Title Page Recognition

Project Title: Title Page Recognition

Character recognition is constantly a frontier area of study in the field of pattern recognition and image processing. Even though, adequate studies have been performed in foreign scripts like English, Chinese and Japanese characters, simply a very little work can be traced for Indian scripts particularly South Indian scripts like Telugu and Kannada. Telugu is one of the oldest and most popular languages of India. Recognition of these scripts may be a challenging task.

In this project work we would like to identify the titles of the book from the scanned digital image which consists of telugu text and images. The special feature is that, it is designed to handle multiple sizes and multiple fonts. Extracting the information from the images and scanned documents has been classified as a science fiction in the present days.

This project focuses on scanning the front page of the book and saving it as an image. Then the next sequence of steps involves Preprocessing, Segmentation, Feature Selection and Recognition. Once the characters are recognized then they are categorized as Title-name, Author, Publisher etc. 

Technologies to be used:                                              

Operating System                   : Windows

Programming Language          : Java

Commercial OCR packages are already available for languages like English. And Considerable work has also been done for language like Japanese and Chinese. Recently, work has been done for development of OCR systems for Indian languages. Telugu is one of the popular languages of India that is spoken by more than 66 million people especially in South India. Work on Telugu character recognition is not substantial.Recognition of Telugu script is much more complicated because of the use of huge number of combinations of characters and modifiers.Recognition of these scripts may be a challenging task. Basic Symbols are identified as the unit of recognition in Telugu script. Histograms are used for a feature based recognition scheme for these basic symbols.

The main objective of this Title Page Recognition project is to identify the titles of the text books from the scanned digital image which consists of Telugu text and images. The special feature is that, it is designed to handle multiple sizes and multiple fonts. Extracting the information from the images and scanned documents has been classified as a science fiction in the present days. It mainly focuses on scanning the front page of the book and saving it as an image. Then the next sequence of steps involves Preprocessing, Segmentation, Feature Selection and Recognition. Once the characters are recognized then they are categorized as Title-name, Author, Publisher etc. which is useful for easy retrieval and storage.

CONCLUSION

The document analysis and understanding of Indian Languages has been lagging behind the recognition systems for languages like English. And Considerable work has also been done for language like Japanese and Chinese. Recently, work has been done for development of OCR systems for Indian languages. Telugu is one of the popular languages of India. In this work we propose a recognizer for Telugu text, which extracts characters from the scanned image and identifies the title and the author of the respective Telugu books.

We have analyzed Telugu script and their language rules for building a language model for better document understanding. We have explored pattern recognition algorithms for designing feature extraction, classification and post processing mechanisms for recognition of document images.

The further work includes implementation of various algorithms for recognition of titles and authors of Telugu text books in the field of pattern recognition and image processing.

Reference books:

  1. Principles of Digital Image Processing – Fundamental Techniques by Wilhem Burger, Mark J. Burge.
  2. Fundamentals of Digital Image Processing by Anil K.Jain.

Java Mini & Major Projects

Java Mini Projects developed especially for BCA, BTech and MCA students for their academic mini and Major project development under Java, MS Access, Oracle, SQL Server & MySQL. These are below are selected projects.

Java Web Applications Project List – 2019

Sr.No Project Title Output
1 Booking Photographer Video
2 City Life Video
3 E-Magazine  Video
4 E-Tuitions Video
5 Magazine College  Video
6 Event File Automation  Video
7 Learning Portal Video
8 Nirman  website  Video
9 Ship Management System Video
10 Placement Cell  Video
11 Cancer Project Video
12 E-Procurement  Video
13  Project Management System Video
14 knowledge-based community sharing system  Video
15 Offer-Bazar  Video
16 Online-E-Gas Video
17 Income-Tax-Return-Processing  Video
18 Online Staff Leave Management Video
19 Employee-Expense-Management-system Video
20 Exam Seating Arrangement System Video
21 Color Hunt Gaming project Video
22 Online Form Request Video
23 Electronic-Veg-Market Video
24 Puyo Puyo (game project)  Video
25 Magic Bounce Ball  (game project)  Video
26 Satvara Matrimony Video
27 Query Handler  Video
28 Grade Processing System  Video
29 AES–Photo Encryption  Video
30 Image Enhancement  Video
31 Paradarshia Corruption Free Economy  Video
32 Implementation Of Floyd’s Algorithm Video
33 Atm Location Search Video
34 E-Farming Video
35 Time Table Management System Video
36 Admin Mall  Video
37 Bulls-Eye-Quiz Video
38 Smarter Work Management System Video
39 Online Grievance Redressal System Video
40 Real Estate Magicbricks Video
41 Apartment Management System Video
42 Medical shop Management System  Video
43 Security Mail Communicator Video
44 Feedback Analysis Of interviews Video
45 Intelligent Hospital System Video
46 Tender Management System TMS Video
47 Virtual Learning Environment (VLE)  Video
48 Online Loan Application  Video
49 Retail Purchase & Tracking System Video
50 Opinion Mining For Social Networking Sites  Video
51 Project Information System Video
52 Student Friendly College Management System Video
53 Online Book Store Video
54 Sentimental Analysis For Mobile Networks Video
55 Report Generation System Video
56 Feedback Information System Video
57 Health Prediction Management System Video
58 Online Book Review Management System  Video
59 Suspicious Email Detection System  Video
60 Student Monitoring System  Video
61 Online College magazine  Video
62 Sports Event Management System  Video
 63 Restaurant Management System Video
64 Online House Rental Management Video
65 Online Food Ordering & Service Video
66 Online Course Management System Video
67  Online Cab Booking System Video
68  Online College Voting System  Video
69  Cluster Analysis and Disease Mapping Video
70  College Feedback System Video
71 Result Analysis System Video
72 E Plastic System Video
73 E-Banking System Video
74 Assignments and Materials System Video
75 Vehicle Management System Video
76 Recipe Management System Video
77 Online Event Attendance Video
78 Online Parking System Video
79 E-Auction Video
80 Telecom Services Video
81 Airline Reservation System Video
82 E-Waste Application Video
83 Exam Invigilation System Video
84 Library Management System Video
85 Patient Follow Up Video
86 Event Management System Video
87 Career Information System Video
88 E-Gas Sewa Application Video
89  Student Attendance Management System Video
90  Office Level Student Information System Video
91  Online Pharmacy System Video
92  Online Recruitment System Video
93  Credit Card Fraud Detection Video
94  Smart General Library Video
95  Venue Booking System Video
96  A Secure Two-Factor Authentication Scheme Video
97  Selection of Effective Clouds for Data Hosting Services Video
98 Career Analysis System Video
99 Student Performance with graph & Academic Project work Reporting System Video
100 Wedding Event Planner  Video
101 Travel Rating and Exploring System Video
102 Performance Evaluation System Adoption of Opinion Mining Information Video
103 Online Marketplace Video
104 Uni Watch – Web Video
105 Training & Placement Cell Video
106 File Security System Video
107 Social Networking Site Video
108 Campus Recruitment System (Training & Placement) Video
109 Farmers Buddy Video
110 Event Organization System Video
111 Online Doctor Appointment Video
112 Online Survey System Video
113 Secure Web Application for Managing Auction System Video
114 Identification of Diabetes Video
115 College Placements & Assistance Video
116 Online College Bus Record Supervising System Video
117 Online E-Ticket System Video
118 Online E-Voting System Video
119 Student & Faculty Interaction Outside the Classroom Video
120 Automated Retail Management System Video
121 Dynamic Media Management Video
122 Electronic Highway for Singers Video
123 College Election System Video
124 E Police Application Video
125 Student Performance Forecasting Video
126 College Bus Tracking System Video
127 Performance Monitoring in Virtual Organizations Video
128 Review-Based Rating Prediction Video
129 Automation of Exam Invigilation System Video
130 Fast Detection of Transformed Data Leaks Video
131  Employee Tracking System Video
132 College Sentimental Analysis Video
133 Personality Prediction System Through CV Analysis Video
134 Analysis of Users Behaviour in Structured E-Commerce Websites Video
135 Image Encryption and Decryption using BlowFish Video
136 Resource Maintenance and Management Video
137 Watermarking Video
138 Monitoring Fake Product Reviews Video
139 College Bus Facility System Video
140 Software Piracy Prevention Video
141 Tour Guide Video
142 Local Vendor Review System Video
143 Multi-Level Marketing Video
144 Secure File Sharing Video
145 Water Distribution and Management System Video
146 Citizen Card System Video
147 Collaborative Online Tutorial System Video
148 Online Entertainment Portal Video
149 Secure Web Portal for Real Estate & Property Management Video
150 Agile Management System Video
151 Book Repository Management System Video
152 Frame It Video
153 Voice to Text Converter Java Project Video
154 Purchasing Management System Video
155 Telangana Public Services Video
156 Analysis of Persuasive Text Passwords Video
157 Project Review Automation Video
158 Easy Search Guide (Malls) Video
159 Food Wastage Management System Video
160 Food Ordering System Video
161 Stack Management Video
162 Courier Service System Video
163 Campus Recruitment System Video
164 Vehicle Rental Management System Video
165 Automation of Timetable Generation System Video
166 Online Gas Management System Video
167 Obsessive Compulsive Disorder Video
168 Online Leave Management System Video
169 Image Steganography using LSB Video
170 File Tracking System Video
171 Electronic Voting System Video
172 Dynamic Analysis vulnerability to Provide Security In Clouds Video
173 Health Care Logistics Video
174 Car Store Video
175 E-Fuel – Online Fuel Booking Video
176 Hour Wise Lecturers Tracking Video
177 Multi-Hospital System – Online Doctor Appointment Video
178 E – Voters Application Video
179 Repository Application Video
180 Student Information Chatbot System Video
181 Student Help Desk Video
182 Online Student Mentoring System Video
183 Placement Information System Video
184 Hostel Management System Video
185 News Report Video
186 Dance Studio Video
187 Passenger Vehicle Management System Video
188 Automatic Question paper Framer Video
189 Development of Learning Management System Video
190 Online Bouquet Store Video
191 E Approval System Video
192 Online University Voting System Video
193 Automatic Exam Seating Arrangement System Video
194 Advanced Query Management System Video
195 Urban Spoon Video
196 Development of Online College Yearbook Video
197 Predicting user behavior through sessions using the web Mining Video
198 Digital WaterMarking Techniques Video
199 Age Group Classification in Social Networks using Deep Learning Video
200 Securing data in Image & Audio Files using Steganography Technique Video
201 Computerized Examination Management System Video
202 Scalable Architecture for Multi-User Encrypted SQL Operations Video
203 Mental Disorder Detection on Social Networks Video
204 Resource-aware hybrid scheduling algorithm in the heterogeneous distributed computing Video
205 Secure File Storage on Cloud using Hybrid Cryptography ( AES, DES, RSA) Video
206 Data Mining for Sales Prediction in Tourism Industry Video
207 A Secure Approach For Data Hiding Using Visual Cryptography (Image Split, Encryption and Decryption) Video
208 Classification and Detection of Abusive and Insulting Content in Social Media Video
209 Data Security In Cloud Computing Using Two Way Handshake Method Based On Token Management Video
210 Web Application For Conducting University Examination Video
211 Student Performance Prediction via Online Learning Behaviour Analytics Video
212 Faculty Management System Video
213 Online Medicine Donation System Portal Video
214 Indian Wildlife Java Project Video
215 Employee Attendance Monitoring System Video
216 House tax Billing System Video
217 Online Meeting With Clients Video
218 Online Voting System Video
219 Construction Management System Video

