempt to hide and disguise the true origin and ownership of the proceeds of criminal activities, thereby avoiding prosecution, conviction and confiscation of criminal funds. The attempted use of financial system to launder money has been recognized a global problem. The international community has recognized money laundering as a serious crime a. more....
Mobile e-mail is defined as an e-mail service optimized to support e-mail usage in mobile devices and mobile networks. Electronic Mail can also be accessed with the devices such as smart mobile phones, PDAs which can be owned by the consumers with less cost over computers or laptops which are currently in use. The existing solutions for accessing E-Mails through these devices in GSM/ Wireless Netw. more....
/* Style Definitions */table.MsoNormalTable{mso-style-name:Table Normal;mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-priority:99;mso-style-qformat:yes;mso-style-parent:;mso-padding-alt:0in 5.4pt 0in 5.4pt;mso-para-margin:0in;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:11.0pt;font-family:Calibri,sans-serif;mso-ascii-font-family:Calibri;. more....
In our project, just by sending SMS, we can easily recharge the mobile at any where at any time. We can transfer the money from one account to another account. This makes the transaction easy.In order to improve the available facility, we are developing software for mobile recharging using mobile SMS as wireless communication. SMS appeared on the wireless. The task under consideration is to provid. more....
To create router application for a wireless sensor network to transmit the data secure and quick. The network manager should monitor all the towers whether they are in active. It should find the shortest path in the network so that the data reaches the destination from source faster without any fault. If any fault occurs in that path through which the data are passing, then the router should selec. more....
To develop the Library management project by using RFID.• Here we design a card using RFID• Each card will have separate id (Book code)• Each card will maintain the details of that particular book based on that card id.• So here we have a project to maintain all the details related to library management.Platform : JAVADOMAIN : WEB APPLICATIONmore....
1. The worldwide web was presented with the first release of the totally new and revolutionary Online Banking called E-Banking.2. Online Banking is to help to view all about the information of Particular Bank and their own account details.3. Online Transaction is made easy to the User and avoid Queue.Platform : DOTNET DOMAIN : WEB APPLICATIONmore....
An important challenge in recruiting people, the recruiters will arrange a place to conduct the test to shortlist the people will take lot of time. So we have developed a project, the initial test will be conducted in online to shortlist the people v This project mainly developed to meet proper alignment of test are analyzed and maintained. All the details are grouped according to test and based o. more....
The aim of this project is to develop a new transport protocol for TCP/IP, Stream Control Transmission Protocol (SCTP) is a new transport layer protocol for TCP/IP. The transport layer’s primary role is to provide end-to-end communications service between two or more applications running on different hosts. Any application running over TCP can be ported to run over SCTP. SCTP offers a point-. more....
This project discusses some issues to keep in mind while accessing a stand-alone database from a Java client. Client/server technology allows distributed processing of information, which lets we have more easily deal with large volumes of data and many concurrent users. This project will work with how to create both a server and a client application that can communicate with each other and provide. more....
Platform : J2EE Server : Tomcat DOMAIN : MOBILE APPLICATIONmore....
Platform : JAVA & J2EE Server : TomcatDOMAIN : MOBILE APPLICATIONmore....
The Main Objective of this system to develop an internet application like orkut etc., The users can login and they can grouped based on the invitation. In this system friends are all grouped and they can share videos or photos. This system is most useful for users and their friends to easily share what they want among their group with high security.Platform : DOTNETBack End : SQL DOMAIN : WEB APPL. more....
Platform : JAVA DOMAIN : TRANSACTIONS ON MOBILE COMPUTINGmore....
*To Solve Consumers problems quickly * Making ease Services * Best Service to Consumers * To make user friendly to Complaints Storer * Maintaining Consumer Details * Getting new complaints * Maintaining Complaints Details * Assigning work to the serviceman * Reports keeping track of status * Closing the ComplaintsPlatform : DOTNET DOMAIN : WEB APPLICATIONmore....
