Seminar Report on Demand Based Bluetooth Scheduling

Introduction to Seminar Topic on Demand Based Bluetooth Scheduling:

The main objective of this paper is to give idea of Bluetooth scheduling.  As the wireless communication is advancing day to day, blue tooth technology has been developed. Bluetooth is defined as a wireless communication technology between devices which are Bluetooth enabled. The communication through this Bluetooth device is  possible within a range of 10m. Each cluster of blue tooth device is called as piconet.

Brief into Demand Base Bluetooth Scheduling

Generally, this Bluetooth technology operates in ISM band. Bluetooth employs Time Division Duplex for communication between devices. Since this band is so noisy, to reduce noise frequency hopping is used. Each piconet consists of one master and up to 7 slaves in which each master and slave communicate by using TDD slots. 

Piconet is identified by the Master Bluetooth Address and clock. If the blue tooth participates in two piconets then a bridge formed between them and this is called a scatter nets. Demand based Bluetooth scheduling is achieved by fixing the polling positions of synchronous and shared slaves. The polling period is updated based on the traffic of the master or slave. The simulation of Demand-based scheduling is done by considering only ADS slaves. 

Advantages and Disadvantage:

The Demand-based Bluetooth scheduling increases the throughput of the piconet and reduces the power consumption of the piconet. This scheduling increases the access latency of the slaves. If the access latency of the slaves increases, this may lead to losing a packet.

 Download  Seminar Report on Demand Based Bluetooth Scheduling.

Wireless Technology Filling Blocks To Enhance Quality Of Image Project Report

Introduction to Wireless Technology Filling Blocks To Enhance Quality Of Image Project:

The Project focused on the filling up the blocks in misleads data in the Wireless image transmission. The images in the compact algorithms like JPEG, are divided into some blocks that consists of 8 x 8 pixels, which transmits into the channel, due to unwanted sound the images are collapsed.

The images of 8 x 8 pixels are measured into the two dimension Discrete Cosine Transform (DCT) that leaded by Quantization and Huffman encoding.  Generally the image got transferred on the wireless channel block by block. That reduces the quality of the image which leads to loss of whole block or at least some continuous block. The packet loss may go up to around 3.6 %. 

In the case of losing a single block leads to the other blocks in the reset interval might not be received with correct average value. To make the transmission vigorous the Forward error correction (FEC) and Automatic transmission query protocols (ARQ) are used. The FEC also requires the extra error correction packets for transmission. The ARQ slows down the data transmission speed which also enhances the network to be congested that triggered the packet loss in the starting. Our project focuses on the reconstruction of the blocks which are lost with the help of information around it. 

The bandwidth efficacy of the transmission then can be enhanced. The principle is to structured the blocks and replace it with the information present around them. The approach of JPEG compression was also taken into consideration in which the encoder itself inhibits the blocks and restructured by decoder similar to wireless network. The project makes the development of compression proportion and less quality reduction. 

The Existing System 

The system is unable to overcome the problem of loss of image blocks. Images are normally JPEG compressed format. The algorithm implemented is Discrete Cosine Transform and Quantization and Huffman encoding. 

The Proposed System 

The lost blocks are restructured. The transmitter may transfer one bit for every block which shows the reconstruction. The Image in painting with sides in between two areas or characteristic transformation of color or the gray value. The structured block is determined by the block classification algorithm which is saved. The technique is applicable for every single block. The perfect image in terms of quality is produced. 

The system can be developed in Windows ZP/2000 operating system, JAVA (Java Swings) program, Eclipse tool. 

The hardware requires Intel processor IV, 20 GB hard disk, 128 MB RAM.

Download  Wireless Technology Filling Blocks To Enhance Quality Of Image Project Report.

Multicast Authentication Based On Batch Signature Report

Introduction to Multicast Authentication Based On Batch Signature Project:

The Multicast Authenticate Batch Signature for sending and receiving of packet data has three features the Data integrity, Data origin authentication and non repudiation. The Data integrity has to assure the receiving packets must not change when it gets transmitted. The Data origin authentication work is to ensure that the receiving packets come from the particular authenticated sender. The non repudiation confirms that the packets cannot be neglected by the sender. Above all features is made functional by the Asymmetric key technique termed as Signature. The sender has to create a signature to all the packets with a secret key termed as Signing. The receiver verifies the lifetime of the signature along with the senders assigned key termed as Verifying. The packet is authenticated with approval of the verification. 

