S.NO Project Title 1. Integration of Watermarking and Cryptography Techniques for Electronic Management of Copyright in Open-Networks ( J2EE ) 2. Lightweight Directory Access Protocol -Browsing And Access Management System Using JNDI ( J2EE ) 3. Sustaining the availability of commercial Web Services against Distributed Denial of Service attacks ( J2EE ) 4. Network Monitoring and Management using SNMP Protocol ( JAVA ) 5. Segment based Streaming proxy in an enterprise Environment
Page 4 5 6 7 8
( JAVA )
6. 7.
Design and Implementation of J2EE Design Patterns in multi-tier 9 Enterprise Applications ( J2EE ) Content Distribution Networks (J2EE) 10
8.
Internet and Mobile Banking System ( J2EE )
11
9.
12
10.
Distributed Heterogeneous Database Driver based on Corba ( JAVA ) Expert Knowledge assessment system based on automata ( J2EE )
11.
Advanced Data Preprocessing for Web Usage Mining ( JAVA )
14
12.
14.
Session based Peak load management system for commercial web 15 server ( J2EE ) SNMP based Network Management Tool for Fault Isolation, 16 Detection and Recovery ( JAVA ) Web based Remote database Administration ( J2EE ) 17
15.
Image Pattern Search in a Distributed Database( JAVA )
18
16.
Open Grid Services Architecture for Healthcare ( J2EE )
19
17.
Single-Sign-On Authentication System( J2EE )
20
18
E-Business Information Sharing using Extranet ( J2EE )
21
19
Distributed Network services using jini ( JAVA )
23
20
Distributed Message integrity protocol ( JAVA )
24
21
Efficient video streaming based on cache Servers ( JAVA )
27
13.
1
13
22
Stegnography based on JPEG 2000 images ( JAVA )
27
23
Integrated data migration ( JAVA )
28
24
Dynamic and Temporal role based access control for enterprise 31 system ( J2EE Secure E-Voting ( J2EE 33
25 25 27 28 29 30 31 32
Improving availability and performance with application specific 34 data replication ( J2EE ) Robust and Secure Secret Distribution system ( JAVA ) 35 A Data Mining Algorithm for Generalized Web Prefetching ( J2EE ) An expiration age based document replacement scheme for web catching ( J2EE ) Efficient Dissemination of Personalized Information Using Content-Based Multicast ( JAVA ) Database replication based on total order broadcasting ( JAVA )
36 37 38 39
33
Reputation based Trust establishment in peer-to-peer electronic 40 systems (JAVA ) Learning Management System ( J2EE ) 41
34
Project Status Reporting and Auditing System( J2EE )
44
35
Trust Management in E-Commerce ( J2EE )
45
36
E-Police Crime Investigation System ( J2EE )
46
37
Integrated on line Booking ( J2EE )
48
38
Self-Organized Public-Key Management for Secure Mobile Ad 50 Hoc Networks ( JAVA ) Efficient and Flexible Digital Money Payment in Internet based 51 Online Transactions ( J2EE ) Querying Multimedia Database using Fuzzy Logic ( JAVA ) 52
39 40 41 42
Design and implementation advanced transactions in EJB 53 Component Model ( J2EE ) ATM Card Management System ( J2EE ) 54
2
43
B2B Integration using Web Services ( J2EE )
55
44
Extended database security design and implementation ( JAVA )
56
45
Active searching and browsing of compressed video database ( JAVA ) Efficient News Video Querying and Browsing Based on Distributed News Video ( J2EE ) Distributed Resource Searching and Sharing on Peer-to-Peer Networks ( JAVA ) Peer to Peer Video Distribution management system using JXTA ( JAVA ) User Centric transactions on web Database ( J2EE )
57
Workload-Aware Load Balancing for Clustered Web Servers ( J2EE ) Building a Multiple-Criteria Negotiation Support System ( J2EE )
62
65
55
.Resource Allocation for Session-Based Two-Dimensional Service Differentiation on e-Commerce Servers ( J2EE ) .Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc ( JAVA ) Service-mining Based on the Knowledge and Customer Databases ( J2EE ) Stock monitoring using mobile ( J2M2 )
56
Sales force automation system ( J2EE )
69
57
Anti Money Laundering System – Detection and Solution ( J2EE )
70
46 47 48 49 50 51 52 53 54
3
58 59 60 61
64
66 67 68
Integration of Watermarking and Cryptography Techniques for Electronic Management of Copyright in Open-Networks AREA: Network Security ABSTRACT: The development of an Electronic Copyright Management System(ECMS) to be used in open-network environments is becoming more and more urgent due to the crucial role copyright protection plays in the diffusion of network multimedia services. Watermarking is often invoked as a tool for the protection of Intellectual Property Rights (IPR) of multimedia data distributed in digital form. A new system is presented which integrates state-of-the-art water-marking with cryptography techniques to enable IPR protection in open-network environments. Digital watermarking has recently been proposed as an effective solution to copyright protection of multimedia data. A digital watermark is unperceivable embedded into the data in such a way that a given piece of information, which gives identity of the owner or of the authorized consumers, is indissolubly tied to the data itself. Later on, such an information can be used to prove ownership, to recognize the identity of a misappropriating person, to trace the dissemination of the marked work through the network, or simply to inform users about the identity of the rights-holder or the allowed use of data. The proposed system is a selfcontained one, in that, at any given time, the information needed to prove the legal/illegal use of the data is hidden within the data itself, whereas no attempt is made to trace previous abuses. Particular care is paid to grant to all the actors involved in the distribution of the protected material the possibility of demonstrating the legitimate use of the data in their hands. The proposed system uses both watermarking and cryptography techniques to improve efficiency of the ECMS. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Applets, JDBC, J2EE
Web server
: Tomcat 5.5
Operating System
: Windows 2000
Backend Database
:MS-Access
4
Lightweight Directory Access Protocol -Browsing And Access Management System Using JNDI ABSTRACT : With rapid advancement in Technology, computer applications have become more distributed, the efficient management and distribution of the information upon which they depend becomes more and more of a problem. Directory service is a vital component of network computing. By using a directory service, we can simplify applications and their administration by centralizing the storage of shared information. As the use of the Java programming language to write practical applications in a network environment increases, the ability to access directory services will become essential. Directory services such as LDAP (Lightweight Directory Access Protocol) address this problem. Lightweight Directory Access Protocol (LDAP) is a fast growing technology for accessing common directory information on a distributed network environment. LDAP has been embraced and implemented in most network-oriented middleware. As an open, vendor-neutral standard, LDAP provides an extendable architecture for centralized storage and management of information that needs to be available for today’s distributed systems and services. The main objective of the project is to develop a Client side Browser that can be connected to a Directory server and access information that is organized in the directory. An important application of this project is that User Specific Information can be retrieved in a very quick way because directories are optimized for high volume lookup. The Project incorporates four modules. They consist of a) Binding a Client to the server (With simple authentication), b) Anonymous and Managerial User Functions, c) Search operations by adding various Filters and for performing LDIF (LDAP data interchange format) operations like Importing and exporting of data. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing, java.net.JNDI
Operating System
: Windows 2000
5
Sustaining the availability of commercial Web Services against Distributed Denial of Service attacks Abstract : The objective of this project work is to design an effective and practical counter measure that allows a victim system or network to sustain high availability during such attacks. In particular, we propose a DDoS defense system for sustaining the availability of web services. Protecting web services is of paramount importance because the web is the core technology under-lying E-commerce and the primary target for DDoS attacks. When a DDoS attack occurs, the proposed defense system When a DDoS attack occurs, the proposed defense system ensures that, in a web transaction, which typically consists of hundreds or even thousands of packets from client to server, only the very first SYN packet may get delayed due to packet losses and retransmissions. Once this packet gets through, all later packets will receive service that is close to normal level. This clearly will lead to significant performance improvement. The basic idea behind the proposed system is to isolate and protect legitimate traffic from huge volumes of DDoS traffic when an attack occurs. Our first step is to distinguish packets that contain genuine source IP addresses from those that contain spoofed addresses. Redirecting a client to a new IP address and port number through a standard HTTP redirect message does this. Part of the new IP address and port number will serve as a Message Authentication Code (MAC) for the client’s source IP address. Packets from an attacker who uses spoofed IP addresses will not have the correct MAC since the attacker will not be able to receive the HTTP redirect message. This newly designed system that effectively sustains the availability of web services even during severe DDoS attacks. Our system is practical and easily deployable because it is transparent to both web servers and clients and is fully compatible with all existing network protocols. Since the web is the core technology underlying e-commerce and a primary target for recent DDoS attacks, this work offers a practical solution to a very important security problem. Software Requirements: Language
: Java JDK1.5,HTML
Java Technologies
: Applets, JDBC, Servlets, JSP
Web server
: Tomcat 5.5
Operating System
: Windows 2000
6
Network Monitoring and Management using SNMP Protocol Area : Network Management
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth. An SNMP-managed network consists of three key components: managed devices, agents, and network-management systems(NMS).A managed device is a network node that contains an SNMP agent and that resides on a managed network. Managed devices collect and store management information and make this information available to NMS using SNMP. Managed devices, sometimes called network elements, can be routers and access servers, switches and bridges, hubs, computer hosts, or printers. An agent is a network-management software module that resides in a managed device. An agent has local knowledge of management information and translates that information into a form compatible with SNMP. An NMS executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management. One or more NMSs must exist on any managed network.
Monitor & Manage the Network. Administrators are able to work more intelligently. User interface with dynamic views to show device status The network and its associated resources and distributed applications become indispensable to the organization. Detection of Network Components Detection of Hardware details in a particular Win32 system. Retrieval of various SNMP parameters Report Generation Graphing all network components with its details
software specifications: Language Java Technologies
: Java JDK1.5 : Java.net
7
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
Segment based Streaming proxy in an enterprise Environment ABSTRACT: In streaming video applications are commonly used by most clients to watch video. The so far, implemented streaming functionality, however, presents many technical challenges at the client, server and the network, that have not yet been efficiently resolved. To provide efficient streaming to the client is the goal. The client in a distributed environment is connected to the server through a network The edge router called here as Co-ordinator Node (CN) of the network relieves the server of its process and responds to the request for streaming as requested by the client. Project description • • • • • • • •
Digital video enables quick and user friendly browsing of multimedia content, thus is highly desirable in streaming video application. I propose to implement efficient streaming video system over a distributed network. The success of peer-to-peer (P2P) applications in both commercial and research fields received attention. The reduced bandwidth and caching cost for media streaming thereby, provided a means for efficient streaming functionality. This concept relies on the Co-ordinator Node(CN) which is an edge router of the network connecting to the p2p network i.e, Client Group Distributed Cache - sharing of the storage resources, thus the storage of one client is made use by the needy in the group. The Co-ordinator Node takes care of the content distribution apart from normal routing. During the first request of any media file, by any client, the CN obtains the video segments from the server and places the segments in the distributed cache. Later when client requests for a streaming, the required frame segments are provided by peer client as directed by the CN. Hence the network latency, network bandwidth, storage etc., are not significant issues any more.
software specifications Language
: Java JDK1.5
Java Technologies
: JDBC,Java.net,JMF2.0
GUI Tool
: NetBean 5.5
8
Operating System
: Windows 2000
RDBMS
: Oracle9i/MS-Access
Design and Implementation of J2EE Patterns in multi-tier Enterprise Applications Abstract : A J2EE design pattern describes a proven solution to a recurring design problem, placing particular emphasis on the context and forces surrounding the problem, and the consequences and impact of the solution. This project provides a palette of patterns you can use in the context of designing Java 2 Platform, Enterprise Edition (J2EE) applications. Patterns reflect the experience, knowledge and insights of developers who have successfully used these patterns in their own work.
