Stop Global Warming Web Portal Java Project Report

Introduction to Stop Global Warming Web Portal  Project:

This is a social homepage for swaying individuals to avoid different contamination causative. It deals with the standards of wellbeing announcement and fortifying the social norms. It not just makes the users attentive to the maladies brought about but additionally how to avert them. It support, direct and partake in examinations and research identifying with situations of water, area and air contamination and its anticipation, control and decrease thereof. 

Recommended System 

The improvement of this newfangled framework holds the emulating actions, which attempt to recuperate the situations from the past framework: 

•           To shed light on the diverse moving stories of these who have committed in opposition to contamination. Aggregate parts will have chances to run diverse hostile to-contamination mindfulness programmers in available places, universities, and so on. 

•           It may as well spread cognizance concerning the ways (steer, aberrant and so on) in which an individual can encourage to overcome contamination. 

•           To develop powerful routines for transfer of sewage and exchange gushing on area. 

•           To screen the crop, transportation, medicine, space and transfer of dangerous wastes. 

•           To aid parts to cooperate with individuals, lead advising and clear remains skeptical about through discourse gatherings. 

•           Secure enrollment and profile administration offices for enlisted parts and administration and non administration firms. 

•           A consistent news-letter may as well be sent to enlisted users to spread consciousness. 

The proposed users are verified to the site by giving the certifications which they got around then of enrollment. He will affirm the enrollment of Group Members, Govt. on the other hand Non-Govt. Offices & Doctors dependent upon their Profiles. He may as well produce and impart the Training lineups directing by Central Pollution Control Board to Group Members and Govt. on the other hand Non-Govt. Bureaus & Doctors.

He may as well print the most cutting edge news concerning the Global Warming on Home Page. They may as well have the ability to cooperate with Govt. additionally Non-Govt. Offices, Doctors at given errand timings to elucidate their questions utilizing talk discussions.

Stock and Portfolio Management Solution Project Report for CSE Final Year

Introduction to Stock and Portfolio Management Solution Project:

At present, the utilities gave by specialists to the moguls are accepted which is not supporting at this snappy adapting stock businesses situation. There is no mechanical warning to the clients on executing their solicitation to the specialists. Reporting cycle identifying with the portfolios is profoundly unpredictable in the existing framework. Seeing that stock trades are quite delicate to the general updates in the social norms, a proficient framework for stock broking needs to be made. For this reason, we are outlining a modern framework which is handy to both the Brokers and Customers taking part in stock broking.

In this module Customers might as well have remote access and might as well have the ability to ration and place ask for connected. A review trail might as well be administered of it. Clients may as well be informed programmed on execution of their appeals and requests. A sub-framework may as well be good to go to clients to track the status. It’s a route to heighten to administration in the event of grievances.

In light of the fact that stock trades are quite delicate to the customary updates in the public order, a proficient framework for stock broking needs to be made. For this reason, we are outlining a modern framework which is advantageous to both the Brokers and Customers participating in stock broking. Agents may as well have access limited to the portfolio where its dealing with the emulating things:

  • Customers might as well have remote access and may as well have the ability to ration and place ask for connected. A review trail might as well be upheld of it.
  • A sub-framework for intermediaries to execute clients’ asks for and requests.
  • Customers might as well be advised programmed on execution of their appeals and requests. A sub-framework might as well be good to go to clients to track the status. But, a route to rise to administration in the event of grievances.
  • Management and Customers may as well have access to diverse reports. The right to gain entrance to reports may as well be part based.

Final Year Project on Image Steganography with Full Report

Steganography is the craft of concealing the way that conveyance is occurring, by shrouding qualified information in different qualified information. Countless unexpected bearer index organizes could be utilized, but computerized visualizations are the most prevalent as a result of their recurrence on the virtual world. For concealing mystery qualified information in representations, there exist vast mixed bags of steganography procedures some are more perplexing than others and the sum total of them have particular unyielding and powerless indicates.

Contrasting provisions may need total intangibility of the mystery qualified information, while others need an imposing mystery inform to be covered up. This undertaking report expects to give an outline of visualization steganography, it utilizes and methods. It additionally tries to recognize the prerequisites of an exceptional steganography functional process and quickly reflects on which steganographic methods are more suitable for which requisitions.

Steganography is a quite intriguing subject and outside of the mainstream cryptography and framework management that the vast majority of us bargain with day following day. Steganography could be utilized for concealed correspondence. We have investigated the cutoff points of steganography hypothesis and rehearse. We printed out the upgrade of the visualization steganography framework utilizing LSB methodology to furnish a method of secure correspondence. A stego-key has been had an association with the framework at the same time as implant of the note into the front picture.

This steganography provision programming accommodated the reason to how to utilize any sort of representation organizes to concealing any sort of indexes inside there. The expert work of this provision is in supporting any sort of pictures without ought to change over to bitmap, and more level constraint on record size to shroud, due to utilizing greatest memory space as a part of pictures to shroud the document.

