Congestion Control of Transmission Control Protocol Based Bandwidth Estimation Project

Congestion control of transmission control protocol based bandwidth esitmation project is a 2010 cse project which is implemented in java platform. Main aim of this project is to implement a bandwidth based TCP algorithm which is different form regular TCP algorithms to control congestion in TCP communication. In this system we will estimate what is the equalibrium point of window size and then improve the window size in a round trip time.

This application is implemented by developing four nodes where each node can send message to respective nodes by setting RTT to on state.  After transmitting message we can view source address, destination address, time delay , file length and bandwidht usage. At the same time transmitted information detailes are displayed on other node GUI.

Detailed explanation of the project is shown in video.

 

download Congestion control of transmission control protocol based bandwidth estimation project 2010 cse base paper and project report.

Achieving Guaranteed Anonymity in Gps Traces Via Uncertainty Aware Path Cloaking Project

Achieving guaranteed anonymity in gps traces via uncertainty aware path cloaking project is a 2010 cse project which is implemented in java platform. Main aim of this project is to deal with problems that occur in achieving guaranteed anonymity in finding location data which include tracing mobile locations. In order to implement this we consider time to confusion criterion and disclosure control algorithm methods for tracing locations, targeting tackers and finding home location.

In present mobile technology integrating sensors and GPS receivers in to mobile devices has increased scope of sensing different location and sharing information with near by users. Some of the applications are traffic updating system which works on GPS technology which will update near by traffic information. 

download Achieving guaranteed anonymity in gps traces via uncertainty aware path cloaking project 2010 cse base paper and project report.

Nymble Blocking Misbehaving Users in Anonymizing Networks

The main aim of this Nymble Blocking Misbehaving Users in Anonymizing Networks project is to blocking the users using Nymble server. Now a day all website administrators are facing a big problem about spam posts and unwanted posts in their blogs, forums, and social networking sites. It’s very hard to delete each post entered by the unknown user or hard to delete his account, it is a time consuming process for website maintainers. This software application works with the for major modules 1) Nymble server management module 2) Pseudonym Management module 3) user blocking module 4) nimble authentication module.

This present project follows a user can login with his/her credentials, after loggin in to his profile he can access some important information like downloading some files, sending messages to others, etc. So here admin can have the rights to block/disable access to the users IP address and it can record the user’s behavior.

Download Nymble Blocking Misbehaving Users in Anonymizing Networks Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

 

Modeling and Detection of Camouflaging Worm Project

The main aim of this Modeling and Detection of Camouflaging Worm project is to provide security to the internet users using C-Worm propagation. This system scans the entire data traffic and provides more threat detection methods.

This project follows the user sends data through the his/her IP address where worm detection test can be performed if it finds any threats it doesn’t send to the receiver section, file transfer can be done if it is not having any threats. Here C-Worm detection tests can be done when we select any drive for scan, if it finds any infected files are threats in selected drive can provide us total log files and worn detection status to the user. This method is called worm analysis.

Download Modeling and Detection of Camouflaging Worm Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Inside The Permutation-Scanning Worms Propagation Modeling and Analysis Project

Inside the Permutation-Scanning Worms Propagation Modeling and Analysis project is a 2010 cse project which is implemented in java platform. Main aim of this project is to scan packet information and check different details like signature and find out any harm full virus is attached to the packet and restrict the packet transmition.

 In internet security computer worms are creating lot of damange to network. This project will work on different factors on this problem and provide solution.

In this project we use three client modules and one scaner module to test this system. Client system consists of selecting file for sending, select the worm, and connection status. While sending file to client we will send virus attached to it and this information is scanned before sending to receiver. In scanner module we can see scanning process and detection mechanis.

Detailed project explanation is shown in video

 

download Inside the Permutation-Scanning Worms Propagation Modeling and Analysis project 2010 cse base paper and project report.

Going Back and Forth Efficient Multi deployment and Multi snapshotting

The main objective of this Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds Java Project is to provide virtual file system mainly for virtual image storage and it is going to solve new problems in Infrastructure as a Service middleware. The previous system has poor data sharing capability, Storage capacity is very less, and also performance level is very low. The present project is going to solve the performance, storage issues.

This windows application index home page contains login page, guests first create their usernames, and in the new user registration form user can have a field of network where he should give his network name like uis10. After login as a user he will have lots of feature on cloud infrastructure those are application state maintenance module, application state module, optimize multi snapshotting module, zoom on mirroring module, aggregate the storage and mirroring module. Coming to the application state maintenance module user can see network VM domain & number of clients joined in the present network.

Download Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks Project

Small state and small stretch routing protocol for large wireless sensor networks project is a CSE 2010 project which is implemented in visual C#.Net platform. Main aim of this project is to implement a new protocol which is developed by considering beacon distance vector based global routing state and scoped distance vector based local routing.

In every network systems routing is the basic mechanism used to send packets on shortest path. So efficiency and reliability of network systems is dependent on routing protocols. In present scenario network size and usage had increased its size so there is need to implement new algorithms which can reach present standards.

download small state and small stretch routing protocol for large wireless sensor network project 2010 base paper and project report.

Extended XML Tree Pattern Matching Theories and Algorithms

Now a day all websites and software companies using XML database. The old systems are working P-C & A-D relations. Here we are using different modules to implement the present the Extended XML Tree Pattern Matching Theories and Algorithms software application namely Optimality of holistic algorithm module, Return nodes in twig pattern queries module, XML data and extended tree pattern query modeling module, Matching Cross module. This project has implemented and well executed under Java technologies for final year M Tech & B Tech/BE Computer science students.

Download Extended XML Tree Pattern Matching Theories and Algorithms Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Secure Distance-Based Localization In The Presence Of Cheating Beacon Nodes Project

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes project is a 2010 CSE project which is implemented in visual C#.Net platform. Main aim of this project is to implementing becon based localization algorithms which is used to determine the location of mobile device with respect to local or global coordinate system.

This project is displayed by considering three becon nodes. Becon A ,B and C and Becon server. Becon server shows postion and distance between becon and display status information of each becon at what distance they are positioned. Then becon clients and excecuted ,  On Becon Client gui we can view graphical view of distance between them. By setting ip address of each becom client and use move left and move right option we can increase or decrease distance between them.

Detailed explanation of project excecution is shown in video.

 

download Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes project 2010 cse base paper and project documentation.

Layered Approach Using Conditional Random Fields for Intrusion Detection Project

Layered approach using conditional random fields for intrusion detection project is a 2010 CSE project which is implemented in java platform. Main aim of this project is to improve efficiency and accuracy in network system by considering implementing approach and conditional random fields.

In networking systems intrusion detection plays important part to control malicious activities in network and effectively deal with large amount of network traffic.  Network administrators and security professionals need to take challenging task to deal with intrusion detection.

Signature based systems are implemented at periphery of a network to controll attacks.  

Detailed explanaiton of project is explained in video

 

download Layered approach using conditional random fields for intrusion detection project 2010 cse base paper and project documentation