Patterns
provide a ready-made solution that can be adapted to different problems as necessary. Patterns provide a common vocabulary of solutions that can express large solutions succinctly. It is important remember that patterns do not guarantee success. A pattern description indicates when the pattern may be applicable, but only experience can provide understanding of when a particular pattern will improve a design. Patterns can be used effectively to improve the efficiency, performance, and user experience of a J2EE application. Multitiered J2EE applications consist of components communicating across tiers to access/change data. This often leads to remote calls between application clients/JSPs/servlets and EJBs or between EJBs.The design patterns suggest good solutions to minimize some of the performance costs in typical J2EE applications. Software Requirements: Language RDBMS
: Java JDK1.5, HTML : Oracle 9i
Development Methodologies : OOAD, UML &Unified process Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1, JSP Application Server
: Weblogic8.1
Platform
: WINDOWS NT/2000
9
Design and Implementation of a User-Centered Content Distribution Network Abstract: Content delivery networks are quite popular among administrators of large Web sites. However, servers holding open-source content and small businesses may prefer a cheaper, yet efficient, solution. We believe that such users are willing to contribute their unused resources to the community in exchange for improved performance for their own site. We propose a decentralized scheme where the owner of a Web site can accept to host replicas from other sites, and obtain in return the ability to deploy replicas of his own documents at remote places. This allows administrators to independently organize a service similar to that of commercial CDNs. This approach is attractive, since it allows one to acquire valuable remote resources in exchange for relatively cheap local resources. Globule is a user-centered content delivery network that our group is developing . It allows Web servers to host each other’s replicated Web documents. To favor integration into existing Web systems, it is designed as a module for the popular Apache server. This project presents the design and implementation of Globule, together with performance measurements. Unlike most Web replication systems, Globule does not apply a fixed replication policy to all documents. As we have shown in previous research, there is no single policy that is best in all cases. This statement is true even for simple Web documents that are constructed as a static collection of HTML files, images, icons, and so on. As a consequence, Globule contains a multitude of replication policies, and associates each document with the policy that suits it best. This is realized with an object-based approach in which each document is encapsulated in an object that is fully responsible for its own distribution. In other words, eachWeb document is considered as an object which does not only encapsulate its state and operations, but also the implementation of a replication policy by which that state is delivered to clients. This allows a document to monitor its own access patterns and to dynamically select the replication policy that suits it best. Software Requirements: Language
: Java JDK1.4
10
Java Technologies
: Servlet, JSP, JDBC and Tomcat Server
Operating System
: Windows 2000
INTERNET AND MOBILE BANKING SYSTEM
ABSTRACT :
Now a days, the bank customer who is everything based on the
bank and can’t able to involve in the bank process. This Problem can be solved through Internet and mobile System. The main aim of this project is to computerize the Bank Process, which is used to reduce the customer transaction time as well as user can able to access from anywhere using internet and mobile. Internet and mobile banking people from every corner of the world can able to view his account details. This system also used to transact money to another client over the Internet and mobile. The user can verify his Cheque and demand draft details if another person may pass a demand draft or cheque. It provides a system for the user to access his bank account through his Internet and mobile. The system also enables the user to pay his bill through the Mobile as well as pay for some other services, which he has availed. The Internet and mobile banking system is not just for payment but a user of the system can also transfer money through the system. He can receive from his bank or from his business associates or friend or other person who is also connected to the system. software requirements
Language Browser Server side programming IDE Database Client side scripting Web Server
Java JDK 1.5 Nokia Simulator 4.0/Internet Explorer 5.0 JSP, JDBC and Servlets NetBean 5.5 MS-Access HTML,WML, WML-Script Apache Tomcat 5.5
11
Distributed Heterogeneous database drive based on CORBA Abstract: The main goal of this project is creating the database driver for controlling remote database using distributed object technology through Network. Distributed driver supports various SQL commands like c reate, insert, delete, update and view tables in a remote machine in user-friendly manner. Using these driver users can flexibly change the database without changing the driver. The concept used for creating and maintaining the remote database access using CORBA. CORBA based driver is language and platform independent and it supports different databases accessed from any remote locations within the internet. A CORBAbased system is a collection of objects that isolates the clients from the servers by a well-defined encapsulating interface Implemented by Interface Definition Language. The entire request is managed by the ORB. In other words, every invocation (whether it is local or remote) of a CORBA object is passed to an ORB. CORBA based driver also supports multiple heterogeneous databases so that it acts as database independent driver. Since the driver is developed based on CORBA clients can be develop in any language and platform supported by CORBA specification.
Software Requirements: Language
: JDK1.5
Java Technologies
: Swing, JDBC and Java ORB
IDE
: NETBEAN 5.5
Database
: Oracle, MS-Sql Server, MS-Access
Operating System
: Windows 2000/NT
12
Automata based Expert Knowledge Assessment System Abstract: : A teacher assesses a student’s knowledge in a specified field by posing a suitable first question from that field to the student by checking whether or not the student’s answer is correct, and by selecting a new question dependent on the student’s answer. The teacher selects all further questions corresponding to the student’s answers to previous questions. In that manner, questions, which are too difficult or too easy for the individual student, are avoided. The querying stops whenever the teacher has sufficient information on the student’s state of knowledge. In this project can be applied to construct efficient algorithms for the adaptive assessment of the student’s knowledge. The problem of knowledge assessment is a special case of the problem of assessing the state of a system. The assessment procedure poses questions to individual students and determines the student state of knowledge. At each step of the procedure, a questioning rule is used to select the next item to be tested. Depending on the student’s performance, state of the assessment system is changed using an update rule. Evaluation system uses the framework of the theory of finite automata. These results are obtained suggesting a new assessment algorithm whose formal equivalence to previously suggested assessment algorithms is proven. Software Specification: Platform
: Windows 2000/NT
Language
: Java (JDK 1.5)
GUI
: Java Applets, HTML
Server side Technologies
: Java Servlets 2.1, JDBC 2.0, JSP
Server
: Tomcat 5.5
Database
: Oracle 9i
13
Advanced Data Preprocessing for Web Usage Mining Abstract : To design popular web sites, publishers must understand their user’s needs. So analyzing user’s behavior recorded in web server log files are an important part of the design. Web usage mining applies data mining procedures to analyze users access of web sites. As with any knowledge discovery and data mining process, web usage mining contains three main steps: preprocessing, knowledge extraction and results analysis. The concept of web usage mining comes into play in case of networks where in there is an administrator monitoring the activities of the user. Most servers have efficient methods for maintaining the log information. But the drawback is in the representation of such details. The servers monitor such logging information and maintain the details using special log files. These files however represent information in form of raw textual data which is very difficult for the users to understand. The entire purpose is lost when the maintained files are in form of raw data, which is extremely difficult to understand. Our tool will perform an efficient parsing on the log file to store information onto convenient data structures in an explicit manner. The GUI presents the user with an interface, which enables the user to query the information stored in the log file. The user is allowed to specify filter variables on the basis of which the entire domain of data is filtered and displayed to the user according to his need. Our tool’s interface depicts a SQL command with graphical components such as buttons, text fields, combo boxes, tables, etc. to perform the querying.
Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing
Web Server
: Tomcat 5.5
IDE
: NetBean 5.5
14
Operating System
: Windows 2000/NT
Session based Admission Control: Peak Load Management of Commercial Web Sites Area: Internet Abstract: As the internet matures, companies are implementing mission critical applications. These applications provide dynamic content, integrate with database, and offer secure commercial transactions. Customers are becoming increasingly reliant on this complex business application for services such as banking, product purchase, and stock trading. These new services make great demands on web servers at a time when traffic is increasing rapidly, making it difficult to ensure an adequate level of service. Commercial applications impose a set of additional service level expectations. Access to webs service occurs in the form of a session consisting of many individual request. Placing an order through the web site involves further request relating to selecting a product , providing shipping information, payment arrangement and finally receiving a conformation. So in this project we show that an overloaded web server can experience a severe loss of throughput as a number of completed sessions compared against the server throughput measured ser second. Statistical analysis of completed sessions reveals that the overloaded web server discriminate against longer sessions. To improve the QoS for commercial web servers we implement session based admission control to prevent a web server from becoming overloaded and to ensure that longer session can be completed. This provides a fair guarantee of completion. Software Requirements: Language
: Java JDK1.5,HTML
Java Technologies
: Applets, JDBC,Servlets, JSP
Web server
: Tomcat5.5
Operating System
: Windows 2000
15
SNMP based Network Management Tool for Fault Isolation, Detection and Recovery Abstract: The main objective of this project is to design and development of network management tool for network fault detection, isolation and recovery. The system uses SNMP protocol to identify any fault occurs at any layer of internet protocol and this model captures information related to the network Services, layers, nodes, and functions in a systematic fashion. The use of a layered approach will precisely generate answers for queries the operators typically have for quickly detecting, isolating and correcting faults. A graphical interface model will automatically generate the related graphs to find out any fault occurs within the network. Our model gives the user interface for presenting the information generated from the graphs, at the operation time. A database also maintained to store the details for future reference. Network management allows a centralized network node, called the Network Management System (NMS), to monitor and control other links and nodes of the network. Monitoring is needed to detect any failures, to collect performance data to finetune the network, and to provide resource usage information for billing purposes. Control is needed to reconfigure the network and to take corrective steps, reacting to the various failures. These corrective steps could be automated response from the NMS or humangenerated commands for diagnostics, tests, and resetting. Software Requirements Language
: Java JDK1.5
Java Technologies
: Java.net, Swing
IDE
: NetBean 5.5
16
Operating System
: Windows 2000
WEB BASED REMOTE DATABASE SERVER ADMINISTRATION
Abstract: Web based remote database server administration is a complete database server access system from any location around the globe over the internet. The main functionality of the software is as follows,
Remote login enable the admin to access the database from any location.