On account of old times, man has found a longing in the capability to impart clandestinely. The late outburst of exploration in watermarking to secure educated property is proof that steganography is not actually constrained to military or reconnaissance requisitions. Steganography, for instance cryptography, will play an expanding function in the fate of secure correspondence in the “advanced planet”.

Image Steganography Project Source Code and Documentation

The fact that communication is occurring and it can be hidden is possible only with technique of steganography which is the art of hiding facts. This can be be made possible by hiding one information in another. Various kinds of file formats can be used for this but the technique of using digital images is quite well known especially because of the high frequency on the internet.

There are a wide assortment of steganography methods that can help to hide informations that are secreted in images. some of these techniques are more complex than the others. Each of these has its own weal and strong points. Absolute visibility is required by some of the applications for hiding the secret information while another requires huge secret informations.

This project gives an overview of steganographic image as well as about its techniques and uses. This document further attempts to discover the requirements of the best steganographic algorithms and also reflects on the techniques used that are more perfectly suitable for applications.

The communication system is growing in the modern world and it also requires a special security system on the network of the computer. The security of the network is therefore becoming more and more important as per the data members that are being exchanged on the internet also increased. The data integrity and the confidentiality also need to be protected against unsruptulous uses and accessing. This further results in the growth of hiding information.

Searching the hidden information is one of the basic research area that is emerging nowadays and it also encompasses various applications like protection of copyright for the media, fingerprinting, watermarking and steganography. The information that makes up the applications differ in various cases. It includes usually the name of the owner, his identification, digital time stamp etc.

Steganography Project Report for B.tech CSE Major Project

Introduction to Steganography Project Topic:

We propose a latest technique in the steganography system to hide the information that is not to be disclosed with the image of the digital format. To hide the data we use BMP image. LSB algorithm stenography is the most common mode and it is used as the base. We have made some changes that are based on the innovative idea which include the integration of second and first LSB algorithms. The security here is considered to be the main aspect. 

Randomization concept is applied to the selection of pixels in pictures to  hide the data. Values are generated randomly with the help of secret keys. Unless the hackers have the key they will not able to find the numbers because they based on random physics. Analysis of statistics and detailed visualization of algorithms disclosed that it provides results that are satisfactory. It can be easily proved that the decoding system is very difficult in the proposed algorithm.

The work that is presented in this document is only the effort to create a strong stenographic system for Convery communication use. The algorithm proposed can be incorporated from various techniques that are existing and it results in an efficient algorithm of steganography. For high security of steganography we have developed a new technique. We are planning to improve our system in the future with robust build and high payload capacity as well as imperceptibility.

Steganography is similar to cryptography and it provides a way for communication of secret messages. A message is usually scrambled in the cryptographic technique so that it cannot be deciphered. On the other hand, the technique of The steganography technique hides the presence of the messages by concealing it inside a file. The cartographic messages can be intercepted with the help of eavesdropper but it will not enable an intruder to know that even the message exists.

Steganography Project DFD Diagram

The existence of communication can be hidden from others by using the steganography technique which is the science and art of communication. This system do not able others detect the messages that are hidden in various ways. The word steganography is derived from a Greek work which means “covered writing”.

It consist of a long chain of secret methods of communications that completely conceal the existence of the messages. Invisible ink, character arrangement, microdots, signatures in digital format, converting of channels and communications through spread spectrum are some of the methods that are used in this technique.

Both the techniques cryptography and steganography are twin cousins and they act in the spy craft family. A message in the cipher text format can easily arouse suspicion in the mind of the recipient while on the other hand, the use of invisible messages created with the art of stenography will not do any such things.

In comparison to the cryptography technique where the intruder is allowed to modify as well as intercept the messages without even violating the premises of the security that is guaranteed by cryptosystem the steganography is used to conceal messages in other messages in such a format that it never allows the hacker to detect that there is even any existence of a second secretive message.

The digital fingerprinting and watermarking for video and audio is hugely in demand in the present industry and it enhances the steganography technique highly. With the discovery of high speed computers steganography in the form of images has reached the edge. the Least Significant Bit  Insertion is one of the most popular technique that is used in image steganography. There are various advantages of using this method and the best use is that it helps in transmitting messages secretly without the risk of the message being discovered by the intruder. 

Steganography Project Report in Java

Introduction to Steganography Project in Java:

In comparison to the technique of cryptography where the messaged has not disguised itself but the content is obscured. With the advent of steganography over the technique of cartography alone the security of messages has highly increased. The messages do not attract the attention of other recipients, to themselves and to the messengers. The art and science of hidden messages are hidden in the technique of steganography and it is done in such a manner that no one other than the recipient who is intended to receive the message can discover the secret message.