 JAVA Projects (Non-IEEE, Web Based, Window Based) – 2018

S.No Project Name Demo
1. Ad Express Management System  Video
2. Finance Management System  Video
3. Credit Card Approval System  Video
4. Computer Telephony Integration System  Video
5. Computer to Computer Learning System  Video
6. Conversation Portal  Video
7.  Logic Gates Java Project  Video
8. Crime File Management  Video
9. Hotel Management System  Video
10. Automotive price Aggregator  Video
11. Blood Donors Symbiosis  Video
12. College Fest Organizer  Video
13. College Management Information System  Video
14. Communication System  Video
15. Computerization of Bluebook/ Online Quiz  Video
16. Computerized Mobile Store Management System  Video
17. Digital Signature  Video
18. Hotel Management System  Video
19. Multi Banking System  Video
20. Digital Tunes  Video
21. Optimal service pricing for a cloud cache  Video
22. Library Management System  Video
23. Crime Records Management System  Video
24. Insurance Management System  Video
25. Friends Meeting Point  Video
26. Student Management System  Video
27. Travel & Tourism Management System  Video
28. E-Compiler for Java with Security Editor  Video
29. Stock Analyzer  Video
30. E-Shopping  Video
31. E-Voting System  Video
32. Enterprise Scheme Planner and Monitoring System  Video
33. E School  Video
34. E Wheelz  Video
35. Congestion Control Using Network Based Protocol  Video
36.  Car Pooling System Java Project  Video
37. Country Cargo and Express Couriers  Video
38. E-Classifieds  Video
39. Distributed Account Management for Prepaid Mobile Services  Video
40. Car Collection for Sale  Video
41. Bug and Component System  Video
42. Bug Tracker System Video
43. Coach Management System  Video
44. Auto Spare parts Java Project Video
45. College Library Record Application  Video
46. Consignment Tracking Services  Video
47. Activity Management System  Video
48. Audio Stenography  Video
49. CRM for Airline Industry  Video
50. Error Tracking System  Video
51. Exam Suite System  Video
52. File Security System  Video
53. Fetch Hard – Component Retrieval System of a PC Video
54. Bug Tracking for Improving Software Reliability  Video
55. Cyber Cafe Management  Video
56.  RSS Feed Reader  Video
57. Ezee Mail System Video
58. Gateway to Gateway Protocol Video
59. Database Manager Video
60. Human Resource Management System Video
61. Image Enhancement Technology Video
62. Image Steganography  Video
63. Increasing Efficiency in Wireless Network Video
64. Image Transport Protocol ITP Video
65. Instant Messenger Video
66. Interest Calculation Video
67. Intra Communication System  Video
68. Inventory Analyzer Video
69. Inventory Management System Video
70. Issue Tracking System Video
71. JChat Video
72. Job Miller  Video
73. Defect Tracking System Video
74. Audio Cryptography System  Video
75. Product Service Management System  Video
76. Auto Mobile Store and Service  Video
77. Ambulance Service Provide  Video
78. Automatic Database Schema Generation  Video
79. An Intelligent Network Backup  Video
80. Digital Image Processing System  Video
81. Knowledge Storm  Video
82. Emergent Request Dispatcher  Video
83. E-Zest Resorts for U  Video
84. Monitoring Online Tests through Data Visualization  Video
85. Data Transmission Using Multi-Tasking-Sockets Video
86. Doctor Patient Tracker  Video
87. Data Hiding in Audio Files  Video
88. Mobile Service Provider Operations Portal  Video
89.  Online Doctor  Video
90. Multi User Chat System Video
91. Network Routing System  Video
92. Online Examination  Video
93. Automation of Interview Scheduling Process  Video
94. Library Management System (Standalone application)  Video
95. Mobile Station Java Project  Video
96. Lending Tree System  Video
97. Library Management  Video
98. VAT Information System  Video
99. Material Management and Information System  Video
100. Government in Action  Video
101. Online Payment Service  Video
102. Order Processing System for Student Music Store
103. Pesticides Information System  Video
104. Property Management System
105. Resource Out-Sourcing  Video
106. Resource Planner  Video
107. Resource Supervision Management  Video
108. SDLC Management System  Video
109. Secured Data Transmission  Video
110. Shopping Cart
111. Online Shopping Cart  Video
112. Simulation of Ant colony Algorithm  Video
113. Speed Age Courier System  Video
114. Traffic Controller System  Video
115. Vehicle Management System  Video
116. Virtual Information System for Audit Group
117. E School  Video
118. Work to Worker Services to Unorganized Sector  Video
119. Broad walk Dealers Network
120. College Administrator Tool/ College Enrollment System  Video
121. College Interact
122. College Management Tool
123. Comparable Entity Mining from Comparative Questions  Video
124. Complaint Management System
125. Computer Retail Store and Maintenance
126. Computerized Examination Management Tool
127. Concurrent Train Simulation  Video
128. Congestion Control Using Network Based Protocol
129. Corporate BPO Solution Management
130. Corporate Leave Management System  Video
131. Corporate Recruitment System (CRS)
132. Cyber Shopping  Video
133. Data Centric Knowledge Management System (DCKMS)  Video
134. Event Tracker
135. DHL Courier System
136. Distributed DBA  Video
137. Distribution Business Automation System  Video
138. EAMCET Mock Counseling  Video
139. Face Identification  Video
140. EzHotels  Video
141. Graphic Media Player  Video
142. Employee Transaction Scenario
143. Hospital Management System  Video
144. Hostel Management Information System  Video
145. FAQ-O-Matic System  Video
146. Get Your Campus
147. Internet Banking  Video
148. Multi-Sensor Railway Track Geometry Surveying System  Video
149. Online Examination
150. Webs Eye
151. Stenography Using Image, Audio & Video  Video
152. Visa Processing Information System  Video
153. University Admission System
154. Telecom Connection System
155. Medi Tracker
156. Travel Management System
157. Online Railway Reservation System
158. Airline Reservation  Video
159. Travel Desk Management System
160. Alumni Information Database  Video
161.  Remote Desktop Administration  Video
162. Health Center Management system  Video
163. Payroll System
164. Self-Diagnosis with Advanced Hospital Management Video
165. 108 – Public Health Emergency Services
166. Water Marking
167. Intranet Chatting  Video
168. Online Banking  Video
169. Net Banking
170. Gateway Of Business Portfolio
171. Distributors Channel Management System
172. Online Doctor
173. Online Mobile Recharge Video
174. Patient Management System
175. Online Order Processing System (AJAX Enabled)
176. Virus Information System
177. Peer to Peer File Sharing Program  Video
178. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net  Video
179. Telecom Business Information System
180. Online Telephone Management System
181. Online Tourism Guide Video
182. Online Taxicab Service
183. Online Registration For Voter Card
184. Safe Internet  Video
185. Mobility Management Approaches for Mobile IP Networks  Video
186. Local Service Center
187. Reseller Management System
188. Re-Ordering Of Packets Using Retransmission Timer
189. Online Crime Investigation
190. Revenue Collection and Recovery Services
191. E-education Video
192. Exam Branch Management System  Video
193. Home Improvement System  Video
194. Value Added Sales Tax Information System
195. E dues (E Billing System)  Video
196. Content Management System  Video
197. Train Information System  Video
198. Enterprise Resource Information System  Video
199. Global Interactive Solutions  Video
200. Global Communication Media
202. Hotel Management System Video
204. Retail-Management-System Video
205. Painting Application Video
206. Social Health Care Record Video
207. Reversible Watermarking Video
208. Audio Cryptography System Video
209. Monitoring Online Tests through Data Visualization Video
210. Alumni Management System Video
211. Product Service Management System Video
212. ATM Location System Video
213. Work in Progress Application Video
214. Chores Made Easy Video
215. E-Procurement Video
216. Emotion Detection Video
217. Institutional Infrastructural Information System Video
218. Placement Cell Video
219. Project Management System Video
220. Query Handling Video
221. Timetable Generation System Video
222. Online Staff Leave Management Video
223. PLACE Personal Learning Assistance Center Video

