non ieee.doc

Upload: marlin-armstrong

Post on 03-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 NON IEEE.doc

    1/13

    S.N. Network & System Project Titles Language1. Multicast Live Video Broadcasting Using Real Time Transmission

    Abstract: In this paper, we address the problem of real-time video streaming over wireless

    LANs for both unicast and multicast transmission. The wireless channel is modeled as a

    packet-erasure channel at the IP level. For the unicast scenario, we describe a novel

    hybrid Automatic Repeat reQuest (ARQ) algorithm that efficiently combines forward error

    control (FEC) coding with the ARQ protocol. For the multiple-users scenario, we formulate

    the problem of real-time video multicast as an optimization of a maximum regret cost

    function across the multicast user space. AUDIO and video streaming over wired networks,

    such as the Internet, have been popular now for quite some time. However, with the

    development of broadband wireless networks, attention has only recently turned to

    delivering video over wireless networks. In this paper, we focus on the wireless Local Area

    Network (LAN), which can operate at high enough bit rates to allow transmission of high

    quality video data. Specifically, we investigate the IEEE 802.11b wireless LAN, though the

    ideas that we present are applicable to other wireless networks as well.

    Java

    2. Server and Clients Node Capture Attacks

    Abstract:

    In this project, we addressed the mitigation of control channel jamming by malicious

    colluding insiders and compromised system users as well as the identification of

    compromised users without prior knowledge of the number of compromised users in the

    system. We mapped the problem of control channel access that is robust to jamming by

    compromised users to the problem of secure key establishment under node capture

    attacks. Based on the mapping, we proposed a framework for control channel access

    schemes using random key assignment. We proposed and evaluated metrics for resilience

    and delay which quantify the availability of control messages under control channel

    jamming attacks. In future work, we will investigate modifications to the adversarys

    jamming strategy and the effect on the availability of control messages and the ability to

    identify compromised users.

    Java

    3. Multi Server Communication In Distributed Management System

    Abstract: This approach has the potential of both distributing the operation processing

    load among the proxies and enabling clients to access the service by communicating with

    nearby proxies rather than a potentially distant centralized server. However, achieving

    even just serializability for operations executed at these proxies using standard replication

    approaches requires that a proxy involve either a centralized server or other (possibly

    distant) proxies on the critical path of each update operation. Our system implements a

    service with a designated server and an unbounded number of proxies. We generically

    refer to the server and the proxies as processes. To support the service, a proxy joins the

    service. In doing so, it is positioned within a tree rooted at the server. All proxies in the

    subtree rooted at that child are said to disconnect. The child (or, if the child failed, each

    uppermost surviving proxy in the subtree) can inform its subtree of the disconnection. The

    subtree can stay put until the disconnection heals, or they might reconnect via the server.

    Java

    4. Intercity Search Query Processing

    Abstract: This project presented a novel approach for reducing the spatial query access

    latency by leveraging results from nearby peers in wireless broadcast environments.

    Significantly, our scheme allows a mobile client to locally verify whether candidate objects

    received from peers are indeed part of its own spatial query result set. The experiment

    results indicate that our method can reduce the access to the wireless broadcast channelby a significant amount, for example, up to 80 percent, in a dense urban area. This is

    achieved with minimal caching at the peers. By virtue of its P2P architecture, the method

    exhibits great scalability: the higher the mobile peer density, the more the queries

    answered by peers. Therefore, the query access latency can be markedly decreased with

    Java

  • 7/28/2019 NON IEEE.doc

    2/13

    the increase in clients.

    5. Data Transferring Congestion and Delay Rate Calculate

    Abstract: End-To-End packet delay is one of the canonical metrics in Internet Protocol (IP)

    networks, and is important both from the network operator and application performance

    points of view. For example the quality of TCP IP is directly dependent on delay, and

    network providers may have Service Level Agreements specifying allowable values of

    delay Statistics across the domains they control. An important component of end-to-end

    delay is that due to forwarding elements, the fundamental building block of which is the

    delay incurred when a packet passes through a single IP router. All input and output linkswere monitored, allowing a complete picture of congestion and in particular router delays,

    to be obtained. Packet delays and congestion are fundamentally linked, as the former

    occur precisely because periods of temporary resource starvation, or micro congestion

    episodes, are dealt with via buffering.

    Java

    6. Active Source Routing Protocol for Mobile AD-HOC Networks .Net

    7. Data Traveling Minimum and Maximum Routers .Net8. Messaging Service over TCP/IP in Local Area Network Java

    9. Multiple Chat Server

    Abstract: Chat Server is based on multi-tier server architecture to provide high

    performance on heavy load sites and the ability to expose a rich set of functionality like

    multi-user chat on standard protocols. The server core is based on the open instant

    messaging protocol Jabber / XMPP, thus allowing the integration with a wide set of clients

    and Jabber libraries. Multi Chat Server also introduces new Jabber protocol extensions to

    allow video conferencing over RTMP, or moderated / censored chat rooms for example.

    The according graphical user interface is exposed by the Multi Chat Flash-Client, to offer

    platform independent web integration. The Architecture-Overview slide shows the parts

    and services belonging to the Multi Chat Server solution. Basically, it consists of the Multi

    Chat Server core, the Admin-Interface, a separate web server for configuration settingsand the Multi Chat database engine.

