Issues in Bandwidth Pricing using Software Agents IIT CSE Project Report

The process of communicating the service or value of a product to customers is called marketing. Marketing can also defined as the art of products selling, but it is only some fraction of marketing.Marketing satisfies the needs required by the society through exchange processes and build long term relationships.

An organizational function Marketing can be looked at as and set of process for creating, communicating worth to the customers and delivering and maintaining customer relationship in the ways that benefit the organization, company and its shareholders. Marketing is target oriented through analysis of market and market segmentation. As well as behavior of consumer buying understanding and providing good customer value

Internet is now main source to marketing and advertising industries. Internet is extraordinary tool for marketing as well as main source of information which is the cheapest means that is able to reach the customer. In this twenty first century, internet is become a big source for collecting information and converting the data into beneficiary results at a rapid rate for many individuals, firms and companies. From households and small scale industries to foreign markets online trading or marketing is the dynamic way to reach the high volume of customers or people.

In this online marketing pricing is main concept which gives profits to the organization. If the pricing software gives error then it will be a great loss to the organization. In this project we are going to deal with the issues creating in bandwidth pricing using software agents.

Bandwidth is item of interest and by adaptive method trading is done, Shop bots and price bots are software agents. For demand and supply fluctuations marketing is highly sensitive. In this project a mathematical model is developed for marketing analysis and the two different strategies of pricing effect studied simultaneously through variety of market methods.

Download  Issues in Bandwidth Pricing using Software Agents IIT CSE Project Report.

A Simple Software Production Line for End User Development Project Abstract

The paper is about implementation of Model-driven engineering (MDE) and Product line engineering (PLE) for future software development and also to increase automation of application development. End user development (EUD) is an emerging paradigm where end users create and adapt systems themselves. Implementation ofMDE and PLE for EUD in small domains is done by using a simple software production line that allows domain engineers to easily set up product line member instantiation environments for end users. 

MDE it uses models as the primary engineering artifacts and provides different aspects of a system where as PLE focuses on application domains, rather than individual systems, and allows individual systems to be built automatically. Product line engineering which is opposed to single system engineering methods addresses multi-system scope development. PLE uses domain engineering for development of generic systems from concrete systems or components can be reused in different systems can be instantiated. 

This type of building concrete systems based on results of domain engineering is referred to as application engineering. The two roles involved in end user development are domain engineer and end user. End user is the one who is advanced computer user with domain knowledge but are neither skilled nor interested in software engineering. The role of the application engineer is made dispensable. Since end users build their systems themselves which is main goal of EUD. 

Present software product line tools are suitable for large domains and are focussed at skilled developers Whereas SimPL is intended for small domains and specifically targets end user development: End users instantiate product line members using a graphical domain specific modelling language that is provided by the domain engineer who employed SimPL to set up the product line member instantiation environment. Domain engineers only need to write the product line specification to set up the instantiation environment, such that end users can use the graphical editor and the code generator that are part of SimPL.

Access Control and Site Security Project Abstract

Access control is the policy-driven limitation of access to systems, data and dialogs. It is all about controlling the access to systems and to identify authorize and unauthorized users (Who should have access) and the operations done on the systems if authentication is done. 

Access Control mainly includes User Authorization and User Authentication. Authentication is all about access of system to individual .Whereas Authorization includes access permissions to users once they logged into the system. 

Access Control Tools includes Physical access control and Logical access control.

Physical access control includes Building Security Basics and Access cards using Locks, Monitoring tools. To implement Security basics we can follow single point of entry to building, Providing Security centers  Provide Training to security personnel and employees, and have Data wiring security. Regarding the access cards the pin can be short, should provide two factor authentication and a central system in case of Card Cancellation. 

Logical access control includes User profiles, Firewalls, Biometrics. User profiles which includes IDs and Passwords, where cracking of Passwords is difficult whereas hacking of user accounts is done commonly than hacking root. Password attacks can be Dictionary attacks and Hybrid attacks Common word with single digit at end, etc. Logical control biometrics includes Biometric authentications and Biometric systems. Biometric authentications use Biometric Methods such as Face recognition, Voice recognition, Keystroke recognition, Rhythm of typing etc. 

Wireless LAN (WAN) operations uses spread spectrum transmission for data transmission which are hard to detect but 802.11 does not provide security but helps easily to detect so  devices can find each other and prevents frequency dependent propagation problems than security. Whereas Wired Equivalent Privacy (WEP) is not enabled by default which uses 40-bit or 128-bit encryption key with shared passwords which are difficult to change so rarely changed and uses Flawed security algorithm.This concludes the different access control methods used for controlling user authorization and authentication.

On Credibility Of Simulation Studies Of Telecommunication Networks Project Abstract

In the recent computing systems, programming can be minimized, or can be replaced, by an icon on a computer monitor. We can even notice success in modern science and technology for implementing these powerful tools for telecommunication networks. But most of the researchers have an opinion that we cannot depend on of published results of telecommunication networks based on stochastic simulation as they lack credibility.

