M.Sc Wireless Communication Systems Engineering Literature Review Report

PROJECT TITLE

Incorporating Energy maps to measure and compare the coherence time and spreading period across mobile wireless networks

Literature Review Report

M.Sc Wireless Communication Systems Engineering 

Table of Contents: 

1. Introduction 

   1.1 Problem Definition

   1.2 Aim of the Project

   1.3 Objectives of the Project 

2. Project Deliverables 

3. Research Methodlogy 

4. Concepts of Energy Maps

    4.1 Modified DSR 

    4.2 Implementation of Overhead Reduction

         4.2.1 Algorithm for Overhead Reduction 

    4.3 Efficient management of Energy in Modified DSR

         4.3.1 Algorithm for implementing power management

    4.4 Hybrid Wireless networks

                 4.4.1 Security Issues

                     4.4.2.1 In Uplink Opportunistic Throughput Maximization

                     4.4.2.2 In Downlink Opportunistic Utility Maximization

                     4.4.2.3 Scheduling Proportional Fair

                     4.4.2.4 Scheduling General Utility-Based                    

5.Conclusion 

 REFERENCES  

Introduction

Problem definition:

            Efficiency of mobile wireless networks plays a very important role in estimating the overall performance of wireless communication. Estimating the performance of mobile wireless networks at individual node is an easy process, but the actual end-to-end quality of service of these networks can be estimated perfectly when the entire network with all the nodes is considered. Energy consumption is the main issue with the mobile wireless networks and to reduce the energy consumption, energy maps can be opted as the best choice in these wireless networks. Planning the perfect energy consumption mechanism across the mobility nodes is really a critical task and there are many existing techniques to achieve this and they are proved to be failure in case of high mobility nodes in the mobile wireless communication networks. 

            To achieve the optimal energy consumption, an end-to-end energy maps are incorporated in the proposed algorithm, where few metrics like energy potential, distribution time, sharing time and fusing time are also taken in to consideration. Internal logic is used to calculate the energy and the coherence time across the mobile wireless networks. Maximum duration for which the end-to-end QoS metrics remains same is predicted with the coherence time and spreading period represents the period of time taken to spread these QoS metrics across all the nodes in the mobile wireless networks. Energy maps are constructed based on these metrics. 

Aim of the Project:

Aims:

            To incorporate the energy maps across the mobile wireless networks for optimal energy consumption and to compare the QoS metrics with the help of Coherence time and spreading period. 

Objective of the Project:

Objectives:

Following are the research objectives 

  • To understand the concept of energy consumption across the nodes of mobile wireless networks and how to optimize the energy consumption.
  • To document the critical analysis of the energy optimization techniques and QoS metric across the mobile wireless nodes.
  • To design and propose logic which can be simple enough to calculate the energy consumption across the mobile nodes.
  • To calculate coherence time and spreading period of the QoS metrics considered and compare them with respective to the energy maps across the nodes
  • To develop a dot net based code to demonstrate the proposed algorithm/logic practically

To evaluate the system is developed and also to document the observations.

Project Deliverables: 

    Following are the deliverables of this project:

  • Literature review on mobile wireless networks and the importance of coherence time and spreading period across them with the limitations of existing systems.
  • Path integration algorithm that can incorporate energy maps across mobile wireless networks.
  • Design document explaining the front end and backend of the application
  • Dot net code that can demonstrate the application practically
  • Results and observations in a proper thesis format 

Research Method: 

          I will make use of both qualitative and quantitative methods of research to proceed with this project. I will study the concepts of energy maps using qualitative methods and develop the proposed algorithm using quantitative methods of research.

NIT Computer Science Project Thesis Report on Image Compression Using Fractal Algorithms

Introduction to Image Compression Using Fractal Algorithms Project:

This system is used for making the image smaller in the resolution size by making the use of the algorithms called the fractal algorithms. These digital pictures that are captured have a material element in it called as the image pixels. These digital images are normally very brighter and very clear as comparing it to the image views.

As the pixels of the images are made lesser and lesser the clearity of the images goes on increasing and hence these digital pictures are capable of any standard scale measurements. This pixel is measured by the unit called the Entropy. This unit gives the detailed information related to the images.

