Electronic Temperature Control Relay Project Report

Introduction to Electronic Temperature Control Relay Project:

In our daily life we have been wasting so much of power by using electronic devices like heaters, fans, TVs, iron boxes, etc and other resources. Electricity is the most important for our world so we should be save it. By using temperature control device we can save the power. 0-100°C electronic temperature controlled relay is a circuit, which temperature is controlled with the help of LM35 temperature sensor.

LM35 series are precision integrated –circuit temperature sensors. Its output is directly proportional to the Celsius temperature. These sensors has an advantage compared to linear sensors is which are calculated in ˚ Kelvin also. If any user does not required to subtract constant voltage from its output to get centigrade scaling, these LM35 series sensors do not require external calibration.

The main aim of this project is control the temperature. Hardware requirements are LM35, Comparator, Relay, Reference voltage, and buzzer or alarm. LM35 temperature sensor is calibrated in Celsius and Kelvin. Comparator is used for to construct complete thermal-controlled switch. Reverential voltage is used for set the temperature. If the temperature is low for the preset level then it will energize if high then de-energize is done by the Relay. Buzzer or alarm will generate the sound when temperature is sufficient.

This project is applicable for both heaters and iron boxes. When a bucket of water is heated with heater then LM35 circuit is keep in touch with heater and set a temperature value. After completion of that presented level buzzer will give sound. same for iron boxes.

Future enhancement is applicable for industries. This circuit is keep in touch with mission and set a temperature value. After completion of the temperature level alarm will give the sound then inform to control room immediately mission will be stop. So we can save the power as well as money.  

 Download  Electronic Temperature Control Relay Project Report .

Project Report on Image Gallery

Introduction to Image Gallery Project:

The Image Gallery application software allows the user or visitor to access the two different categories or sections known as “Read” and “Write”. The “Read” tab grants the user to see the images in the album, to give a comment for the particular image, see images by slide show. The “Write” tab allows the user to access and post the images of them or uploading of images. 

The holder owner of the Gallery has a registered user account and possesses special accessible rights. The owner does not have the rights to control or regulate the “Owner” and the “Primary Group”. They are only rights to access their “Read” and “Write” access permissions. The “Owner” and the “Primary group” permission rights is made only for the Administrator. 

The Existing system 

The existing system focused on the data analysis that are extracted from the different records. The system tackles the decisions and transactions on the basis of the data collected. To collect data the commonly used tools are the Flow charts, Interviews, Training, and the Experience also some general knowledge. These tools are combined to form a system. The shortcomings of the system is to understand the problem after only completely defined and investigated and need the solution. 

The Proposed System 

The Proposed system has image gallery of our interest to create it. The merits of the system are:

  1. The user friendly Interface
  2. Quick access to the database
  3. Reduce error
  4. More Storage 

The Proposed system is developed on the Windows XP/SP2 operating system, Java Run time Environment 1.5, ASP for the front end program, Microsoft Access 2003 for the Back end program. The hardware specifications are Intel Pentium IV 2.4 GHz, 256 MB RAM, 40 GB hard disk.

A Spy Based Approach for Intrusion Detection Project Report

Introduction to A Spy Based Approach for Intrusion Detection Project:

The current intrusion detection system (IDS) is able to protect the only host or bunch of the interlinked systems that are networked. The single host IDS is known as the Host- based intrusion detection system. The network host IDS is known as the Network- based intrusion detection system.

The both intrusion detection system has some defaults, like, the host based IDS has demerit of the inability of the detection to the new kinds of the threats in the system, whereas the Network based IDS is cumbersome to handle, which is not able to identify the encrypted packets of data. The Network based IDS creates the time consuming transfer of the log information and that causes the huge collection of the data and resulting in traffic. This concludes with the incorrect performance of the system. 

The Proposed Spy Based IDS has the merit over two IDS by combining the both single host and Network IDS enhancing the efficiency and creates the information transfer with no problem. 

Anomaly Intrusion Detection 

This kind of Intrusion Detection System keeps the information regarding the use of the system and prepares the statistical data for it. This checks the unusual action which can be intrusions. 

Misuse Intrusion Detection 

The IDS can identify the only know intrusion type. This is not able to detect the new type of Intrusion. 

Features of the Spy Based Intrusion Detection System 

  1. Regulator of the system
  2. Honeypots
  3. Possesses network sensor
  4. Spy type
  5. Log
  6. Tracer

Hotel Nextgen Java Project Abstract

Introduction to Hotel Nextgen Java Project:

The Hotel Nextgen is the software application solution for the Hotel and their associates to perform their work in an easier manner as following:

  1. To maintain Master Data of the Hotel and its Places.
  2. To maintain Master Data of the particular Hotel room or suite Inventory and accounts.
  3. To maintain the Master Data every room needs.
  4. To maintain the seasonal/festival/yearly Tariffs.