Create, insert, delete, update and view tables could be done in a remote machine in user-friendly manner.
Multiple database support – Oracle, MS-SQL, MySQL
Mandatory access control policy is supported to restrict the user access level. There are three access levels a) Operation level b) Table level c) Database level
It can be used to technical person to fix the problems on web server without appear on that machine.
Remote Database Administration (DBA) services, as a means to reduce IT expenses is the order of the day.
Remote rendering of DBA services results in improved system performance, enabling high efficiency and lower cost of operation. Gain a predictable annual budget for database administration
Reduce DBA expenses: salary increases, benefits, recruiting, and training
Software Requirements: Language
: JDK1.5
Java Technologies
: Swing, JDBC, Servlets
IDE
: NETBEAN 5.5
Web Server
: Tomcat5.5
17
Database
: Oracle, MS-Sql Server, MS-Access
Operating System
: Windows 2000/NT
Image Pattern search in distributed Image Database ABSTRACT:
The main objective of this project is to treat image as a basic component of information interchange. An image database system is a combination of three basic components. First is the extraction of information from physical images, the second one is responsible for the storage and management of original images and the extracted information. The third component concerns querying the database. An image is associated with two kinds of descriptors, viz., information about its content and information related to the spatial arrangements of its pictorial elements. To make the image database flexible, the spatial knowledge embedded in images is preserved by the data structures used to store them. Retrieving pictures that satisfy high-level spatial queries is an important issue of this project. Retrieve images based on the patterns in distributed databases. Pattern will be searched in Multiple database in a networked environment Image processing facilities also be included to store and retrieve analysed data
Software used in the project: Platform :
Windows 2000/NT
18
Language :
Java (JDK 1.5), JDBC 2.0
Database :
Oracle 9i
GUI
:
Swing
IDE
:
NetBean 5.5
Open Grid Services Architecture for Healthcare ( J2EE ) Abstract: The Internet is still used primarily for person-to-person communications, with computers storing and delivering information that is meaningful only to humans. Emerging Web services provide a framework for application-to-application interaction that grants access to business-to-business, e-science, and e-government services over the Internet. These services will allow a more extensive use of the Web’s functionality by supporting automated processes involving machine-to-machine cooperation and interaction. In the meantime, a significant network infrastructure for exchanging programs and computing services as well as data is emerging. This infrastructure – the Grid – supports the creation of integrated computing environments in which distributed organizations can share data, programs, and computing nodes to implement decentralized services in science and business. In short, we can consider the Web an “information Grid” and the Grid an “extended Web“ that goes beyond information sharing to allow users to share computer resources. Just as the Web grew from an infrastructure for scientific collaboration to a major communication medium for e-business, the Grid might find its main arena in commercial distributed applications (business-to-business, e-commerce, enterprise
computing, and so on).
OGAS( Open Grid Services Architecture) is based on web services WSDL,UDDI, SOAP and XML. This project implements medical grid.
Software Specification:
19
Platform
: Windows 2000/NT
Language
: Java (JDK 1.5)
Server side Technologies
: Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Web Services
: XML,WSDL,SOAP and UDDI
Server
: Weblogic 8.1
Database
: Oracle 9i
Single Sign on authentication ABSTRACT : With the increasing use of distributed systems users need to access resources that are often remote. Traditionally users have had to sign-on to multiple systems, each of which may involve different usernames and authentication techniques. In contrast, with single sign-on, the user needs to authenticate only once and the authenticated identity is securely carried across the network to access resources on behalf of the user. To solve these problems by letting individuals log in to many Internet services while authenticating only once, or at least always in the same way. Enterprise hope that single-sign-on protocols will significantly decrease customer-care costs due to forgotten passwords and increase e-commerce transactions by enhancing the user experience. Commercial interest centers on distributed enterprises and on small federations of enterprises with existing business relationships, such as supply chains. To use sign-on protocol, an individual registers with a so-called identity provider. The identity provider will later be the only party to directly authenticate the user, either globally or within a federation of enterprises. This confirms the user’s identity to the other parties, or service providers. Software Requirements: Language
: JDK1.5
Java Technologies
: Swing, JDBC, Servlets
IDE
: NETBEAN 5.5
Web Server
: Tomcat5.5
Database
: MS-Access
20
Operating System
: Windows 2000/NT
E-Business Information Sharing using Extranet An extranet is like a “private” business club. It provides a central location for forging deals, collaborating with outside companies, and transacting business with existing trading partners. In an extranet, however, the “club” operates on-line and, since it uses the same user-friendly technology that has made the Internet a global network, its “members” can include companies of all sizes located in virtually every corner of the world. The Project “E-Business Information Sharing using Extranet “ is aimed at to make Car Company business dealing with the various business partners like Supplier, Distributor, banker etc. through extranet. This Project is a part of an ongoing web application Project.
This Project provides more reliable security for the e-business
contributors. The proposed system overcomes the drawbacks of existing client/server by implementing Multi-tier Architecture in which the Business logic is completely separated from the client and it forms the middle layer between the client layer and the data access layer. Since the business logic is separated from the client any changes that has to be made to the business logic can be made easily within short span of time. The system is, basically a multi-tier, distributed, enterprise oriented one. It has the features of working in a heterogeneous network, i.e., all the branch offices of the enterprise are globally connected to a centralized server in a secured network. The Project is based on an extranet through the Internet. The communication between the client and the server happens through the Internet but only the authenticated users i.e., the employees of the company have access to the system. Hence the system is secured from unauthorized access.
21
Since all the offices are globally connected the current status of any particular company is available at any time, which is very helpful to make effective management decisions thus offering a competitive edge over the other enterprises. The proposed system perfectly suits the heterogeneous network of systems as it is developed using the platform independent enterprise solution the Enterprise Java Bean Technology.
The following are some of the advantages of the proposed system: •Platform independence. •Highly secured. •Suits well for distributed enterprise application. •To control traffic replication of middle-tier can be done. •Re-compilation of the components not needed. •High processing speed. •Simultaneous access of shared data. software specifications Language
: JDK1.5 , HTML
Java Technologies
: Applets,JDBC,JNDI,Servlets & EJB
Application Server
: Weblogic 8.1
Designing Tool
: Rational Rose 2000
GUI Tool
: NetBean 5.5
Browser
: Internet Explorer 5.1 & Netscap Navigater
Operating System
: Windows 2000
RDBMS
: Oracle 9i
22
Distributed Services using JINI (Distributed Objects) Abstract: Jini is the name for a distributed computing environment, which can offer ``network plug and play’’. A device or a software service can be connected to a network and announce its presence, and clients that wish to use such a service can then locate it and call it to perform tasks. Distributed systems require strategies to detect and recover from failures. One commonly used strategy employs a leasing mechanism, where a node grants a leaseholder access to a resource for a limited time (the lease period). If the resource is needed beyond the original lease period, then the leaseholder can renew the lease by requesting additional lease periods. Once the resource is no longer needed, the leaseholder may relinquish its lease. If the leaseholder does not renew a lease before expiration of the lease period, the lease grantor assumes leaseholder failure and terminates the lease to prevent resource leaks. In any leasing system, questions arise regarding how to select the lease period. Choosing an appropriate lease period requires consideration of tradeoffs among resource utilization, responsiveness, and number of leaseholders. Jini can be used for mobile computing tasks where a service may only be connected to a network for a short time, but it can more generally be used in any network where there is some degree of change. There are a large number of scenarios where this would be useful. project description: In our project we are going to access files (resource) from the remote service present in the network. We are using three processes for access the resource. File browsing is the process used to search the required files from the network (list of files which are
23
available for distributed computing displayed in the client machine). Downloading process is used to download the selected files from the network. Scanning process is used to scan the ports that are to find out which port is in open mode. Scanning is used to identify which port is busy and which are not. software specification Language
: Java JDK 1.5
Operating system
: windows 2000/NT
Java technologies
: jini 2.0
DESIGN AND IMPLEMENTATION OF MESSAGE INTEGRITY PROTOCOL Abstract : Recently, Computer security has become an important issue. More and more systems have added control to the access process for avoiding illegitimate users reading sensitive information. Cryptography is a powerful tool for building secure distributed systems, at substantial computational cost. This is especially true for public key cryptography. Cryptography is an often misunderstood and misused security tool. Today more than ever, privacy is a necessary part of business communications. Conventional wisdom dictates that cryptography must be done locally in order to be secure. Security of data in transit over the Internet/intranet becomes increasingly necessary because of steadily growing data volume and importance. Also some confidential data like the transactions involving credit cards through internet needs security as an important criteria. This network architecture amortizes the cost of special purpose cryptographic hardware across many users. Cryptography helps provide: Authentication, Data Integrity, Privacy and Non-Repudiation. The aim of our project is to ensure security of data transported and routed through high application layers by implementing the message integrity protocol. Message integrity protocol is designed
24
to make use of TCP as a communication layer to provide a reliable end-to-end secure and authenticated connection between two points over a network (for example between the service client and the server). The plan is to design and implement Message Digest Protocol, which Provides security using RSA algorithm and One-Way Hash Functions. The main objective of the Message integrity protocol is •
Authenticating the client and server to each other
•
Ensuring data integrity
•
Securing data privacy
In our project we ensure security by implementing RSA and MD5 algorithm together. Basic operations of MESSAGE INTEGRITY PROTOCOL is Both the sender and receiver are authenticated separately by the authentication server. The data is encrypted using RSA algorithm. Then hash function is generated. The encrypted message and hash function together are transferred to the destination. At the receiver side, integrity of data is checked by generating hash function using the encrypted message sent. Then the hash function generated at the receiver is checked with hash function send from the transmitter. software specifications Language
: Java JDK1.5
Java Technologies
: JDBC,Java.net,Javax.crypto
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
RDBMS
: Oracle9i/MS-Access
25
Distributed encoded Video Streaming through Caches. Abstract : The efficient distribution of stored information has become a major concern in the internet which has increasingly become a vehicle for the transport of stored video. Because of the highly heterogeneous access to the Internet, researchers and engineers have argued for layered encoded video. In this project we deliver layered encoded video using caches and heuristics to determine which video and which layers in the video should be cached in order to maximize the revenue from the streaming service. The revenue increases nearly logarithmically with the cache size and linearly with the link bandwidth that connects the cache to origin servers. This project improves the efficiency of distributed video from servers to end users. As with web content, it clearly makes sense to insert intermediate cache between the server and client. This will allow users to access much of the stored video content from near by servers, rather than accessing the video from a potentially distant server.