Traditional means are used for encryption of steganographic messages and then the cover text is further changed in some or other manner. The encrypted message results in stegotext. Letter size, typeface, spacing and other convert text characteristics can changes are made to execute the hidden message. This means that only the receiver of the message can recover and decryption it. Steganographic coding present in a transport layer likeMP3 file and protocol like UDP are then used in the electronic communication system.

For transmission of data safely and securely the steganographic system is used and it also enables safe storage of data in the network. There are many files that are important and include confidential data, they can be stored in encrypted form in the server. These files can be used only by authorized users.

Transmission of these files can be made possible only in the form of encrypted data and it does not disclose the message to the intruders. This means that the hackers and intruders will not able to make out any meaningful information during the transit. Moreover before trying to use the files the users need to enter the system with the help of valid password and user id that is allotted by the administrator to him.

Statistical Techniques for Detecting Traffic Anomalies DFD Diagram and Documentation

The main aim of the project is to reduce the traffic caused by the network while transmitting data’s using an egress router and ingress router. In order to reduce the traffic that is caused by the network during the transmission of data with the help of ingress and egress router is the main focus of this project.

Attack on network infrastructure is very frequent and various types of  worms and denial service are used which lead to the need of several latest techniques for monitoring and analyzing the traffic work. If only some efficient tools would have existed then it could be possible to detect the anomalies and attacks. It would also make it possible to take necessary actions to reduce their actions before they can further propagate in the network. For detection of attacks and anomaly various studies are being carried on to know the possibilities of traffic analysis that are based on mechanisms. The onset of traffic can be estimated with a sudden hike in traffic on a particular port.

We approach two types of detection mechanisms that will help to detect the anomalies – real time modes and post mortem. The latter technique usually consumes a lot of time of data as a single set and also employ  rigorous processing methods. Further it is a technique that demands lots of resources for accurate analyzing.

This kind of analysis is usually very beneficial for engineering purposes and understanding the peak demand. On the other side, there is the real time method that analyzes and concentrate a small window of data traffic. It provides a quick dirty waning of the ongoing and impending anomalies of traffic. This analysis does no require any sophisticated equipment’s and resources. This is widely used because of its features like imminence of attacks and less demands. 

Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data Project Abstract

The main aim of this project is to design a technique for the anomaly of the traffic detection that is based on the analyzing correlation of the IP destination in the outgoing of traffic at egress router. This data on address correlation are transformed with the use of discrete wavelet for providing effective detection of anomalies with the analysis of the statistics.

The motivation for this project arise from a requirement and it aimed to reduce the chances of intruders from attacking the campus machines. Using this system the campus may prevent hijacking of the system and also the liability for such attacks reduced. Outgoing traffic of header data packet is studied and it includes destination address, number of flows, port numbers etc. it is used in order to find out the anomalies origination at the campus edge of the campus.

Detecting attackers and anomalies that allow close to the main source to put an end to the potential damage that is close to the attacking machines. The technique of traffic monitoring that is close to the source enable quicker identification of the operator. It also allows administrators control domain’s records. By the process of early detection attack propagation speed can be reduced to a large extent.

Our approach monitors the traffic on the network at periodical interval and also analyze it to find if any kind of abnormalities persist in the traffic. Correlating and observing the traffic with its previous conditions it is possible to find out whether the present traffic is behaving in the same manner or not. due to the flash crowds, infrastructure problem and changing of accessing patterns and DoS attacks the network traffic can appear a bit different. The network usage can increased and various abnormalities can even pop up in case of an attack of the bandwidth.

.Net Frame Work CSE Project on SQL Tuner Project Report

In today’s industry as per the normal scenario whenever a developer or a programmer design or write any new query he have to submit the same to the DBA of any company for fine tuning. Even the DBA do nit able to tune it to the fullest extent and even if they become successful then take a lot of resources and time for that. It is not possible to tune every single query during the crunch time. The DBA’s relies on its own experience for the tuning purpose. There are no rules for the tuning and do that sometimes even the most experience DBA do not able to properly tune the queries.

This topic is chosen among all to reduce the tuning work of the quarries by the DBA’s. This can also be used for to tune the queries by the programmer instead of going to the DBA. For developing the tuning if the SQL Queries this project is developed. By reducing the entire CPU time and the I/O time taken by the query the tuning can be made more precise and finer. There are two kinds of tuning that is indexed and syntax tuning.

Syntax tuning helps in checking the physical and logical operators that are used by the query. Index tuning keeps a check on the indexes that is used in the query and can also be used for the columns that are involved in the process of querying.

The interface is used for typing the queries of the users that is provided by the particular software and there are two choices for the users that is either tuning the query or execute it. The software gives suggestions is the tuning is chosen for improving the query performance. On the other hand, if the option of executing is selected then simply it will execute the query.