The Existing System

  1. The existing system does not able to secure the data as required and the data may be lost due to mishandling.
  2. The existing system doesn’t have the provision to book or reserve the room or suite online for the customers.
  3. Similarly the existing system don’t provide the online status of the Hotel.
  4. The existing system is not able to give the vacant room details immediately.

The Proposed System

The new system gives the opportunity to the Hotel clients to maintain their regular actions in an automatic manner by using data integrating approach. The following functions are there for the users.

  1. To organize the hierarchy or systematic approach for the Hotel group and its associates Locations.
  2. To organize the inventory and account details of the facility of every room and suite.
  3. To organize the details and management of the facility such as Banquet Halls, the Brand stores, about Restaurants, the Coffee Shops, Wallet parking and many more functions.
  4. To organize the Associate Hotel locations and places along with every room facility and Hotel facility.
  5. To organize the Tariff plans for each Hotel.
  6. To create the important reports in Excel sheets.

Software Requirements for the Hotel Management System

Windows XP/2000 or Linux operating system.

HTML, CSS user interface.

JavaScript, JAVA Programming language.

JDBC, Servlets, JSP web applications, My Eclipse 6.0 IDE or Workbench.

Oracle 10g Database, Tomcat 5.x Server, Struts 1.x Framework.

Hardware Requirements for the Hotel Management system

Pentium IV processor, 40 GB hard disk, 512 MB RAM.

Download  Hotel Nextgen Java Project Abstract .

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Abstract

Introduction to Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries:

The main objective of this paper is to give idea of effective and secure content processing. As usage of computers are increasing are day to day, cyber frauds are also becoming more like stealing content etc. Data security has become a serious problem to many of the users. At present the system which we are using mainly focuses on data delivery but not security.

Hence we need to develop a efficient and secure content processing by using some intermediaries. In e-commerce, e-government confidentiality is more important. The software requirements are jdk, netbeans and Ms access. It needs a machine with dual core processor, 512 Mb ram and a network cables.

Brief into Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries : 

 This design uses peer to peer systems and data integrity service model. By using this only the authorized persons can modify the data. The metadata modification policies are specified by the users, according to the policies integrity can be achieved. Data present on the server is transferred to the client by passing through intermediaries.

Multiple intermediaries simultaneously process the different portions of data and is transferred to the client. Since the data to be transferred is passed through many intermediaries It is impossible to modify the data.

Advantages :

By using this method the security can be provided for intermediaries. . Integrity can be achieved. Confidentiality can be provided by using method.

Download  Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries Abstract .

Dual Link Failure Resiliency through Backup Path Mutual Exclusion Abstract

Introduction to Dual Link Failure Resiliency through Backup Path Mutual Exclusion Project:

The main objective of this paper is to give idea of dual link failures. As usage of networks are increasing are day to day, we expect high transmission speed without any interruption. At present huge amount of information is being transferred in the networks and it is necessary to avoid any interruption due to failures.

The main reason why interruption occurs is due to dual link failures. These are important to solve because the links share resources, if there is any failure in shared resources this results in the failure of multiple links and the repair time for a failed link may be few hours or days and this is sufficient  for a second failure to occur. These dual link failures can be reduced by giving automatic backup path. By using this we can avoid dual link failures. This requires a hard disk of 40gb capacity, Ram of minimum 256mb,Processor with speed 3.0ghz and software’s like JDK, Java Swing and Sql 2000.

Brief into design and working:

The networks can be protected from link failures by path protection or link protection. By using path protection we can restore connection end to end by giving a backup path, back up path is given such that if the original path fails to work then this backup path comes into action.

Link protection is used to recover the signal by re-routing the connection at the place where the link is failed. When link protection is done to two failed links independently, then if they fail simultaneously these two links will not use each other in backup paths. This is called Backup link mutual exclusion. 

Download  Dual Link Failure Resiliency through Backup Path Mutual Exclusion Abstract.

Evacuation of Delayed Packets in Networks Java Project Report

Introduction to Evacuation of Delayed Packets in Networks Java Project:

The main objective of this paper is to give idea of delayed packets in networks. At present the networks which we are using supports only two classes of traffic, it takes long time to service if there is any failure. Hence to solve all these problems a OCGRR technology has been developed. This is the advanced version of OCRR technology. It requires a processor of 500MHZ and above, ram of 128 mb and hard disk of 10 gb size. It makes use of jdk 1.5, windows 2000 server family operating system and sql server databases. 

