Boolean and Fuzzy Logic Technical Presentation

Description: The research paper Boolean and Fuzzy Logic Technical Presentation talks about Boolean and Fuzzy logic. The research paper also explains the difference between the two. It is suggested that data and information are tough to understand quantitatively. It is suggested that it is easy to decipher imprecise data rather than the precise data. Fuzzy logic is akin to human reasoning it comes to decision seeking not so clear premises and imprecise data. It uses mathematical expression to come to a decision based on premises that are both insufficient and imprecise. Fuzzy set involves segregating classes and groups that are not precisely defined. In simpler words they are fuzzified by generalizing a crisp set with a fuzzy set having unclear boundaries. Linguistic variables are of a critical importance in fuzzy logic. For example an 85 kg man can be grouped both under ‘medium’ and ‘large’ headings. Fuzzy set theory encompasses fuzzy logic, fuzzy arithmetic, fuzzy mathematical programming, fuzzy topology, fuzzy graph theory, and fuzzy data analysis, though the term fuzzy logic is often used to describe all of these.

Boolean logic is totally different from fuzzy logic in the sense truth value is determined only by the binary values 0 and 1, unlike fuzzy logic where in impreciseness determines many an answer and the truth value lies somewhere in the middle of all these. It is put forth in the research paper that the fuzzy logic and its seeds were sown as early by Buddha who posited that ‘the rose may be red or may not be’. This led to the breakthrough research in the domain at the University of California, Berkeley.

Conclusion: The passage concludes on a note that, Fuzzy logic has myriad application value in computational applications like embedded systems and many more. Fuzzy logic provides the most precise way of coming to a conclusion based on vague premises. It somehow works close to human reasoning skills which allow making decision considering approximate values.

Download Boolean and Fuzzy Logic Technical Presentation.

Hospital Management a VB Project

Hospital management VB project deals with student marks and management. It simplifies managing the student details which are inclusive of personal, academics and providing marks list in a college. This program also provides immediate details needed in the student marks management.

This Hospital management VB project complex project has the scope of adding new employees, doctors, admitting outpatients, fixing appointments etc.  This project also displays the services provided to outpatient. It consist of several interfaces which include Welcome interface Login interface, MDI main interface, Application interface, Doctor interface, Employees interface, Ward interface, Outpatient interface and Services interface.

HOSPITAL-MANAGEMENT-A-VB-PROJECT

In welcome interface, it includes just progressing, intimates that the administrator is getting in the management program. In login interface, we provide authorization to the user getting in. The multiple document interface, provides base screen for all management program actions present in the management program.  

It contains menu bar which list the manipulation forms for management. Application interface provides the basic accessories that are required for certain essential operations. This interface provides us the facilities such as viewing doctor’s details including his/her id, qualification and specialization, address etc. 

It also displays the list of doctors present in various departments. We can search a doctor by his id and then view his details. This interface also provides us the facility to add new doctors in. 

Myriad Advantages:

This interface provides us the facilities such as viewing employee’s details including his/her id, qualification, address etc..  It also display the list of employees present in various departments. We can search an employee by his id and then view his details. This interface also provides us the facility to add new employees in. The ward  interface provides us the details about wards and the habited patients in those wards. 

Conclusion: 

This interface provides us the information about the outpatients, what for they are in, appointments with doctor, bill details, time they are in etc. This interface provides us the information about the services present in that hospital, which time they are scheduled to be open, and the in charge administrator.  The basic functionalities of hospital management system is to provide convenient way of management to the administrator. 

It should be highly user defined and all the details of doctors, employees and patients can be conveniently maintained due to the presence of the data base.

Dynamic Heterogeneous Grid Computing a Java Project

Dynamic Heterogeneous Grid Computing a Java Project is for computer science final year students who are interested in grid computing java project.

Description: 

Communication Induced Check-pointing protocols usually make the assumption that any process can be check-pointed at any time. An alternative approach which releases the constraints of always check-point able processes, without delaying, “Any do not message reception” or altering message ordering enforcement by the communication layer and by the application.

Dynamic-Heterogeneous-Grid-Computing-a-Java-Project

Reason for implementation and others: 

This protocol has been implemented within Pro-Active, an open source Java middle ware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes).However, large applications executing on Grid or cluster architectures consisting of hundreds or thousands of computational nodes create problems with respect to reliability. 

