Rainbow Technology A CSE Mini Project Report and Paper Presentation

Description: 

Rainbow technology a cse mini project and paper presentation is, a breakthrough in digital data storage enables us to store up to a massive 450GB on just a piece of paper. Rainbow Storage is a group of techniques to store digital data in some colours, colour combinations and some symbols known as rainbow format, and therefore a rainbow picture will be generated. Rainbow-Technology-A-CSE-Mini-project-Report

Why is this useful? 

The technique is used to achieve high-density storage. With the help of Rainbow system we would be watching full-length high-definition videos from a piece of paper. The main attraction is the cheap paper. The Rainbow technology is feasible because printed text, readable by the human eye is a very wasteful use of the potential capacity of paper to store data. By printing the data encoded in a denser way much higher capacities can be achieved. 

Paper is, of course, bio-degradable, unlike CDs or DVDs. And sheets of paper also cost a fraction of the cost of a CD or DVD. In the Rainbow technology, soon we would be watching full-length high-definition videos from a piece of paper! With the popularity of the Rainbow Technology, computer or fashion magazines in future need not carry CDs in a pack. 

One of the major advantages of the Rainbow system is the fact that it should cost a lot less to produce than the typical polycarbonate DVDs, CDs and now Blue- rays. Hence huge data banks can be constructed out of Rainbow-based storage medium.

download Project Report and paper presentation  of CSE Rainbow Technology A CSE Mini project . 

Online Examination Project a Java Project

Online Examination java project is a newly developed project that assesses students by conducting online objective tests. The tests would be highly customizable. This project will enable educational institutes to conduct test and have automated checking of answers based on the response by the candidates. The purpose of the project is to see that the responses from the candidates will be checked automatically and instantly. Online examination will reduce the hectic job of assessing the answers given by the candidates. Being an integrated Online Examination System it will reduce paper work.

Advantages: 

It can generate various reports almost instantly when and where required. This project would be very useful for educational institutes where regular evaluation of students’ is required. Further it can also be useful for anyone who requires feedback based on objective type responses. 

ONLINE-EXAMINATION-PROJECT-A-JAVA-PROJECT

Conclusion: 

Online Examination java project allows faculties to create their own tests. It would enable educational institutes to perform tests, quiz and create feedback forms. It asks faculty to create his/her set of questions. Faculty then creates groups and adds related students into the groups. Further the tests are associated with specific groups so that only associated students can appear for the test.

The result of the response would be available to the faculty of the question set. Further the result would also be mailed to the student. This project would be helpful for creating practice tests, say for educational institutes and as a feedback form. The project requires programmed software with administrator aspect, student aspect and analysis.

Online Blood Bank a C# .Net Project

Entering the details about the blood groups, members, addresses etc. And tracking the database is complicated when the details are maintained manually. This makes the maintenance of schedule erroneous. There are quite a few constraints causing hindrance to the existing system.

The whole process is time consuming and is not accurate leading to error prone results. It requires lot of manpower in order to get effective results and also lacks data security. The retrieval of data at any given point of time is time consuming. 

The percentage of accuracy is less and reports take time in order to be produced. The Online Blood Bank C# .Net Project is  a windows application allows you to access the whole information about Blood Bank Management Software, readily scalable and adaptable to meet the complex need of Blood Banks Who are Key Facilitator for the Health care Sector, it also supports all the functionalities of Blood Bank. 

It is used for maintaining information about the campus. The project includes 3 modules; The Admin, Donors and Acceptors. The admin module focuses on the both donors & acceptors. Each member in a donor & acceptor is given a user id and password, which identifies him uniquely. The member is given a login form. he enters the login details user id and password. 

Conclusion: 

Each member in a Donor is given a user id and password, which identifies him uniquely. The member is given a login form. he enters the login details user id and password. The options given to a each member in a staff are to change the password, inquire on a particular blood group and information on, “why donate blood”. 

In this you can   store the information about   Acceptors. The whole project makes work easier for every person using the software in their required category.

Hospital Management a VB Project

Hospital management VB project deals with student marks and management. It simplifies managing the student details which are inclusive of personal, academics and providing marks list in a college. This program also provides immediate details needed in the student marks management.

This Hospital management VB project complex project has the scope of adding new employees, doctors, admitting outpatients, fixing appointments etc.  This project also displays the services provided to outpatient. It consist of several interfaces which include Welcome interface Login interface, MDI main interface, Application interface, Doctor interface, Employees interface, Ward interface, Outpatient interface and Services interface.

HOSPITAL-MANAGEMENT-A-VB-PROJECT

In welcome interface, it includes just progressing, intimates that the administrator is getting in the management program. In login interface, we provide authorization to the user getting in. The multiple document interface, provides base screen for all management program actions present in the management program.  

It contains menu bar which list the manipulation forms for management. Application interface provides the basic accessories that are required for certain essential operations. This interface provides us the facilities such as viewing doctor’s details including his/her id, qualification and specialization, address etc. 

It also displays the list of doctors present in various departments. We can search a doctor by his id and then view his details. This interface also provides us the facility to add new doctors in. 

