Facebook Stock Broker Application Java Project

Introduction to Facebook Stock Broker Application Java Project:

The main aim this app is implementation of stock broker in Social Networking Site Facebook stock broker means who buys & sells shares of various companies It is developed using Java Development Kit and OracleJava Script, JSP, Servlets .The investor who want to invest will contact the broker   required stock that he want and Stock broker acts as mediator between The firm and investor and gets commission from the buyer.by this kind of process buyers are lost

To prevent this kind of problems stock broker is developed in Face book where buyers can talk with each other regarding stocks in market.charges for this also very less compared when dealing with broker.

By this process lot of burden is saved and they directly transfer money from home through online transfer via internet  not only this money is also saved and also can contact broker directly.by developing this app it provides a better communication between broker & buyer

Existing system:

               In these days for buying shares investors have to contact directly with stock broker. The Investor   Continue   trading stock with   other persons   with acceptable price in company.It directly indicates that there is a need of broker for running stock exchanges with no difficulties

Drawbacks:

  1.  In this system investors should give high commission rates to brokers
  2.  Lot of time is wasted by contacting broker to know the current status in market
  3. Correct information about stock exchange is Unknown 

Proposed System:

                                               By implementing the facebook  stock broker app it is usefull  for   both broker and investor. This can be concluded by following Advantages

Advantage of investors:

                                                             The people who are investing have so many doubts on which stock they have to invest to get better profit and there is need of getting suggestion from stock broker about investment and mostly they prefer getting advice from the people who they know.By online networking then can interact with each other. This can be achieved by facebook stock broker app.Investors can also know  other peoples  interest in various trends.by this kind of online activity investors can get time to time updates which helps in making good investments.

Advantage for Brokers:

  Brokers have many advantages because whenever investor wants to buy a stock.Brokers get commissions every time when the investor buys a stock 

User Advantages By Facebook application: 

Easy Access:    The User can easily access the market through online.The traders can verify the Real Time online stock trade account and helps to give better idea about  what they are dealing with.Communication between user and  broker is achieved by online chat

Eliminate Middlemen: This is used to separate long term middlemen involved in stock trading.By this they can Buy & sell the stock easily and also allows the traders to contact stock trading brokers directly.

Lower Commission:By this higher commission rates can be decreased.Another benefit is brokers charge certain amount money only.

Rich Information Source: Distance between traders & commercial market is decreased.the traders can get various types of information regarding stocks companies market trends and also facilitates investor to communicate with each other

Wider Investment Choice:  It provides many choices for investor where they can invest like stocks, mutual funds, bonds, insurance.

Quick Trade execution: The trading can be done very quickly.The complete trading process is made so simple and wastage of time decreased.

The Facebook stock broker app has eight modules

Registration:The users who are already registered can access the Stock Broker Application.New users have to signup for login.

User:The user can view their profile after logging and can send friend request

Application: In This so many apps are displayed the user can select any of the apps and selected app will be shown

Application Request: Application Request is shown the user can accept & reject or user can ignore the request.

Stock Portfolio Canvas Page: The canvas page is displayed which contains information about different stocks that are available and they can also share them. Trade stocks can be controlled.

Portfolio page After Trade: By Entering shares of a stock they can be buoyed clicking Buy/Sell Option

Trade Notification: Trade notifications are displayed to friends depending on settings

Recommended Stock to Friends: For recommending stock friend request is to be sent to the others. And it is shown in application Request form.

Download  Facebook Stock Broker Application Java Project.

An Advanced Mac Protocol MIMO WLANS Project

Introduction to An Advanced Mac Protocol MIMO WLANS Project:

A format where digital messages are exchanged inside a system network is called communication protocol, MAC or Media access control is such a data communication protocol which acts as a data link layer sub layer. It is part of a 7 layer computer network OSI model. The physical layer of the network and the logical link layer use MAC as an interface between the two.

Communication service by MAC Channel includes

  • Unicast
  • Multicast
  • Broadcast

If the two devices are connected in a network through a wireless medium it is called a wireless LAN network or WLAN network. There are different types of wireless technology used around the globe in WLAN’s. In order to better the connection capacity and the range among the access point and a client station, a new wireless technology is used called MIMO or multiple input or multiple output wireless networks. For this type of wireless communication networks, the standard used are mostly specified in IEEE 802.11 specs.