A Glittering Problem: 

The source of the problems is node failures and the need for dynamic configuration over extensive runtime. 

Conclusion: 

By allowing recovery even under different numbers of processors, the approaches are especially suitable for applications with a need for adaptive or reactionary configuration control. The low-cost protocols offer the capability of controlling or bounding the overhead. A formal cost model is presented, followed by an experimental evaluation. It is shown that the overhead of the protocol is very small, and the maximum work lost by a crashed process is small and bounded. 

The solution to this is two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. These are transparent protocols capable of overcoming problems associated with both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a data flow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multi threaded applications.

Flexible Deterministic Packet Marking CSE Paper Presentation Java Project

Description:

Flexible Deterministic Packet Marking CSE Paper Presentation .Internet Protocol (IP) trace back is the enabling technology to control Internet crime. Without a proper termination condition, the attack graph constructed by the PPM algorithm would be wrong. There are quite many defects in the existing system.

It is not easy to find out pack travel path, the packet can be lost and duplicate packets can be received by the receiver. If this process is repeated over and over receiver will not have any original packet because of the increase in duplication of messages. 

However, the FDPM algorithm provides an autonomous way for the original PPM algorithm to determine its termination. The most significant merit of the FDPM algorithm is that when the algorithm terminates it guarantees that the constructed attack graph is correct, with a specified level of confidence. 

We carry out simulations on the FDPM algorithm and show that the FDPM algorithm can guarantee the correctness of the constructed attack graph. 

Different probabilities that a router marks the attack packets .It is easy to find out packet loss, Duplicate packets and find out each and every packet path. It also reduces the network traffic. In this paper, we present a novel and practical IP traceback system called Flexible Deterministic Packet Marking (FDPM), which provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. 

While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. In particular, FDPM adopts a flexible mark length strategy to make it compatible to different network environments; it also adaptively changes its marking rate according to the load of the participating router by a flexible flow-based marking scheme. 

Conclusion: 

Evaluations on both simulation and real system implementation demonstrate that FDPM requires a moderately small number of packets to complete the traceback process; add little additional load to routers and can trace a large number of sources in one traceback process with low false positive rates.

The built-in overload prevention mechanism makes this system capable of achieving a satisfactory traceback result even when the router is heavily loaded. The motivation of this traceback system is from DDoS defense. 

It has been used to not only trace DDoS attacking packets but also enhance filtering attacking traffic. It has a wide array of applications for other security systems. We present a novel and practical IP trace back system called Flexible Deterministic Packet Marking (FDPM).

FDPM provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. FDPM requires a moderately small number of packets to complete the Trace back process.

Enhancing Performance of Data Migration CSE Final Year Project

Description: 

Transferring of data between storage types, formats, or computer systems is termed as Data migration CSE final year project , it is usually performed programmatically to achieve an automated migration, freeing up human resources from tedious tasks. When organizations or individuals change computer systems or upgrade to new systems, or when systems merge, this can be put to potential use. Data-migration-CSE-final-year-project

To achieve an effective data migration procedure, the data on the old system is mapped to the new system providing a design for data extraction and data loading. The design relates old data formats to the new system’s formats and requirements. Programmatic data migration may involve many phases but it minimally includes data extraction where data is read from the old system and data loading where data is written to the new system. 

If a decision has been made to provide a set input file specification for loading data onto the target system, this allows a pre-load ‘data validation’ step to be put in place, interrupting the standard ETL process. Such a data validation process can be designed to interrogate the data to be transferred, to ensure that it meets the predefined criteria of the target environment, and the input file specification. Data migration phases (design, extraction, cleansing, load, verification) for applications of moderate to high complexity are commonly repeated several times before the new system is deployed. 

Similarly, Data Compression is useful because it helps to reduce the consumption of expensive resources, such as hard disk space or transmission bandwidth. On the downside, compressed data must be decompressed to be used, and this extra processing may be detrimental to some applications. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed. 

The design of data compression schemes therefore involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced, and the computational resources required to compress and uncompress the data. 

