Global Counseling System MCA Java Project Documentation

Introduction to Global Counseling System Java Project:

Global Counseling System Application is the tool that is used to maintaining the resource of the global system and the necessary information. It has more capabilities than any storage system. It also helps in managing the various users.

These systems provide proper report and the only thing what you exactly need. These have the features to store the information of the users, their history or past and present what they are doing, everything is categorized in that system and they can also remove any user from those systems if they need to that. They have got the right to delete, add or modify the global data. They define all the data and the departments and adjust them very well then they add any new employee.You can also add new department or new field or new categories.

Present systems that are used are proper they are not developed efficiently. They store data in the table like excel sheet. That makes the data compact and impossible to search from many. For that we have to make new system that have database based on the query and that categories the data. This will remove the data complexity and data will be user friendly.

Global Counseling System Modules:

admin:this will control the entire application, it will add, delete, or modify like features.

Guide: its function is to answer the query.

Members:  they can create exams and place the query to the form and display the merit list.

User module: to need to have username and password to log in to the account.

You need system that has at least 256MB and 20GB hard disk with Windows XP installed on the computer. You can do coding in the HTML and JAVA with using JAVASCRIPT and SQL as a database.

Latest CSE Java Project Topic on Fast Adaptive Fuzzy AQM Controller for TCP/IP Networks Report

Currently Active Queue Management have been proposed to look after the degradation of performance of end-to end control of congestion. AQM algorithms do not able to provide stabilization to the heavy network loads. In this document a fuzzy control algorithm based on the novel adaptive system is used to enhance the  IP network performance. In comparison to the traditional AQM which includes PID and RED the proposal made by us avoid any sort of underflows Andover flow of buffer, reduce droppings with packets etc.

An on-line adpating mechanism is proposed by us that enable the capturing of fluctuating network in conditions. On the other hand, classical AQM requires tuning based on stats mode. The stability of the algorithm is proven mathematical. The results of simulation shows for the utilization of the same link and FAFC provides far more superb performance the PID and RED.

In this document we propose a new system that is acting as an adaptive fuzzy controller for FAFC and AQM. It enables a fast response in comparison to the classical controllers like PID and RED. Thanks to the Lyapunov theory  and the system’s stability is checked properly. The controller that is obtained is simple and allows quick implementation. At the same time it also improves the functions of the network and reduce the delay in work.

For multimedia packet loss rate and jitter are important applications. The experiments of stimulation demonstrate that FAFc allows to stabile the length of the queue quickly in spite of the TCP sessions variation.  The performance result that is demonstrated the capacity of FAFC enable network capturing that are in nonlinear formats. Our future work will aim in extending the FAFC so that it can deal with the requirements of the heterogeneous traffics which will further provide varieties of droppings probabilities in networks.

A P2P Architecture for Internet Scale Content Based Search and Retrieval Project

Introduction to A P2P Architecture for Internet Scale Content Based Search and Retrieval Project:

The model peer-to-peer is one of the most popular software and with the passing of time it has become more attractive and powerful. This helps in modifying and developing the system of internet scale for the resource sharing which includes documents and files. Nodes are used for distribution of these systems and they are usually located across several networks as well as domains. It affects the efficient retrieval of the important information’s  Plus, in this document we take in consideration all the effects of the construction  that is overlaid and logically aware on the peer-to-peer keyword search algorithms.

As per the existing system the participating nodes of planet construct an inverted index globally over the space of the keyboard which is constructed partially by each node. The basis of the framework includes bloom filters which usually capture Pi nodes. In the rest of the community these filters are gossiped about randomly so that every peer can make a membership query about the Pi contents. Foam filters can be disseminated efficiently in an environment because of its small size that helps in maintaining the filter. The P2P churn rate system makes the peer maintenance an endeavor job.

System Flow Diagram:

P2P Architecture for Internet Scale

The individual peer numbers can be defined by the churn rate that helps in moving out and in from a network over a particular time period thus it may be possible that high rate can translate into the process of maintenance of the bloom filters. In contrast to our framework PlanetP can enable the users to find out the answers of the users’ queries in less timings. It depends on the filter contents like with the peer contents filters go into synchrony.

As per the the context of the Internet-Scale this presumption cannot be easily given a satisfactory explanation and therefore we focus only on the local knowledge that too at an increased amount to get the correct results. The utilization as bloom filters are considered and it is supplementary to the approach made by us. This is just ideal when the network size is limited.

Package for Flower Distributor Java Project Idea for MCA Students

Introduction to Package for Flower Distributor Java Project:

The project PACKAGE FOR FLOWER DISTRIBUTOR is designed to handle the daily transaction of the distributor of flower. This is a software application that helps in maintaining issues related to sales. Purchases, Returns, updates, bank flows, sales and the music store recorder level. The aim of this application is to make the existing system automate because it is a manual system of maintaining records of sales, purchases, returns, monetary position of supplier and other transactions that are made at the counter. music stores can also use this software to make the manual system of marinating of data is to automate system. It includes the maintenance of liquid flows and stock.