Brief into Evacuation of delayed packets in networks

In OCGRR, small rounds of a frame and a packet-by-packet are made used such that every stream inside a class can send only one packet in each small round. .In this packets of same class  are sent to the destination. Before frame is scheduled, each output port  data streams are stored in a separate Buffer .

Buffers are placed in frames such that each frame consists of only one buffer. Once Scheduling is done transmission traffic occurs and data is transferred according to their priorities. Only one packets are transmitted in one single round.

Advantages:

It minimizes delay, latency and jitter occurring in the network due to delaying of the packets. It can provide good bandwidth for the transmission of data packets. It reduces packet transmission time in the same stream. It can support multi class traffic which can increase the performance of the network.

Download  Evacuation of Delayed Packets in Networks Java Project Report .

Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project Report

Introduction to Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project:

The main objective of this technique is to find the broken links which are transferring information and to divert them to the other nodes which are present in the cache. A cache update algorithm is used for updating the new cache structure called a cache table for the broken links. In this paper we will see for the cache algorithms are implanted for find the broken links and updating the caches.

Brief into the working of the distributed cache updating:

To make cache update for the broken links each node maintains the cache table information required for making the cache updates. When a link failure is detected the algorithm notifies all the reachable nodes which have the cached link. The proactive cache updating includes some protocols for patching up the broken links.

We have two types of routing protocols available for the adhoc networks. The proactive protocols maintain a up to date information of the nodes which periodically disseminates the topology updates through the network. Whereas the on demand protocols make the discovery of the routes only when the routes are required.

Limitations of existing system and advantages of distributed cache updating:

In the existing system the link failure occurs in the mac layer as it undergoes multiple transmissions due to increase of stale route packet delivery latency. The stale route packets remain in the caches only due to the usage of FIFO replacement algorithm.

By using proactive cache updating the propagation of stale routes to other routes gets prevented. A new cache updating algorithm is used which makes the dynamic source routing to adapt quickly to the changes occurred in the topology.

Download  Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project Report.

Discovering Conditional Functional Dependencies Java Project

Introduction to Discovering Conditional Functional Dependencies Java Project:

The main objective of this paper is to give idea of conditional functional dependencies. As usage of computers is increasing are day to day, the storage of data also is more. The data has to  be cleaned an removed if it is not useful.

Data cleaning should be done automatically by finding out the errors. Hence this gave rise to conditional functional dependencies. CFDs are considered as a extension of functional dependencies. CFD supports patterns of  related constants, and hence it can be used as rules for cleaning relational data. 

For discovering CFD three methods are used . First, CFD Miner is used to discover CFDs whish have constant patterns. These constant CFDs are important for identifying an object to clean .The two algorithms which are used for discovering general CFDs is CTANE and FastCFD, CTANE is considered as extension of TANE which is used  in mining of FDs. 

FastCFD is based on the depth-first approach and it reduces the search space. When the relation is large, CTANE is said to work well. FastCFD works better than CTANE in terms of arity, when the arity of the relation is large. Using CFDMiner is faster than CTANE and FastCFD. These algorithms used for cleaning are based on type of application by the user.

Download  Discovering Conditional Functional Dependencies Java Project.

Administration and Inventory Process System Project DFD Diagrams

Introduction to Administration and Inventory Process System Project:

In every business organization the details of production and the supply are maintained by using an application. In this paper we will see how the application maintains the administration and the inventory system details. By giving the request for the sales or the production details it checks from the administrator database and processes the request. In this the application runs the ERP sales between the supplier, administrator and the consumer. In this paper we will be looking into production purchase and billing system, supplier registration and validation system, customer edit details and supplier edit details.

Brief on the data flow models:

An administrative system is present which maintains the details of the raw materials supplied from the supplier and also maintains the details of the goods supplied to the customers. Here the inventory system maintains the details of the checks issued to the supplier and the payments received from the customer and also maintains a production account for maintaining the details of the finished goods.

The production system also checks the availability of the goods for generation of the bills and it maintains a finance database for maintain the billing processes. A billing system is present where the user can look into his account by entering his user id and password and can check the bills by sending a request to the administrator.

Conclusions:

It is very difficult for the persons to look after huge databases and generate responses for the requests. So this kind of administrative systems are very useful for maintaining the databases and they give fast responses for they given requests.

 Download  Administration and Inventory Process System Project DFD Diagrams.