    Java

    10. Dynamic Control for Cache Updating Network System

    Abstract: In this project, we propose proactively disseminating the broken link information

    to the nodes that have that link in their caches. Proactive cache updating is key to making

    route caches adapt quickly to topology changes. It is also important to inform only the

    nodes that have cached a broken link to avoid unnecessary overhead. Thus, when a link

    failure is detected, our goal is to notify all reachable nodes that have cached the link about

    the link failure. We define a new cache structure called a cache table to maintain the

    information necessary for cache updates. A cache table has no capacity limit; its size

    increases as new routes are discovered and decreases as stale routes are removed. Eachnode maintains in its cache table two types of information for each route. The first type of

    information is how well routing information is synchronized among nodes on a route:

    whether a link has been cached in only upstream nodes, or in both upstream and

    downstream nodes, and neither.

    Java

    11. HTTP Proxy Server

    Abstract: In computer networks, a proxy server is a server (a computer system or an

    application program) that acts as an intermediary for requests from clients seeking

    resources from other servers. A client connects to the proxy server, requesting some

    service, such as a file, connection, web page, or other resource, available from a different

    server. The proxy server evaluates the request according to its filtering rules. For example,

    it may filter traffic by IP address or protocol. If the request is validated by the filter, the

    proxy provides the resource by connecting to the relevant server and requesting the

    service on behalf of the client. A proxy server may optionally alter the client's request or the

    server's response, and sometimes it may serve the request without contacting the

    Java

  • 7/28/2019 NON IEEE.doc

    3/13

    specified server.

    12. Location Based Search Engine

    Abstract: User mobility and data exchange through wireless communication give Location

    Based Search Engine some unique characteristics that the traditional spatial query

    processing in centralized databases. In a mobile environment, a typical Location Based

    Search Engine is of the form find the top-three nearest hospitals. The result of the query

    depends on the location of its requester. Caching and sharing of query results must take

    into consideration the location of the query issuer. The database resides in a centralized

    server, which typically serves a large mobile user community through wirelesscommunication. Due to user mobility, answers to an LBSE will lose their relevancy if there

    is a long delay in query processing or in communication. For example, answers to the

    query find the top-three nearest hospitals received After 5 minutes of high-speed driving

    will become meaningless. Instead, a prompt, albeit approximate, answer, telling the user

    right away the approximate top-three nearest hospitals, may serve the user much better.

    The wireless environment and the communication constraints play an important role in

    determining the strategy for processing Location Based Search Engine.

    Java

    13. Effective Packet Analyzing and Filtering System for ATM Network

    Abstract: The TCP/IP protocol suite is the standard requirement for all applications that

    need to communicate over the Internet. As TCP/IP applications are unable to specify the

    QoS parameters needed for most Asynchronous Transfer Mode (ATM) services, we tend

    to use the GCRA Algorithm. The purpose of Cell-Rate Guarantees for Traffic across ATM

    Network is to provide QoS. ATM is a connection-oriented switching technology, utilizing

    statistical multiplexing of fixed-length packets, known as cells. The purpose of traffic

    control is to minimize congestion. In an ATM network when the Source Machine

    continuously sends cells to the Destination Machine through the Router Machine, there will

    be a possibility of occurring congestion. When congestion occurs the Routing Machine

    cannot accept more cells and hence these cells will be discarded. This causes

    regeneration and retransmission of the discarded ATM cells. The objective of this project is

    to simulate an overflowing ATM network and establish a router with congestion control

    based on the GCRA algorithm.

    Java

    14. Packet Losses Measurement

    Abstract: The purpose of our study was to understand how to measure end-to-end packet

    loss characteristics accurately with probes and in a way that enables us to specify the

    impact on the bottleneck queue. We began by evaluating the capabilities of simple

    Poisson-modulated probing in a controlled laboratory environment consisting of commodity

    end hosts and IP routers. Measurement and estimation of packet loss characteristics are

    challenging due to the relatively rare occurrence and typically short duration of packet loss

    episodes. Measuring and analyzing network traffic dynamics between end hosts has

    provided the foundation for the development of many different network protocols and

    systems. Of particular importance understands packet loss behavior since loss can have a

    significant impact on the performance of both TCP- and UDP-based applications.

    Java

    15. Adaptive Security and Authentication for DNS System Java16. Dynamic Routing with Security Considerations

    Abstract: In the past decades, various security-enhanced measures have been proposed

    to improve the security of data transmission over public networks. Existing work on

    security-enhanced data transmission includes the designs

    of cryptography algorithms and system infrastructures and security-enhanced routing

    methods. Another alternative for security-enhanced data transmission is to dynamically

    route packets between each source and its destination so that the chance for system

    break-in, due to successful interception of consecutive packets for a session, is slim. The

    intention of security-enhanced routing is different from the adopting of multiple paths

    between a source and a destination to increase the throughput of data transmission. The

    set of multiple paths between each source and its destination is determined in an online

    Java

  • 7/28/2019 NON IEEE.doc

    4/13

    fashion, and extra control message exchanging is needed.

