Privacy-Preserving Public Auditing For Data Storage Security In Cloud Computing Project

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing is a 2010 CSE project which is implemented in visual C#.Net platform. Main aim of this project is to provide solution for protecitng security of data inside cloud computing maintaing systems and provide more accurate and secured service for users and improve qulaitiy of cloud computing technology.

Cloud computing is going to be next generation architecture for any software companies. Many big companies like microsoft, apple, oracle …etc almost every company had inversted huge amount on this technology. One of the main reasons for using this technology is cost saving and location independent, independent resource planning and many more. Away form cloud features companies offering cloud technology called as CSP should look after different aspects for protecting data.

Detailed information of project is expalined in  video.

download privacy preserving public auditing for data storage security 2010 cse base paper, project report.

Cross Layer Design In Multi hop Wireless Networks Project

Cross layer design in multihop wireless networks project is a 2010 CSE project which is implemented in visual C#.Net platform. Main aim of this project is to implement a holistic approach for existing protocol architecture design in multihop wireless networks. Main intention is to combine different protocol layers in to rigorous framework by considering them as distributed computations inside multihop wireless network to reduce optimization problems.

This project is explained using server module and scheduling approach and download access and processor view display. Initially basic parametrs are set and file is transferred and performance is calculated in existing architecture and same file is transferred and performance is calculated in proposed architecture.

Detailed explanation of project is shown in video file.

download Cross layer design in multihop wireless network project 2010 cse base paper and documentation.

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Project

Optimal jamming attacks and network defense policies in wireless sensor networks project is a 2010 cse project which is implemented in java platform.  This project explains about attackes that are caused in jamming and defense mechanisim is implemented and graphical view of the performance and attacks are shown.

In this project we create our own attacking system which will attact different nodes. This attacker is not part of any authenticated or associated network. Main intention of jammer is to cause damage at receiver by attacking packets. Because of intentional collision packets are re transmitted which cause additional engergy consumption and produces less output for a given amount of consumed energy.

Detailed explanation of the project is explained in base paper and video file.

 

download Optimal jamming attacks and network defense policies in wireless sensor networks project 2010 CSE base paper and documentation. 

Embedded Extended Visual Cryptography Schemes Project

The main purpose of developing this Embedded Extended Visual Cryptography Schemes Project is to provide secret image sharing and recover the secret image by using EVCS technology. In this system we can encode the image and share it instead of using high level cryptography methods. Some of the old applications supported to only jpg image secret sharing but now the proposed project can support both gif images as well as png images.

The main advantage of this system is we are not going to lose visual image quality and image pixel size. The executed applet has a menu bar and navigation bar. Menu bar contains file section, mode section, visual cryptography section, show result section, information section. Encrypt section, encrypt transparencies section and overlay section. Under file section any user can upload gif or png images.

This final year M Tech project was developed with java swings and java applets using Eclipse tool.

Download Embedded Extended Visual Cryptography Schemes Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Effective Navigation of Query Results Based on Concept Hierarchies

The main objective of Effective Navigation of Query Results Based on Concept Hierarchies final year based java project is to navigate huge amount of SQL query results under BioNav method & Mesh hierarchy. The previous system has a problem when searching in biomedical systems the data can be overloaded. This application front end designed with Java, Java Server Pages, HTML, DHTML, and Java Script.

The system back end coded with SQL server. It has four main modules 1) searching in biomedical areas module, 2) navigating the hierarchy module, 3) website search engine module, 4) query execution online module

Download Effective Navigation of Query Results Based on Concept Hierarchies Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Dynamics of Malware Spread in Decentralized Peer-To-Peer Networks

Now a day all internet users, social networking users, and networks are facing a problem with malware. The main objective of this Dynamics of Malware Spread in Decentralized Peer-To-Peer Networks project is to develop an analytic framework to control the malware. We have implemented this final year java project with two major parts 1) find out the total peers in TTL 2) combine the related nearer information to the final model. Java provided more features while developing this project.

Modules developed in this software system are peer-to-peer (P2P) networks module, quantities in modeling module, scanning networks module, propagating the malware module.

The system architecture follows if any user sends files to the destination from the source IP address by using file transfer protocols uploaded files transfer can be done. Here in this case if any malware, threats, virus find at uploaded document can be stopped processing to the destination and will get a error message to the sender, if system not able to find any errors in that file it can transfer to the sender under malware propagation test.

Download Dynamics of Malware Spread in Decentralized Peer-To-Peer Networks Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Optimal Bandwidth Assignment for Multiple Description Coded Video

The main aim of this Optimal Bandwidth Assignment for Multiple Description Coded Video Java Project is to encoding the video streaming information.  This project well executed with three major modules using Java, SQL server and provides best bandwidth solutions.

In this software system the media signals can be converted into sub streaming info packets before transforming and there is no packet data loss while data signals streaming at the destination station.

Download Optimal Bandwidth Assignment for Multiple Description Coded Video Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Multicast Authentication Based On Batch Signature Project

Multicast Authentication Based on Batch Signature project is a 2010 CSE project implemented in java platform. Main aim of this project is to implement a digital signature technique for providing security for data from malicious attacks. Multicast technology is one of the efficient methods for transmitting multimedia files like video files to group of receivers. This system is gaining importance in video conference, gamming field, online education field and broadcasting field.

In this method authentication is one of the important factor where application should provide security for user data from any middle attacks.This project explains about this problems and implement digital siganture method to solve this problem.

Project excecution is explained in video demo.

 

 

download Multicast Authentication Based on Batch Signature project base paper and project documentation and paper presentation

Ranking Spatial Data by Quality Preferences Project

The main aim of this Ranking Spatial Data by Quality Preferences Computer Science Engineering Java Based project is to provide efficient indexing techniques and search engine based algorithms.

The previous search application works with object ranking technique, it has lots of disadvantages and to overcome these errors we have implemented spatial and non spatial search engine ranking algorithms. There are lots of search engine based applications over the internet like Google, yahoo, Bing, MSN, rediff, ask, and many more. This Final year 2011 project was implemented with Java programming language.

Download Ranking Spatial Data by Quality Preferences Project Abstract, Complete Documentation, Paper Presentation, Base Paper.

Opportunistic Routing In Multi Radio Multi Channel Multi Hop Wireless Networks Project

Opportunistic routing in multi radio multi channel multi hop wireless networks project is a 2010 cse project which is implemented in java platform. Main idea of this project is to implement a opportunistic routing technique for wireless transmission systems which can increase throughput and reduce combat losses caused in network.

Main reasons for limiting thoughput in multi hop wireless network systems are unreliability of data while transmission. By introducing new technologies like multi radio and multi channel wireless communication systems had increased concurrent transmission in the network which can increase system capacity.

Project excecution is explained in the video demo.

 

download Opportunistic routing in multi radio multi channel multi hop wireless networks project base paper and documentation.