Data Compression: 

There are two kinds of data compression Lossy and Lossless. Generic, data-specific, and parallel compression algorithms can improve file I/O performance and apparent Internet bandwidth .However, when integrating compression with long-distance transport of data from today’s parallel simulations. 

Issues: 

These issues include: what kind of compression ratios can we expect? Will they fluctuate over the lifetime of the application? If so, how should we make the decision whether to compress? Will the compression ratios differ with the degree of parallelism? If so, how can we handle the resulting load imbalance during migration? Are special compression algorithms needed? Can we exploit the time-series nature of simulation snapshots and checkpoints, to further improve compression performance? What kind of performance can we expect on today’s supercomputers and internet?

download Project Report  of CSE Data migration CSE final year project.

Credit Card Fraud Detection Using Hidden Markov Model A ASP.Net Project

Credit Card Fraud Detection Using Hidden Markov Model A ASP.Net Project is for B.tech Computer science final year students. Credit-Card-Fraud-A-ASP-Net-Project

Description:

The trend today is to use a card instead of cash. Each time you walk past a a store or each time you peep into the wallet of a working class employee, executive or big shot entrepreneur all you tend to see are plastic cards which have great value! 

Nowadays the usage of credit cards has dramatically increased and has become the most popular mode of payment for both online as well as regular purchases. However, it is very easy to manipulate and make wrong use of these cards. The cases of fraud associated with credit cards are rising along with its user group. 

Making cash flow simpler: 

Credit-card-based purchases can be categorized as physical card and  virtual card. In a physical-card based purchase, the cardholders presents his card physically to a merchant for making a payment, in case another user is swiping the stolen or lost card , it can lead to substantial loss to the original card holder or the credit card company. In the latter purchase, only some important information about a card (card number, expiration date, secure code) is required in order to make the payment. 

Such purchases are normally done on the Internet or over the telephone. To commit fraud in these types of purchases, fraudsters require to know the card details.  The only way to detect this kind of fraud is to analyze the spending patterns on every card and to figure out any inconsistency with respect to the “usual” spending patterns.

Conclusion: 

Here, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholders. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. We present detailed experimental results to show the effectiveness of our approach and compare it with other techniques available in the literature.

Airline Reservation System A Java Project

Software’s have always created a platform to make work easier and more accurate. The Airline reservation system a java project is not an exception. With working employees traveling 24/7 this software speed up your reservation process and makes it convenient for the customers to book flights whenever and wherever! AIRLINE-RESERVATION-SYSTEM-A-JAVA-PROJECT

It reduces the scope of manual error and conveniently maintains any modifications, cancellations in the reservations. It not only provides flight details but also but also creates a platform to book tickets, cancels or modifies ticket timings or dates and even informs about the number of people on board!

 The software is divided into 5 parts with each having their respective functions. 

Primary Objective: 

The system objectives educate us about the primary function of this Airline reservation system a java project software. The system context deals with easy-to-use, interactive, and intuitive graphical and telephonic interfaces. 

The functional requirements consist of the bulk of the project explaining the various functions and working of the software. It also has taken into consideration the non- functional requirements and also the plausible future requirements. 

When a user makes a reservation or a cancellation it is identified as “reserve in file “or “cancel in file.” This information is accepted and the details are restored in the passenger data base, which does not cause any hindrance to the customer. 
Conclusion: 

The web based “airline reservation system” project is just another attempt to stimulate the basic concepts of airline reservation system.  The system follows a simple process which allows the passenger to check availability of flights by entering the two travel cities, namely the “Departure city” and “Arrival city”.

Once this is done if the seats are available the system asks the customer to enter his details such as name, address, city, state, credit card number and contact number. Then it checks the validity of card and book the flight and update the airline database and user database.

How Firewall Works Engineering Seminar

Description: The research paper How Firewall Works Engineering Seminar comments on Firewalls and the benefits derived by installing them on the system or a networked community. These days there is both reason and need for security because systems are connected a centralized system, it is like data is flowing from a terminal via a networked medium into many nodes i.e. where authenticated users work from. There is also interconnectivity among systems by way of LAN (Local Area Network). Local companies are connected both to one another and with the regional and main branches via Wide Area Network (WAN).