Office Correspondence and Auto Questionnaire Java Project

INTRODUCTION

GENERAL: Office correspondence and auto questionnaire java based project are developed as per the requirements of the mechanical department.

OFFICE CORRESPONDENCE

Mechanical department deals with the different type of letters. The letters which are received by the mechanical department are incoming letters and the letters which are sending through the department are the outgoing letters.

The different types of letters received and sent by the mechanical department are as follows:

  • Local letters
  • Headquarters letters
  • Others


office correspondence

LOCAL LETTERS

The letters received from and send to other departments of Vijayawada division are termed as local letters.

INCOMING LOCAL LETTERS

The letters received from other departments of Vijayawada division are termed as incoming local letters.

OUTGOING LOCAL LETTERS

The letters sent to other departments of Vijayawada division are termed as outgoing local letters.

HEADQUARTER LETTERS

Secundrabad division is headquarters of the Vijayawada division. So the letters received from and send to Secunderabad division are termed as headquarters letters.

INCOMING HEAD QUARTER LETTERS

The letters received from Secunderabad division are termed as incoming head quarter Letter.

OUTGOING HEAD QUARTER LETTERS

The letters sent to Secunderabad division are termed as outgoing headquarters Letters.

OTHERS

The letters received from and send to the divisions other than Vijayawada and Secunderabad are termed as other letters.

INCOMING OTHER LETTERS

The letters received from the divisions other than Vijayawada and Secunderabad are termed as incoming other letters.

OUTGOING OTHER LETTERS

The letters sent to the divisions other than Vijayawada and Secunderabad are termed as outgoing other letters.

If the reply for the above letters is to be given immediately then those letters are marked as demi official letters.

So different types of demi official letters can be

  • Incoming Local demi official letter
  • Outgoing Local demi official letter
  • Incoming Head quarters demi official letters
  • Outgoing Head quarters demi official letters
  • Incoming Other demi official letters
  • Outgoing Other demi official letters

All the incoming letters are received by the chief office superintendent and are marked to different sections of the mechanical department with the authorized signature of the senior divisional mechanical engineer. Then the respective task is performed by section accordingly to the letter which is received by it and sends the reply to the chief office superintendent. Then the chief office superintendent with authorized signature of the senior divisional mechanical engineer sends the letter as an outgoing letter.

The mechanical department consists of seven sections.

  • Contract/tenders
  • Carriage & wagon staff
  • General/pass
  • Rolling stock
  • Stores
  • Budget
  • Power

AUTO QUESTIONNAIRE

The test to avail the promotion is conducted for the employees of the Vijayawada division. The question bank offered to the employees for preparation comprises of the following type of questions.

  • Long answers
  • Short answers
  • Fill in the blanks
  • Multiple choices
  • Expansions

auto questionnaire

STATEMENT OF THE PROBLEM 

OFFICE CORRESPONDENCE

To maintain the details of different types of letters, to show the status of the letter and also to generate the reports. 

AUTO QUESTIONNAIRE

To maintain the questions and to generate the questions randomly when appropriate type of question is selected.

EXISTING SYSTEM

OFFICE CORRESPONDENCE

In the existing system, the details of the letter are being maintained manually by entering different types of letters in different books. To know the present status of the letter, it is very difficult in the existing system because one has to verify all the entries in that particular book. So it is time-consuming. 

AUTO QUESTIONNAIRE

In the existing system, question paper is set manually by selecting the type of questions from the printed question bank. It is very difficult and time-consuming to set question paper manually because when selecting a question one has to verify whether it was previously given or not.  One has totally the maximum marks for which paper was given and marks allotted for each question and he should also consider the choices for each type of question.

PROPOSED SYSTEM 

OFFICE CORRESPONDENCE

The proposed System is a web-based application. It maintains details of all the letters within the mechanical department. The present system shows the pending letters and reports. 

AUTO QUESTIONNAIRE

In the proposed system the question paper is set automatically by selecting random questions when an appropriate number of question type is selected.

OBJECTIVES OF STUDY 

OFFICE CORRESPONDENCE

  • Automating the manual work.
  • To generate the status of the letter
  • reminder  provision for pending letters

AUTO QUESTIONNAIRE

  • To generate the question paper quickly from the available database.         

REQUIREMENT ANALYSIS   

FUNCTIONAL REQUIREMENTS

OFFICE CORRESPONDENCE

  • The user can add the details of all the letters into the database and view the pending letters.
  • The authorized user can edit the details of the letters and delete the letters from the database.

AUTO QUESTIONNAIRE

  • The authorized person can add, delete and update the questions in the database.

SYSTEM DESIGN SPECIFICATION 

SOFTWARE REQUIREMENTS

Operating system: Windows XP professional

Programming Language: JAVA

Web Technology J2EE (JDBC, Servlets, JSP, HTML)

Browser: Internet Explorer

Web application serverApache Tomcat

Model Design: Rational rose

IDE: Net Beans 6.7.1

Data Base: Oracle 10g, MS Access. 