In this system a device called the Human Visual System abbreviated as the HVS is been situated which requires some basic characteristics to work upon like Coding redundancy, Interpixel  redundancy, Phychovisual redundancy. Coding redundancy make use of the symbols in the coding languages. Interpixel redundancy refers to the geometric redundancy that uses the 2D array pixels to minimize the Interpixel redundancy. During this process this is transferred to the invisible or hidden formats that are used for the viewing. Phychovisual redundancy has the most information contents that the other previous redundancies.

Image compression also has the two main concepts called the encoder and the decoder. The advantages of the image compression device are the transformed images are little less in comparison to the single image and in between the two images. It has very low sensitive power in the corrupted transmission of the images.

This image transformation has the standard methods that are used in the programs. These standard methods called the DCT are used in the Walsh itself.  Walsh is also said to be as the standard methods. Many new techniques are used to the expressional execution process. In the future days this system can be made a great choice for the various fractal materials.

 Download  NIT Computer Science Project Thesis Report on Image Compression Using Fractal Algorithms  .

Computer Project Idea on Rapid Prototyping

Introduction to Computer Project Idea on Rapid Prototyping:

The rapid prototyping is mainly used to improve the knowledge and the architecture of the framework to update the design of the existing system software. By observing the critical and the confusing stage of the software development in the technology the developer’s team made an update in the system technology and designed the rapid prototyping for the improvement of the frameworks. For this the developers used the methods called the Design for X. here the people write using the DGL-CF’s for the updating of the knowledge by making the use of the Rapid prototyping technologies.

The technologies used by the developers for the development of the rapid prototype software are they are mainly created in the FDM called as the Fused Deposition Modeling, SLA called as the Steriolithography, SLS called as the Selective Laser Sintering, LOM called as the Laminated Object Manufacturing. All this are constructed in a group they have their main standard layers and their characteristics. All this are constructed only in DGL-CF’s. Are there are also customized here.

This system concludes that it is mainly and widely used for the designing and the update that are been made in the system documents. This system mainly use the DGL-CF called as the Design Guidelines and Collaborative Frameworks. This is made to work on these methods that generated the detailed information documents that are graphed from the IEEE groups. In the coming future generation this related systems will be in use for getting the detailed information of other science and technologies.

In the middle time of the development kits the information of all the four types of the technologies can be generated and then we can see the main difference between the types technologies, similar related class, necessary objects, and also a lot kind of experience that we can get by developing this system.

 

Proactive Content Poisoning Computer Project Abstract

Introduction to Proactive Content Poisoning Computer Project:

The existing system is specially developed for the prevention of the collusive privacy for the peer-to-peer sharing of the files and documents. In today’s generation the peer-to-peer networks are widely used in the field of music, gaming, video stream and the developing of the standard software’s too… these networks are more costly to be bringing in use and also for transferring the big files and documents from one user to another user. The main target of this system is to put a break to the collusive privacy protection in the limits of the peer-to-peer networks.

After doing the testing and the experimental work of the existing system the results that were gained are it is very critical and also very hard to make the copyright of the peer-to-peer networks in the current life time. So replicate peer-to-peer networks were brought in use to get the experimental results in the successful manner. The standard features of the p2p networks were constructed by making use of these three architectures plans like first measuring the small parts of the replicate networks, Secondly measuring the download and upload time duration of the replace p2p networks and last is that both this are distinguished to protect the resulted experiences.

By observing the experimental results and the experiences the system is brought to the conclusion that the multitask use of the system index the networks are enough capable to detect the accomplice and helping the user to stop the piracy of the peer-to-peer networks in the whole department of the Peer-to-Peer networks.

The large observations that are done regarding the existing system are stopping the peer-to-peer network; the piracy is detected during the execution time duration only, making the choice of large peers, gets prevented by Unauthorized networks directly, all secured networks are protected, torrent networks are rejected and more work plans that the system provides to the users while the execution period.