    17. Distributed Node Migration by Effective Fault Tolerance

    Abstract: This project proposes an adaptive programming model for fault-tolerance

    distributed computing, which provides upper-layer applications with process state

    information according to the current system synchrony (or QoS). The synchronous

    distributed computing model provides processes with bounds on processing time and

    message transfer delay. These bounds, explicitly known by the processes, can be used to

    safely detect process crashes and, consequently, allow the noncrashed processes to

    progress with safe views of the system state. Synchronous systems are attractive becausethey allow system designers to solve many problems. The price that has to be paid is the a

    priori knowledge on time bounds. If they are violated, the upper-layer protocols may be

    unable to still guarantee their safety property.

    Java

    18. Data Traveling Random Direction using MANETs

    Abstract: In this work, we study both the availability and the duration probability of a

    routing path that is subject to link failures caused by node mobility. In particular, we focus

    on the case where the network nodes move according to the Random Direction model, and

    we derive both exact and approximate (but simple) expressions of these probabilities.

    Through our results, we study the problem of selecting an optimal route in terms of path

    availability. In this work, we focus on the stability of a routing path, which is subject to link

    failures caused by node mobility. We define the path duration as the time interval from

    when the route is established until one of the links along the route becomes unavailable,

    while we say that a path is available. we focus on bi-dimensional random mobility and we

    consider nodes moving according to the Random Direction (RD) mobility model.

    .Net

    19. Secure Video Data Hiding and Extraction Using BPCS

    Abstract: Steganography is the practice of hiding or camouflaging secret data in an

    innocent looking dummy container. This container may be a digital still image, audio file,

    video file, or even a printed image. Once the data has been embedded, it may be

    transferred across insecure lines or posted in public places. Therefore, the dummy

    container should seem innocent under most examinations. The proposed method is based

    on wavelet compression for video data and bit-plane complexity segmentation (BPCS)

    steganography.

    Java

    20. Energy Maps for Mobile Wireless Networks

    Abstract: We focus on the energy consumption as the end-to-end QoS metric, and

    describe a novel method by which an energy map can be constructed and refined in the

    joint memory of the mobile nodes. IN mobile networks, providing end-to-end Quality-of-

    Service (QoS) guarantees, such as a guaranteed end-toend throughput, delay, bit error

    rate, or energy consumption As a result, neither proactive nor reactive routing protocols,

    which require that the paths that are maintained or discovered remain stable, can provide

    end-to-end QoS guarantees. In highly mobile networks, local routing protocols, such as

    geographic routing, are able to route the data in the right direction; however, they are

    unable to provide end-to-end QoS guarantees because the end-to-end paths are still

    viewed as highly unreliable, and only dynamically and locally determinable. The main

    assumption that underlies all of these approaches is that a path is a fixed sequence of

    nodes.

    .Net

    21. RFID Authentication

    Abstract: RADIO Frequency Identification (RFID) tags for the function of next-generation

    electronic product code (EPC) will become one of the most widely used devices in the near

    future an RFID. Once the tag is found valid, the back-end database will look up its product

    information for further processing. RFID tags are classified into three types: active, semi

    passive, and passive. Active tags contain batteries so that they can actively communicate

    with the reader. Semi passive tags also contain batteries but they wait for the readers

    query. As for passive tags, the power comes from the reader. The class of a tag represents

    the effective reading range. We analyzed the number of rounds required and

    .Net

  • 7/28/2019 NON IEEE.doc

    5/13

    the period of key update for practical deployment.

    22. Retrieving Files Using Content Based Search

    Abstract: The current project is divided into four inter-dependent phases.

    Phase 1: Deals with designing algorithms for summarizing and indexing text files. In case

    of multimedia files the meta data files are created manually by the programmers. This

    phase also involves algorithms for converting .doc and .pdf files to .txt format. In this

    system the searching is not done at the run time as indexing is done before hand.

    Phase 2: In folders would be replaced by a new construct called a library. A library is a

    virtual folder that intelligently gathers information about files on the system and presents

    them to the users. The concept of folders ceases to exist. Instead, the users are privileged

    enough to view similar files together irrespective of their location in the physical memory.

    This enables retrieval of files based on various parameters. This concept is named as

    CAROUSEL VIEW after the proposed system with the same name to be launched by the

    Microsofts Windows Longhorn which is a complete revolution in itself.

    Phase 3: Establishes a common peer to peer (P2P) protocol that enables remote querying

    over other terminals in the network. This module allows this software to be used across the

    internet and also over various LANs.

    Phase 4: In a nutshell, this project aims at creating a system which is highly enhanced

    over the existing traditional ones and providing a user friendly environment.

    Java

    23. Anti Void Routing for Wireless Sensor Networks

    Abstract:A wireless sensor network (WSN) consists of sensor nodes (SNs) with wireless

    communication capabilities for specific sensing tasks. Due to the limited available

    resources, efficient design of localized multi hop routing protocols becomes a crucial

    subject within the WSNs anti-void routing protocol is proposed to guarantee packet

    delivery with increased routing efficiency by completely resolving the void problem based

    on the unit disk graph setting. Several routing algorithms are proposed to either resolve or

    reduce the void problem, which can be classified into Non-graph-based and graph-based

    schemes.