This project deals with drastically lessens the chance of collision across a network during the case of multi user access streams, CSMA/CA scheme which is advanced is suggested for solving the constant collision problem.  The main disadvantage or drawback of the 1EEE 802.11 system was it had huge block delays during communication and no throughput was happening.

The proposed system displayed an encouraging throughput and there was a considerably improvement in the delay factor. Moreover the proposed system protocol helped in processing large number of data requirements rate applications across a host of networks. The constraint which has very less delay is also managed as effectively with this new protocol. A control channel is not required at all for the transmission of data, moreover the probability of collision is so much less as its dependability is on clusters contending.

Download  An Advanced Mac Protocol MIMO WLANS Project.

Secure Key Exchange and Encryption For Group Communication In Wireless Adhoc Networks

Any types of network which are not interconnected with wires or cables are known as a wireless network. A wireless ad-hoc network is a type of wireless network in de centralized form and does not depend on a specific existing set up or infrastructure. The data routing and forwarding happens between each and every nodes and network connectivity forms the basis of this routing.

The communication channels although are transformed through open air which makes it vulnerable to threats and attacks. Many range of threats such as eves dropping and interfering knowingly happens across ad-hoc networks. As said earlier, the nodes do a double role as both host and routers. For forwarding and receiving the data packets through nodes are connected internally through a multi hop network path. As the threat is more to wireless systems than a wired one, a need of proper security measure is extremely important 

This proposed system deals with an encryption mechanism along with a key change between the data transfer among nodes. This is done by using an additional parameter in MAC address in the form of specific key message while forwarding data by the nodes. The authenticated neighbor nodes would be able to exchange the key and any type of circular formation is avoided. The biggest advantage is that there would be only a momentarily dynamic connection between the two neighboring nodes. 

An ad-hoc network uses the probability of multi hop radio delaying and in this the nodes can act without having any fixed or steady infrastructure. Security is the prime concern across these ad-hoc networks and by using this key exchange and encryption it is almost well secured across a communication that spreads in groups. Each node has to be smart enough while forwarding the data to the neighboring nodes. 

Download  Secure Key Exchange and Encryption  For Group Communication In  Wireless Adhoc Networks .

Designing Reduced Instruction Set computer RISC Processor Using VHDL Project Report

Introduction to Designing Reduced Instruction Set computer (RISC) Processor Using VHDL Project: 

The designing of super-efficient computer processors and accelerators for hardware is done mainly by reducing the control of the compiler hardware to a low level.  RISC computing or reduced instruction set computing is a design of the CPU that can provide higher performance by simplified instructions which leads to a faster execution.

RISC is a system that allows the usage of optimized set of instruction to the highest level and uses the load/store architecture. Primitive computer languages were used to analyze the sequential programs, much similarly standard language are used to define the digital circuits. Hardware description language or HDL is used in hardware elements to concurrent the process model in it.  The cost effectiveness of the RISC model has impressed many of those who design a compact hardware.

The first step in designing is to test a program to check the input and output in the design module under various conditions. A simulator tool called Verilog simulator verifies the functioning of the design. Algorithm and logical unit will be synthesized and generation of a netlistwill happen which in turn will be transformed into a programmable logic device or PLD image file. The test jig is wired and verified after the PLD files are programmed in a device called CPLD.

Verilog HDL has many pros comparing to the other HDL’s. No special technology is selected while designing, also redesigning the circuit also don’t emerge as a case. The design is implemented into the tool and a gate level net list is created, the verification process is done in the design stage itself eliminating the errors and cons there and then itself.

The functional units of the machine:

Processor

Controller

Memory

Various functions includes data operations on ALU, storage, instruction, address registers and program counter content changing, altering memory content , data retrieval , bus movement controls etc. 

Download  Designing Reduced Instruction Set computer (RISC) Processor Using VHDL Project Report.

Balanced Ant Colony Optimization BACO in Grid Computing Abstract

Introduction to Balanced Ant Colony Optimization BACO in Grid Computing:

A huge computing power and technique is required to solve complex and difficult scientific doubts and problems. The space required for storing data is also pretty huge as the solution takes up a lot of memory. Grid computing is an innovative computation technique through which we can manage a large number of files through interactive workloads distribution system. It mainly focuses on unused processing cycles and harnesses them to solve these problems. 

