Evacuation of Delayed Packets in Networks Java Project Report

Introduction to Evacuation of Delayed Packets in Networks Java Project:

The main objective of this paper is to give idea of delayed packets in networks. At present the networks which we are using supports only two classes of traffic, it takes long time to service if there is any failure. Hence to solve all these problems a OCGRR technology has been developed. This is the advanced version of OCRR technology. It requires a processor of 500MHZ and above, ram of 128 mb and hard disk of 10 gb size. It makes use of jdk 1.5, windows 2000 server family operating system and sql server databases. 

Brief into Evacuation of delayed packets in networks

In OCGRR, small rounds of a frame and a packet-by-packet are made used such that every stream inside a class can send only one packet in each small round. .In this packets of same class  are sent to the destination. Before frame is scheduled, each output port  data streams are stored in a separate Buffer .

Buffers are placed in frames such that each frame consists of only one buffer. Once Scheduling is done transmission traffic occurs and data is transferred according to their priorities. Only one packets are transmitted in one single round.

Advantages:

It minimizes delay, latency and jitter occurring in the network due to delaying of the packets. It can provide good bandwidth for the transmission of data packets. It reduces packet transmission time in the same stream. It can support multi class traffic which can increase the performance of the network.

Download  Evacuation of Delayed Packets in Networks Java Project Report .

Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project Report

Introduction to Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project:

The main objective of this technique is to find the broken links which are transferring information and to divert them to the other nodes which are present in the cache. A cache update algorithm is used for updating the new cache structure called a cache table for the broken links. In this paper we will see for the cache algorithms are implanted for find the broken links and updating the caches.

Brief into the working of the distributed cache updating:

To make cache update for the broken links each node maintains the cache table information required for making the cache updates. When a link failure is detected the algorithm notifies all the reachable nodes which have the cached link. The proactive cache updating includes some protocols for patching up the broken links.

We have two types of routing protocols available for the adhoc networks. The proactive protocols maintain a up to date information of the nodes which periodically disseminates the topology updates through the network. Whereas the on demand protocols make the discovery of the routes only when the routes are required.

Limitations of existing system and advantages of distributed cache updating:

In the existing system the link failure occurs in the mac layer as it undergoes multiple transmissions due to increase of stale route packet delivery latency. The stale route packets remain in the caches only due to the usage of FIFO replacement algorithm.

By using proactive cache updating the propagation of stale routes to other routes gets prevented. A new cache updating algorithm is used which makes the dynamic source routing to adapt quickly to the changes occurred in the topology.

Download  Distributed Cache Updating For the Dynamic Source Routing Protocol Java Project Report.

Discovering Conditional Functional Dependencies Java Project

Introduction to Discovering Conditional Functional Dependencies Java Project:

The main objective of this paper is to give idea of conditional functional dependencies. As usage of computers is increasing are day to day, the storage of data also is more. The data has to  be cleaned an removed if it is not useful.

Data cleaning should be done automatically by finding out the errors. Hence this gave rise to conditional functional dependencies. CFDs are considered as a extension of functional dependencies. CFD supports patterns of  related constants, and hence it can be used as rules for cleaning relational data. 

For discovering CFD three methods are used . First, CFD Miner is used to discover CFDs whish have constant patterns. These constant CFDs are important for identifying an object to clean .The two algorithms which are used for discovering general CFDs is CTANE and FastCFD, CTANE is considered as extension of TANE which is used  in mining of FDs. 

FastCFD is based on the depth-first approach and it reduces the search space. When the relation is large, CTANE is said to work well. FastCFD works better than CTANE in terms of arity, when the arity of the relation is large. Using CFDMiner is faster than CTANE and FastCFD. These algorithms used for cleaning are based on type of application by the user.

Download  Discovering Conditional Functional Dependencies Java Project.

Administration and Inventory Process System Project DFD Diagrams

Introduction to Administration and Inventory Process System Project:

In every business organization the details of production and the supply are maintained by using an application. In this paper we will see how the application maintains the administration and the inventory system details. By giving the request for the sales or the production details it checks from the administrator database and processes the request. In this the application runs the ERP sales between the supplier, administrator and the consumer. In this paper we will be looking into production purchase and billing system, supplier registration and validation system, customer edit details and supplier edit details.