    .Net

    24. Image Water Marking and Combustion

    Abstract: Image Watermark protects your pictures and photos by adding visible

    watermarks to them so that they can't be replicated or stealed when published online.

    Watermarks are blended and integrated in images and therefore will replace (in a

    transparent way if you choose) some parts of your original image. Combustion processing

    creating watermark technology using transparent or solid watermark.

    Java

    25. Router Link Failure Detection

    Abstract: In this project, we consider the problem of fault localization in all-optical

    networks. We introduce the concept of monitoring cycles (MCs) and monitoring paths

    (MPs) for unique identification of router-link failures. They are constructed such that any

    single-link failure results in the failure of a unique combination of MCs and MPs that pass

    through the monitoring location(s). For a network with only one monitoring location, we

    prove that three-edge connectivity is a necessary and sufficient condition for constructing

    MCs that uniquely identify any single-link failure in the network.

    .Net

    26. Wavelet Based Compression and Decompression Using Steganography Technique

    Abstract: This paper presents a steganography method using lossy compressed video

    which provides a natural way to send a large amount of secret data. The proposed method

    is based on wavelet compression for video data and bit-plane complexity segmentation

    steganography. In wavelet based video compression methods such as partitioning

    in hierarchical trees algorithm and Motion- JPEG2000, wavelet coefficients in discrete

    wavelet transformed video are quantized into a bit-plane structure and therefore BPCS

    Java

  • 7/28/2019 NON IEEE.doc

    6/13

    steganography can be applied in the wavelet domain. Presented a large capacity

    steganography method applicable to compressed video which is invented based on BPCS

    steganography and wavelet-based video compression.

    27. Cluster Building in Wireless Sensor Networks

    Abstract: This paper proposes a new centralized clustering method for a data collection

    mechanism in wireless sensor networks, which is based on network energy maps and

    Quality-of-Service (QoS) requirements. During data collection, two mechanisms are used

    to reduce energy consumption: message aggregation and filtering of redundant data.

    These mechanisms generally use clustering methods in order to coordinate aggregationand filtering. Such a clustering mechanism is used to collect data in sensor networks. The

    first original aspect of this investigation consists of adding these constraints to the

    clustering mechanism that helps the data collection algorithm in order to reduce energy

    consumption and provide applications with the information required without burdening

    them with unnecessary data. Centralized clustering is modeled as hypergraph partitioning.

    Finally, results show that a tabu search-based resolution method provides quality solutions

    in terms of cluster cost and execution time.

    .Net

    28. Data Security in Ad hoc Networks Using Multi Path Routing Java29. Data Communication Parallel Multichannel Communications

    Abstract: Multichannel data communication system in which the stop-and-wait automatic-

    repeat request protocol for parallel channels with an in-sequence delivery guarantee is

    used for error control. Packet transmission over a single channel, in a multichannel

    communication system, multiple packets are sent at a time, one packet per channel, and

    packet transmission errors can occur across every channel. To implement error control

    through retransmission of packets in a multichannel communication system. In a wireless

    communication system, however, the transmission condition of a wireless channel

    changes over time, and consequently, the channel is often severely affected by time-

    varying losses. In future work, we can apply the modeling and analytical approach

    presented in this paper to conducting performance studies on the selective-repeat ARQ

    protocol over parallel channels with time-varying channel models.

    .Net

    30. Data Transmission using Multi Router Monitoring System Java31. Shortest Path Finder in Wireless Networks

    Abstract: In multi-hop wireless networks, packets are transferred through routes that could

    be composed of multiple relay nodes between sources and destinations. In many multi-hop

    wireless networks, shortest path routing is often used for its simplicity and scalability, and

    this is closely approximated by straight line routing for large multi-hop wireless networks.

    Thus, in this paper, we will focus on straight line routing for delivering packets from

    sources to destinations. It has been traditionally believed that shortest path (or straight

    line) routing could lead to hot spots in the network, degrading the network performance.

    .Net

    32. Best Effort Multimedia Services

    Abstract: In the wireless systems with time-varying channels, the resource allocation

    algorithm can exploit channel variation to enhance the system performance. We consider

    the video streaming service as the representative RT service since it generates massive

    traffic in comparison with other multimedia services. For the BE services, we consider the

    required average transmission rate as the QoS requirement, to prevent the long starvation

    of some users and the excessive delay of their packets. This policy is particularly helpful

    for the Internet services using the transmission control protocol (TCP).

    .Net

    33. Routing and Security in Mobile Ad Hoc Networks Java34. Multiple Copy Case using Mobile Networks

    Abstract: In this work, we investigated the problem of multi-copy routing in intermittently

    connected mobile networks. In addition to the cases of wireless Internet access and ad hoc

    networks, the need to depart from the traditional networking practices has been recognized

    for a number of emerging wireless applications. We proposed two efficient multi-copy

    schemes, called Spray and Wait and Spray and focus from the perspective of functionality,

    .Net

  • 7/28/2019 NON IEEE.doc

    7/13

    spray routing can be viewed as a tradeoff between single and multiple copy techniques.

    Despite this, theory and simulations show that spray routing.