Database partitioning technique which adopts “divide and conquer” method can efficiently simplify the complexity of managing massive data and improve the performance of the system, especially the range partitioning. The traditional range partitioning approach brings heavy burden to the system without an increased partitioning algorithm, so it does not adapt to the partitioning in the r. more....
The considered Service Overlay Networks (SON) lease bandwidth with Quality of Service (QoS) guarantees from a multitude of Internet Autonomous Systems, through service level agreements (SLA) with Internet Service Providers (ISP). This bandwidth is used to establish SON links and deliver end-toend QoS for real time service connections. The leased bandwidth amount influences both the admitted traffi. more....
The Internet has taken its place beside the telephone and the television as an important part of people's lives. Consumers rely on the Internet to shop, bank and invest online. Most online shoppers use credit cards to pay for their purchases. As credit card becomes the most popular mode of payment, cases of fraud associated with it are also increasing. In this paper, we model the sequence of opera. more....
This project entitled “Automated Share Transaction” is an Ideal application project on People services limited dealing with selling and buying of shares. In the process of expansion of their activities, they plan to automate their operations.The Customer Register themselves with the company. On registering, the customer id will be given to the customer. The customer id is to be given i. more....
Now a day’s computer replaces the papers and pens from the office. The internal and external works of the office are done by the system effectively. In an office, each employee has a computer for doing their works. And these computers are interconnected and create a LAN or Intranet.The intranet has a centralized server for giving response to the requested client. And a database is also avail. more....
An application is used to check e- mail, read message and compose it. supporting to send a circular in an adminitration.Platform : JAVA & J2EEDOMAIN : WEB Applicationmore....
An important challenge in the age of internet business is the proper alignment of the customer’s needs with the business system. In order to improve the internet business according to customer’s needs continuously, reuse of design results is of particular importance. This proposes a development environment, called eBizBench, which provide support for the alignment and reusability.For t. more....
Mobile Antivirus software helps in blocking the virus files that tends to disturb the functionality of the mobile. The Mobile Security is designed to protect data-centric mobile devices such as smart phones against viruses and short message service (SMS) Spam. The integrated solution provides automatic, real-time scanning to protect wireless devices against malicious code and viruses on the Web or. more....
Our project deals with developing some tools, which help in enhancing the activities at different stages in the software development life cycle (SDLC). Our tools will fall under the category of CASE tools, which enable sophistication during the software development.We aim at developing two tools, (a) Code Analyzer (jBrowser) and (b) Log Reader. The jBrowser would be a tool that would help the user. more....
The overall goal is to turn the network into a flexible, easily administered tool with which human and computational clients can find resources. Providing users an effective and efficient way of computation which minimizes cost, time and its resources. The idea that drives this project is that a procedure that makes network based computation more compelling. This allows cooperating devices, servic. more....
The project entitled “Multi Task Editor” aims to perform multiple tasks such as to displaying text, displaying images and manipulation of text. It provides the user to create the directory to the remote system and save the information without sharing the systems.Additionally this editor has the options to perform shutdown and restart operations for the system. This is developed using j. more....
Single Sign-on (SSO) systems allow users to log in only once, providing Access to multiple applications without the user having to log into each application separately. With a central Identity Management system, Password Synchronization can be implemented relatively simple, thus improving security and simplifying management. SSO enables the user to access all of the resources, applications and sys. more....
The worldwide web was presented with the first release of the totally new and revolutionary Online Railway Reservation system called TIRE RACK.Online Railway Reservation System is to help to view all about the information of Trains timings, fare and Status of Tickets. Ticket booking is made easy to the passenger and avoid Queue.Platform : DOTNET DOMAIN : WEB APPLICATIONmore....
Projects Category
Testimonial
I Finally made it.. I am a CCIE... Would like to thank u one n all for ur extended support. I would like to thank TimeNet Team members who has always .....
Newsletter Signup