Traffic Flow Management using Wireless Sensor Networks Project Report

Introduction to Traffic Flow Management using Wireless Sensor Networks Project:

The wireless sensory network is the latest technological advancement that is doing wonders in the field of management of traffic flow. With the help of the sensing, communicating and computing from a tiny device, management of traffic flow has become much smooth over the years.

Any type of wireless sensory network is made up several autonomous sensors that re distributed within the device. The task of these sensors is to keep a tab on physical conditions like record the temperature, pressure, level of pollutants, motion, vibration etc. the wireless sensory network was developed because of the active involvement of the military because it helped them in surveillance of the battlefield.

However over the course of time, it is now used by several civilian and industrial applications. The areas of applications in these two areas include – monitoring of industrial process, traffic control, home automation, monitoring of habitat and environment and healthcare applications. 

Keeping the success of the wireless sensory network in mind, it has now been decided to introduce in the management of traffic flow. System gurus think that it is wise to divide the system in three layers of the wireless sensor network, higher level coordination of traffic lights agents and localized traffic flow model policy.

What has been decided is that the wireless sensor networks are to be installed on those roads that have a very high traffic count and should ideally be those that goes out and in to the intersection. The task of the sensors is to detect the numbers of the vehicles, and the speed of it and then send the data to the nearest located Intersection Control Agent which in turn is the one that determines the flow model, based on the information that the sensor provides. The objective of this system is to make sure that traffic flows smoothly and that people do not have to spend a lot up time caught up in the traffic.

Download  Traffic Flow Management using Wireless Sensor Networks Project Report.

LGI Monitoring System VB.Net Project Report

Introduction to LGI Monitoring System VB.Net Project:

The LGI Monitoring system is the finance information application in developed in Windows Operating system. The application provides all information related with the Loans, the Grants-in-Aid and also Investments. The LGI Monitoring system project is developed under and for the use of Ministry of Finance to ease their procedures for Loans and the Grants- in- Aid applications.

The project aims to computerized the processing of all applications and cases related to Loans and Grants, Investments in a very systematic way that has been starting from entering the Loan sanction details to producing their reports for the RBI New Delhi and CAS Nagpur. 

To maintain the thousands of LGI files and records is not an easy procedure which cannot be remembered especially histories and the old records in the form of paper and documents.

The Software system gives the solution to this in a very efficient manner in which the authorized person can easily access the information filled. This developed software has gone through the three stages of testing. The first stage consists of the DH level which asks to enter all data of Loan sanctions. The second stage includes the AAO level which is made for the security purpose that sorts out the data of DH level. The third stage is the PAO level that modifies the information. The information need to be passed which then enables the report generation for the RBI. 

The work is now easy by the automated software system that make the user to enter the data in the form for all Loans and Grants and Investments which will be  processed for the in the Computer and easily retrieved. 

The Hardware requires are Pentium  IV processor, 256 MB RAM and 20 GB hard disk drive. The operating system is Windows XP and Software programs are Vb.Net 8.0 and Crystal Reports, SQL Server 2000.

Download  LGI Monitoring System VB.Net Project Report.

CSE Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

Introduction to Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services:

The Wireless broadcasting has been an impressive way to spread information or data to various users. The accessibility of data is made available to the user by the symmetric key based encryption to decrypt the data for security cause. The efficient key management is required to spread and also change keys in different types of subscriptions to explore the broadcasting services. Here we are offering the scheme of efficient key management known as KTR. This can be used for key distribution in complex subscriptions and user applications. The merits of the KTR are following.

  1. The KTR gives the place for the subscription options in wireless broadcast services.
  2. The user gets advantage of having only the single key sets to explore all subscriptions not many key sets.
  3. Regarding Broadcast services protection, the option is there to change the minimum key sets which can be recognized easily. 