    35. Parallel File Downloading Peer-To-Peer Networks

    Abstract: PEER-TO-PEER (P2P) technology is heavily used for content distribution

    applications. The early model for content distribution is a centralized one, in which the

    service provider simply sets up a server and every user downloads files from it. In this type

    of network architecture (server-client), many users have to compete for limited resources in

    terms of bottleneck bandwidth or processing power of a single server. As a result, each

    user may receive very good performance. P2P technology tries to solve the issue ofscalability by making the system distributed. Each computer (peer) in the network can act

    as both a server and a client at the same time. It is obvious that as time goes on, the

    service capacity of the entire network will increase due to the increase in the number of

    servicing peers. In other words, users of a P2P network should enjoy much faster

    downloads.

    Java

    36. A Secure Routing Protocol for mobile Ad-hoc Network

    Abstract: In this project, we proposed an efficient Secure Routing Protocol for mobile ad

    hoc networks that guarantees the discovery of correct connectivity information over an

    unknown network, in the presence of malicious nodes. The protocol introduces a set of

    features, such as the requirement that the query verifiably arrives at the destination, the

    explicit binding of network and routing layer functionality, the consequent verifiable return

    of the query response over the reverse of the query propagation route, the acceptance of

    route error messages only when generated by nodes on the actual route, the query/reply

    identification by a dual identifier, the replay protection of the source and destination nodes

    and the regulation of secret keys.

    Java

    37. Proxy Server Connect and Re-Connect using Bank Application

    Abstract: We describe a system called Parent Proxy that demonstrates an alternativeapproach to achieving consistent access to objects by edge proxies while retaining the

    proxies load-dispersing and latency-reducing effects. Parent Proxy organizes the proxies

    in a tree rooted at the server. The tree is structured so that geographically close proxies

    reside close to one another in the tree. To perform certain types of operations, a proxy

    uses the tree to migrate each involved object to it self and then performs the operation

    locally. Although this incurs the expense of object migration for some operations and is

    thus reasonable only if objects are not too large and operations involve only a few, it also

    promises performance benefits of applications.

    Java

    38. Intrusion Detection in Wireless Sensor Networks

    Abstract:Intrusion detection in Wireless Sensor Network (WSN) is of practical interest inmany applications such as detecting an intruder in a battlefield. The intrusion detection is

    defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or

    anomalous moving attackers. Analyzes the intrusion detection problem in WSNs by

    characterizing intrusion detection probability with respect to the intrusion distance and the

    network parameters. Two detection models are considered: single-sensing detection and

    multiple-sensing detection models. The analytical model for intrusion detection allows us to

    analytically formulate intrusion detection probability within a certain intrusion distance

    under various application scenarios.

    Java

    39. ATM Networks for Online Monitoring System

    Abstract: The TCP/IP protocol suite is the standard requirement for all applications that

    need to communicate over the Internet. As TCP/IP applications are unable to specify the

    QoS parameters needed for most Asynchronous Transfer Mode (ATM) services, we tend

    to use the GCRA Algorithm. The purpose of Cell-Rate Guarantees for Traffic across ATM

    Network is to provide QoS. ATM is a connection-oriented switching technology, utilizing

    statistical multiplexing of fixed-length packets, known as cells. The purpose of traffic

    control is to minimize congestion. In an ATM network when the Source Machine

    continuously sends cells to the Destination Machine through the Router Machine, there will

    Java

  • 7/28/2019 NON IEEE.doc

    8/13

    be a possibility of occurring congestion. When congestion occurs the Routing Machine

    cannot accept more cells and hence these cells will be discarded. This causes

    regeneration and retransmission of the discarded ATM cells. The objective of this project is

    to simulate an overflowing ATM network and establish a router with congestion control

    based on the GCRA algorithm.

    40. Create Databases Watermarking

    Abstract: We present a mechanism for proof of ownership based on the secure

    embedding of a robust imperceptible watermark in relational data. We formulate the

    watermarking of relational databases as a constrained optimization problem and discussefficient techniques to solve the optimization problem and to handle the constraints.

    Watermark decoding is based on a threshold-based technique characterized by an optimal

    threshold that minimizes the probability of decoding errors. We implemented a proof of

    concept implementation of our watermarking technique and showed by experimental

    results that our technique is resilient to tuple deletion, alteration, and insertion attacks.

    C# .Net

    41. Data Caching In Mobile Ad Hoc Networks

    Abstract: Data caching can significantly improve the efficiency of information access in a

    wireless ad hoc network by reducing the access latency and bandwidth usage. The

    problem of optimal placement of caches to reduce overall cost of accessing data is

    motivated by the following two defining characteristics of ad hoc networks. Firstly, the ad

    hoc networks are multi hop networks without a central base station. Thus, remote access

    of information typically occurs via multi-hop routing, which can greatly benefit from caching

    to reduce access latency. Secondly, the network is generally resource constrained in terms

    of channel bandwidth or battery power in the nodes. Caching helps in reducing

    communication, which results in savings in bandwidth as well as battery energy. The

    problem of cache placement is particularly challenging when each network node has

    limited memory to cache data items.