 Two types of grids:

  • Computing grid
  • Data grid

It would consume a lot of time to process, solving and storing a large amount of data and grid computing helps us to do the same with less storage space and time. Status conditions of resource and networks are closely monitored and if it is found to be unstable, the proposed job would be a failure and will result in a large computation time. In order to bring in more effectiveness to the job, a scheduling algorithm is proposed to schedule these jobs in the most effective manner.

This scheduling algorithm is extremely important as hundreds of computers are used as resources and the task is impossible to do manually.  Balanced Ant Colony Optimization or BACO is such a scheduling algorithm used in the grid environment to schedule jobs effectively. Although there are other scheduling algorithms such as FCFS and SJF, BACO excels in the dynamic grid environment. Local search are made extremely quick and efficient and the strategy used for scheduling will be dependent on the job types and present environment.

Some of the problems solved with the help of BACO

  • Traveling salesman problem
  • Vehicle routing problem
  • Graph coloring problem

BACO algorithm is of different types:

  • Ant colony system
  • Max min ant system
  • Fast ant system
  • Elitist ant system
  • Rank Based ant system

Download  Balanced Ant Colony Optimization BACO in Grid Computing Abstract .

Multiple Routing Configurations for Fast IP Network Recovery Documentation

Introduction to Multiple Routing Configurations for Fast IP Network Recovery Project:

We can’t imagine a world without internet these days, the very fact that we use internet for even small things such as navigation or even finding a favorite recipe explains how much it has influenced all of our lives. Moreover the abundance and easy access to internet unlike olden days have made internet mass popular.

We often face problems while accessing the internet and the most re occurring problem is that of a decrease in browsing, uploading and downloading speeds sue to heavy net traffic, this happens mainly due to the failure of the nodes and slow  link recovery across network protocol. MRC or Multiple Routing Configuration is a new innovative technique through which perform a recovery process fast and effective after a node failure. 

Performance are analyzed by MRC by considering 

  • Scalability
  • Lengths of the backup path
  • Distribution of loads 

In cases of net traffic, MRC will reduce the congestion by recovering the traffic and improving its distribution. In the present network the traffic congestion is not managed properly as the work load is mainly relying upon link weights in many cases. Most connections throw light only on the cases where no failures happen.

In the case of load balancing, a better optimization can be obtained with the proposed MRC system as it has a very simple and effective approach.  The recovery is almost guaranteed on scenarios where single failure happens, MRC do this by managing the node and link failures under single mechanism. As this technique is sans a connection and uses hop by hop forwarding technique which are destination based for the assumption. During the diagnosis, if MRC detects a failure an additional routing information are maintained specifically which enables the forwarding of the packet to flow on that alter link without any delay 

Download  Multiple Routing Configurations for Fast IP Network Recovery Documentation  .

A Secure Communication Protocol For Ad Hoc Networks Java Project Abstract

Introduction to A Secure Communication Protocol For Ad Hoc Networks Java Project:

The biggest problem everyone faces while sending or sharing data is the security issue associated with the transfer. The chance of infiltration is higher in a less secured network and as a result there would be loss of important confidential data. The ad-hoc network is independent of any fixed infrastructure and it’s the each individual node in it that works as a router by managing and transferring the data among each other.

There should be a highly secured and safe protocol for communication between each of these nodes. This topic deals with such innovative security measure called clustering adapted for such ad-hoc networks. The data packets are shared between two nodes inside and among these clusters. A head node is selected to execute all important functions and uses various technological processes such as encryption and cryptography to make the whole system more authentic, secure and scalable. 

The data packets are usually vulnerable to hacker attacks and it is extremely important to protect them from such malicious attacks. Techniques such as symmetric key cryptography and authentication techniques such as Kerberos authentication are used to manage the integrity and transparency of these data packets. A method and an algorithm which is randomized to control access to channel broadcast is also another technique used to secure communication protocol of these types of ad-hoc networks.

A distributed clustering algorithm is also used to help cluster the nodes. A leader is selected within a cluster and other nodes maintain close proximity to this leader in cluster leader based scheme which reduces the cluster overhead considerably well. The two different algorithms namely randomized channel control access and distributed clustering are also used for increasing the security of the protocol. By using these methods the overall efficiency of the ad-hoc network increases and the overhead considerably decreases. 