HARDWARE REQUIREMENTS

Processor: Intel p4

RAM: 256MB RAM

Hard disk: 20GB or more

Required Software’s:

  • Oracle 9i
  • Java
  • Netbeans 6.7.1
  • Mozilla Firefox

Instructions to Deploy:

1. Install the required software’s
2. Open Netbeans and open the project from source code
3. Configure database connections from DBConn package of Source Packages under the root PPO & Technical
4. Right click on CreateTab.java under Test Packages under the root PPO & Technical and click on run
5. Right click on root and click on run

Note: In case of reference problems right click on root and click on resolve reference problems, and select the library files.

Output Screens:

  • Homepage in office correspondence
  • Selection of letter type in office correspondence
  • Reports generation using a serial number in office correspondence
  • Report generation using by date in office correspondence
  • Report generation using between dates in office correspondence
  • Report generation using marked in office correspondence
  • Report generation using received from in office correspondence
  • Report generation using send to in office correspondence
  • Report generation using general in office correspondence
  • Report generation using remainders in office correspondence
  • Pending letters in office correspondence
  • Editing of the letter in office correspondence
  • Login page for deleting the letter in office correspondence
  • Letter deleted successfully in office correspondence
  • Login page in the auto questionnaire
  • Operations on question bank in the auto questionnaire
  • View of multiple choice questions in the database
  • Default question paper in the auto questionnaire
  • Question generator in the auto questionnaire
  • window to open or cancel generated question paper in the auto questionnaire
  • Generated question paper opened in MS word in the auto questionnaire

CONCLUSION 

The primary goal of this project is to reduce the work which is being done manually. By maintaining the details of all the letters in the database we view the letters based on different fields such as serial number, marked to, date and so on. The letters which are pending can be viewed easily and the remainder is generated. Editing and deleting the details of letters is also possible.

The question paper is being generated by selecting the questions randomly from the database. We need to mention the maximum marks and the type of question. Creation of our own template is also possible. This system is very user-friendly.

SCOPE 

The application i.e., office correspondence which we developed is a standalone one i.e., within the department we can use. The letters are received in paper format and then they are saving them in the database. Due to this time gets wasted. If we develop a web-based application the letters received by the department are sent through emails then a lot of time gets saved.

Download Office Correspondence and Auto Questionnaire Java Project Code

Online Examination System in J2EE

The manual procedure for conducting examination is a time consuming process and error prone due to human limitations. The existing automated system has been facing certain limitations like not having the ability to view the unanswered questions for the student reference. This system is an enhancement to the existing system covering some of its limitations.

STATEMENT OF THE PROBLEM:

The purpose of this project is to develop Online Examination System, used to test the Technical & Non Technical knowledge of the students in the college. Here only registered students must be allowed to write the online test.

Existing System:

The manual procedure for conducting examination is a time consuming process and error prone due to human limitations. The existing automated system has been facing certain limitations like:
• Answers validation being done at client side. Answers are reaching the client as soon as he starts the exam and hence hacking is possible.
• Difficult to check unanswered questions quickly.

Online Examination System

Proposed System:

This system is an enhancement to the existing system covering some of its limitations. The proposed system has advantages like:
• Validation at server side. No possibility of answers through cookies.
• Provides option to separately view the unanswered question ids.

Objectives of Study:

• Enhance it with server side validation
• Refreshing the database by removing the question bank when the exam is over.
• User friendly environment to view the unanswered question ids.

REQUIREMENT ANALYSIS:

We are overcoming the direct disclosure of answers by server side validation.
Functional Requirements
This section describes the functional requirements of the system for those requirements which are expressed in the natural language style. They are as follows:
• Repetitive questions not to be allowed.
• Student should be able to scroll through the paper.
• They should be able to view the unanswered questions.
• They should be able to view results online.
• Questions should be randomly retrieved.

SYSTEM DESIGN SPECIFICATIONS

SOFTWARE REQUIREMENTS:

Operating system : Windows Xp professional
Programming Language : JAVA
Web Technology : J2EE (JDBC, Servlets, JavaScript, JSP)
Browser : Internet Explorer
Web application server : Apache Tomcat (also supported by Glassfish)
IDE : Net Beans
Model Design : Rational rose
Database : MySql

HARDWARE REQUIREMENTS

Processor : Intel Pentium core to duo.
RAM : 2GB RAM(preferable)
Hard disk : 80GB or more

Pages Created for this Project:

  1. Admin/Student Login Page
  2. Student Registration Page
  3. Student Profile page
  4. Student Change Password Page
  5. Student Exam Paper
  6. Admin Home Page
  7. Admin View Profile Page
  8. Create User Page
  9. Delete User Page
  10. Admin Change Password Page
  11. Exam Paper Posting Page
  12. Admin/ Student Log Out Page

CONCLUSION:

The primary goal of this project is conduction of online exam. This system is very user friendly. It also has user friendly features like getting the unanswered questions. This requires an optimal space in the database as the question bank is cleared once for every subject. So there us no unnecessary loss of the memory space due to extensive tables. This project is session managed which expire after the administrator logs out. It provides separate privileges to the administrator and the student. This project is successfully completed by including all the specified features. Our project team worked hard with the help of our guide and ensured its completion. At last we can conclude firmly that the entire project is completed as per the stated requirements.

SCOPE:

This project has a wide scope for development by including some extra features such as we can provide the administrator with the capability of the setting the required number of questions. We can randomize the options of the question paper. Our question paper can be modified in such a way that one question can be displayed at a time. The unanswered feature also can be enhanced such that on clicking the question number we can directly be redirected to the intended question. The question bank can be subjected to standard encryption techniques to maintain security.

Automation Of Faculty Profile And Student Attendance

Statement of the problem

The Automation Of Faculty Profile And Student Attendance project mainly focuses on the total computerization of faculty details and student attendance in which different levels of users are restricted to access the database at different places. By restricting, we can make the faculty to access the data but they can’t modify or update the database of other faculty details and attendance of students entered by another faculty, and other information etc.This project mainly operated by two modules mainly Faculty and administrator. 

Existing System:

The existing system refers to the system that is being followed till now. In the existing system, the student attendance and faculty details are entered manually in books or files. Here the information is maintained and manipulated by the corresponding faculty or the administrator.

In this system, if we want to track the faculty details or student attendance then the corresponding faculty has to check those details manually which consumes a lot of time. At some time the details of faculty need to be updated.

The system is not at all complete system because of it not capable of producing the desired output. For example in this system, if we require the attendance of a student during a semester, then it is difficult to retrieve the information at a single glance of the system. It requires some amount of time to produce that result.

Fig: Application Login Page

Drawbacks of Existing System:

  • Lack of security of data.
  • Time-consuming.
  • Consumes a large volume of paperwork.
  • More manual work
  • There is no security for data
  • Does not provide round the clock service

PROPOSED SYSTEM:

The proposed system is the automation of faculty profile and student daily attendance by replacing the existing system of manually entering the details in files. Here all the information is present in the system. At any time the user can access the information from the database which is easier and simple when compared to the existing system.

Here the faculty will enter his details, the student attendance, and marks in the system. Faculty can update his profile details any time in the system by entering his username and password. When any users require the details of faculty or student attendance information he can access them but he cannot modify them. Only the administrator will modify or update the information on the system. If faculty forgets his password then the administrator can reset it. Both administrator and faculty can modify the details of respective faculty.

Fig: Faculty Profile Page

This system overcomes the drawbacks of the already existing system. So if we replace the existing system with the proposed system it will be very useful to track the information of faculty in any department of the College.

The Automation Of Faculty Profile And Student Attendance project is successfully completed by including all the specified features, our project team worked hard with the help of our guide to develop the system in such a way that we can retrieve information in all dimensions. At last, we can say firmly that the entire project is completed as per the stated requirements.

Sequence Diagram for Staff Registration:

Interaction Diagram for Registration of new faculty

Sequence Diagram for faculty details update:

SCOPE

This Student Attendance project has a wide scope for development by including some extra facilitated tools such as we can use biometric tools for department attendance calculations. We can develop this system in such a way that we can generate the reports in the required fashion.

The database used here can be replicated in the alumni by just eliminating the old student records, we can include this. We can develop the client-side application by creating more number of facilities to him such as interacting with the concerned officials of the department.

We can include the module such as face recognition. When we click on the photo of a particular student the system automatically will show the details of the student. By this procedure, we can track all the students without knowing his name and number and just by recognizing his face.