 

A Practical Architectural Design Method for Software Intensive Systems Project Report

The system is mainly designed for the fulfillment of the architecture design by using the standard things like the software design, system design, architecture design, Design method and the Design process. This software is mainly tested on the basis of the performances and the update capacity that the machine can uphold. Some standard properties are also set inbuilt in the system that highly simplifies the design making of the software. But in some of the departments this system is said to be as the critical holdover of the organizations.

The stages to follow while developing the architecture centric design method is First Establish the Architecture drivers in this stage the team of the software developers communicate with the user to understand their needs and the their requirements too.

By this the developers gets the basic ideas what the user demands about the content of the software. Second stage is the Establishment of the scope of the projects in this the information that is taken in the first stage is combined and a basic idea of the software is generated in other words the algorithm of the system is generated here.

Third stage is the Create and reediting the architecture plans here design process of the software is done and updates are also done if needed. Forth stage is the evaluation of the Plans here the final appearance of the architecture plan is done and the finishing work is done. Fifth stage is the production here the software is meant for sailing in markets and are made available to the users. Last stage the sixth stage is the Experiments done to test the software on the user level to get the proper feedbacks.

This system is very demand in use by various organizations and companies too. As this system software is in the development stage new more updates can be made here from the feedback of the existing system by adding extra new feature to it.

 Download  A Practical Architectural Design Method for Software Intensive Systems Project Report .

Texel-Based Texture Segmentation CSE Latest Project Abstract

Introduction to Texel-Based Texture Segmentation Project:

The pictures and the images mainly have the small chunks which are based on the different pixels in the picture scene. These surfaces are due to the some similar case materials that give birth to the images which has the great brightness and also without texture images.

This system is generally about the texture image generation which creates the best revolution and the brightest image ever. This system generates the 2 Dimension images which specially has the specific standard numbers that decide the clarity of the 2 Dimension images.

The existing system contains the topics like Relationship to the future works, the benefits of the space properties, Binned mean shifts, Bandwidth networks and the last is the observation and the views of the progress and the output results of the experiments. The Binned mean shifts has some sub contains like the Technical rationale and some types of different bandwidth etc… the hierarchical kernel is the hardware system and the configuration of the existing systems.

This hierarchical kernel has many combinations of the formulas and the standard expressions that are meant to be used in the system software fir the proper execution and maintenance of the system.

This existing system presents the texture work to develop the images that the software creates and this is exactly executed by snapping the different stages of the textures. This system software can also snap the pictures and images like the satellite view, some site view, fruits and vegetables images, animals and other objects too… The pictures can even be taken in colors as well as in the various other types of shades. Since these images are in need of the texture they never need the pixels and the sub-pixels. There are also various formulas that are used to calculate the Integrated square errors.

 Download  Texel-Based Texture Segmentation CSE Latest Project Abstract  .

NIT Computer Science Project Report on HTTP Web Server

Introduction to HTTP Web Server Project:

The existing system is the follower of the Hyper Text Type Protocol web servers. I have the same features and the functions like the Apache web servers. It works on the platform that supports the Java and has the ability of accepting the multiple users demanding request at the same duration of time. In the early 1990s the World Wide Web was in use to this application and then later came the Http web server and this attracted the minds of the people. It gets connected through a single internet connection to retrieve a large amount of data at the same time.

This Http makes the conversation with the users and also the clients. This Http has divided into two different sub-types like the client program and the server program. This shares and transfers the conversation messages from the clients and the users. As this works on the web browsers it mainly uses the Netscape communicator and the Internet Explorer to execute the transactions.

As this is based completely on the web applications and servers each of this process have a URL and also an IP address to get to the address faster. By this URL the http search the web page according to the given web addresses and displays it on the screen.

As this system is the Http web server it also has the same type of the demand like the Apache servers. This software can accept the multiple request of the client at the same duration of time. But this also has the certain multiple request sending limits too. Since the security issues are very weak here the secured browsing is much needed in this existing system. The progressive of the existing system is completely depended on the number of the clients and the users that sends the multiple requests at the same time as well.

 Download  NIT Computer Science Project Report on HTTP Web Server .