The multicast authentication protocol is a difficult task. The development is difficult due to some reasons. The efficiency needs understanding of sender and specifically for the receivers, the receivers’ ability and assets are different from multicast sender which may be strong server. 

The heterogeneity of the receiver needs the multicast authenticated protocol   to make the functional not only in advanced desktop computer, also in the resource able cell phones. The computation and communication overheads are important debate which cannot be neglected. 

The unavoidable packet loss in the internet is due to the traffic at routers. The congested router passes the buffering packets as per regulatory policy. The TCP some how re transmits the packets but the multicast packets passes on UDP, which is not able to replace the loss. The packet loss is more in mobiles.

The wireless channel continually change also enhances the packet loss. Above this the lower data transfer makes the wireless channel more congested. It is not required in either real time online streaming or stock quotes transfer applications. The online streaming will not be proper if the packet loss occurs, which leads to infrequent transfer of stock quotes. So when the end users need of good service, the multicast authentication protocol makes it by reducing the packet loss. Also if the packet loss occurs, the authenticity of existed packets received is more measurable. Other traditional multicast schemes are not able to reduce the packet loss. 

The Existing System 

The single cast authentication signature is existed in which the encrypted and decryption file is not possible to post. The transferring of files has no proper security when it goes between intermediate nodes. 

The Proposed System 

The Proposed System sends the encrypted and decryption file. The batch signature is verified to multicast the receiver to get many files. The security is present in the system to protect the file transfer and loss of packets. 

The hardware required in proposed systems are Pentium IV with 1.1 GHz, 40 GB hard disk drive, 512 MB RAM. The software required Windows XP operating system, JAVA (JDK 1.6.0), TCP/IP protocol, Eclipse and Java Swing. 

 Download  Multicast Authentication Based On Batch Signature Report.

Localized Sensor Area Coverage with Low Communication Overhead

The project explains about many localized sensor area coverage protocols regarding heterogeneous sensors. Every sensor has been mentioned along with its arbitrary sensing and transmission radii. The every single sensor consists of some limited time cycle that can receive messages from the specific nodes only in the limited time which has not completed.

After the due time of expiry it will not receive or hear any messages. The sensor node which is not completely surrounded sensing area i.e., or partially surrounded with some group of active sensors still active for some required time informing it by giving out message before become inactive. Our project makes this sensor to remain active till the sensor   active or not surrounded.  The covered nodes will be in the dormant stage by some time generating a leaving message to the sensor about its situation. Depends on the other sensor response the inactive sensor takes decision to be covered or still remain active. 

The Existing System 

The existing system has demerit of not having status links with other sensors. Because of the improper interaction between sensors the competition and data missing occurs. The cause of this demerit is improper use of the source. The affluent network is unable to surround the place of linked groups of active nodes. Therefore the nodes are not judging about the particular communicating node. 

The Proposed System 

The presented project overcomes this problem of improper communication between sensors. The sensors now posses the figure of the communicating device at the same time. So every sensor has ability to communicate or interact with other sensor or whole network. The less life time sensor with coverage, observes other sensors availability and given the job to the specific sensor. This system is very working and vigorous as it covers more area by using the limited active sensors and also the longstanding connection. However it may loss some messages. 

The Proposed system can be operated in Window XP. The software programs required for the application development are Microsoft Visual Studio.Net 2005 for the front end and Visual C#.Net for the Coding language. It requires Pentium III 700 MHz processor, 40 GB hard disk drive and 128 MB RAM.

 Download  Localized Sensor Area Coverage with Low Communication Overhead.

Centralized Authentication Registry Asp.Net Project

Introduction to Centralized Authentication Registry Asp.Net Project:

This project ought to be executed employing Web Services or WCF technology solely. The aim is, in the largest institutions, the User documents will be integrated in a register. For the access of various applications, the validation description will be restored from the register (generally Lotus Notes Domino or Windows Active Directory) and grounded on documents, the applications access part will be offered.