Hardware Specifications:

Processor: Intel Pentium IV or later

RAM: Minimum 512MB RAM

Secondary Storage: 80GB or more

Software Specifications:

Operating system: Windows XP or later

Programming Language: Java

Web Technology: JDBC, Servlets, JavaScript, JSP

Browser: Microsoft Internet Explorer

Web application server: Apache Tomcat

Model Design: Rational rose 7

Download Automation Of Faculty Profile And Student Attendance Project source code and Database

Planning & Technical Management System in Java

The manual procedure for interaction between the PPO users and the other users in ELS (Electric Loco Shed) is prone to certain limitations.  The existing system has been facing certain limitations like communication gap between various departments of ELS and maintaining the details manually which is a time-consuming process. So, it is becoming very difficult to maintain the Loco information, its Schedule, its Failures and the time to time communications between the departments.

To Overcome these drawbacks The Proposed system is an enhancement to the existing system covering some of its limitations by automating the process. The PPO which maintains the information of the Locos, Schedules the Locos, Assigns the work to different departments, Finds the repairs and all other work is computerized. This general introduction includes the scope of the system.

Home page of Planning & Technical Management System

SCOPE OF SYSTEM

  • View all the details regarding the Locos.
  • Maintain all the details regarding locos like a loco number, loco schedule.
  • Maintain the Loco failure details.
  • Activities like the update, deletions, and creations done in the system by the developer in future.

PURPOSE OF THE SYSTEM

The main aim of the Planning & Technical Management System project is to reduce the paperwork and duration of work process and to maintain the data of Electric Loco Shed efficiently the maintenance of all details is undergoing manually in the existing system. So it is becoming very difficult for the communication between the various departments of ELS and also to maintain & refer to the Loco information.

To overcome these drawbacks, computerizing the details of the Locos related to a particular Electric Loco Shed is needed. So this system is built to access the information of the loco in an easier way. The system also provides information regarding the staff attendance so that the top management can have an easy way to handle the staff members’ regularity.

EXISTING SYSTEM

The existing system is entirely being operated manually. All the registers are being maintained in hardcopy files, which is quite difficult to maintain and harder to access. It is very much time consuming and requires a lot of requisites for the information to be passed from one department to another department. And in case of replacements, if spares are not readily available, tenders are being issued so as to opt for the best quote that is obtained which is more cost efficient. Also, there is a possibility of encountering errors due to the human intervention.

PPO Department Work Description Page

PROPOSED SYSTEM

The proposed system is the computerized version of the existing system wherein all the files are digitized and stored in a database which can be accessed by only privileged users. Information regarding any worker or a loco can be instantly known at any time. Our proposed system also enhances security by maintaining the digital signatures of workers who work on a particular loco for future reference. The communication between the users of different departments is made very easier in the system.

OBJECTIVES OF STUDY

  • Maintaining digitized data for easier access.
  • Remote access to data for all the departments of ELS.
  • User-friendly environment to get the required information. 

REQUIREMENT ANALYSIS 

FUNCTIONAL REQUIREMENTS

This section describes the functional requirements of the system for those requirements which are expressed in the natural language style. They are as follows:

  • Automate tedious manual work.
  • Automatic alert provision for task completion on locos.
  • They should be able to view the required reports related to locos.

NON-FUNCTIONAL REQUIREMENTS

  • Performance: The completely separate business logic at the server side from the user interface ensures good performance.
  • Interface: the User interface is web browser based. The client-side user interface is developed using HTML and JSP.
  • Usability: This section includes all of those requirements that affect usability. It will be very easy to use for the naïve user.
  • Supportability: Choosing Java platform makes this system cross-platform independent.
  • Reliability: The system is more reliable as it inherits the Java platform qualities.

SYSTEM REQUIREMENTS AND SPECIFICATIONS 

SOFTWARE REQUIREMENTS

Operating System: Windows XP Professional

Programming Language: JAVA

Web Technology: J2EE (JDBC, JavaScript, JSP, HTML)

Browser: Mozilla Firefox

Web application server: Apache Tomcat 6.0

Model Design: Rational Rose

Data Base: Oracle 9i

IDE: NetBeans 6.7.1 

HARDWARE REQUIREMENTS

Processor: Intel P4/AMD Athlon

RAM: 256MB RAM

Hard Disk: 20GB or more

Output Screens of the project:

1 The home page of Planning & Technical Management System
2 Login page for all departments
3 Daily Schedule Page
4 Loco Schedule Update Page
5 Loco Important Parts Update Page
6 View Loco History Page
7 PPO department Work Allotment Page
8 PPO Department Work Description Page
9 General Work Allotment View Page
10 Sectional Work Allotments Page
11 Sectional View Work Page
12 Staff Description Page
13 Attendance Report Type Selection Page
14 Daily Attendance Report of the whole Department
15 Monthly Attendance Report of the whole Department
16 Daily Attendance of Individual Staff Member
17 Monthly Attendance Report of Individual Staff Member
18 Yearly Report of Individual Staff Member

Conclusion:

The primary goal of this project is to computerize the entire process being done in the Electric Loco Shed (ELS/BZA) and provide instant access to the work that is being carried out in various departments to the authorities. It further aims at providing a digital database of all the records that are currently being stored in hard copies. This is all done with user-friendly GUI and easy to understand functionalities.

The project has been successfully completed by including all the specified features. Our project team members worked hard with the help of our guide to develop the system in such a way that we can retrieve information in all dimensions.  We can confirm that the entire project has been completed as per the stated requirements.

Download Planning & Technical Management System Java Project Source Code and Database.

Automation Of Stationery Shopping Center Java HTML Project

The Automation Of Stationery Shopping Center Java HTML Project is a web based application intended to online for customer. The main objective of this application is to make it interactive and its ease of use. It would make searching, viewing and selection of a product easier. It contains an easy search methods for users to search item specific target their needs. The search engine provides an easy and convenient way to search for products where a user can Search for a product interactively and the search engine would treat the products available based on the user’s input. The user can view the complete detail of each product.

Automation Of Stationery Shopping Centre Modules overview:

 

The application also provides user can add a product to the shopping cart (push cart) by dragging the item in to the shopping cart. The main emphasis lies in providing customer to order item in easy way by using add to cart or select one item .The system generate receipt for the customer when successfully order item .

The Admin have many privilege in the system, such as delete, update item detail, create account for sales person, search item, view comment and view report . The sales person also have privilege such as register item, generate receipt, view comment  ,view order and add advertisement.

The customer also have privilege such as search an item and order item. In this system unauthorized access and data is not allowed, the system can display error message when the user enter incorrect input and not give permission of transaction for customers who have no account number or insufficient balance.

So we develop online selling and buying transaction for Shop canter for customer who lives around that shop centre and generate advertisement for items which price is discount and when new item is registered.

Virtual Desktop Project in Java Abstract

This is the Virtual Desktop Project in Java which facilitates learning electronically. This virtual Desktop Environment project is developed with aim to provide learning electronically. This Project is developed for the electronic learning for Training Institutions. This project makes use of cheap communication media Internet. The one of the advantage of using this project is it makes use of Internet. This product can use for On-line Trainings and On-line Seminars. It makes the institutions to provide quality of education to the door steps. It avoids unnecessary infrastructure and unnecessary time. It makes Trainers available 24/7 if required. This incorporates the global people under one umbrella; they can share the knowledge by sitting at their desktops. 

Features of Virtual Desktop Environment: 

The Virtual Desktop Environment is a virtual e-learning environment. The software is positioned as a full-featured, web collaboration and training environment that has the capability to be used in training .The service is available worldwide.

Video capability of VDE allows you to show live views of instructor (if they have web cams). You can turn the video on and off as desired. You can have up to two video cameras showing in a single interaction. 

Main Modules of virtual desktop project:

Client (Student) Module:  In this application client is student who can access trainer by online using this module. Student can hear trainer voice and view desktop screen. 

Admin Module: Admin will act as mediator between student and trainer. Student and trainer registration details can be accessed by admini. 

Trainer Module:  Using this module trainer can communicate with student and share desktop screen and have voice communication.

SDLC Management System Project in Java

 Project titled SDLC  management system is a management software designed to manage invoice and billing system for organizations. This application is developed in java programming language using mysql database. 

SDLC Management System Project in Java

Project overview:

             In order to manage customers tracking details and quality of service fo any organization we need a time tacking system which will track customers orders and delivery in given time..etc. In order to manage this type of works this application will be useful.