The Facts about Existing System with respect to Proposed System 

  1. The existing system demands for the different set of keys to manage different subscriptions which leads to subscribe many programs. Where as in our Proposed system the programs can be run parallel with the same set of keys.
  2. The same set of keys or common keys can be reused or  managed skillfully during the subscription of new programs or un subscription of programs with no security threat. 

The Proposed System Features 

  1. The Logic Key Hierarchy: The Secure key management and Secure group key management in Wireless Broadcasting and Networking respectively, are some what similar. The Data encryption key of the Program and the Individual key of the user are identified by each other. The Key distribution keys (KDK’s) are another keys. If the user is added or removed in the group, the server system produces the new corresponding keys which is called the Rekey. The message broadcasts is called Rekey message. The Proposed system broadcasts this Rekey message in the same broadcasting program to the user.
  2. Broadcast Encryption Techniques: The index head decrypts the packets. Earlier the subscription was need pre planned. But the pervasive computing and air data access, the subscriptions can be changed at any moment. The LKH approach are however more flexible that key management schemes for the Broadcast Encryption Technique.
  3. Rekey Operations: The two paths are made when the user un register the tree, the keys are of no use called Leave path. When the user register the program the keys are for use called Enroll path. The Leave path and Enroll path are made during the transfer from one program to another. The KTR allows the path that start in Leaf node and finishes in multiple DEK’s of the register programs. The server broadcasts the newly assigned keys to the user by forming Rekey packets.

Download  CSE Java Project on An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services.

A Minor Project Report on FTP

Introduction to A Minor Project Report on FTP:

File transfer protocol is a network used to copy a file. And even for transmitting files between computers using internet. FTP is mostly used to transfer web page files from their creator to the system that which acts as their server to everyone on the internet, can also be used  for downloading programs or any  from severs.

The contents of FTP are scope, definition of problem, problem description, theoretical background, system analysis and design, system planning, DFD, ERD & sequence diagram, adopted methodology, system implementation & details of hardware and software used, snapshots and work report.

 Scope: To ensure portability and compatibility & even to ensure system moves with time, in order to program the system by using appropriate syntax.

Theoretical Background: File transfer protocol is used to exchange and manipulate files. It is on client-server architecture. It is also used as an application component to automatically transfer for program internal functions.

Software Development Life Cycle: SDLC consists of a set of steps in which each step uses the results of the previous one. Important components are planning, analysis, design, and implementation and the waterfall model is a sequence of stages in which the output of the each becomes the input of the next.

 All these   stages are generalized into different ways as follows:                                                                                                                           

  1. Project   planning, feasibility study   
  2. System analysis   
  3. System   design
  4. Implementation
  5. Integration and testing
  6. Acceptance, installation, deployment
  7. Maintenance are the steps for SDLC.                       

Limitations:

  1. Cabling and installation
  2.  Observation was fixed to a specific area
  3. The camera cannot be easily moved to another.

 Advantages:

  1. Wire connection
  2. Image clarity

 Facts considered in the feasibility analysis were technical, economic and behavioral feasibilities.

SCOPE: web site maintenance and publishing, uploading and download of images, movies and music files.

Assumptions: The details related to area to be monitored and Administrator is created in the system.

Administrator:

  1. End user/ Primary actor
  2. Pre-conditions
  3. Success Guarantee
  4. Trigger

  Work Report: It is done 5 phases. And the project is finished.

Download  A Minor Project Report on FTP.

Issues in Bandwidth Pricing using Software Agents IIT CSE Project Report

The process of communicating the service or value of a product to customers is called marketing. Marketing can also defined as the art of products selling, but it is only some fraction of marketing.Marketing satisfies the needs required by the society through exchange processes and build long term relationships.

An organizational function Marketing can be looked at as and set of process for creating, communicating worth to the customers and delivering and maintaining customer relationship in the ways that benefit the organization, company and its shareholders. Marketing is target oriented through analysis of market and market segmentation. As well as behavior of consumer buying understanding and providing good customer value

Internet is now main source to marketing and advertising industries. Internet is extraordinary tool for marketing as well as main source of information which is the cheapest means that is able to reach the customer. In this twenty first century, internet is become a big source for collecting information and converting the data into beneficiary results at a rapid rate for many individuals, firms and companies. From households and small scale industries to foreign markets online trading or marketing is the dynamic way to reach the high volume of customers or people.