    Java

    42. E-Mail Server Using Multithreaded Sockets Java43. Video Multicasting in Muilticellular Wireless Networks

    Abstract: In this paper, we propose a new mechanism to select the cells and the wireless

    technologies for layer-encoded video multicasting in the heterogeneous wireless networks.

    Video delivery in wireless networks is becoming an important multimedia application due to

    the proliferation of the Web-based services and the rapid growth of wireless

    communication devices. The most significant layer, that is, the base layer, contains the

    data representing the most important features of the video, whereas the additional layers,

    that is, the enhancement layers, contain data that progressively refine the reconstructed

    video quality. The layers are distributed to receivers via multicast channels in wireless

    networks.

    Java

    44. Subscription Based Online Book Shop

    Abstract: Our dissemination approach thus represents an efficient and secure mechanism

    for use in applications such as publishsubscribe systems for XML Documents. The

    publishsubscribe model restricts the consumer and document source information to the

    routers to which they register with. Our framework facilitates dissemination of contents with

    varying degrees of confidentiality and integrity requirements in a mix of trusted and

    untrusted networks, which is prevalent in current settings across enterprise networks and

    the web. Also, it does not require the routers to be aware of any security policy in the

    sense that the routers do not need to implement any policy related to access control.

    .Net

    45. 2-D Grayscale Morphological

    Abstract: A new method for computing morphological operations with arbitrary 2-D flat

    structuring elements faster than our preliminary version. It has a computational complexity

    that is independent of the number of gray levels in the image. The proposed method has a

    clear computational performance advantage easily decomposed into linear structuring

    elements. Commercial and open source image processing software for performing

    morphological operations was found to be either quite slow, being based on an processor

    .Net

  • 7/28/2019 NON IEEE.doc

    9/13

    optimized version of the direct algorithm or fast but limited to rectangular.

    46. Online Traffic Routing Under Information Provision Tourism Department

    Abstract: Fuzzy control through a rule-based mechanism can be used to determine

    behavior-consistent route information based control strategies for route guidance to

    robustly respond to the performance enhancement objectives of a system controller in a

    dynamic vehicular traffic system. BC strategies explicitly factor the likely driver response

    behavior to information provision in determining the controller-proposed route guidance

    strategies. The fuzzy control model defines a fuzzy system that continuously seeks real-

    time information-based control strategies to improve the overall vehicular traffic systemperformance. The controller uses these SO route assignment proportions and an iterative

    procedure involving a controller-estimated model of driver behavior and the fuzzy control

    model, to generate routing strategies to provide route guidance to drivers so that the actual

    driver decisions in the next stage result in close to the route proportions.

    .Net

    47. Image Processing for Real-Time 3-D Data Acquisition .Net48. Multiple Information Providers on Web Java49. Optimal Multicast Routing in Mobile Ad-Hoc Networks Java50. Automated Containment of Worms Java51. Medical Image Retrieval Java52. Data Embedding for Binary Images in Morphological

    .Net53. Credit Card Fraud Detection .Net54. Network Border Patrol Preventing Congestion Collapse Java55. Rule Mining Algorithm in Distributed Databases Java56. Distributed Metadata Management for Large Cluster-Based Storage Systems .Net57. Scalable Wireless Ad-Hoc Network Simulation using XTC Java58. Sports Video Retrieval .Net59. Cache Updating Dynamic source routing protocol Java60. Face Recognition Java61. Shortest Node Finder in Wireless Ad-Hoc Networks Java62. Image Processing Techniques for Image Crack Detection and Removal . Net63. Next-Generation Global Roaming Mobile Networks Java64. Java Visual Editor with Compiler

    Abstract: Providing the users with the create documents main purpose of this

    application. The project implementation is mainly concerned with create

    documents are maintained by our editor. The project has been developed by

    utilizing JAVA2, using Swing, IO, and wt(Abstract Window Toolkit) The

    successful platform used is Windows and has its application in windows

    based System. The abstraction for a System is its Documents, the usual

    methods in now-a-days based on Windows Environments. The term Word

    Processing refers to the activity carried out using a computer and suitable

    software to create, view, edit, manipulate, transmit, store, retrieve and print

    documents.

    Java

    65. Noise Reduction Image Filtering

    Abstract:A new fuzzy filter is presented for the noise reduction of images

    corrupted with additive noise. The filter consists of two stages. The first stage

    computes a fuzzy derivative for eight different directions. The second stage

    uses these fuzzy derivatives toper forms fuzzy smoothing by weighting the

    contributions of neighboring pixel values. Both stages are based on fuzzy

    rules which make use of membership functions. The filter can be applied

    iteratively to effectively reduce heavy noise. In particular, the shape of the

    membership functions is adapted according to the remaining noise level after

    each iteration, making use of the distribution of the homogeneity in the

    Java

  • 7/28/2019 NON IEEE.doc

    10/13

    image. A statistical model for the noise distribution can be incorporated to

    relate the homogeneity to the adaptation scheme of the membership

    functions. Experimental results are obtained to show the feasibility of the

    proposed approach. These results are also compared to other filters by

    numerical measures and visual inspection.