               This software fulfils all requirements which are required for any software company. We can develop this software in any other language here we used java as front end language. We can add more modules based on user requirements.

 Existing System & Disadvantages:

             In existing system tracking and invoicing is based on paper work. We need employees to mangae all records. In this system it will be hard to track old records and search exisitng records in short time. 

Proposed System & Its Disadvantages

Proposed SDLC model is based on software platform where a single user can mange tracking, invoice ..etc work. Details are stored in database, it will be easy to track records and update records. Admin can look after different works using features available in software.

Modules Description 

The system is proposed to have the following modules:

  • Admin : Admin can add projects to the application using his id and password.
  • Analyst :  analyst will look after client requirement for designing SRS. He will have unique registration details.
  • Client 
  • Designer  
  •  Developer  
  • Tester

Java Available Projects (IEEE)

Welcome to Available 2007, 2008, 2009, 2010, 2011,2012 and 2013 Java based projects.

Contact us for buying single / bulk java projects.

  1. A Clustering Algorithm For Data Mining Based On Swarm Intelligence
  2. A Competitive Study of Cryptography Techniques over Block Cipher
  3. A Competitive Study of Cryptography Techniques
  4. A Decentralized Service Discovery
  5. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
  6. A Distributed Control Law for Load Balancing in Content Delivery Networks
  7. A Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network Systems
  8. A Dual Framework and Algorithms for Targeted Online Data Delivery
  9. A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks
  10. A Fast Cluster ing-Based Feature Subset Selection Algor ithm for High Dimensional Data
  11. A Framework for an Adaptive Intrusion Detection System
  12. A Fuzzy Self-Constructing Feature Clustering Algorithm for Text Classification
  13. A Gaussian Derivative Based Version Of Jpeg For Image Compression and Decompression
  14. A Generic multilevel architecture for time series prediction
  15. A Genetic Programing Approach to Record Duplicaton
  16. A Geometric Approach To Improving Active Packet Loss Measurement
  17. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
  18. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
  19. A machine learning approach for identifying disease-treatment relations in short texts
  20. A Memory Learning Framework for Effective Image Retrieval
  21. A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Los
  22. A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
  23. A New Algorithm for Inferring User Search Goals with Feedback Sessions
  24. A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
  25. A New Operational Transformation Framework for Real-Time Group Editors
  26. A Novel Association Rule Mining Mechanism in Wireless Sensor Networks
  27. A Novel Secure Communication Protocol for Ad Hoc networks [SCP]
  28. A Permutation Based Algorithm to Optimally Reschedule Trains in a Railway Traffic Network
  29. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
  30. A Precise Termination Condition Of The Probabiistic Packet Marking Algorithm
  31. A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
  32. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
  33. A Review of the Applications of Agent Technology In Traffic and Transportation Systems-Project
  34. A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
  35. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
  36. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
  37. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
  38. A Semantically Enriched Clinical Guideline
  39. A Signature based indexing Method for Efficient Content-Based Retrieval of Relative Temporal Patterns
  40. A Stochastic Approach To Image Retrieval Using Relevance Feedback And Particle Swarm Optimization
  41. A Stochastic Model to Investigate Data
  42. A Survey of Payment Card Industry Data Security Standard
  43. A System to Filter Unwanted Messages from OSN User Walls
  44. A Trigger Identification Service For Defending Reactive Jammers In Wireless Sensor Network
  45. Access Policy Consolidation For Event Processing Systems
  46. Achieving Network Level Privacy in Wireless Sensor Networks
  47. Active Source Routing Protocol For Mobile Networks
  48. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
  49. Adaptive QoS for Mobile Web Services Through Cross Layer Communication
  50. Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
  51. Always Acyclic Distributed Path Computation
  52. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
  53. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
  54. An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Net
  55. An Efficient and secure self organized key mamnagement
  56. An Efficient Association Rule Mining Algorithm In Distributed Databases
  57. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
  58. An Efficient Paging Scheme for Terminal Mobility Using Personal Mobility Management Information in Interworked Fixed and Mobile Networks
  59. An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay- Based IEEE 802.16 Networks
  60. An SSL Back-End Forwarding Scheme in Cluster-Based Web Servers
  61. Analysis on Credit Card Fraud Detection Methods
  62. ANEW Aalgorithm
  63. Application of BPCS steganography to wavelet compressed video
  64. Architecting a Secure Enterprise Data Sharing Environment to the Edge
  65. Attribute-Based Encryption With Verifiable
  66. Audio Cryptography System
  67. Authorization Recycling In Distributed Systems through Discovery Service
  68. Automatic Database Schema Generation
  69. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
  70. Automatic Discovery of Association
  71. Autonomy-Oriented, Self-Equilibrium Routing Model in Traffic Networks
  72. Back End Communication Management System in Distributed Network
  73. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
  74. Bandwidth Recycling in IEEE 802.16 Networks
  75. BINRANK Scaling Dynamic Authority-Based Search Using Materialized Sub Graphs
  76. Buffer Sizing for 802.11 Based Networks
  77. Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
  78. Call-Stack Coverage for GUI Test Suite Reduction
  79. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  80. Capturing Router Congestion and Delay
  81. Carving and Replaying Differential Unit Test Cases from System Test Cases
  82. Catching Packet Droppers and Modifiers in Wireless Sensor Networks
  83. CCD A Distributed Publish OR Subscribe Framework for Rich Content Formats
  84. Client Side Load Balancer using Cloud
  85. CLOSENESS A New Privacy Measure for Data Publishing
  86. Cloud Computing for agent Based Urban Transportation systems
  87. Cloud Data Protection for the Masses
  88. CloudMoV Cloud-based Mobile Social TV
  89. Cloud Computing Security
  90. Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
  91. Clustering with Multi-Viewpoint based Similarity Measure
  92. Super Resolution based Inpainting
  93. Collaboration in Multicloud
  94. collaborative filtering using dual information sources
  95. College Attendance System
  96. Colleges and Students Information System
  97. Comparable Entity Mining from Comparative Questions
  98. Computation-efficient Multicast Key Distribution
  99. Conditional Shortest Path Routing In Delay Tolerant Networks
  100. Confucius A Tool Supporting Collaborative Scientific Workflow Composition
  101. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates
  102. Continuous Data Protection using struts frame work
  103. Continuous Monitoring of Spatial Queries in Wireless Broadcast
  104. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation
  105. Cooperative Provable Data Possession for Integrity Veri fication in Multi-Cloud Storage
  106. Costing of Cloud Computing Services A Total Cost of Ownership Approach
  107. Coupling-Based Structural Metrics for Measuring the Quality of Software
  108. Cross-Layer Design for Wireless Networks
  109. Crowd sourcing Predictors of Behavioral Outcomes
  110. Cryptographic Versus Trust-Based Method For Manet Routing Security
  111. Cut Detection in Wireless Sensor Networks
  112. Data Leakage Detection
  113. DECOR A Method for the Specification and Detection of Code and Design Smells
  114. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
  115. Delay Analysis and Optimality of Scheduling
  116. Delay-Based Network Utility Maximization
  117. Demonstration of Secure Socket Layer
  118. Design a Guard System for Sybil Attack
  119. Design and Implementation of TARF  A Trust-Aware Routing Framework for WSNs
  120. Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks
  121. Designing Less-Structured P2P Systems
  122. Detecting Malicious Packet Losses
  123. Detecting Spam Zombies
  124. Detection of Routing Misbehavior in MANETs
  125. Detection of Selfish Nodes in Networks Using CoopMAC Protocol with ARQ
  126. Discovering Conditional Functional Dependencies
  127. Distributed Cache Updating for Dynamic Source Routing(DSR) Protocol
  128. Distributed Collaborative Key Agreement And Authentication Protocols For Dynamic Peer Groups
  129. Distributed Cooperative Caching In Social Wireless Networks
  130. Distributed E-Health Care System Using SOA Service-Oriented Distributed Data Mining