Brief on the data flow models:

An administrative system is present which maintains the details of the raw materials supplied from the supplier and also maintains the details of the goods supplied to the customers. Here the inventory system maintains the details of the checks issued to the supplier and the payments received from the customer and also maintains a production account for maintaining the details of the finished goods.

The production system also checks the availability of the goods for generation of the bills and it maintains a finance database for maintain the billing processes. A billing system is present where the user can look into his account by entering his user id and password and can check the bills by sending a request to the administrator.

Conclusions:

It is very difficult for the persons to look after huge databases and generate responses for the requests. So this kind of administrative systems are very useful for maintaining the databases and they give fast responses for they given requests.

 Download  Administration and Inventory Process System Project DFD Diagrams.

Seminar Report on Demand Based Bluetooth Scheduling

Introduction to Seminar Topic on Demand Based Bluetooth Scheduling:

The main objective of this paper is to give idea of Bluetooth scheduling.  As the wireless communication is advancing day to day, blue tooth technology has been developed. Bluetooth is defined as a wireless communication technology between devices which are Bluetooth enabled. The communication through this Bluetooth device is  possible within a range of 10m. Each cluster of blue tooth device is called as piconet.

Brief into Demand Base Bluetooth Scheduling

Generally, this Bluetooth technology operates in ISM band. Bluetooth employs Time Division Duplex for communication between devices. Since this band is so noisy, to reduce noise frequency hopping is used. Each piconet consists of one master and up to 7 slaves in which each master and slave communicate by using TDD slots. 

Piconet is identified by the Master Bluetooth Address and clock. If the blue tooth participates in two piconets then a bridge formed between them and this is called a scatter nets. Demand based Bluetooth scheduling is achieved by fixing the polling positions of synchronous and shared slaves. The polling period is updated based on the traffic of the master or slave. The simulation of Demand-based scheduling is done by considering only ADS slaves. 

Advantages and Disadvantage:

The Demand-based Bluetooth scheduling increases the throughput of the piconet and reduces the power consumption of the piconet. This scheduling increases the access latency of the slaves. If the access latency of the slaves increases, this may lead to losing a packet.

 Download  Seminar Report on Demand Based Bluetooth Scheduling.

Demand Response Scheduling By Stochastic SCUC Project Abstract

Introduction to Demand Response Scheduling By Stochastic SCUC Project:

Many independent system operators have designed programs to utilize the services provided by the demand response. Demand responses are provides with the demand response providers which manages the customer responses. In this we will look into a stochastic model which utilizes the reserves provided by the demand response in the markets.

Brief on Demand response scheduling:

We find two types of demand response programs they are time based demand response programs and incentive based demand response programs. Time based demand response programs are designed for independent system operators which contain the programs like time of use tariffs, critical peak pricing and real time pricing.

Whereas the incentive based programs have a market based structure and can be offered in both retail and whole sale markets. Most of the incentive base programs have its own goal of operation and san over long term, midterm and short term. A stochastic mixed integer programming model is suggested in which the first stage involves a network constrained unit and the second stage involves security system scenarios.

Advantages and Drawbacks in the existing system:

The demand response providers participate in the electricity markets which act as a medium between the retail consumers and independent system operators. The demand response programs offer aggregate response in the independent system operators. Many independent system operators have the requirement of minimum curtailment level but the demand response programs are lagging this. The demand response programs don’t provide security to the system.

 Download  Demand Response Scheduling By Stochastic SCUC Project Abstract.

Data Leakage Detection Project Abstract

Introduction to Data Leakage Detection Project :

In this paper we will see how data how data leakage occurs and the preventive measures to reduce the data leakage. Data leakages occur when the sensitive are handed over to the trusted third parties and due to this leakage occurs and the data may be found at the unauthorized persons. Perturbation is the most effective technique use for reducing data leakages. In this paper we will look into the unobtrusive techniques for detecting the data leakages.

Leakage prevention techniques:

Perturbation is the effective technique in which the data to be handed over is modified and made less sensitive so that the leakage does not occur. Water marking method is traditionally used in which a unique code is embedded in the data so as to identify the data leakage.

This model is used for accessing the guilt of agents and algorithm is used for distributed the objects to the agents. We will use agent guilt model analysis which estimates the values in the objects for guessing the targets. By using the component failures are known and by using this it checks the location of the leaked agent. To check the parameters interaction with the scenarios generated guilt model analysis is used.