    66. Online Handwritten Script Recognition Java67. Image Processing for Structure and Texture Filling-in of Missing Image Blocks

    Java68. An Image Transport Protocol for the Internet Java69. Hybrid Intrusion Detection

    Abstract: Hybrid INTRUSIONS and anomalies are two different kinds of abnormal traffic

    events in an open network environment. An intrusion takes place when an unauthorized

    access of a host computer system is attempted. An anomaly is observed at the network

    connection level. Both attack types may compromise valuable hosts, disclose sensitive

    data, deny services to legitimate users, and pull down network based computing

    resources. The intrusion detection system (IDS) offers intelligent protection of networked

    computers or distributed resources much better than using fixed-rule. Signature matching

    is based on a misuse model, whereas anomaly detection is based on a normal use model.The design philosophies of these two models are quite different, and they were rarely

    mixed up in existing IDS

    products from the security industry.

    J2EE

    70. Video Steganography Java71. Neural Networks for Unicode Optical Character Recognition C# . Net72. An Acknowledgment-Based Approach for The Detection Of Routing in MANETs Java73. Mobile Agents In Distributed Multimedia Database Systems Java74. Image Stream Transfer Using Real-Time Transmission Protocol Java75. Personal Authentication Using 3-D Finger Geometry Java76. A Memory Learning Framework for Effective Image Retrieval

    Java77. Neural Networks for Handwritten character and Digits VC++78. Evaluating the Performance of Versatile RMI Approach In Java Java79. Effective Packet Analyzing and Filtering System for ATM Network Java80. Selective Encryption of Still Image VB,

    C,Java81. Homogenous Network Control and Implementation Java82. Retrieving Files Using Content Based Searching and presenting it in Carousel view Java83. Embedding in Video Steganography Java84. Genetic Algorithm Based Train Simulation Using Concurrent Engineering Java85. Location Aided Routing for Mobile Ad-Hoc Networks

    Java86. Flood Fill Algorithms in C# and GDI+ C# .Net87. Genetic Algorithms and the Traveling Salesman Problem using C# and ATL COM C# .Net88. Hiding messages in the Noise of a Picture C# .Net89. Windows Management Instrumentation WMI Implementation C#.Net90. Steganography for Hiding Data in Wave Audio Files C# Net91. Neural Network for Recognition of Handwritten and Digits Backpropagation VC++92. Optimal Cryptographic Technique .Net93. XML Enabled SQL SERVER Java94. An efficient message digest algorithm (MD) for data security VC++95. Hopfield model of neural network for pattern recognition C# Net96. Using Trigonometry and Pythagoras to Watermark an Image

    Abstract:

    C# .Net

    97. Hiding messages in the Noise of a Picture

    Abstract: Data hiding is a characteristic of object-oriented programming. Because

    an object can only be associated with data in predefined classes or templates, the

    C# .Net

  • 7/28/2019 NON IEEE.doc

    11/13

    object can only "know" about the data it needs to know about. There is no

    possibility that someone maintaining the code may inadvertently point to or

    otherwise access the wrong data unintentionally. Thus, all data not required by an

    object can be said to be "hidden". Data hiding in media, in images, video and

    audio, is of interest for the protection of copyrighted digital media, and to the

    government for information systems security and for covert (steganographic)

    communications. It can also be used in forensic applications for inserting hidden

    data into Image files for the authentication of spoken words and other sounds,

    and in the music business for the monitoring of the songs over broadcast radio.

    The technology enables the insertion and recovery of hidden data in Image files

    through manipulation of the relative phase of harmonically related components.

    Steganography is the art and science of writing hidden messages in such a

    way that no one apart from the intended recipient knows of the existence of the

    message. The word "Steganography" is of Greek origin and means "covered, or

    hidden writing".An encrypted file may still hide information using Steganography,

    so even if the encrypted file is deciphered, the hidden message is not seen.

    Steganography used in electronic communication include steganographic coding

    inside of a transport layer, such as an Image file. The advantage of

    steganography over cryptography alone is that messages do not attract attention

    to themselves, to messengers, or to recipients. A steganographic message (the

    plaintext) is often first encrypted by some traditional means, and then a hidden

    text is modified in some way to contain the encrypted message (cipher text),

    resulting in stegotext.98. ERP for Leather Company J2EE99. Cryptographically Using Secure Server/Client Protocol VC++100. Neural Networks for Handwriting Detection System Using Brain Net VB .Net101. Image Rendering for Grid Technology Java102. Java Network File Sharing System Java103. Java Visual Editor with Compiler Java104. E-Mail Server Using Multithreaded Sockets Java105. Network Component for XML Migration

    Abstract: In the modern Internet age most of the business is being conducted

    through the internet. As a result space comes at a premium, more the space that

    is needed the more it costs. In the existing scenario a client wanting to store data

    in the web server has to rent space in the database server of the deploying

    agency as well as paying for the web space in the web server. This system is

    not economical and furthermore the client has lesser control over the data as the

    Database Administrator belongs to the ISP.To counter these disadvantages the

    proposed system implements the changes as follows, when a user submits data

    to the deploying agency instead of storing it in a separate database server the

    data is stored in a flat file format like XML in the web server space itself, thereby

    eliminating the cost of renting a database server completely. The client can then

    login to the web server and download the necessary XML files which are parsedand the data in the XML files are stored in the local database. This provides an

    added advantage in that the client can have better control over the data as they

    can have their own Database Administrator.