  131. Distributed Packet Buffers for High-Bandwidth Switches and Routers
  132. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
  133. Diverse firewall design
  134. Domain name service system with secured manner
  135. Double Guard Detecting Intrusions in Multitier Web Applications
  136. Dual-Link Failure Resiliency Through Backup Link Mutual Exclusion
  137. Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
  138. Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries
  139. Dynamic Load Balancing in Distributed Systems in the Presence of Delays A Regeneration-Theory Approach
  140. Dynamic MallWare Spread in Decentralized P2P System
  141. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
  142. Dynamic Routing with Security Considerations
  143. Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks
  144. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
  145. E-fraud Prevention Based N The Self-authentication Of E-documents
  146. Effective Navigation of Query Results Based on Concept Hierarchies
  147. Effective Navigation
  148. Effective Pattern Discovery for Text Mining
  149. Effective Software Merging in the Presence of Object-Oriented Refactorings
  150. Efficient and Dynamic Routing Topology Inference From End-to-End Measurements
  151. Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
  152. Efficient Approximate Query Processing In Peer-to-Peer Networks
  153. Efficient Broadcasting in Mobile Ad Hoc Networks
  154. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
  155. Efficient Error Estimating Coding Feasibility and Applications
  156. Efficient Fuzzy Type-Ahead Search in XML Data
  157. Efficient key Agreement for Large and Dynamic Multicast Groups
  158. Efficient Key Management For Threshold-Multi Signature In Distributed System
  159. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
  160. Efficient Multi-Dimensional Suppression for K-Anonymity
  161. Efficient Processing of Metric Skyline Queries
  162. Embedded Extended Visual Cryptography Schemes
  163. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  164. Encrypted Marking Based Detection And Filtering (EMDAF)
  165. Energy Efficient Cooperative Video
  166. Energy Efficient System
  167. Energy-Efficient Cooperative Video distribution with Statistical QOS provisions over Wireless Networks
  168. Energy-Efficient SINR-Based Routing for Multihop Wireless Networks
  169. EnergyMaps For Mobile Wireless networks coherence Time Versues Spreding Period
  170. Engineering Privacy
  171. Enhanced Ant Algorithm Based Load Balanced Task Scheduling In Grid Computing
  172. Enhancing Search Performance in Unstructured P2P Networks Based on Users Common Interest
  173. Ensuring Data Storage Security in Cloud Computing
  174. Ensuring Distributed Accountability for Data Sharing in the Cloud
  175. Enterprise Collaboration Tool Project
  176. Error Control System In Network Environment
  177. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
  178. Estimation of Defects Based on Defect Decay Model ED3M
  179. Evaluating the Efficacy of Forward Error Correction Coding
  180. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
  181. Evaluation of Accuracy in design pattern occurence detection
  182. Evaluation of User Behavior trust in cloud computing
  183. Extended Boolean Retrieval
  184. Extended XML Tree Pattern Matching Theories and Algorithms
  185. Extracting Actionable Knowledge From Decission Trees
  186. Extracting Spread-Spectrum Hidden Data from Digital Media
  187. Face Recognition For Smart Recognitions
  188. Face Recognition Using Laplacianfaces
  189. Facial Expression Recognition Using Facial Movement Features
  190. Facilitating Effective User Navigation through Website Structure Improvement
  191. FADE Secure Overlay Cloud Storage with File Assured Deletion
  192. Fast Data Collection in Tree-Based Wireless Sensor Networks
  193. Fast Rendering Algorithm of Underwater Optical Effect
  194. Fast Transmission to Remote Cooperative Groups
  195. Fault Tolerant Scheduling for Hard Real Time Tasks in Uniprocessor System
  196. FEBA A Bandwidth Allocation Algorithm for Service Differentiation in IEEE 802.16 Mesh Networks
  197. Filtering Unwanted Packets On Atm Network
  198. Fingerprint Authentication System
  199. Flexible Rollback Recovery In Dynamic Heterogeneous Grid Computing
  200. FoCUS Learning to Crawl Web Forums
  201. Fog Computing Mitigating Insider Data Theft Attacks in the Cloud
  202. Footprint Detecting Sybil Attacks in Urban Vehicular Networks
  203. Fully Anonymous Profile Matching In Mobile Social Networks
  204. Fuzzy Keyword Search over Encrypted Data in Cloud Computing
  205. Game-Theoretic Pricing for Video Streaming in Mobile Networks
  206. Genetic Algorithm Based Train Simulation using Concurrent Engneering
  207. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
  208. Geographical Routing With Location Service in Intermittently Connected MANETs
  209. GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
  210. GLIP A Concurrency Control Protocol for Clipping Indexing
  211. Going Back and Forth Efficient Multideployment and Multisnapshotting on Clouds
  212. Grid Scheduling based on Collaborative Random Early Detection Strategies
  213. Handling Selfishness in Replica Allocation
  214. Handwritten Chinese Text Recognition by Integrating Multiple Contexts
  215. Harnessing the Cloud for Securely Outsourcing
  216. HASBE A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control by Separate Encryption Decryption in Cloud Computing
  217. HASBE Access Control in Cloud Computing
  218. Hiding Data Distribution in outsourced Archival Databases
  219. HIDS Intrusion Detection System Over Abnormal Internet Sequence
  220. Homogenous Network Control and Implementation
  221. Horizontal aggregation in SQL to prepare data sets for data mining analysis
  222. Host-to-Host Congestion Control for TCP
  223. How Software Developers Use Tagging to Support Reminding and Refinding
  224. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HID)
  225. Hybrid Scheduling Of Dynamic Task Graphs With Selective Duplication For Multiprocessors Under Memory And Time Constraints
  226. Identification of Humans Using Gait
  227. Identity-Based Secure Distributed Data Storage
  228. Image Authentication Over Wireless Channels
  229. IMine Mining Association Rules with Item Constraints
  230. Implementing Multicast Distribution through Recursive Unicast Trees
  231. Implementing security across the networks with Quantum key distribution protocol
  232. Improving Utilization of Infrastructure Clouds
  233. Incentive Compatible Privacy-Preserving Data Analysis
  234. Increasing efficiency in wireless networks using bandwidth routing protocol
  235. Intrusion detection An Energy efficient approach in Heterogeneous WSN
  236. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
  237. Intrusion Detection System Over Abnormal Internet Sequence
  238. IP Fast Reroute Framework
  239. ITP An Image Transport Protocol for the Internet
  240. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
  241. Java Grid Done Using Grid Computing
  242. Java Program Invention With User Integrated Developed Environment
  243. Robust video data hiding using forbidden data hiding
  244. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
  245. KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
  246. Large Connectivity for Dynamic Random Geometric Graphs
  247. Latency Equalization as a New Network Service
  248. Layered Approach Using Conditional Random Fields for Intrusion Detection
  249. Learn to Personalized Image Search from the Photo Sharing Websites
  250. Live Streaming with Receiver-based Peer-division Multiplexing
  251. Load Rebalancing for Distributed File Systems in Clouds
  252. Load-Balancing Multipath. Switching System with Flow Slice
  253. Location Aided Routing In Mobile Adhoc Networks
  254. Location Based Routing For Distance Nodes
  255. Location Based Spatial Query Processing In Wireless Broadcast Environments
  256. Low Latency And Energy Efficient Routing Protocols For Wireless Sensor Networks
  257. M-Privacy for Collaborative Data Publishing
  258. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks
  259. Maximizing The Number Of Broadcast Operations In Random Geometric Adhoc Wireless Networks
  260. Measuring Capacity Bandwidth of Targeted Path Segments
  261. Message Authentication In Computationally Constrained Environments
  262. Minimizing Delay and Maximizing Lifetime for Wireless sensor Networks with Anycast
  263. Minimizing File Download Time in Stochastic Peer-to-Peer Networks
  264. Mining Contract S For Business Event And Temporal Constraints In Service Engagement
  265. Mitigating Denial-of-Service Attacks on the Chord Overlay Network A Location Hiding Approach
  266. Mitigating Performance Degradation in congested sensor networks
  267. Mitigating selective forwarding attacks with a channel-aware approach in WMNS
  268. Mitigation of Control Channel Jamming under Node Capture Attacks
  269. Mobile Agents In_a_Distributed Multimedia Dabase System
  270. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
  271. Mobile Sampling of Sensor Field Data Using Controlled Broadcast
  272. Mobility Management Approaches for Mobile IP Networks Performance Comparison and Use Recommendations
  273. Modeling & Automated Containment of Worms
  274. Modeling and Detection of Camouflaging Worm
  275. Monitoring Online tests thru data visualisation
  276. Monitoring patients via a secure and mobile healthcare system