Download  A Secure Communication Protocol For Ad Hoc Networks Java Project Abstract  .

Voice Enabled Browser Seminar Report for CSE Students

Introduction to Voice Enabled Browser Seminar Topic:

Voice enabled browser means that recognize the speech for the computer input. It converts the spoken words into machine language that is under stable to the computer.  It recognize the person speech that what is said by the user and what to do.

This type of technology includes call dialing for example “ call home “ , content search, audio search, call routing, data entry, text processing by using speech, doing e-mails by speech, preparation of the document, input of the any number and to find any song in the device.

Hand free computing: – hand free computing means to use the computer by the user without the use to hand that they commonly used interfacing device such as mouse and keyboard. For this speech recognition technique is used that recognize the speech as a command for the input. It is also useful for the disabled user. A computer can be trained to recognize the speech and the correct command is to taken as the input.

It is very useful while driving or in factories. This can be varied by range of tongue, lips, month and movement of the head to the mouth. It uses speech recognition software and a microphone. Some example of this technology is sensitive camera and joysticks. A camera is mounted on the user head to take input in the device.

Our aim is to build a speech recognition application that searches the keyword or content entered by the user in appropriate way. Its system preferences can be changed by the user according to his or her needs. This application must be multi functional that is it can accept two or more than two commands at a time. New command for new action can be created by the user. The application must generate mouse and keyboard events.

Download  Voice Enabled Browser Seminar Report for CSE Students .

Project Report on Inspection Tools

The Project is about the Inspection Process of the automated system. This checks the automation process and efficiency. The Inspection process has been done in the important stages of SDLC or Software Development Life Cycle for confirming the dependency and  efficiency of the software. The Inspection Process is an mandatory stage in the development of the software application. All software firms are being following strictly the process of Inspection. This shows the checking of the software efficiency. Also it makes less burden on the programmer in the development of software with out any error. 

The Existing System 

The Existing system is Inspection the software development in a manual procedure which is time taking. The process of debugging and inspecting is complicated in the development of the software. The application software become vigorous and difficult. 

The Proposed System 

The Proposed system consists of the combination of the procedures and the data from software inspection is used as the highly recommended statistical engine to evaluate every software module. 

The inspection data has to be entered into the tool which analyses and produces an output of the number of the defects present in the inspected software module. This process enhances the quality of inspection by recommending the re-inspection process to be done. The Software firms and other organizations must include the Inspection process to inspect the software. The Inspection Process still has to be made cost effective. 

The software requirement for the Inspection tool development are Windows 2000/ XP operating system, XML, HTML, DHTML for the front end program, J2EE program for the middleware, Oracle 8i program for the backend, Web Logic 6.1 Server. The hardware requirements are 32 bit Pentium IV virtual memory processor, 256 MB RAM, 40 GB hard disk.

Download  Project Report on Inspection Tools .

Information Retrieval and Knowledge Management System Java Project Report

Introduction to Information Retrieval and Knowledge Management System Java Project:

The information gathering and the knowledge management is normally based on the technical situations. The application is for the use of the user and the administrator in which the user asks a query on it which has to be answered by the administrator. The application is depended on the internet and at a time many different user can communicate with one another. 

The system is designed like this it contains 3 main modules known as the Super user, the administrator and the Student. The work of the Super user to regulate the data which is processed by the administrator. The administrator has job to edit, modify and answer the queries of the question asked by the students. The students are the last user who uses the system to ask their questions. 

The system works by getting the new query from the student that has been added in the database and can be viewed by the administrator. The database stores and identifies the type of query and make available to the administrator. 

The Existing System 

The existing system have various problems as it cannot handle the more students and their questions to a related faculty, it also cannot maintain the huge number of frequently asked questions  for the use of students. 

The Proposed System 

The Proposed system is called the Information Retrieval and Knowledge Management System. 

The Proposed system has all features from super user to control over the database to the administrator for answering queries and maintaining the frequently asked questions for the students. The student query has been sent to the related faculty and then gets the answer which is done by the administrator and again sent to student. 

The Information Retrieval and Knowledge Management System is developed by programming language J2SDK 1.4, Oracle 10g database, Operating system Windows 2000. The hardware includes Intel Pentium IV Processor 2 GHz, 256 – 512 MB RAM, 40 – 80 GB hard disk.

Download  Information Retrieval and Knowledge Management System Java Project Report .