software specifications
Language
: Java JDK1.5
Java Technologies
: JDBC,Java.net,JMF2.0
GUI Tool
: NetBean 5.5 26
Operating System
: Windows 2000
RDBMS
: Oracle9i/MS-Access
Steganography in JPEG 2000 Compressed Images ABSTRACT: Information hiding in JPEG2000 compressed images is investigated in this project. JPEG2000 is an upcoming still image coding standard. This standard complements JPEG by providing several important features such as resolution, better resilience to bit errors, etc. it is believed JPEG2000 will be used widely and its rich features will benefit many emerging applications. The challenges of covert communication in this state -of-the-art image codes are analyzed and a steganographic scheme is then proposed to reliably embed high-volume data into JPEG 2000 bit stream. The project is concerned with the development application to hide data into JPEG2000 bit stream. Cryptographic techniques extend the security of the hidden data. The application should be easy to use and should run on multiple platforms. software specifications Language
: Java JDK1.5
Java Technologies
: Java.net
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
27
INTEGRATED DATA MIGRATION Abstract: Integrated data migration is a semi enterprise application which provides data transfer between two applications along with data format conversion, platform independence. Server Operations Displays the menu Creates the new Instance of a server when requested User Authentication is done in server User Management is a main Operation of server Accepts the User information and connects to the database and checks for a valid user If valid user Client gui will be displayed for futher actions If not, an error message will be displayed Receives the user details and registers the user as an valid user Option is provided to edit user details after registration Administrator can view the user details If required, administrator can also delete the user
Connection Establishment through JDBC Ms-Access connection-Provides access to MS-Access Database
28
Mysql connection-Provides access to MySQL Oracle connection -Provides access to Oracle Client Operations Displays the client Main Menu If “Select” menu item is selected you are provided with two panels You can enter the database name and save the data in the text file if you have choosen TextFile panel You can choose Database File panel if you need to convert from one data format to another (for ex oracle to mysql) If DataBaseFile panel is choosen we enter the database name,the available table will be displayed You can choose any table that needed to be converted Once you choose the table, the content of
the table will be displayed along with
options to convert the table to required format
Client [Middle Format Data Conversion] Once the table is selected the data in the table are copied in to text file and the fields are seperated using the delimiter % You can choose any type of conversion According to the option the details of conversion and required format should be provided Advantages Enables the data in one database format [MYSQL, Oracle ,MS-Access] to be transferred to another database [MYSQL, Oracle, MS-Access] Enables the data to be transferred across two different platforms
29
Avoids Manual Insertion of Data into the Database software specifications Language
: Java JDK1.5
Java Technologies
: JDBC
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
RDBMS
: Oracle9i/MS-Access
E-Business Information Sharing using J2EE An extranet is like a “private” business club. It provides a central location for forging deals, collaborating with outside companies, and transacting business with existing trading partners. In an extranet, however, the “club” operates on-line and, since it uses the same user-friendly technology that has made the Internet a global network, its “members” can include companies of all sizes located in virtually every corner of the world. The Project “E-Business Information Sharing using J2EE “ is aimed at to make Car Company business dealing with the various business partners like Supplier, Distributor, banker etc. through extranet. This Project is a part of an ongoing web application Project. This Project provides more reliable security for the e-business contributors. The proposed system overcomes the drawbacks of existing client/server by implementing Multi-tier Architecture in which the Business logic is completely separated from the client and it forms the middle layer between the client layer and the data access layer. Since the business logic is separated from the client any changes that has to be made to the business logic can be made easily within short span of time. 30
The system is, basically a multi-tier, distributed, enterprise oriented one. It has the features of working in a heterogeneous network, i.e., all the branch offices of the enterprise are globally connected to a centralized server in a secured network. The Project is based on an extranet through the Internet. The communication between the client and the server happens through the Internet but only the authenticated users i.e., the employees of the company have access to the system. Hence the system is secured from unauthorized access. Since all the offices are globally connected the current status of any particular company is available at any time, which is very helpful to make effective management decisions thus offering a competitive edge over the other enterprises. The proposed system perfectly suits the heterogeneous network of systems as it is developed using the platform independent enterprise solution the Enterprise Java Bean Technology. The following are some of the advantages of the proposed system: •Platform independence. •Highly secured. •Suits well for distributed enterprise application. •To control traffic replication of middle-tier can be done. •Re-compilation of the components not needed. •High processing speed. •Simultaneous access of shared data.
software specifications Language
: JDK1.5 , HTML
Java Technologies
: Applets,JDBC,JNDI,Servlets & EJB
Application Server
: Weblogic 8.1
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000 31
RDBMS
: Oracle 9i
A Dynamic and Temporal Role-Based Access Control for Enterprise System Abstract : The Role based access control consists of four basic components: a set of users Users, a set of roles Roles, a set of permissions Permissions, and a set of sessions Sessions. A user can be a human being or an autonomous agent. A role is a collection of permissions needed to perform a certain function within an organization. A permission refers to an access mode that can be exercised on an object in the system and a session relates a user to possibly many roles. In each session, a user can request activation of some of the roles he is authorized to assume. Such request is granted only if the corresponding role is enabled at the time of the request and the user is entitled to activate the role at that time. In the RBAC model, for four sets, namely, Users, Roles, Permissions, and Sessions, several functions are defined. The user role assignment and the role permission assignment functions model the assignment of users to roles and the assignment of permissions to roles, respectively. The user function maps each session to a single user, whereas the role function establishes a mapping between a session and a set of roles activated by the corresponding user in the session. In many practical real time applications, users may be restricted to assume roles only at predefined time periods. roles may only be invoked on pre-specified intervals of time depending upon when certain actions are permitted. However, the TRBAC model addresses the role enabling constraints only. In this project, we propose a Generalized Temporal Role-Based Access
32
Control model capable of expressing a wider range of temporal constraints. In particular, the model allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments. In an interval, activation of a role can further be restricted as a result of numerous activation constraints including cardinality constraints and maximum active duration constraints The main features of this model include periodic enabling of roles and temporal dependencies among roles which can be expressed through triggers. A role is said to be enabled if assumed by a user. Priorities are associated with role events, which in conjunction with a set of precedence rules, are used to resolve conflicts. TRBAC also allows an administrator to issue runtime requests for enabling and disabling a role. This project has been implemented based on Enterprise Banking System. Enterprise Banking System is developed in intranet environment using web interfaces. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Applets, JDBC, J2EE
Operating System
: Windows 2000
WebServer
: Tomcat 5.5
Database
: MS-Access/Oracle 9i SECURE E-VOTING
Abstract: With a rapid growth in computer networks, many people can access the network through the Internet and therefore an electronic voting can be a viable alternative for conducting an election. An electronic voting system must attempt to achieve at least the same level of security as ordinary elections. We have developed an electronic voting system, E-voting for a general election. The E-voting system employs cryptographic techniques to overcome the security issues in the election process. In this system, voter's privacy is guaranteed by using a blind signature for confidentiality and voter's digital signature for voter's authentication. E-voting is implemented by employing Java technology and cryptography provider. The provider, which is an open source library, is used to provide the secure communication channel. Using password-based encryption
33
with SHA and DSA algorithm so that only valid voter can use it protects the voter’s private key for digital signature. Software Specifications Language
: Java JDK1.5 , HTML
Java Technologies
: JSP, JDBC, JNDI, Servlets, Javax.crypto
Server
: Tomcat 5.5
GUI Tool
: NetBean 5.5
Browser
: Internet Explorer 5.1 & Netscape Navigater
Operating System
: Windows 2000
Improving Availability and Performance with Application-Specific Data Replication ABSTRACT: Improving availability and latency is crucial for business critical ecommerce servers. This project explores distributed object architecture to build an edge service data replication system for an e-commerce application, which simulates an online bookstore. Our goal is to build an edge service replication architecture using applicationspecific distributed objects for e-commerce applications. Standard e-commerce Implementations allows business logic to access the central databases directly. However, if business logic were distributed, accesses to a central database would become costly remote operations. Therefore, our edge service architecture replicates both business logic and data to edge servers by encapsulating the service’s shared data within application-specific distributed objects that manage this distributed state. As we deploy business logic, distributed objects, a database, and a messaging layer on a set of distributed servers that are accessed by clients via standard HTTP front ends. The distributed objects interpose between the business logic and the local database to control data access. They also communicate with other instances of the distributed objects through the persistent messaging layer to manage data replication and consistency.
34
We take advantage of application-specific semantics to design distributed objects that each manages a specific subset of shared information using simple and effective consistency models. Our experimental results show that by slightly relaxing consistency within individual distributed objects, our application realizes both high availability and excellent performance. Software Requirements: Platfrom
: Windows9x/2000
Language
: Java JDK1.5, J2EE.
Web server
: Tomcat Server 5.5.