  277. Monitoring The Aplication Layer DDOS Attacks
  278. Monitoring the Application-Layer DDoS Attacks for Popular Websites
  279. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks
  280. Multicast Routing with Delay and Delay Variation Constraints for Collaborative Applications on Overlay Networks
  281. Multiparty Access Control For Online Social Networks Model And Mechanisms
  282. Multipath Dissemination in Regular Mesh Topologies
  283. Multiple Routing Configurations for Fast IP Network Recovery
  284. Network Component for Xml Migration
  285. Network Load Balancing
  286. Network Border Patrol Preventing Congestion Collapse
  287. NICE Network Intrusion Detection and Countermeasure
  288. Noise Reduction by Fuzzy Image Filtering
  289. Nymble Blocking Misbehaving Users in Anonymizing Networks
  290. OCGR A New Scheduling Algorithm for Differentiated Services Networks
  291. ODAM An Optimized Distributed Association Rule Mining Algorithm
  292. On Event-Based Middle ware for Location-Aware Mobile Applications
  293. On Modeling Analysis and Optimization of Packet Aggregation Systems
  294. On Optimizing Overlay Topologies for Search in Unstructured Peer-to-Peer Networks
  295. On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System
  296. On the Impact of Security Protocols on the Performance of SNMP
  297. On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
  298. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
  299. Online Index Recommendations for High-Dimensional Databases Using Query Workloads
  300. Online Intrusion Alert Aggregation For Data Streaming Modeling Final Source Code
  301. Online Modeling of Proactive Moderation System for Auction Fraud Detection
  302. Open Smart Classroom Extensible and Salable Learning System in Smart Space Using Web Service Technology
  303. Optical Character Recognition on a Grid Infrastructure
  304. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  305. Optimal Client-Server Assignment for Internet
  306. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
  307. Optimal Power Allocation in Multi-Relay
  308. Optimal service pricing for a cloud cache
  309. Optimized Resource Allocation for Software Release Planning
  310. Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization
  311. Organizing User Search Histories
  312. P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
  313. Packet Loss Control Using Tokens at the Network Edge
  314. Packet-Hiding Methods for Preventing Selective Jamming Attacks
  315. PAM An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
  316. PCA-Based Spatially Adaptive Denoising of CFA Images for Single-Sensor Digital Cameras
  317. Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
  318. Personal Authentication Using 3-D Finger Geometry
  319. Pharmacy Management System
  320. Learn to Personalized Image Search from the Photo Sharing Websites
  321. PMSE A Personalized Mobile Search Engine
  322. Policy-by-Example for Online Social Networks
  323. POPI A User-level Tool for Inferring Router Packet Forwarding Priority
  324. Portable Cloud Services Using TOSCA (2012)
  325. Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
  326. Preventing Private Information Inference Attacks
  327. Price Differentiation for Communication Networks
  328. Privacy Preserving Data Sharing With Anonymous ID Assignment
  329. Privacy Preserving Delegated Access Control
  330. Privacy-Preserving Distributed Profile Matching In Proximity-Based Mobile Social Networks
  331. Privacy-Preserving Public Auditing for Secure Cloud Storage
  332. ProgME Towards Programmable Network Measurement
  333. Progressive Parametric Query Optimization
  334. QUIVER Consistent object Sharing for Edge Services
  335. Random Access Transport Capacity
  336. Randomized Protocols for Duplicate Elimination in Peer-to Peer Storage Systems
  337. Ranked Reverse nearest Neighbor Search
  338. Ranking Model Adaptation for Domain-Specific Search
  339. Ranking Spatial Data by Quality Preferences
  340. Re-Ordering Of Packets Using Retransmission Timer
  341. Reliable And Energy-Efficient Multipath Communications In Underwater Sensor Networks
  342. Reliable Re-encryption in Unreliable Clouds
  343. Remote Approach for Effective Task Execution and Data Accessing Tool
  344. Remote System Access By Using VN
  345. Research on Ontology-based Representation and Retrieval of Components
  346. Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
  347. Resource Management Using Dynamical Load Prediction and Multiprocessor Cooperation
  348. Retrieving Files Using Content Based Searching and Presenting It in Carousel View
  349. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
  350. RIHT A Novel Hybrid IP Traceback Scheme
  351. Risk-Aware Mitigation for MANET Routing Attacks
  352. Robust Face-Name Graph Matching for Movie
  353. Robust Module Based Data Management
  354. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding
  355. Route Reservation in Ad Hoc Wireless Networks
  356. SaaAS
  357. SAT- Solving Approaches to Context-Aware Enterprise Network Security Management
  358. SATA Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
  359. Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
  360. Scalable and Secure Sharing of Personal Health Records
  361. Secure and Practical Outsourcing of Linear
  362. secure communication for next generation internet
  363. Secure Communications Over Wireless Broadcast Networks Stability and Utility Maximization
  364. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
  365. Secure Encryption System
  366. Secure Socket Layer Protocol Simulation
  367. Secureand Practical Outsourcing of Linear Programming in Cloud Computing
  368. Secured Architecture for Remote Virtual Desktops
  369. Secured Distributed Key Management for Threshold-Multisignature using Cryptography-
  370. Securing User-Controlled Routing Infrastructures
  371. Security Analysis of a Single Sign-On Mechanism
  372. Security Analysis of the SASI Protocol
  373. Security in large Mediator Protocols
  374. Security in Large Networks Using Mediator Protocols
  375. Security of web forms
  376. Security System for DNS using Cryptography
  377. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
  378. Self Adaptive Contention Aware Routing
  379. Selfish Overlay Network Creation and Maintenance
  380. Sensitive Label Privacy Protection on Social Network Data
  381. SigFree A Signature-free Buffer Overflow Attack Blocker
  382. SIMPS Using Sociology for Personal Mobility
  383. Simulation of Handoff Techniques in Mobile Cellular Networks
  384. Sketch4Match – Content-based Image Retrieval System Using Sketches
  385. Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks(2012)
  386. Slicing A New Approach to Privacy Preserving Data Publishing
  387. Social Cloud Computing A Vision for Socially Motivated Resource Sharing
  388. Software as A Agent Service
  389. Spam Collection and Detection System
  390. SparkClouds Visualizing Trends in Tag Clouds
  391. Spatial Approximate String Search
  392. Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
  393. Speculative Transmission for Latency Reduction
  394. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  395. Spread Node Relocation by effective tolerant Process
  396. Stateless Multicasting In MANETs
  397. Statistical Entity Extraction from Web
  398. Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compress
  399. Subspace-Based Striping Noise Reduction in Hyperspectral Images
  400. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks1
  401. Techniques For A Selective Encryption Of Uncompressed And Compressed Images
  402. Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations
  403. Temporal Partitioning of Communication Resources in an Integrated Architecture
  404. The CoQUOS Approach to Continuous Queries
  405. The District Medical Data Center Based on Cloud
  406. The Security Of Cloud Computing System Enabled By Trusted Computing Technology
  407. Three Party Authentication For Key Distributed Protocol Using Classical And Quantum Cryptography
  408. Throughput Optimization in Mobile Backbone Networks
  409. Toward publicly auditable secure cloud data storage services
  410. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
  411. Toward Secure and Dependable Storage Services in Cloud Computing
  412. Towards A Statistical Framework For Source Anonymity In Sensor Networks
  413. Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
  414. Towards Secure And Dependable
  415. Towards Superhuman Speech Recognition
  416. Trust modeling in social tagging of multimedia content
  417. Truth Discovery with Multiple Conflicting Information Providers on the Web
  418. Two tales of privacy in online social networks
  419. Two Techniques for Fast Computation of Constrained Shortest Paths
  420. Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks
  421. Using Fuzzy Logic Control to Provide
  422. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
  423. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
  424. Vampire attacks Draining life from wireless ad-hoc sensor networks
  425. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks
  426. Verification and Trade-Off Analysis of Security Properties in UML System Models
  427. Wardrop Routing in wireless networks
  428. Winds of Change from Vendor Lock-In to the Meta Cloud
  429. Wireless Sensor Networks A Study on Congestion
  430. XTC A Practical Topology Control Algorithm for Ad-Hoc Networks
  431. Zero knowledge protocol for WSN’s