Conclusions:

When there is need for the data to be handover to the other agents then we can use the watermark technique for the data, for finding the leakages. If there are more intended users there it will be difficult for us to know from which agent the data leakage has occurred by using watermark technique. The proposed algorithm employs various data distribution strategies for finding the leaker which ensures safety for the distributer.

 

Bank Management System Project Report in VB

Introduction to Bank Management System Project:

In the present scenarios, banks play a significant role in handling the wealth of an organization. The term globalization had completely changed the banking industry and numerous banks are being established in various countries. This is because of the increase in banking customers, number of transactions, etc.

Now-a-days, most of the transactions have become electronic and enables their customers to made transactions via internet without going to a bank. So, today successful banks are maintaining their customer databases which are running into millions. However, due to recent recession the industry growth had slowed down. So banking industry came under study with the introduced regulations in order to clearly analyze its activities. In order to ensure its profitability, most of the banks imposed self regulations on lending and other activities.

Now the economies are slightly increasing its standard and allowing the banks to again improving their financial growth. In banking industry, in spite of consolidation still there are numerous people struggling for both attention and subsequent transaction of its consumers. These days, banking industry are feeling burden because of its business and competitive pressures. Among the competition, there are some aggressive player’s like Telco’s where it offers private label credit cards, micro-payment options, etc.

Regardless of present pressures, banks don’t have enough money to slow down. So, the bankers are considering customer bases as priority and taking help from loyalty programs to fulfil this task. Further, banks are restoring the data collection processes of customers for investigation through intelligent analysis. Because of the large number of partners, bankers are mainly selected coalition loyalty programs. Most of the products or systems are becoming complex.

So the implementation of any new product in present market refers to an realization, application, and execution of a model. Moreover, the maintenance phase in a software enables the user to correct the defects which occurs while field usage. 

Download  Bank Management System Project Report in VB .

Java Project Report on Government Document Work Flow Management

Introduction to Government Document Work Flow Management Java Project:

It is the application developed using java scripts which also include HTML and JSP. It used the features of servlets and struts. It used My SQL for storing data or for data base management, to maintain the record of the government. It can be developed using eclipse and dream weaver. We can also add the bar code for the scanning purpose or security purpose.

There is always the problem of the government record or files where they are kept, it is very difficult task to maintain the file in the government record where they are kept. Customers always have to face the problem in government offices by spending hours but they get nothing. So to overcome this problem, an application is generated that can be used to maintain the record of the government offices. To make this better we use bar code that has the information of the particular department and the reason for the record.

Every customer will be given specific login id and password so that they can login from internet anywhere and anytime. This will reduce the headache of both customer and government. But this application they can be updated with the information.

This application includes the management process, proper documentation and information of the employee, bar code generation and scanner for any search. Documents are scanned by bar code before adding or retrieval and after that reporting of the statics data.

This application allows the user to setup their document and do the routing process if exceptions are generated. For every generation we have to generate the bar code for submitting the document and employee can also set their record in the data base for specifying in the department.

 Download  Java Project Report on Government Document Work Flow Management.

Chat Server Project Report in Java

Introduction to Chat Server Project:

Chat server is an online system created for the community of people to interact with one another on the Internet. This system provides solution to most of the shortcomings of the traditional system. The teachers, students and the firm are profited evenly by the suggested system. The system preserves a great amount of time and effort too, for both. A new software has been introduced for chatting, which is called Chat Server. This software plays a pivotal role in decreasing the interaction gap among the various people in a college, so it can be termed as very significant for the college.

This system includes four stages of interaction or three modules:

  • Administrator level: Administrator level enables only the administrator to log in to it and  make required alterations in database and other significant fields of the system, by going to this level. He has the authority to accept or decline the request of a newly registered user.
  • Staff level: Staff level is meant for the employees functioning at different divisions and departments. The employees will log in employing the user ID and password.
  • Student level: Student level enables the student to login in to the site from any place. He can get to know the position of other chatters by login and can chat online and offline and also send feedback to his teachers.
  • Parent level: Parent level enables the parent to chat with his ward as well as the teachers.

Hardware Requirements:

An Intel Pentium class, 600 MHz or higher, a RAM of 256 MB, a Free hard disk space of 600 MB, a super VGA monitor and a CD ROM drive of 52X is required.

Software Requirements:

An Operating System of Windows 2000 Advanced Server Windows XP, client side-HTML and server side- JSP, Servlets are required.

Download  Chat Server Project Report in Java .