For instance, in an institution, the staff member will be recorded with an application to satisfy the connecting formalities. When he associates himself with an institution, he receives an User ID and Password, similar documents he/she ought to be capable to employ the Intranet/Internet applications of the institution such as Mails, Attendance, Leave plans, Staff member reference for new jobs, employing Email of the institution to buy objects with firm trademark.

Functional needs:

Manages the various applications

  1. Maintain staff members’ data
  2. Offers safety to the applications
  3. Produce reports
  4. Constrain the  authorizations via web services
  5. Maintain user profile, alter password, description in case of forgetting the password.

Non-functional needs:

  1. Safe access of private data(user’s description) ought to be offered
  2. Access of the application round the clock
  3. Application ought to be approachable over Internet
  4. Reformed element design to gain reformed performance at peak time
  5. Manageable service grounded architecture will be greatly suitable for expansion in the future.

Hardware Requirements:The system should have an Intel Pentium or above Processor, a RAM of 512 MB and a Hard Disk of 40 GB.

Software Requirements:The Software needs include  a Windows XP or above Operating System, a Database- MS SQL Server 2005, a Web Server-Internet Information Services 6.0 or above, Web Technologies-HTML, CSS, Java Script, ASP.NET with VC#.NET, Client Application- Internet Explorer 6.0 or above  and IDE & Tools-Microsoft Visual Studio.Net-2008, AJAX Tool kit, Web services.

Download  Centralized Authentication Registry Asp.Net Project .

Hacker Detection In Wireless Sensor Network Java Project Abstract

Introduction to Hacker Detection In Wireless Sensor Network Java Project:

The intruder detection in the wireless sensor network is an  area of interest in many types of network applications which is similar to identify an enemy in a war zone. The intruder detection is the procedure to identify the presence of wrong, inappropriate and inaccurate resting attackers in wireless sensor network. In our model, we prefer hacker detection as per the Heterogeneous WSN models. We proposed two types of Sensing detection models:

1) Single sensing detection

2) Multiple sensing detection. 

 Our simulation work concludes about the benefits of Multiple sensor heterogeneous WSN’s. 

Existing Model of Intruder Detection: Single Sensing Detection can detect only a single intruder at a time in the WSN.

 We had done our previous work which was based on the Homogenous and Heterogeneous single sensor in Wireless sensor network. 

Proposed Model: We are now proposing the Intruder detection under Heterogeneous wireless sensor network where intruder can be identified and clear out anywhere in the network. 

SYSTEM REQUIREMENTS 

HARDWARE

SOFTWARE

Processor- Pentium IV 2.6 GHz Front End- JAVA
RAM- 512 MB DD RAM Tool Used- JFlame builder
Monitor- 15” Color Operating System- Windows XP
Hard Disk- 20 GB  
CD Drive- LG 52X  
Keyboard- Standard 102 Keys  
Mouse- 3 Buttons  

 Download  Hacker Detection In Wireless Sensor Network Java Project Abstract .

Distributional Features for Text Categorization Asp.Net Project Abstract

Introduction to Distributional Features for Text Categorization Project:

Text categorization is known for providing a predefined category to natural language text. The “bag-of-word’” presentation was used on the values of the word that based on the existence of the word in the document and its repetition. Though the values mentioned for the Text categorization word was not able to clarify the information to be provided due to improper circulation of the word in the document.

The proposed project presents other kinds of values known for the word. The ideal values which is to be highlighted through word possesses a features called Distributional features that projects the clear expression of word and the proper place to start word as meaningful. The Distributional features presented through “tfidf style equation” and added with Ensemble learning techniques. The Distributional feature are advantageous for the text categorization projected on its appearance and meaning. 

Exiting System: 

The current system is based on the values to be presented along with its presence and appearances in the document. The system also includes the statistical way of presentation depends on number of words existed continuously in the text called n-gram. 