The manual system is presently used for keeping the transaction records that include purchases, returns and sales along with handling of customers and suppliers accounts. These should be automated for brief and accurate results and it also demands an application that can perform all the work logically. The system must be efficient to replace the present manual method without any problem of major need for modification. Plus, the application should give authenticate results at a quick pace and enable to record the works successfully. It should also be able to provide reviews for the growth of business that can be easily compared. It should also able to provide the reports in a detailed manner so that important decisions can be easily taken on its basis.

An SRS is an organization’s understanding of a customer and the requirements of a client’s system at a specifies time before the actual design or work of development. This is a two way insurance policy that makes sure that both the organization and the client understand the requirements from the particular perspective given at a particular point of time. This document is written in an explicit language as well as in a precise manner.

Stop Global Warming Web Portal Java Project Report

Introduction to Stop Global Warming Web Portal  Project:

This is a social homepage for swaying individuals to avoid different contamination causative. It deals with the standards of wellbeing announcement and fortifying the social norms. It not just makes the users attentive to the maladies brought about but additionally how to avert them. It support, direct and partake in examinations and research identifying with situations of water, area and air contamination and its anticipation, control and decrease thereof. 

Recommended System 

The improvement of this newfangled framework holds the emulating actions, which attempt to recuperate the situations from the past framework: 

•           To shed light on the diverse moving stories of these who have committed in opposition to contamination. Aggregate parts will have chances to run diverse hostile to-contamination mindfulness programmers in available places, universities, and so on. 

•           It may as well spread cognizance concerning the ways (steer, aberrant and so on) in which an individual can encourage to overcome contamination. 

•           To develop powerful routines for transfer of sewage and exchange gushing on area. 

•           To screen the crop, transportation, medicine, space and transfer of dangerous wastes. 

•           To aid parts to cooperate with individuals, lead advising and clear remains skeptical about through discourse gatherings. 

•           Secure enrollment and profile administration offices for enlisted parts and administration and non administration firms. 

•           A consistent news-letter may as well be sent to enlisted users to spread consciousness. 

The proposed users are verified to the site by giving the certifications which they got around then of enrollment. He will affirm the enrollment of Group Members, Govt. on the other hand Non-Govt. Offices & Doctors dependent upon their Profiles. He may as well produce and impart the Training lineups directing by Central Pollution Control Board to Group Members and Govt. on the other hand Non-Govt. Bureaus & Doctors.

He may as well print the most cutting edge news concerning the Global Warming on Home Page. They may as well have the ability to cooperate with Govt. additionally Non-Govt. Offices, Doctors at given errand timings to elucidate their questions utilizing talk discussions.

Stock and Portfolio Management Solution Project Report for CSE Final Year

Introduction to Stock and Portfolio Management Solution Project:

At present, the utilities gave by specialists to the moguls are accepted which is not supporting at this snappy adapting stock businesses situation. There is no mechanical warning to the clients on executing their solicitation to the specialists. Reporting cycle identifying with the portfolios is profoundly unpredictable in the existing framework. Seeing that stock trades are quite delicate to the general updates in the social norms, a proficient framework for stock broking needs to be made. For this reason, we are outlining a modern framework which is handy to both the Brokers and Customers taking part in stock broking.

In this module Customers might as well have remote access and might as well have the ability to ration and place ask for connected. A review trail might as well be administered of it. Clients may as well be informed programmed on execution of their appeals and requests. A sub-framework may as well be good to go to clients to track the status. It’s a route to heighten to administration in the event of grievances.

In light of the fact that stock trades are quite delicate to the customary updates in the public order, a proficient framework for stock broking needs to be made. For this reason, we are outlining a modern framework which is advantageous to both the Brokers and Customers participating in stock broking. Agents may as well have access limited to the portfolio where its dealing with the emulating things:

  • Customers might as well have remote access and may as well have the ability to ration and place ask for connected. A review trail might as well be upheld of it.
  • A sub-framework for intermediaries to execute clients’ asks for and requests.
  • Customers might as well be advised programmed on execution of their appeals and requests. A sub-framework might as well be good to go to clients to track the status. But, a route to rise to administration in the event of grievances.
  • Management and Customers may as well have access to diverse reports. The right to gain entrance to reports may as well be part based.

Steganography Project Report for B.tech CSE Major Project

Introduction to Steganography Project Topic:

We propose a latest technique in the steganography system to hide the information that is not to be disclosed with the image of the digital format. To hide the data we use BMP image. LSB algorithm stenography is the most common mode and it is used as the base. We have made some changes that are based on the innovative idea which include the integration of second and first LSB algorithms. The security here is considered to be the main aspect. 