Authentic and Secure Secret Distribution System ABSTRACT : Secure secret distribution system stores secrets for subsequent access by authorized clients. It also is a vehicle for exploring the generality of a relatively new approach to building distributed services that are both fault-tolerant and attack-tolerant. It is a distributed service for storage and dissemination of secrets. It was designed to be one of the components in a secure publish/subscribe communications infrastructure, providing the support for storing secret keys used to encrypt published information objects and ensuring that authorized subscribers retrieve those secret keys. The system binds secrets to names. Bindings are write once only a single value is ever bound to each name. The three system operations enable clients to manipulate and retrieve bindings: Create introduces a new name, Write associates a (presumably secret) value with name, and Read returns the value associated with a name. Having create and write be distinct rather than single compound operation provides the flexibility to separate the administration of a secret from associating value with that secret. We expect distinct principals will be concerned with these two kinds of operations, and we expect the operations to occur at different times. Clients of the system can expect the following security properties to hold: Confidentiality Secrecy
35
Authentication and Authorization Integrity Fault-Tolerance Attack-Tolerance Software Requirement : Platform :
Windows 2000/NT
Language :
Java (JDK 1.5)
Java Tech :
Java.net, JDBC
Database :
MS-Access
GUI
:
Swing
IDE
:
NetBean5.5
A Data Mining Algorithm for Generalized Web Prefetching Abstract : The popularity of the Internet and World Wide Web continues to grow. So does the number of users accessing information on the Web. This leads to continued increase of both network load and server load. Since the Internet capacity is not keeping pace, the net effect of this growth was a significant increase in the user perceived latency, that is, the time between when a client issues a request for a document and the time the response arrives. Potential sources of latency are the Web server’s heavy load, network congestion, low bandwidth, bandwidth underutilization, and propagation delay. To improve the situation, the technique of pre-fetching has been investigated. Pre-fetching refers to the process of deducing a client’s future requests for Web objects and getting those objects into the cache, in the background, before an explicit request is made for them. The Predictive Web pre-fetching refers to the mechanism of deducing the forthcoming page accesses of a client based on its past accesses. The main advantages of employing pre-fetching is that it prevents bandwidth underutilization and hides part of the latency. In this project, a new algorithm called WMo has been proposed, which is based on data mining and is proven to be a generalization of existing ones. Wmo is the generalization of
Dependency Graph and k-order PPM algorithm. An extensive
analytical and experimental comparison of all algorithms, indicates that the proposed
36
algorithm outperforms existing ones by combining their advantages without presenting their deficiencies. Software Requirements: Language
: Java JDK1.5,HTML
Java Technologies
: Applets, JDBC, Servlets, JSP
Web server
: Tomcat 5.5
Operating System
: Windows 2000
An Expiration Age-Based Document Placement Scheme for Cooperative Web Caching Abstract : The popularity of the Internet and World Wide Web continues to grow. So does the number of users accessing information on the Web. This leads to continued increase of both network load and server load. One way to meet this challenge is to try to scale network and server bandwidth to keep up with the client demand, which is an expensive strategy. An alternative is caching, which reduces network bandwidth and server load by migrating server files closer to those clients that use the files. Caching can be done either at a client (by Web browser) or in the network between clients and content servers (by proxy servers) Cooperative caching the sharing and coordination of cache state among multiple caching proxies has been recognized as one of the most important techniques to reduce Web traffic and alleviate network bottlenecks. In this project, we propose a simple and yet effective scheme to limit the replication of documents within a group. We view the aggregate disk space of the cache group as a global resource of the cache group and introduce the concept of cache expiration age to measure the disk space contention of caches. The new scheme is based on the expiration
37
ages of individual caches in the group, referred to as the Expiration Age-based scheme (EA scheme for short). The EA scheme effectively reduces the replication of documents across the cache group, while ensuring that a copy of the document always resides in a cache where it is likely to stay for the longest time. Further, the implementation does not involve any extra communication overheads when compared with the ad hoc scheme used in many existing cooperative-caching protocols. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC and Tomcat Server
Operating System
: Windows 2000
Efficient Dissemination of Personalized Information Using Content-Based Multicast Abstract : Future information systems will increasingly need to deliver the results of diverse applications to a growing number of users. While the information can be unicast to all the users, it is clear that multicasting the information offers a better alternative Considering the commonality in the information desired by various subscribers. Therefore, we believe that multicast will increase in importance at all levels of information and networking systems. Along with this increase in the use and importance of multicast, we also observe a need to generalize the notion of multicast to bring its advantages to bear on more sophisticated and specialized uses. Traditional or basic IP multicast consists of a set (or group) of participants, one of whom is typically the source whereas the others are sinks; any information generated by the source is delivered to the rest of the group by setting up a multicast tree. IP multicast services do not consider the structure and semantics of the information in the multicast process. We propose the use of Content-Based Multicast (CBM) where extra content filtering is performed at the interior nodes of the IP multicast tree; this will reduce network bandwidth usage and delivery delay, as well as the
38
computation required at the sources and sinks. In this paper, we evaluate the situations in which CBM is advantageous. The benefits of CBM depend critically upon how well filters are placed at interior nodes of the IP multicast tree and the costs depend upon those introduced by filters themselves. Further, we consider the benefits of allowing the filters to be mobile so as to respond to user mobility or changes in user interests and the corresponding costs of filter mobility. The criterion that we consider is the total network bandwidth utilization. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing, Java.net, JDBC
Operating System
: Windows 2000
Database Replication Techniques Based on Total Order Broadcast ABSTRACT : Database replication is traditionally handled in two ways, either with eager replication or with lazy replication. Eager replication implies an atomic commitment protocol and is slow and deadlock prone. Lazy replication is efficient, but does not enforce consistency between the replicas. To address this problem, replicated databases based on group communication have been proposed for some time. Those techniques, which typically replace the two-phase commit protocol, promise better performance. Techniques based on group communication typically rely on a primitive called total order broadcast. This primitive ensures that messages are delivered reliably and in the same order on all replicas. While most techniques described in the literature use total order broadcast, they do not use it in the same way. Some techniques use a single total order broadcast, while others need, additionally, a reliable broadcast. Moreover, some techniques do the broadcast at the start of the transaction and some others do it at the end. To avoid ambiguities with active replication technique, we call it certification-based replication. When the delegate server sd receives a transaction t from a client c, the server sd executes transaction t but delays the write operations. When commit time is reached, transaction t is broadcast to all servers using a total order broadcast. Upon delivering the message that contains t, each server executes a deterministic certification phase.
39
Certification decides if transaction t can commit or must abort. This technique shares the communication requirements with active replication: Only one total order broadcast is needed per transaction. This technique does not have the drawbacks of active replication: It can handle interactive transactions. On the other hand, this technique is optimistic: Conflicting transactions might be processed only to be aborted at the certification phase. This means such techniques are effective in low-conflict situations. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing, java.net, JDBC
Database
: Oracle9i
Operating System
: Windows 2000
Peer Trust PEER-TO-PEER (P2P) online communities can be seen as truly distributed computing applications in which peers communicate directly with one another to exchange information, distribute tasks, or execute transactions. In E-Commerce settings, P2P communities are often established dynamically with peers that are unrelated and unknown to each other. Peers have to manage the risk involved with the transactions without prior experience and knowledge about each other’s reputation. One way to address this uncertainty problem is to develop strategies for establishing trust and develop systems that can assist peers in assessing the level of trust they should place on an eCommerce transaction. Trust is critical in such electronic markets as it can provide buyers with high expectations of satisfying exchange relationships. The challenge of building such a reputation based trust mechanism in a P2P system is how to effectively cope with various malicious behavior of peers such as providing fake or misleading feedback about other peers. Another challenge is how to incorporate various contexts in building trust as they vary in different communities and transactions. we develop PeerTrust, a P2P reputation-based trust supporting framework. This project has a number of unique contributions. First, by analyzing a variety of common problems encountered in
40
today’s online communities, we introduce Peer-Trust model with five important parameters and a general trust metric combining these parameters for evaluating the trustworthiness of a peer in an evolving P2P community. We also present the trust information dissemination architecture, the usage of the trust model, and the design and implementation considerations of PeerTrust.
Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing, java.net, JDBC, JXTA
Operating System
: Windows 2000
E-LEARNING MANAGEMENT SYSTEMS ABSTRACT: The main aim of this project is to design and implement an Intranet Portal for a university department using Java 2 Enterprise Edition (J2EE) technologies. We will develop the system for the Computer Science department of the University. As most other university departments, the CS department has a traditional and static webpage. It displays the general information about the department, such as the programs/ courses offered, faculty / staff directory, and student organizations. This type of webpage suffers from two shortcomings: First, it does not serve as an interactive media for the students and faculties in the department. That is, it does not provide any facilities for a student, a faculty member, a research group, or a student club, to communicate or collaborate with the others in the same department. Second, it needs webmaster’s manual effort to present the up-to-date information about the department, such as news and events-to-come. In today’s world, it is difficult to rely on a single webmaster to present frequently updated information. If anybody eligible in the department can upload new information, information will be shared in a more efficient way.
41
To address these problems, we propose to develop an Intranet portal that provides the following functionalities: A user (faculty or student) belonging to the respective home department can log in using his/her ID and Password. Then depending on the type of the user, the portal will present information that is relevant to that particular user and his/her specific request. The faculty and students can be given different access rights to the various resources presented. The faculty members can upload their research work, post lecture notes, and make announcements. The students can search, view and download online material posted by faculty. A user can send messages to another user or a group of users. The faculties and students can participate in text-based discussion forums which is viewable to everyone. Data collection techniques such as Surveys and Polls can be implemented to collect information from different groups of users. This data can further be analyzed to get a perception of the aspects of a user or a group of users. This will make the portal more interesting and informative. We propose to use J2EE to implement this system. Using J2EE the entire system can be developed following a 3-tier architecture model. This is known as MVC2 (Model-ViewController) architecture in which an application's data model, user interface, and control logic are separated into three distinct components so that modifications to one component can be made with minimal impact to the others.
Software Requirements: Web Server
:
Tomcat 5.5
Server side scripting :
JSP
Database
:
MS-Access
Language
:
Java JDK1.5,HTML
42
Technologies
:
JSP,JDBC, Servlets,
GUI tool
:
NetBeans 5.5
Monitor
:
SVGA(M)
Project status reporting and auditing This status reporting tool allows the managers to predict the accuracy with which the employees are working. This is important because an accurate forecast is the key for having the right product, in the right place, at the right time. By providing an accurate forecast, the correct product can be delivered to the customers at the right time. The proposed project aims to design an application by which it is possible for the managers to predict the performance of the employees. The system permits only authenticated users who have been assigned access rights to work with the application. On login, the system validates the user and displays he various working links. The user can then select the necessary link to work upon. But there is some restriction on the access of the various links. The employees are only allowed to enter their daily timesheet and are not allowed to access other links or even view other employee’s details. The employees can only enter the working details and are not allowed to modify the details but are allowed to modify their personal details. The entry of the daily working hours is done on weekly basis. The project leaders are can view the details of the employees only under their projects. The Project leader has to enter the details of the umber of resources, training details for particular project. 43
The project managers can have access to almost all the employees in the company. The project manager is the one who can allocate projects to the employees. For this project manager must look upon the projects on which the employees are working so that any employee is not overloaded. The project allocates the projects and decides the project leader and the employees for that particular project. The Group leader can view and even modify the employee details. It is only the Group leader who can have access to the overall company aspects regarding the resources and the other billing details in the form of an excel sheet. Thus only the Group leader can access to all the links. User and Group level security is implemented in this status reporting tool. The benefits of this tool are: Saves time for managers. The Timesheet entry module handles most of the details involved with the total working hours of each employee. Improves customer service. This tool as describes the employees performance at the right time helps the managers to keep track of the work being carried out so as to provide the customers with the product they want, when they want it.