Disadvantages: 

1.     The current system is unable to provide the information which are mentioned in the document completely.

2.     The current system is inefficient.  

Proposed System: 

The Distributional features of the proposed system are based on tfidf style equation and other features are assembled through Ensemble learning techniques. The distributional features are applied along with inverted index. The inverted index not only mentions the number of times of word presentation, also the places of presentation in the document. Depending on the word presented and size of document the features of word is structured and computed. 

Advantages: 

  1. The text categorization of Distributional feature can be made in less cost.
  2. The Distributional system has superior performance.
  3. The Distributional system features has shown its quality when documents are lengthy and have informal style.
Download  Distributional Features for Text Categorization Asp.Net Project Abstract .

Project Report on Online Billing System in Java

Introduction to  Online Billing System in Java:

The record keeping and reporting is the key of successful transactions which definitely consists of user friendly interface with easy and common application. The objective to develop the application is based on the easy way of getting yellow page information. The application can be used easily for record keeping and reporting. The application can be installed on desktop or operated via client/server architecture. 

The system is easy to use with simple knowledge of computer. The applied principles in this system are instinctive and depend on running application at user interface. 

The following steps are included in the developing of an application.

  1. Information collection
  2. Design
  3. Coding and assigning
  4. Testing
  5. Applying the application at User end 

Programming Language were used in developing this application:  JAVA with JS, Javascipt, HTML. Database application used MS Access. 

Hardware was used: RAM 64 MB and 2 GB hard disk. 

Operating Systems: Windows 95 & higher version. 

Architecture: The modules is divided into

  • Login
  • Create User
  • Add entry
  • Erase Entry
  • Modify Entry- 1. Search name, 2. By mobile number.

The online Billing application is providing with efficient GUI to the user and can be installed in other systems easily.

  Download  Project Report on Online Billing System in Java.

Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project

Introduction to Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project:

Health care sector, hospitals, primary health care centers, doctor’s offices and dental care centers is capable of enhancing their efficiency to respond to patients with the help of automated and self replied phone system which can be used to answer the calls from the patients and injured persons that can give information exactly and in time. 

Medical business and organizations can be quick and advantageous by installing this automated telephone answering services. The phone responds to the caller in a very prominent way for 24 hours in a day and all 7 days a week. 

IVR systems and services would be recognized to provide excellent work for Clinical trials. The Clinical IVRS extracted data maintains a perfect, persistent and an error free patient record without any disputes. 

Features 

  1. Beneficiary would request for information regarding health care programs and costs.
  2. Customer can be informed about Policy information on phone easily.
  3. IVRS can instantly provide information to existing policy holders and receive the claim number or policy account number which can be processed and revert to customer with billing and claims information.
  4. The customer if not getting the proper solution, it can be transferred to concerned department to answer the customer requirements.

  Download  Interactive Voice Response System (Ivrs) For Medicare Using Java and Voice Xml Project.

Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR

Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR Abstract:

The main things that play role in IPFA in vehicular ad hoc networks is RDFR is the internet, wireless technology, computing power, communicating devices, network connectivity. In our early college days of computer we have learned about graph. We are well aware of the concept of nodes.

Vehicular AD HOC Network is also known as VANET. 

Thus VANET if a form of technology that uses moving cars as nodes in a network so that it can create a mobile network. VANET can be used by middle organization or large organization. In this time there is huge progress in GPS and navigation system this form of system is useful to traffic report as they can easily be integrated so that you can find the possible short path to reach the destination. There is nothing new in the concept we are learning it is simply the concept of graph applied in real life . GPS are now seen in most of mobile phone that comes in the market.

Also there is another factor taken into consideration is energy efficiency.

Dynamic Source Routing (DSR) plays important role on energy efficiency. 

VANET vehicle itself can provide continuous power to communication devices and computing devices. One of the best known routing protocols is GPS.GPS stands for Global Position System. How this system work may be an interest to us.

As we have voice output for our help for our GPS system. Gps is a special form of navigation, as it is not you who navigates, but it tells our computer software on how to travel to your destination. Thus it makes our job a quite better .This system is so simple that it can be used by anyone .The only requirement to create such a system is a good and strong network.

 Download  Improved Packet Forwarding Approach In Vehicular Ad Hoc Networks Using RDGR .