Myriad Advantages:

This interface provides us the facilities such as viewing employee’s details including his/her id, qualification, address etc..  It also display the list of employees present in various departments. We can search an employee by his id and then view his details. This interface also provides us the facility to add new employees in. The ward  interface provides us the details about wards and the habited patients in those wards. 

Conclusion: 

This interface provides us the information about the outpatients, what for they are in, appointments with doctor, bill details, time they are in etc. This interface provides us the information about the services present in that hospital, which time they are scheduled to be open, and the in charge administrator.  The basic functionalities of hospital management system is to provide convenient way of management to the administrator. 

It should be highly user defined and all the details of doctors, employees and patients can be conveniently maintained due to the presence of the data base.

Dynamic Heterogeneous Grid Computing a Java Project

Dynamic Heterogeneous Grid Computing a Java Project is for computer science final year students who are interested in grid computing java project.

Description: 

Communication Induced Check-pointing protocols usually make the assumption that any process can be check-pointed at any time. An alternative approach which releases the constraints of always check-point able processes, without delaying, “Any do not message reception” or altering message ordering enforcement by the communication layer and by the application.

Dynamic-Heterogeneous-Grid-Computing-a-Java-Project

Reason for implementation and others: 

This protocol has been implemented within Pro-Active, an open source Java middle ware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes).However, large applications executing on Grid or cluster architectures consisting of hundreds or thousands of computational nodes create problems with respect to reliability. 

A Glittering Problem: 

The source of the problems is node failures and the need for dynamic configuration over extensive runtime. 

Conclusion: 

By allowing recovery even under different numbers of processors, the approaches are especially suitable for applications with a need for adaptive or reactionary configuration control. The low-cost protocols offer the capability of controlling or bounding the overhead. A formal cost model is presented, followed by an experimental evaluation. It is shown that the overhead of the protocol is very small, and the maximum work lost by a crashed process is small and bounded. 

The solution to this is two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. These are transparent protocols capable of overcoming problems associated with both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a data flow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multi threaded applications.

Flexible Deterministic Packet Marking CSE Paper Presentation Java Project

Description:

Flexible Deterministic Packet Marking CSE Paper Presentation .Internet Protocol (IP) trace back is the enabling technology to control Internet crime. Without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. There are quite many defects in the existing system.

It is not easy to find out pack travel path, the packet can be lost and duplicate packets can be received by the receiver. If this process is repeated over and over receiver will not have any original packet because of the increase in duplication of messages. 

However, the FDPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination. The most significant merit of the FDPM algorithm is that when the algorithm terminates it guarantees that the constructed attack graph is correct, with a specified level of confidence. 

We carry out simulations on the FDPM algorithm and show that the FDPM algorithm can guarantee the correctness of the constructed attack graph. 

Different probabilities that a router marks the attack packets .It is easy to find out packet loss, Duplicate packets and find out each and every packet path. It also reduces the network traffic. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM), which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. 

While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. 

Conclusion: 

Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates.

The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. 

It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems. We present a novel and practical IP trace back system called Flexible Deterministic Packet Marking (FDPM).

FDPM provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. FDPM requires a moderately small number of packets to complete the Trace back process.

Enhancing Performance of Data Migration CSE Final Year Project

Description: 

Transferring of data between storage types, formats, or computer systems is termed as Data migration CSE final year project , it is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. When organizations or individuals change computer systems or upgrade to new systems, or when systems merge, this can be put to potential use. Data-migration-CSE-final-year-project

To achieve an effective data migration procedure, the data on the old system is mapped to the new system providing a design for data extraction and data loading. The design relates old data formats to the new system’s formats and requirements. Programmatic data migration may involve many phases but it minimally includes data extraction where data is read from the old system and data loading where data is written to the new system. 

If a decision has been made to provide a set input file specification for loading data onto the target system, this allows a pre-load ‘data validation’ step to be put in place, interrupting the standard ETL process. Such a data validation process can be designed to interrogate the data to be transferred, to ensure that it meets the predefined criteria of the target environment, and the input file specification. Data migration phases (design, extraction, cleansing, load, verification) for applications of moderate to high complexity are commonly repeated several times before the new system is deployed. 

Similarly, Data Compression is useful because it helps to reduce the consumption of expensive resources, such as hard disk space or transmission bandwidth. On the downside, compressed data must be decompressed to be used, and this extra processing may be detrimental to some applications. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed. 

The design of data compression schemes therefore involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced, and the computational resources required to compress and uncompress the data. 

Data Compression: 

There are two kinds of data compression Lossy and Lossless. Generic, data-specific, and parallel compression algorithms can improve file I/O performance and apparent Internet bandwidth .However, when integrating compression with long-distance transport of data from today’s parallel simulations. 

Issues: 

These issues include: what kind of compression ratios can we expect? Will they fluctuate over the lifetime of the application? If so, how should we make the decision whether to compress? Will the compression ratios differ with the degree of parallelism? If so, how can we handle the resulting load imbalance during migration? Are special compression algorithms needed? Can we exploit the time-series nature of simulation snapshots and checkpoints, to further improve compression performance? What kind of performance can we expect on today’s supercomputers and internet?

download Project Report  of CSE Data migration CSE final year project.