Our project focuses on two necessary conditions of a credible simulation study: usage of appropriate pseudo-random generators for independent uniformly distributed numbers, and usage of appropriate analysis of simulation output data. 

The first step of any performance evaluation studies is to use a valid simulation model. Such that in case of communication networks assumptions should focus on network’s internal mechanisms its limitations, and characteristics processes and secondly the valid simulation model should be used in valid simulation experiment. At this stage we can face issues on Application of elementary source of randomness and appropriate analysis of simulation output data. 

Our research publications of telecommunication network suggests that majority of published results of simulation studies do not satisfy the basic criteria of credibility. This can be overcome when scientists or engineers study performance of networks by accepting fuller responsibility for credibility of their results. When we consider telecommunication networks it requires a long run in order to obtain results at desired level of precision and excessive run-time effects development and validation of simulation model which is again a challenging task.

Human Face Recognition Using Neural Networks Project Abstract

Human Face Recognition Using Neural Networks Project is about the development of human face recognition system (HFRS) using multilayer perceptron artificial neural networks (MLP). The system takes the face image as input from video camera and also detects the presence of an object in front of the camera and detected facial area will now be used as input to neural network to perform recognition. 

The operation of   HFRS has three modules: Human head tracer (HHT), Eye locator (EL), and Recognition of face (RF).HHT module includes sensing the presence of an object in front of   video camera   and to locate the human head in image frame. EL module includes searching for location of human eyes in the image frame and responsible to scan for left and right eyes of face image. RF does the main task of human face recognition. The input of RF is the image of human face and is compared with several output nodes with set of face images fed in database.If nooutput nodes responds to input image, the input image is considered as not recognized else it is recognized. 

HFRS process includes capturing head and shoulder of human object with equipment, detection of image and approximate location of human head and scans for eye features and once eye features are detected and face input area is known is compared with several output nodes with set of face images fed in database. 

It concludes that when the optical bruin damage (OBD) technique is applied to MLP there is no significant increase in its ability to recognize face images.

And MLP without OBD has ability to reject non face images. But When is applied to MLP deletes the ‘unnecessary’ weights from network. This reduces MLP in making wrong classifications on non-face images.

Hand Written Character Recognition System Using Kohonen Self Organization Map Paper

This paper is about recognition of hand written character using artificial neural network. Kohonen self-organization technique is implemented for pattern recognition. By the end of this paper we get conclusion that hand written character recognition is one of the efficient methods of recognition.

According to character recognition it takes input as a character and compares it with predefine character class. The starting step of this research is to convert the written text to computer understandable form; Research has been done with artificial neural networks.

The advantage with the Kohonen self-organization map is that the system is changing according to the changing condition and inputs. Even the recognition ratio is good in the proposed system.

According to the pattern recognition, recognition is based on concrete and abstract items which include two assumptions where class membership identifies input patterns that share common features and other assumption where network identifies input patterns for common features.

As a part of research patterns are taken from handwritten characters with a set of patterns it was found that it was 95% accurate. The main problem with recognition of character is increased with noisy data with various differences in handwriting because of writer or can be due to nature of writing.

In this paper an experiment was conducted on characters which are handwritten. The experiment was carried with 10 different persons and the tests are conducted on the system with combination of characters. The overall accuracy was around 95% with disconnected character.

This paper gives a recognition system based on hand written character. The performance increases by this implementation to fullest. People times cannot identify their own writing; it may depend on various factors so finding efficiency is difficult. And the written text is converted into computer readable form.

Download  Hand Written Character Recognition System Using Kohonen Self Organization Map Paper.

Flexible Deterministic Packet Marking Documentation

Introduction to Flexible Deterministic Packet Marking Documentation:

The main aim of this project is to developing ip trace back system. This is implemented by using java development kit. This is also known as flexible deterministic packet marketing (FDPM). The source of ip packets are determined quickly and easy to trace out than the other mechanisms. This process is done by having small number of packets. Due to built in overload mechanism makes this achieving the required trace back.

Existing System:

                     The attack graph contracted by ppm algorithm would be wrong if termination condition is false.

Disadvantages:

  • Packet Travel path can be determined
  • Packet can be loss or it may be duplicated
  • Chance of losing original packet

Proposed System:

                      In This process termination is determined correctly and also enhances the reliability of ppm algorithm. The Best feature in this algorithm in this process is when the algorithm is terminated it guarantees correctness of attack graph.

Advantages:

  • Various probabilities are marked are marked by routers of the attack packet
  • Packet loss and duplication can be avoided
  • Packet path can be determined
  • Network traffic is reduced

Download  Flexible Deterministic Packet Marking Documentation.

Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Report

Introduction to Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Topic:

The main aim of this project is to build content-based image retrieval depending color and generic shape.  Another name of content-based image retrieval is also called as query-by image content (CBIR). It is originated in 1992 and it is used by Kato. For searching the images in the large data-base content-based visual information retrieval is used. Based on the size shape and color and other information are extracted from image by content-based image retrieval. There is another way to search the images by keywords, captions but this procedure is very expensive to achieve.

The CBIR process retrieves images automatically from database by syntactical analysis of image features. The tools that are used in this process are pattern recognition, signal processing and computer vision

Technical Progress:

                            From day-to-day the interest in CBIR was going on. With the help of current technology textual information can be easily extracted from images. But it’s a difficult process because it should be handled personally for describing every image information in data-base. There is a loss of images when different names are used in their descriptions.

Potential users of CBIR:

  • Art collections
  • Photograph Archives
  • Retail catalogs
  • Medical Records

Content-Comparison Techniques:

        There are three techniques

  • Color
  • Texture
  • Shape

Color:

                   This technique follows comparing the color histograms in images. This technique is most widely used.

Texture:

This technique follows by checking visual patterns and spatial in images. Actually Textures are represented using textures by identifying number of textures the images can be easily identified.

Shape:

                     Shape is detected using segmentation and edge detection and also particular region in the image. But in some circumstances human involvement is necessary for shape detection.

Download  Fast Multi-Resolution Image Querying Using Color Characteristics Seminar Report.

Image Processing CSE Project Report

Introduction to Image Processing Project:

It is fun for the youngsters to edit various images and perform number of operation on them and to change the look of the image. To do this they use various software’s available in market and are free for downloading. There are also many websites available which allows image editing or image processing. This document gives us a short description about Image Processing. Image processing is basically about performing various operations on the image such as brightening, we will also discuss various technologies used in image processing and its application.

            Image processing can be carried into two ways.

a.)    Optical Image processing:

Optical image processing is the one which is carried by using high definition optical lenses which we can call as Cameras with high definition lenses and optical zoom.

b.)    Electrical Image Processing:

Electrical Image Processing is the one which is carried in two ways.

a.)    Analog Processing:

Analog image processing is the one which is done with the help of electrical signals are altered and used to change the image.

b.)    Digital Processing:

Digital processing is the one which is carried put using the digital  computers.

            Some of the applications of the operating systems are.

a.)    Robotics.

b.)    Graphics and animations.

c.)    Medical field.

d.)    Satellite Imaging.

Let us go through the Index Terms used in Image Processing.

a.)    Image Restoration.

b.)    Color Image Processing:

c.)    Wavelets:

d.)    Compression:

e.)    Morphological Processing:

f.)     Image Segmentation:

Now we will go through the analysis of Image Processing.

a.)    Noise Reduction.

b.)    Convolution and Mask

c.)    Edge Detection

d.)    Image Data Reduction.

e.)    Real Time Image Processing.

Applications of Image Processing are as follows:

Image processing is widely is used in the field of Robotics, Medical, in Ultrasonic and X-Rays.

Advantages and Disadvantages of Image Processing:

Image Processing is widely used in the field of robotics and these robots captures images and help in many important things. Image processing is widely used in Geological Survey. It is also widely used to find out various minerals.

            Disadvantages of Image Processing are use of image processing requires a deep knowledge of this technology so a no-vice programmer cannot use it. The experts also need a deep knowledge of many other fields to develop application in this field.

Download  Image Processing CSE Project Report.

An Advanced Mac Protocol MIMO WLANS Project

Introduction to An Advanced Mac Protocol MIMO WLANS Project:

A format where digital messages are exchanged inside a system network is called communication protocol, MAC or Media access control is such a data communication protocol which acts as a data link layer sub layer. It is part of a 7 layer computer network OSI model. The physical layer of the network and the logical link layer use MAC as an interface between the two.

Communication service by MAC Channel includes

  • Unicast
  • Multicast
  • Broadcast

If the two devices are connected in a network through a wireless medium it is called a wireless LAN network or WLAN network. There are different types of wireless technology used around the globe in WLAN’s. In order to better the connection capacity and the range among the access point and a client station, a new wireless technology is used called MIMO or multiple input or multiple output wireless networks. For this type of wireless communication networks, the standard used are mostly specified in IEEE 802.11 specs.

This project deals with drastically lessens the chance of collision across a network during the case of multi user access streams, CSMA/CA scheme which is advanced is suggested for solving the constant collision problem.  The main disadvantage or drawback of the 1EEE 802.11 system was it had huge block delays during communication and no throughput was happening.

The proposed system displayed an encouraging throughput and there was a considerably improvement in the delay factor. Moreover the proposed system protocol helped in processing large number of data requirements rate applications across a host of networks. The constraint which has very less delay is also managed as effectively with this new protocol. A control channel is not required at all for the transmission of data, moreover the probability of collision is so much less as its dependability is on clusters contending.

Download  An Advanced Mac Protocol MIMO WLANS Project.