Software Requirements: Language
: Java JDK1.5,HTML
Java Technologies
: Applets, JDBC,Servlets, JSP
Web server
: Tomcat 5.5
Operating System
: Windows 2000
44
Trust Management in E-Commerce Abstract: The Internet changed the way people do business and communicate with each other. Since many of the resources on the Internet are private and not public, protection mechanisms are necessary to control the access to those resources. Various security mechanisms are deployed to protect private or commercial digital information accessible through the Internet. However, even when a secure and confidential channel is established between two entities, the concern about the trustworthiness of the participants in a transaction remains. Trust or reputation management is an important issue in ecommerce, where traders might have never met and know nothing about each other’s trustworthiness. This lack of information about traders’ reputations causes uncertainty and mistrust, which influences the e-market’s economic efficiency. The access control mechanisms used in traditional security infrastructures have been proven inadequate, inflexible, and difficult to apply to the Internet of today. In this work, we have proposed a general purpose, application-independent Distributed Trust Management System (DTMS). In DTMS, access rights are directly associated with a trust value. The trust values are further classified into direct trust values, indirect trust values and trust authorization levels. We have calculated and expressed each type of the trust values into explicit numerical numbers.
45
Reputation value is within the range of (0, 3000). A new user is assigned 0, the minimum value. A current user’s reputation is always higher than a new user’s. Two users can only rate each other once. If two users interact multiple times, Sporas only accepts the latest rating. This helps avoid the problem of two users intentionally increasing their reputation value by frequent interactions. It changes the reputation value of users with very high reputation values more slightly. A distributed trust management broker framework for eservices, such as e-commerce has introduced in this project. In their framework, each user (a client or a trader) is associated with a broker, which collects trust ratings of any service providers for its users. The trust-management framework consists of users, brokers, and reputation authorities. A broker maintains a database, which collects and stores trust information for the users that it’s associated with. When a client needs a trader’s trust information, it first contacts its broker. The broker’s reputation manager component processes requests from clients associated with the broker. If it can’t handle a request, it passes the request to the broker’s connection manager. The connection manager sends the request to other brokers and processes their replies. If no broker can provide the required information, it sends the request to the reputation authority. The reputation authority is designed as a universal database. It collects trust information from the public in a voluntary way and stores trust information for all users. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC
Web Server
: Tomcat Server 5.5
Operating System
: Windows 2000
46
E-Police-crime Investigation management system Abstract:
The institution is the Police. The proposed system applies to Police
Institutions all across the country and specifically looks into the subject of Crime Records Management. It is well understood that Crime Prevention, Detection and Conviction of criminals depend on a highly responsive backbone of Information Management. The efficiency of the Policing function and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it.
It is proposed to centralize Information Management in Crime
for the purposes of fast and efficient sharing of critical information across all Police Stations across the territory. Initially, the system will be implemented across Cities and Towns and later on, be interlinked so that a Police detective can access information across all records in the state thus helping speedy and successful completion to cases. The System would also be used to generate information for pro-active and preventive measures for fighting crime. The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SQLServer2000 and all the user interfaces has been designed using the JSP technologies. The database connectivity is planned using the “SQL Connection” methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are
47
produced as per the applicable strategies and standards that are put forwarded by the administrative staff. software specifications Language
: Java JDK1.5 , HTML
Java Technologies
: JSP,JDBC,JNDI,Servlets,XML
Server
: Tomcat 5.5
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
RDBMS
: MS-Access
Integrated Online Booking Services This project used to develop the facilities for online booking system for employees. The employee can able to search details like the portal for the best deals for air-fare, hotels, rent car and package tours. The employee can able to booking the online transaction like air tickets, hotel accommodation, rent cars and package tours. The queries/transactions should be made from a database of travel-sites, where the air- fare, hotel, car rental and tour information are stored, for every travel site.
software specifications Language
: Java JDK1.5 , HTML
Java Technologies
: JSP,JDBC,JNDI,Servlets,XML
Server
: Tomcat 5.5
GUI Tool
: NetBean 5.5
Operating System
: Windows 2000
RDBMS
: Oracle 9i
48
Efficient and Flexible E-Cash payment to prevent blackmailing Abstract : Recent advances in the Internet and WWW have enabled rapid development in e-commerce. More and more businesses have begun to develop or adopt e-commerce systems to support their selling/business activities. While this brings convenience for both consumers and vendors, many consumers have concerns about security and their private information when purchasing over the Internet, especially with electronic payment or e-cash payment. This project proposes a practical payment protocol with scalable anonymity for Internet purchases. The protocol uses electronic cash for payment transactions. It is an offline payment scheme that can prevent a consumer from spending a coin more than once. Consumers can improve anonymity if they are worried about disclosure of their identities to banks. An agent provides high anonymity through the issue of a certification. The agent certifies re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level, depending on the available time, computation, and cost. This system spends less computational resources and reduces network communication. No one can trace consumers from cash. However, the identity of a consumer can be found if he/she uses a coin twice. This project also prevents blackmailing by modifying existing e-cash system. A new online electronic cash scheme to prevent blackmailing is present by using group blind signature technique. The blackmailed cash was marked by an entity, called supervisor, so that the bank can distinguish it from the valid cash. Our scheme not only has all the advantages of existing
49
scheme, but also overcomes its some drawbacks such as inefficiency and impractical assumptions. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC and Crypto
Web Server
: Tomcat 5.5
Operating System
: Windows 2000
Self-Organized Public-key Management for Secure Mobile Ad Hoc Networks Abstract : A mobile adhoc network is an autonomous collection of mobile nodes that communicate over the wireless link. Due to node mobility, the network topology may change rapidly and unpredictably over time. Each node can act as a router and host. Wireless ad hoc networks are dynamic because the nodes may move randomly and join or leave the network any time at their will. As a result, the neighborhood and trust relationship may also change accordingly. Conventional public key management is implemented with public key infrastructure, in which a trusted third party holds the public key certificates of all participating entities and acts as an online Certificate Authority to provide a public key verification service. In mobile adhoc network implementing public key management is more challenging. The self-organizing publickey management system that allows users to create, store, distribute, and revoke their public keys without the help of any trusted authority or fixed server. The main motivation for taking this approach comes from the self-organized nature of mobile ad hoc networks, and from the need to allow users to fully control the security settings of the system. As such this approach is developed mainly for “open” networks, in which users can join and leave the network without any centralized control. In this project the broadcasting property of radio communications and self-signed public key certificates to propose a flexible public key management scheme for wireless ad hoc networks, which is able to overcome the above challenges. In the proposed system every node is able to hold dynamically two hops neighbours self-signed public certificates and distribute the public key certificates through multi-hop communication on demand in a verifiable way. In our
50
scheme, every intermediate node may check the 1- and 2-hop neighbor’s digital signatures, which guarantee that no single node may modify the public key certificate information during the distribution process. Our proposed scheme can be operated in a fully self-organized manner without relying on any central administration or CA. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC and Crypto
Web Server
: Tomcat 5.5
Operating System : Windows 200
Efficient and Flexible Digital Money Payment in Internet based Online Transactions Abstract : Recent advances in the Internet and WWW have enabled rapid development in e-commerce. More and more businesses have begun to develop or adopt e-commerce systems to support their selling/business activities. While this brings convenience for both consumers and vendors, many consumers have concerns about security and their private information when purchasing over the Internet, especially with electronic payment or digital money payment. This project proposes a practical digital money payment protocol with scalable anonymity for Internet purchases. The protocol uses electronic cash for payment transactions. It is an offline payment scheme that can prevent a consumer from spending a coin more than once. Consumers can improve anonymity if they are worried about disclosure of their identities to banks. An agent provides high anonymity through the issue of a certification. The agent certifies re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level, depending on the available time, computation, and cost. This system spends less computational resources and reduces network communication. No one can trace consumers from cash. However, the identity of a consumer can be found if he/she uses a coin twice.
51
Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC and Crypto
Web Server
: Tomcat 5.5
Operating System
: Windows 2000
Querying Multimedia Database using Fuzzy Logic Techniques Abstract: In multimedia age, new functionalities and capabilities are needed for managing new kind of data: images, sounds, text, video data, and their combination into composite objects .The special and temporal, retrieval, browsing, Integration and presentation requirements of multimedia data significantly differ from traditional data. Fuzzy Logic is known for providing a convenient tool for interfacing linguistic categories with numerical data and for expressing user’s performance in a gradual and qualitative way. Fuzzy set methods have been already applied to the representation of flexible queries and to the modelling of uncertain pieces of information in databases systems, as well as in information retrieval. This methodology seems to be even more promising in multimedia databases which have a complex structure and from which documents have to be retrieved and selected not only from their contents, but also from “the idea” the user has of their appearance, through queries specified in terms of user’s criteria. This project provides a preliminary design of the potential applications of fuzzy logic in multimedia databases. The problem of comparing Semi-structured document is first discussed. Querying issues are then more particularly emphasized. We distinguish two types of request, namely, those which can be handled within some extended version of an SQLlike language and those for which one has to elicit user’s preference through examples. 52
Software Requirements: Language
: JAVA JDK 1.5
Java Technologies
: JDBC
IDE
: NetBeans 5.5
Database
: ORACLE 9i
Operating System
: Windows2000/NT
Design and implementation advanced transactions in EJB Component Model Abstract: Enterprise Java Beans (EJB) is a new technology that aims at supporting distributed transactional component-based applications written in Java. One of the main goals of EJB is the support of electronic transactions on the Internet. In EJB, distributed flat transactions are supported with no means for supporting long-lived or cooperating transactions. In recent years, a lot of new advanced software applications have arisen, which have new requirements for transaction processing. Since EJB is modern concept that deals with transactions, the project analyze the support of EJB for those requirements for advanced transactions and identifies weaknesses of transactions in EJB. The project also implements an extension of the current transactional concepts in EJB, which can be a remedy for some of the weaknesses identified. The extension, called Bourgogne transactions, allows a transaction to delegate bean objects to other transactions, to share bean objects with other transactions, and to establish flow control dependencies between transactions. Implementation issues together with pitfalls of the proposed extension are also analyzed. Software Requirements: Language RDBMS
: Java JDK1.5, HTML : Oracle 9.0
Development Methodologies : OOAD, UML &Unified process
53
Java server side Technologies : JDBC2.0, Servlet 2.1, EJB1.1 Application Server
: Weblogic8.1
Platform
: WINDOWS NT/2000
ATM card back office management system Abstract: ATM-CMS is a card processing system, which provides full operations for issuing ATM cards and maintaining them by financial institutions. ATM-CMS offers a complete back-office solution, including merchant application scoring and screening, card management, credit management, cardholder billing and collection, merchant set-up, merchant deposits and payments, and risk management. Support for front-end transaction processing authorization is also provided, and is integrated with the any ATM switch. ATM-CMS provides a powerful management system for card products that enables financial institutions to define new products and services in response to market trends. The core features of ATM-CMS are as follows:
Card Issuing.
Card Maintenance.