NIT Computer Science Project Report on HTTP Proxy Server

Introduction to HTTP Proxy Server Project:

This existing system is the system which enable the user to access the internet even when the user is not connected to the internet service or the wireless connection. This uses a command prompt which also uses an existing port for running both the files and the application at the same time. So here the direct connection can be done and the entire user connection request can be even accepted.

This server has the transaction like the HTTP transaction which has the sub types like the sample request, response, proxies etc… HTTP transactions are called as the collectivity and also the resources. It is established by the TCP/IP protocols and their sockets too. Sample request are just the web page addresses. Responses are the results and the answers that are given by the TCP servers. A proxy contains the requests that are sending to outrival by the users.

The specifications of the existing system are the Linux Operating system and the language used is the C language. Server ports are also used here to connect to the internet service. Comments are just the complaints and the answers that are given by the users and other people.  The other contents that are included in the HTTP proxy server are the connections, sending the request to the servers, filtering, Data Structures etc… the connections have two more sub types like the client side and the proxy side.

The client side has the browser in the client group which grabs the request from the proxy servers and their clients. This needs to have a proxy IP address through which it properly runs. In proxy clients the request are accepted when the user demands for the server connections.

These proxy clients can even block the client as well as the server side too which has the Blocking clients and blocking server’s content present in it.

 Download  NIT Computer Science Project Report on HTTP Proxy Server .

NIT Computer Science Master Project Report on Hostel Information System Database Design

Introduction to Computer Science Master Project on Hostel Information System Database Design:

Now a day’s Internet has become a daily need to each and every Ones life. Each and every information that a person needs is also available on the Internet now a days. Here the very famous institute called the NITC is the best one to learn this various important things. This NITC helps people to trace their required ward as per their own need. But this existing device provides the people to trace their wards Without the NITC too. This also helps the people to know their own private detailed information that they need.

The basic requirements that are needed to develop this software are a Java Supported Browser and also that must support HTML. A JSP server, the Tomcat service and the Oracle 9i database system for storing the back end data’s. The Hardware requirements are the BIOS from Pentium onwards and near 128 MB RAM and a 5GB hard disk. Communication interface and the User Interface are the Two Interfaces that are used in the device.  

This existing system has no sort of errors and it works properly and has a great progress in the Outcome of the Results too. The advantages of the systems are it works complete automatically and it also has a quick execution process. This device has the data updated feature whenever needed.

This system is easy to handle and also a security protected device system too. The future architecture of the system is the database of the system can be newly updated and allocation of the room student management can also be easily added in the existing system. The security issues can be made more secured for better security to users. It can be updated in all of the supported Operating system too. And the last is the Interfaces can be made very handily and also.

 Download  NIT Computer Science Master Project Report on Hostel Information System Database Design .

Honeycomb Creating Intrusion Detection Signatures Using Honeypots CSE Project Abstract

Introduction to Honeycomb Creating Intrusion Detection Signatures Using Honeypots Project:

The existing system works on the misuse detectors and the trackers too. Here in this process the executing process the network protocols are then combined by the registered documents. This devices are mostly used in the fire engines and also the fire alerts too. This device is mainly made for the new generation people and the development of this device is incrementing day by day. It is tested by the TCP and the IP’s also. This device while working constructs the signals by the help of the network traffic and this then can be gripped on the honey spots.

The main purpose to develop this system is to protect the attacks that are done by the characteristics elements. It is a very small and slim sized device which has a large capacity of to allot the proper signals while needed. This honeycomb device normally supports the brands like the Bro and the Snort.

Bro has the large language power which permits the user to access the language in large use. The Snort is not that as famous and demanding like that of the Bro because it is outdated from the Bro but some developers use Snort because of its powerful repository features.

These devices are developed with the partnerships of the Intel researches centers. In the coming future the device Honeycomb will burst out to a great development stage. The developers are researching on the fact that the price of the device can be reduced and can be affordable to all the peoples. This device also works on the LCS algorithms to generate the required signals that are needed by the honeycomb device. And normally they honeycomb devices are only used for creating the signals. The development teams are trying to establish more features and beneficial facilities in the existing devices.

 Download  Honeycomb Creating Intrusion Detection Signatures Using Honeypots CSE Project Abstract .