Randomization concept is applied to the selection of pixels in pictures to  hide the data. Values are generated randomly with the help of secret keys. Unless the hackers have the key they will not able to find the numbers because they based on random physics. Analysis of statistics and detailed visualization of algorithms disclosed that it provides results that are satisfactory. It can be easily proved that the decoding system is very difficult in the proposed algorithm.

The work that is presented in this document is only the effort to create a strong stenographic system for Convery communication use. The algorithm proposed can be incorporated from various techniques that are existing and it results in an efficient algorithm of steganography. For high security of steganography we have developed a new technique. We are planning to improve our system in the future with robust build and high payload capacity as well as imperceptibility.

Steganography is similar to cryptography and it provides a way for communication of secret messages. A message is usually scrambled in the cryptographic technique so that it cannot be deciphered. On the other hand, the technique of The steganography technique hides the presence of the messages by concealing it inside a file. The cartographic messages can be intercepted with the help of eavesdropper but it will not enable an intruder to know that even the message exists.

Steganography Project DFD Diagram

The existence of communication can be hidden from others by using the steganography technique which is the science and art of communication. This system do not able others detect the messages that are hidden in various ways. The word steganography is derived from a Greek work which means “covered writing”.

It consist of a long chain of secret methods of communications that completely conceal the existence of the messages. Invisible ink, character arrangement, microdots, signatures in digital format, converting of channels and communications through spread spectrum are some of the methods that are used in this technique.

Both the techniques cryptography and steganography are twin cousins and they act in the spy craft family. A message in the cipher text format can easily arouse suspicion in the mind of the recipient while on the other hand, the use of invisible messages created with the art of stenography will not do any such things.

In comparison to the cryptography technique where the intruder is allowed to modify as well as intercept the messages without even violating the premises of the security that is guaranteed by cryptosystem the steganography is used to conceal messages in other messages in such a format that it never allows the hacker to detect that there is even any existence of a second secretive message.

The digital fingerprinting and watermarking for video and audio is hugely in demand in the present industry and it enhances the steganography technique highly. With the discovery of high speed computers steganography in the form of images has reached the edge. the Least Significant Bit  Insertion is one of the most popular technique that is used in image steganography. There are various advantages of using this method and the best use is that it helps in transmitting messages secretly without the risk of the message being discovered by the intruder. 

Steganography Project Report in Java

Introduction to Steganography Project in Java:

In comparison to the technique of cryptography where the messaged has not disguised itself but the content is obscured. With the advent of steganography over the technique of cartography alone the security of messages has highly increased. The messages do not attract the attention of other recipients, to themselves and to the messengers. The art and science of hidden messages are hidden in the technique of steganography and it is done in such a manner that no one other than the recipient who is intended to receive the message can discover the secret message.

Traditional means are used for encryption of steganographic messages and then the cover text is further changed in some or other manner. The encrypted message results in stegotext. Letter size, typeface, spacing and other convert text characteristics can changes are made to execute the hidden message. This means that only the receiver of the message can recover and decryption it. Steganographic coding present in a transport layer likeMP3 file and protocol like UDP are then used in the electronic communication system.

For transmission of data safely and securely the steganographic system is used and it also enables safe storage of data in the network. There are many files that are important and include confidential data, they can be stored in encrypted form in the server. These files can be used only by authorized users.

Transmission of these files can be made possible only in the form of encrypted data and it does not disclose the message to the intruders. This means that the hackers and intruders will not able to make out any meaningful information during the transit. Moreover before trying to use the files the users need to enter the system with the help of valid password and user id that is allotted by the administrator to him.

Statistical Techniques for Detecting Traffic Anomalies DFD Diagram and Documentation

The main aim of the project is to reduce the traffic caused by the network while transmitting data’s using an egress router and ingress router. In order to reduce the traffic that is caused by the network during the transmission of data with the help of ingress and egress router is the main focus of this project.

Attack on network infrastructure is very frequent and various types of  worms and denial service are used which lead to the need of several latest techniques for monitoring and analyzing the traffic work. If only some efficient tools would have existed then it could be possible to detect the anomalies and attacks. It would also make it possible to take necessary actions to reduce their actions before they can further propagate in the network. For detection of attacks and anomaly various studies are being carried on to know the possibilities of traffic analysis that are based on mechanisms. The onset of traffic can be estimated with a sudden hike in traffic on a particular port.

We approach two types of detection mechanisms that will help to detect the anomalies – real time modes and post mortem. The latter technique usually consumes a lot of time of data as a single set and also employ  rigorous processing methods. Further it is a technique that demands lots of resources for accurate analyzing.

This kind of analysis is usually very beneficial for engineering purposes and understanding the peak demand. On the other side, there is the real time method that analyzes and concentrate a small window of data traffic. It provides a quick dirty waning of the ongoing and impending anomalies of traffic. This analysis does no require any sophisticated equipment’s and resources. This is widely used because of its features like imminence of attacks and less demands.