Card Transactions.
Account Information.
ATM-CMS is an application that allows financial institutions to create, modify, and terminate the cards they issue. ATM-CMS also facilitates card production (embossing). System administrators may use ATM-CMS to configure and maintain all aspects of card issuance, such as card replacement, renewal and conversion. Administrators may also use ATM-CMS to identify stolen cards and terminated cards. Since ATM-CMS project is developed mainly using JAVA platform, OOPs concepts are widely used, some of the advantages in using OOPs are better security, 54
dynamic execution, data abstraction and hiding, faster execution, reusability, easier debugging etc., Software Specification: Platform
:Windows 2000/NT
Language
:Java (JDK 1.5)
GUI
:Java Applets, HTML
Server side Technologies
: Java Servlets 2.1, JDBC 2.0, JSP, EJB1.1
Server
:Weblogic 8.1
Database
:Oracle 9i
Enterprise Business Integration Using Web Services ABSTRACT : B2B integration or B2Bi is basically about the secured coordination of information among businesses and their information systems. It promises to dramatically transform the way business is conducted between partners, suppliers and customers or buyers. All companies (large, medium, small, or new) can experience increased growth and success through tightly integrated partnerships. Companies, from across a variety of industries, are embracing B2Bi and realizing the enormous competitive advantage it provides, through faster time to market, reduced cycle times, and increased customer service. Through integration of business and technical processes, companies are able to strengthen relationships with partners and customers, achieve seamless integration inside and outside the enterprise, gain real-time views of customer accounts, increase operational efficiencies, and reduce costs.Web Services, which are based on XML standards, are a boon to the world of B2B, as we discussed in the previous section that XML-based standards hold the key for the success of dynamic B2Bi and its wide spread adoption by companies of all sizes. Web Services are based on the following open standards: Web Services Description Language (WSDL - to describe), Universal Description, Discovery and Integration (UDDI - to advertise and syndicate), Simple Object Access Protocol (SOAP - to communicate) and Web Services Flow Language (WSFL - to define work flows). Thus, Web Services use SOAP based messages to achieve dynamic integration between two disparate applications. Companies use WSDL,
55
a Web Services standard, to describe their public and private Web Services and publish their Web Services either to a private or public repository and directory using UDDI. software specifications Language
: Java JDK1.5 , HTML
Java Technologies
: JSP,JDBC,JNDI,Servlets,XML,SOAP,UDDI
Application Server
: Weblogic 8.1
GUI Tool
: NetBeans 5.5
Operating System
: Windows 2000
RDBMS
: Oracle 9i
Extended database security design and implementation Abstract: Protection of data against unauthorized disclosure has been the major issue in database systems. As organizations increase their adoption of database systems as the key data management technology for day-to-day operations and decision making, the security of data managed by these systems becomes crucial. Damage and misuse of data affect not only a single user or application, but may have disastrous consequences on the entire organization. Hence the confidentiality and integrity is required to prevent unauthorized disclosure and modification. The proposed system implements Discretionary Access Control and Mandatory Access Control. Access control mechanisms of current DBMSs are based on discretionary policies governing the accesses of a subject to data based on the subject’s identity and authorization rules. These mechanisms are discretionary in that they allow subjects to grant authorizations on the data to other subjects. Because of such flexibility, discretionary policies are adopted in many application environments and this is the reason that commercial DBMSs adopt such policies. An important aspect of discretionary access control is thus related to the authorization administration policy. Authorization administration refers to the function of granting and revoking authorizations. Mandatory access control policies regulate accesses to data by subjects on the basis of predefined classifications of subjects and objects in the system. Objects are the passive entities storing information, such as relations, tuples in a relation, or
56
elements of a tuple. Subjects are active entities performing data accesses. The classification is based on a partially ordered set of access classes, often referred to as labels, that are associated with every subject and object in the system. A subject is granted access to a given object if and only if the access classes of the object and the subject satisfy some order relationship, depending on the access mode. This system also detects any intrusion in database. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Swing, java.net, JDBC
Operating System
: Windows 2000
A Compressed Video Database Structured for Active Browsing and Search Abstract—In this project, we describe a unique new paradigm for video database management known as ViBE (video indexing and browsing environment). ViBE is a browseable / searchable paradigm for organizing video data containing a large number of sequences. The system first segments video sequences into shots by using a new feature vector known as the Generalized Trace obtained from the DC-sequence of the compressed data. Each video shot is then represented by a hierarchical structure known as the shot tree. The shots are then classified into pseudo-semantic classes that describe the shot content. Finally, the results are presented to the user in an active browsing environment using a similarity pyramid data structure. The similarity pyramid allows the user to view the video database at various levels of detail. The user can also define semantic classes and reorganize the browsing environment based on relevance feedback. We describe how ViBE performs on a database of MPEG sequences. Software Environment Platform :
Windows 2000/NT
Language :
Java (JDK 1.5), JDBC 2.0
Database :
Oracle 9i
57
GUI
:
Swing
IDE
:
NetBeans 5.5
News Video Querying and Browsing on Content Based Multi-Tier Distributed News Video Server Architecture Abstract: The recent proliferation of digital images and video has brought new opportunities to end-users that now have a large amount of resources when searching for content over Internet. Due to the rapidly changing nature of modern society, watching news has become a part of daily life. Keeping up with the news has already become essential for modern people to catch up the rapidly changing times. With the massive use of the World Wide Web, a great many TV stations also build their own news video web servers, which allow users to watch news video through the Internet. It is therefore essential to develop a search engine integrating the news video information in all news video web servers so that users can find out their concerned news video stories in a short time. In recent years there has been a great interest in designing and building systems that organize and search news video data based on its content form distributed news video servers. This project proposes efficient news video browsing system based on distributed news video servers that share news video with the clients. Hence a multi-tier architecture has been proposed to browse news video form the global news video content. The proposed system applies efficient summarization and content-based retrieval technique to search news video. The system has been divided into four-layer architecture, which composed of client side visual browser/viewer, query processing server, Preprocessing server and news video server. This system processes all the news video provided by news 58
video web servers and provides a querying/browsing interface. Each news video story is represented by its story abstract, which consists of key sentences and key frames generated from news script and news video stream, respectively. Especially, the visualized scanning of key frames facilitates the quick understanding of a news video story. Preprocessing server summarizes the story abstract based on the classification and generates metadata based on the content of the news video and key frame. Once a user find out his concerned news story, he could click the provided link to access the whole video of this news story stored in its corresponding news video web server. Software Requirements: Language
: Java JDK1.5
Java Technologies
: Servlet, JSP, JDBC, Java.net
Webserver
: Tomcat 5.5
Operating System
: Windows 2000
Distributed Resource Sharing on peer to peer Peer-to-Peer networks have excellent decentralized architecture and with enable distributed technology they could easily harvest the resources in each peer. Hence these networks are gaining importance in networking world. This project is aiming at logically dividing the network into differnt groups based upon its significance. There is a server running in the network which is keeping track of all the available computers connected in the network. A computer connected in the network is not knowing about other machines available in the network. The machine which is looking for a resource (client)is making a query to the server in the form of request. The server will acknowledge the request and broadcast this query to all machines connected in a particular Group. The server will wait until it receives response from each nodes in the network. This response will be sent to the machine which had asked for the resource. The response basically contains the IP address of the machines in the network which contains the requested resource. Once the IP address is known, the client machine can directly contact the machine which has the resource directly bypassing the server.
59
The various functionalities supported by this architecture areFILE LISTING FILE DOWNLOADING KEYWORD SEARCH INSTANT MESSAGING
SOFTWARE SPECIFICATIONS Language
: Java JDK1.5
Java Technologies
: Java.net
GUI Tool
: Netbean 5.5
Operating System
: Windows 2000
Peer-to-peer video distribution management system using JXTA Abstract :
PEER-TO-PEER (P2P) computing has recently attracted a great deal of research attention. In a P2P system, a large number of nodes can potentially be pooled together to share their resources, information, and services. Many filebased P2P systems have already been deployed. The JXTA platform provides developers with a flexible, standards-based set of protocols and reference libraries using java programming. Using JXTA, developers can focus on implementing their collaborative applications rather than on the specifics of P2P technology. The JXTA platform is the next stage of development in the maturing P2P arena, a fundamental shift in the way people use the Internet. Using JXTA, developers can create new applications that will communicate with any number of distributed peers, providing distributed search, file sharing, and collaboration services without relying on the traditional client/server hierarchy. The result is more robust and reliable applications that enable users to fully realize the communication capabilities of the Internet. This project is designed to search and locate the video shared among the peer group. This project has the capability of serving multimedia
60
resources with high availability at a much lower cost while maximizing the use of resources from every peer connected to the P2P network. It also provides ownership of media files, any peer accessing video can be played by the peer and can not be redistributed or copied into the local system. JXTA Platform has been extensively used to develop the project. Software Requirements:
Language
: Java JDK1.4
Java Technologies : Swing, java.net, JXTA Operating System
: Windows 2000
Unified User Satisfaction based Transaction Management in Web-Database Systems Introduction: As the Internet matures, companies are implementing mission critical Internet applications. These applications provide dynamic content, integrate with databases and offer secure commercial transactions. Customers are becoming increasingly reliant on these complex business applications for services such as banking, product purchases and stock trading. These new services make greater demands on web databases and servers at a time when traffic is increasing rapidly, making it difficult to ensure adequate level of service. Web-based database systems of today manage time sensitive data and must comply with several requirements such as freshness and deadlines. This project has been designed to improve overall user satisfaction level in web based database transactions. A framework is proposed to measure the overall effectiveness of the Web-database system and a unified User Satisfaction Metric for Webdatabase that incorporates multiple factors and can be tailored to the users’ needs and preferences. Two algorithms have been developed to perform admission control and update frequency modulation to balance the query and update workload. A User Centric Transaction Management system uses the feedback control mechanism and it relies on an admission control algorithm along with a new update frequency modulation scheme in order to maximize user satisfaction metric.