In this online marketing pricing is main concept which gives profits to the organization. If the pricing software gives error then it will be a great loss to the organization. In this project we are going to deal with the issues creating in bandwidth pricing using software agents.

Bandwidth is item of interest and by adaptive method trading is done, Shop bots and price bots are software agents. For demand and supply fluctuations marketing is highly sensitive. In this project a mathematical model is developed for marketing analysis and the two different strategies of pricing effect studied simultaneously through variety of market methods.

Download  Issues in Bandwidth Pricing using Software Agents IIT CSE Project Report.

A Simple Software Production Line for End User Development Project Abstract

The paper is about implementation of Model-driven engineering (MDE) and Product line engineering (PLE) for future software development and also to increase automation of application development. End user development (EUD) is an emerging paradigm where end users create and adapt systems themselves. Implementation ofMDE and PLE for EUD in small domains is done by using a simple software production line that allows domain engineers to easily set up product line member instantiation environments for end users. 

MDE it uses models as the primary engineering artifacts and provides different aspects of a system where as PLE focuses on application domains, rather than individual systems, and allows individual systems to be built automatically. Product line engineering which is opposed to single system engineering methods addresses multi-system scope development. PLE uses domain engineering for development of generic systems from concrete systems or components can be reused in different systems can be instantiated. 

This type of building concrete systems based on results of domain engineering is referred to as application engineering. The two roles involved in end user development are domain engineer and end user. End user is the one who is advanced computer user with domain knowledge but are neither skilled nor interested in software engineering. The role of the application engineer is made dispensable. Since end users build their systems themselves which is main goal of EUD. 

Present software product line tools are suitable for large domains and are focussed at skilled developers Whereas SimPL is intended for small domains and specifically targets end user development: End users instantiate product line members using a graphical domain specific modelling language that is provided by the domain engineer who employed SimPL to set up the product line member instantiation environment. Domain engineers only need to write the product line specification to set up the instantiation environment, such that end users can use the graphical editor and the code generator that are part of SimPL.

Access Control and Site Security Project Abstract

Access control is the policy-driven limitation of access to systems, data and dialogs. It is all about controlling the access to systems and to identify authorize and unauthorized users (Who should have access) and the operations done on the systems if authentication is done. 

Access Control mainly includes User Authorization and User Authentication. Authentication is all about access of system to individual .Whereas Authorization includes access permissions to users once they logged into the system. 

Access Control Tools includes Physical access control and Logical access control.

Physical access control includes Building Security Basics and Access cards using Locks, Monitoring tools. To implement Security basics we can follow single point of entry to building, Providing Security centers  Provide Training to security personnel and employees, and have Data wiring security. Regarding the access cards the pin can be short, should provide two factor authentication and a central system in case of Card Cancellation. 

Logical access control includes User profiles, Firewalls, Biometrics. User profiles which includes IDs and Passwords, where cracking of Passwords is difficult whereas hacking of user accounts is done commonly than hacking root. Password attacks can be Dictionary attacks and Hybrid attacks Common word with single digit at end, etc. Logical control biometrics includes Biometric authentications and Biometric systems. Biometric authentications use Biometric Methods such as Face recognition, Voice recognition, Keystroke recognition, Rhythm of typing etc. 

Wireless LAN (WAN) operations uses spread spectrum transmission for data transmission which are hard to detect but 802.11 does not provide security but helps easily to detect so  devices can find each other and prevents frequency dependent propagation problems than security. Whereas Wired Equivalent Privacy (WEP) is not enabled by default which uses 40-bit or 128-bit encryption key with shared passwords which are difficult to change so rarely changed and uses Flawed security algorithm.This concludes the different access control methods used for controlling user authorization and authentication.