    Java

  • 7/28/2019 NON IEEE.doc

    12/13

    106. Image Water Marking and Combustion Java107. Image Processing for Convolution Filters C# .Net108. Artificial intelligence network load balancing using Ant Colony Optimization C# .Net109. Image Processing for Edge Detection Filters C# .Net110. Active Learning Methods for Interactive Image Retrieval

    Abstract:Active learning methods have been considered with increased interest in

    the statistical learning community. Initially developed within a classification

    framework, a lot of extensions are now being proposed to handle multimedia

    applications provides algorithms within a statistical framework to extend active

    learning for online content-based image retrieval (CBIR). The classification

    framework is presented with experiments to compare several powerful

    classification techniques in this information retrieval context. Focusing on

    interactive methods, active learning strategy is then described. The limitations of

    this approach for CBIR are emphasized before presenting our new active

    selection process RETIN. First, as any active method is sensitive to the boundary

    estimation between classes, the RETIN strategy carries out a boundary correction

    to make the retrieval process more robust. Second, the criterion of generalization

    error to optimize the active learning selection is modified to better represent the

    CBIR objective of database ranking. Third, a batch processing of images is

    proposed.

    C# .Net

    111. Image Stream Transfer Using Real-Time Transmission Protocol

    Abstract: Images account for a significant and growing fraction of Web

    downloads. The traditional approach to transporting images uses TCP, which

    provides a generic reliable in-order byte-stream abstraction, but which is overly

    restrictive for image data. We analyze the progression of image quality at the

    receiver with time, and show that the in-order delivery abstraction provided by a

    TCP-based approach prevents the receiver application from processing and

    rendering portions of an image when they actually arrive. The end result is that an

    image is rendered in bursts interspersed with long idle times rather than smoothly.

    This paper describes the design, implementation, and evaluation of the image

    transport protocol (ITP) for image transmission over loss-prone congested or

    wireless networks. ITP improves user-perceived latency using application-level

    framing (ALF) and out-of-order application data unit (ADU) delivery, achieving

    significantly better interactive performance as measured by the evolution of peak

    signal-to-noise ratio (PSNR) with time at the receiver. ITP runs over UDP,

    incorporates receiver-driven selective reliability, uses the congestion manager

    (CM) to adapt to network congestion, and is customizable for specific image

    formats (e.g., JPEG and JPEG2000). ITP enables a variety of new receiver post-

    processing algorithms such as error concealment that further improve the

    interactivity and responsiveness of reconstructed images. Performance

    experiments using our implementation across a variety of loss conditions

    demonstrate the benefits of ITP in improving the interactivity of image downloads

    at the receiver.

    Java

    112. Active Packets Improve Dynamic Source Routing for Ad-hoc Networks

    Abstract:DSR (Dynamic Source Routing) is an on-demand routing method for

    ad-hoc wireless networks that floods route requests when the route is needed.

    Route caches in DSR are used to reduce flooding of route requests. But with the

    increase in network size and node mobility, cached routes quickly become stale

    or inefficient. The consequence is a huge number of routing packets in the

    network that consume significant bandwidth and computing resources. This paper

    Java

  • 7/28/2019 NON IEEE.doc

    13/13

    presents a deployable active network approach to this route cache problem. In

    our method, an active packet roams around the network, and collects network

    topology information. By checking the content of this active packet when it passes

    through, network nodes are able to positively update their route caches. Thus

    cache miss rates decrease and the route discovery flooding is reduced.113. Energy Efficient Adaptive Multipath Routing for Wireless Sensor Networks

    Abstract: We propose an energy efficient adaptive multipath routing technique

    which utilizes multiple paths between source and the sink, adaptive because theyhave low routing overhead. This protocol is intended to provide a reliable

    transmission environment with low energy consumption, by efficiently utilizing the

    energy availability and the received signal strength of the nodes to identify

    multiple routes to the destination. Simulation results show that the energy efficient

    adaptive multipath routing scheme achieves much higher performance than the

    classical routing protocols, even in the presence of high node density and

    overcomes simultaneous packet forwarding.

    .Net

    114. An energy efficient multipath routing algorithm for wireless sensors

    Abstract: In this paper we take a view that, always using the minimum energy pathdeprives the nodes energy quickly and the time taken to determine an alternate path

    increases. Multipath routing schemes distribute traffic among multiple paths instead of

    routing all the traffic along a single path. We propose an energy efficient adaptive multipath

    routing technique which utilizes multiple paths between source and the sink, adaptive

    because they have low routing overhead. This protocol is intended to provide a reliable

    transmission environment with low energy consumption, by efficiently utilizing the energy

    availability and the received signal strength of the nodes to identify multiple routes to the

    destination. Simulation results show that the energy efficient adaptive multipath routing

    scheme achieves much higher performance than the classical routing protocols, even in

    the presence of high node density and overcomes simultaneous packet forwarding

    measured data and transmit it to a base station, commonly referred to as the sink node,

    over a wireless channel. Multipath Routing has been used in literature to describe the class

    of routing mechanisms that allow multiple paths to be established between the source and

    the destination.

    C# .Net