How Firewall Works: Employees working over systems are connected to one another; they even have internet access via ISP i.e. the Internet Service Provider. When there is dense sharing of information and active communication there is every reason for security threats. There could be hackers that play foul with the information shared. There could be threat from emails and other sources in the forms of bugs, worms and Trojans. Having an intrusion protection fixed to a system may not be a viable solution. Consider a network with hundreds or even thousands of systems, running a mix of various versions of UNIX, plus Windows. When a security flaw is discovered, each potentially affected system must be upgraded to fix this flaw. The alternative, increasingly accepted, is the firewall. The firewall is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

Conclusion: The research paper concludes on a note that a firewall defines a single choke point that keeps unauthorized users out of the protected network. A firewall prohibits potentially vulnerable services from entering or leaving the network. A firewall provides a location for monitoring security related events, Audits and alarms can be implemented on the firewall system. A firewall is a convenient platform foe several internet functions that are not security related.

Download How Firewall Works Engineering Seminar.

Firewalls Computer Science & Information Technology Seminar

Description: The research paper Firewalls Computer Science & Information Technology Seminar talks about Firewalls. The research paper suggests that with the increase in sharing of information, data on computers even within the company, in a networked environment and the extension of network to all the branches of the company, security concerns are equally gaining lots of prominence and importance. Network security is aimed at when the user has to go through different layers of security before reaching the desired network. This will safeguard the company’s interest and certainly aid in company’s growth.

A network is a connected group of systems transacting over a similar purpose and goal. The network has a server which provides information and different authenticated nodes that get transmission via server. Businesses, government agencies, any corporate that operates on many businesses are networked and need severe security. A security lapse might cast doom over company’s progress.

 Types of Attacks in a Security System:

  • Interruption: In an attack where one or more of the systems of the organization become unusable due to attacks by unauthorized users.
  • Interception: An unauthorized individual intercepts the message content and changes it or uses it for malicious purposes. After this type of attack, the message does not remain confidential.
  • Modification: The content of the message is modified by a third party. This attack affects the integrity of the message.

Firewall: Firewall is a group of security components that together form a barrier between two networks. A firewall can be purchased as software and can be installed in your computer. The firewall then conducts a kind of investigation and will not allow ‘unidentified’ data enter into the system. One has to conduct a real experiment before installing firewall because the implied meaning could be so different from the actual one.

Conclusion: The research paper concludes that firewall provides adequate security measures in a wired environment. It blocks viruses and bugs, unauthorized interactive logins, unwanted movies, literature and pornography.

Download Firewalls Computer Science & Information Technology Seminar Paper Presentation.

Biometric Authentication System

Description: The research paper Biometric Authentication System speaks about Biometrics and the procedures for securing any transaction. Biometrics is an upcoming field that relies heavily on the physical characteristics of a person.

The applications of biometrics make it easier for online transactions and transactions that include passwords, PINs, and Smart Cards. As the threat of hackers and others is increasing day by day, the demand for security is also increasing alongside.

Here in comes the role of biometrics which depends on an authenticated truth that the physical characteristic traits of a person are very unique and cannot be replicated come what may.

With the increased facilities of the transaction, the element that is seriously jeopardized is ‘security’. With hackers and other cybercriminals that are escaping scot-free, the security measures fall thin. Biometric offers just the right kind of security that a person requires while in the process of an e-transaction.

Biometrics identifies a very appealing and universal fact that the personality traits are peculiar and unique and cannot be copied whatsoever. This makes certain body features quite interesting to the computer scientists and they depend heavily on these to provide a cent percent security to the transacting clients.

The unmatched physical features and other personality traits will make you alone eligible to transact your own procedures. Iris recognition, retinal scan, fingerprinting and other viable techniques of biometrics are currently the order of the day.

Although a bare minimum of companies i.e. pathetically just 1% use the biometric procedures and 15% have rejected them straightaway still there is every possibility that with growing demand of security concerns these techniques will certainly in the future catch up like wildfire.

Conclusion: The research paper concludes on a note that biometrics is a domain that needs greater exposure. Awareness has to be created in the society. Although latent as of now Biometrics is a domain that has an indisputable growth prospect. All the routine security measures will be transformed into biometric procedures sooner than later.