Human Face Recognition Using Neural Networks Project Abstract

Human Face Recognition Using Neural Networks Project is about the development of human face recognition system (HFRS) using multilayer perceptron artificial neural networks (MLP). The system takes the face image as input from video camera and also detects the presence of an object in front of the camera and detected facial area will now be used as input to neural network to perform recognition. 

The operation of   HFRS has three modules: Human head tracer (HHT), Eye locator (EL), and Recognition of face (RF).HHT module includes sensing the presence of an object in front of   video camera   and to locate the human head in image frame. EL module includes searching for location of human eyes in the image frame and responsible to scan for left and right eyes of face image. RF does the main task of human face recognition. The input of RF is the image of human face and is compared with several output nodes with set of face images fed in database.If nooutput nodes responds to input image, the input image is considered as not recognized else it is recognized. 

HFRS process includes capturing head and shoulder of human object with equipment, detection of image and approximate location of human head and scans for eye features and once eye features are detected and face input area is known is compared with several output nodes with set of face images fed in database. 

It concludes that when the optical bruin damage (OBD) technique is applied to MLP there is no significant increase in its ability to recognize face images.

And MLP without OBD has ability to reject non face images. But When is applied to MLP deletes the ‘unnecessary’ weights from network. This reduces MLP in making wrong classifications on non-face images.

A Candidate Set Free Algorithm for Generating D Optimal Split Plot Designs Project Abstract

This paper is about a new method of generating optimal split-plot design. An advantage of using split-plot design is that, no need to specify the candidate set in prior. This can be more useful when the candidate set is too large. 

The word split-plot design comes from agricultural experiment. A factor that changes between separate plots of land is a whole-plot factor and in sub-plot factor levels varies within each plot. Though split-plot implementation is economic we prefer over randomized design in some cases.A usage of split-plot designs mainly focuses on sample size, whole plot size and priori model.

 The algorithms of Goos and Vandebroek choose combinations at factor level and arrange in whole parts so that D-optimality criterion is maximum but it becomes a problem when number of experimental factors are large or when experimental region is highly constrained. Because a candidate set which covers the entire region requires a large number of factor level combinations. 

There are two ways by which practitioner’s money can be saved. First, the algorithm provides an opportunity to reduce sample size when compared to the use of fractional factorial designs. Secondly, it provides efficient solutions for challenging practical problems than can be found using available methods. 

The main aim of Split-plot experiments is non-specification of the candidate set in prior. The performance of candidate-set-free algorithm is implemented using proof-of-concept example and wood products experiment.

Hand Written Character Recognition System Using Kohonen Self Organization Map Paper

This paper is about recognition of hand written character using artificial neural network. Kohonen self-organization technique is implemented for pattern recognition. By the end of this paper we get conclusion that hand written character recognition is one of the efficient methods of recognition.

According to character recognition it takes input as a character and compares it with predefine character class. The starting step of this research is to convert the written text to computer understandable form; Research has been done with artificial neural networks.

The advantage with the Kohonen self-organization map is that the system is changing according to the changing condition and inputs. Even the recognition ratio is good in the proposed system.

According to the pattern recognition, recognition is based on concrete and abstract items which include two assumptions where class membership identifies input patterns that share common features and other assumption where network identifies input patterns for common features.

As a part of research patterns are taken from handwritten characters with a set of patterns it was found that it was 95% accurate. The main problem with recognition of character is increased with noisy data with various differences in handwriting because of writer or can be due to nature of writing.

In this paper an experiment was conducted on characters which are handwritten. The experiment was carried with 10 different persons and the tests are conducted on the system with combination of characters. The overall accuracy was around 95% with disconnected character.

This paper gives a recognition system based on hand written character. The performance increases by this implementation to fullest. People times cannot identify their own writing; it may depend on various factors so finding efficiency is difficult. And the written text is converted into computer readable form.

Download  Hand Written Character Recognition System Using Kohonen Self Organization Map Paper.