Detecting Malicious Packet Losses a Java Project and Source Code

Detecting Malicious Packet Losses a Java Project is for B.tech computer science final year students who are interested in implementing java related projects.

Description: 

Network routers occupy a unique role in modern distributed systems. They are responsible for cooperatively shuttling packets amongst themselves in order to provide the illusion of a network with universal point-to-point connectivity. However, this illusion is shattered – as are implicit assumptions of availability, confidentiality, or integrity – when network routers are subverted to act in a malicious fashion. 

DetectingMalicious-Packet-Losses-a-Java-Project

By manipulating, diverting, or dropping packets arriving at a compromised router, an attacker can trivially mount denial-of-service, surveillance, or man-in-the-middle attacks on end host systems. Consequently, Internet routers have become a choice target for would-be attackers and thousands have been subverted to these ends. 

Advantages: 

The solution is taken to detect whether a compromised router is maliciously manipulating its stream of packets. In particular, the system is concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. 

Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the same effect. Modern networks routinely drop packets when the load temporarily exceeds their buffering capacities.

Previous detection protocols have tried to address this problem with a user-defined threshold: too many dropped packets imply malicious intent. However, this heuristic is fundamentally unsound; setting this threshold is, at best, an art and will certainly create unnecessary false positives or mask highly focused attacks. 

Conclusion: 

The designed, developed, and implemented system is a compromised router detection protocol that dynamically infers, based on measured traffic rates and buffer sizes, the number of congestive packet losses that will occur. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malicious actions. We have tested our protocol in Emulab and have studied its effectiveness in differentiating attacks from legitimate network behavior.

Crime File Management A Java Project

Srishti Systems is a  Software and Web Development Company a Java Project with in-depth technical knowledge coupled with industry experience and the unique methodology enables us to successfully deliver the services to the clients worldwide.

We are driven to attain our customer’s highest satisfaction by providing business experts with underlying delivery expertise in Enterprise Technology, Methodologies and Implementations. Our core competencies are designed to effectively deliver results to our customers.

The project titled as “Online Crimefile Management “is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, shows most wanted person’s details via mail or chat. Any Number of clients can connect to the server.

The number of users is not restricted. Each user first makes their login to sever to show their availability. The server can be any Web Server. 

CRIME-FILE-MANAGEMENT-A-JAVA-PROJECT

How this should be? 

An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities. The main modules in this project include visitors, registered users and the administrator. Visitors can see updates of the latest hot news put up by the admin. However, a registered user has far more options.
                                                           
Advantages – Conclusion: 

The user can file a complaint, add a crime report, upload the details of missing person, view all further updates by other users. They also can edit complaints, chat or mail people, get updates on crime reports or the complaints filed by them.

The administrator can view and reply to a user’s complaint, View and reply to users crimes, Add and delete latest hot news, View and delete user’s feedback, Add, delete and view most wanted persons, Add, delete and view missing persons, Add and view Criminal reports. It also felicitates email and chat facilities along with other log in controls.

Credit Card Management System a .Net Project and Paper Presentation

Description: 

The credit card management system a .Net Project  is suitable for management of Debit cards, Credit cards as well as Smart cards. IT is a windows based application that mainly involves maintenance and management of card –related information in a Bank. The existing system is a slow procedure that causes inconvenience to the customer. 

A person is required to go to the bank in order to find out his eligibility, cancel his appointments and wait for a long time in order to meet the concerned person. Lack of efficiency in the customer service compiles him to make frequent visits for the same reason. The procedure is followed by submission of documents and their verification which further delays the loan and causes inconvenience to the customer. It is a mere waste of time and energy of the customer. 

Objective: 

The proposed Credit Card .Net Project system mainly involves the maintenance and management of card – related information in a Bank. This product caters to all the Credit, Debit and Smart Card based functions of a bank like Registration of Customers for card issue, Opening Card Accounts for the registered customer, Creation of Cards for registered customers, Hot Carding, making the Card ready for Embossing by creation of Card Data file etc.

The Card Management System could interact with an external Card Transaction System, thereby making the Card-related information maintained by the bank, up-to-date.  

The purpose is to build a Card Management System which provides complete card processing, to meet the needs of full-fledged Credit card and Debit card based ATM or Point of Sale network.

Conclusion: 

The system is designed in order to make the existing system more effective. It allows the customer to access cash easily. The Card Management System could interact with an external Card Transaction System, thereby updating the Card-related information maintained by the bank. 

The purpose is to build a Card Management System which provides complete card processing, to meet the needs of full-fledged Credit card and Debit card based ATM or Point of Sale network. Customer can apply for credit card and know his eligibility from his own place just by giving his personal details.

Everything comes to his door. Person comes to collect the required documents. Verification and other process will be finished within 5 days and customer is intimated about the sanctioned loan amount and EMI that he has to pay.