61
A User Centric Transaction Management system uses the Load Balancing controller the feedback control mechanism and it relies on an admission control algorithm along with a new update frequency modulation scheme in order to maximize user satisfaction metric. The QAC uses Adaptive Allocation Algorithm to decide upon whether to accept or reject the query. The Update frequency modulation uses Lottery Scheduling based upon the frequency to decide whether to accept or reject the updation. Software Requirements: Language
: Java JDK1.4
Java Technologies
: Servlet, JSP, JDBC
Web Server
: Tomcat Server
Operating System
: Windows 2000
Workload Aware Load Balancing Scheme for Replicated Web Servers Abstract: Serving the ever-increasing and diversified customer population in web systems while ensuring high availability in a cost-effective way is a challenge. Service replication is the obvious vehicle to achieve scalability and availability, but this requires robust load balancing policies, especially given the complexity of the workload characteristics experienced by a Web cluster. Contemporary servers provide not only static and read-only information, but also personalized dynamic pages created on demand. This, in conjunction with bursty client request rates that fluctuate dramatically even within short periods of time and the wide disparity of per-request CPU and I/O resource requirements, further complicates resource allocation in Web server clusters. Being able to swiftly adapt the scheduling policy to the workload without human intervention is critical for the commercial success of Web sites. An effective load balancing policy must self-adjust its parameters as the arrival and service characteristics of the incoming workload changes. This project proposed a new policy work load aware load balancing and gave a proof of concept that dynamically readjusting its parameters based on the monitored 62
workload is a promising approach. It advocates dedicating servers to requests of similar size, with the aim of reducing the average job slowdown through separation of long and short jobs. The policy is based on the empirical distribution of the workload resource demands, i.e., the request sizes and their frequencies. The policy is examined under a workload that changes dramatically across time and uses knowledge of the history of request distribution to allocate incoming requests and to adjust its balancing parameters on-the-fly. Workload aware load balancing tends to assign requests for the same file to the same server, thus it achieves a high cache hit ratio and low slowdowns. Unlike location-aware policies, though, it does not have to maintain the status of each server’s cache.
SOFTWARE REQUIREMENTS: Platform
:Windows 2000
Language
: Java JDK1.5,
Java Technologies: J2EE. Web server : Tomcat Server.
Design and Implementation of Multiple-Criteria Negotiation Support System Abstract: Electronic marketplaces have recently been built that allow many types
of multiple-criteria bargaining schemes. Within these marketplaces, systems have been constructed to enable bargaining between a single buyer and a single seller, which is known as bilateral bargaining; forward auctions that involve many buyers and one seller and reverse auctions that involve one buyer and many sellers, which are known as multilateral bargaining; and dynamic exchanges between many buyers and many sellers, which are termed double-sided bargaining. However, 63
recent developments in information technology have enabled the creation of a single platform that can aggregate many buyers and sellers with various pricing schemes through the use of such technologies as mobile agents, which combine the demands of buyers to solicit better offers from sellers. This project proposes a negotiation support system that uses the utility function to model the preferences and strategies of negotiators. The proposed system is an active collaboration and negotiation framework that uses an active document that consists of data and software, data and macros, or data and scripts that can be manipulated interactively. The document can initiate complex actions when certain form fields are completed, which allows business logics or business rules to be embedded and adapted to different collaborative strategies. An active collaboration and negotiation framework is a negotiation support system to support decision-making and group collaboration. This project proposes an active collaboration and negotiation framework for the construction of a semi-automated negotiation process in which a utility function depicts the preferences of the negotiators. A semi-automated approach is used because human preferences and behavior are very complex, and it is difficult to completely and precisely model internal reference prices, reference prices, and different types of negotiation strategies. This study allows human involvement in the determination of bargaining strategies and utility functions, but the negotiation process is fully automated through the use of mobile agents and stationary agents. Mobile agents are used because they can carry active documents between the negotiators while the stationary agents process the activities locally. Software Requirements: Language
: Java JDK1.4
Java Technologies : Servlet, JSP, JDBC Web Server
: Tomcat Server
Operating System
: Windows 2000 64
Session based Admission Control and Quality of Service Differentiation on eCommerce Server Abstract: A session is a sequence of individual requests of different types made by a single customer during a single visit to an e-Commerce site. During a session, a customer can issue consecutive requests of various functions such as browse, search, select, add to shopping cart, register, and pay. It has been observed that different customers exhibit different navigation patterns. An e-Commerce session contains a sequence of requests for various functions in different states. Requests in different states have different opportunities to turn themselves to be profitable. A scalable e-Commerce server should also provide different levels of QoS to requests in different states in each session so that profitable requests like order and checkout can be completed in a timely manner. Service differentiation is to treat client requests differently based on clients’ needs and servers’ resource limitations. Because clients are different in their visiting patterns, receiving devices and service payments, a scalable e-Commerce server needs to provide different levels of QoS to different clients. In this project, a 2D service differentiation model has been proposed for session-based e-Commerce applications, namely, inter-session and intra-session differentiation. It proposes a processing rate allocation scheme for the objective of achieving 2D proportional slowdown differentiation to the clients. Based on a resource allocation optimization, then proposed a square-root proportional rate allocation scheme that optimizes a system-wide QoS to the server and also provides square-root proportional slowdown differentiation to the clients. The results have shown that both schemes can consistently achieve predictable, controllable, and fair 2D service differentiation in the short time scales and long time scales. The square-root proportional rate allocation scheme provides 2D service differentiation at a minimum cost of service slowdown. To improve the web Quality of Service for web servers, a session-based admission control has been introduced to prevent a web server from becoming overloaded and ensure the 65
longer session can be completed without disconnections. The term web quality of service to describe the service levels needed to complete web sessions. A web server that ensures a fair opportunity and guarantee of completion for all sessions, independent of session length, exhibits good web quality of service. To satisfy the web quality of service requirements, a session-based admission control mechanism for a server handling a session-based workload would be implemented. Software Requirements: Language
: Java JDK5
Java Technologies : Applets, Servlets, JSP, JDBC Web Server
: Tomcat 5.1
Operating System
: Windows 2000
Backend Database :MS-Access Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Abstract: Group membership has been an important problem in the area of faulttolerant distributed computing. Solving the problem requires the provision of a service that establishes and maintains some kind of agreement over time among participating components about who is currently in the group, despite the presence of failures in the corresponding distributed system. Such a group membership service simplifies the development of many fault-tolerant distributed applications and is widely used for supporting reliable group communications. We encountered a group membership problem in our attempt to support group computation in ad hoc mobile environments. Peer-to-peer or group cooperation are common scenarios for ad hoc mobile applications. When two or more mobile hosts come together to form a group working on the same problem, it is sometimes essential for all of them to have the same view of the joint computation state when they start working or when some of the members leave the group. One important piece of
66
group state information is membership in the group, i.e., who is and who is not in the working group. The design of ad Hoc mobile applications often requires the availability of the application state among the participating hosts. Such views are important because they simplify both the programming and verification tasks. Our ultimate goal is to provide application developers with the ability to maintain a consistent global data structure in a setting in which mobile hosts come and go as they please and engage in reliable transient collaborative activities. The group membership service needs to provide an accurate snapshot of the membership view all the time, and a message entrusted in a view shall be, guaranteed to be delivered to members, given appropriate system assumptions. This property is preserved over time despite movement and frequent disconnections. The protocol splits and merges groups and maintains a logical connectivity graph based on a notion of safe distance. We provide the specification for a partitionable group membership service supporting ad Hoc mobile applications and propose a protocol for implementing the service. Software Requirements: Language
: Java JDK1.5
IDE
: Netbean 5.5
Operating System
: Windows 9x/2000 ,NT
Service-mining Based on the Knowledge and Customer Databases Abstract: Nowadays, the application systems run in many companies such as Enterprises Resource Planning(ERP), Customer Relationship Management(CRM) are lack of the capability to mining from their database with some special service guideline to find the best service opportunity and the best item of service for their customers. Although, technology of Data mining provide us a way to find the relevant knowledge from massive data, it is not suitable to those companies who must provide their service by a fixed regulation but the service providing
67
opportunity is totally depend on the products condition. Service-mining is based on customer service database, through analysis and statistics tool to obtain each customer’s consumption characteristic or use habit of a certain specific product, combining with relevant expert knowledge and service guideline issued by products maker. The service mining system, which is based on knowledge and customer database, can be applied to CRM. From the service mining to selfimproving of service quality, the system implements intellectual services through the whole process automatically. This project implements service mining for vehicle maintenance. The system contains three layers Data, Reasoning and Application. It can predict a suitable time and the item of service through the behaviors of a customer. The knowledge to predict is based on the data processing from customer databases, and the knowledge can be amended by the system itself as the new service records are added into customer databases. It provides the solution to its users by reckon from knowledge and the records of customer database. Software Requirements: Language
: Java JDK1.5
Java Technologies : Servlet, JSP, JDBC Web Server
: Tomcat Server
Operating System
: Windows 2000
Stock monitoring using mobile The world is rapidly moving towards a mobile content revolution with services, commerce and transactions available on mobile. This unique innovation, “Stocks on Mobile” will empower mobile customers to stay in touch with their stock and portfolio on a real time basis. Mobile customers would open the Stock applications through GPRS connecting to retrieve and view the latest data from NSE. Now the customer would be able to add, modify, delete, and search the stocks of the
68
portfolio he is monitoring, keep tab on number of stocks sold, calculate total profit on the basis of his stock holding at any point of time, check the performance of a script as per its movement in the market. Software Requirements: Language
: Java JDK1.5 / j2ME
Java Technologies : Servlet, JSP, JDBC Web Server
: Tomcat Server
Operating System
: Windows 2000 Sales Teams Automation
Abstract Sales Teams Automation (STA) capabilities allow you to manage the entire selling process, including sales order entry, post-sale follow-up and support, as well as up selling opportunities. Unlike our competitors, Net Suite provides complete customer purchase histories, which enable your sales representatives to serve your customers better, improve customer satisfaction and increased profitability. On the Internet, E-Commerce is the selling of products, services, or information between businesses. The companies buying from and selling to each other online. But there's more to it than purchasing.. In traditional sales, the buyer and/or the salesman are the active party. In one case, the buyer initiates the purchase by either going to the store to buy or calling on the phone and making an order. Due to increase in number of users on internet, many people want to attack other system resources. Competitors also want to make their web site more popular than others. So they want to attack the service of other’s web site. They keep on logon to a particular web site more times, and then service provided by the web server performance keeps degraded. In another situation, the salesman
69
goes to the home or place of business to make the sale, or he calls on the phone to make the sale. A third method combines action from both parties. Software Requirements: Language
: Java JDK1.5
Java Technologies : Servlet, JSP, JDBC Web Server
: Tomcat Server
Operating System
: Windows 2000
ANTI-MONEY LAUNDERING COMPLIANCE SYSTEM Abstract Anti-money laundering (AML), these solutions worked by establishing fixed rules-based monetary thresholds and detecting specific money laundering patterns and user scenarios that breached those thresholds. These “intelligent enterprise systems” are able to learn and adapt, comprehending new money laundering schemes as they arise. With their enterprise-wide approach, they are able to analyze both the client profile and all of the transactions that are undertaken by them, helping the financial institution prevent money laundering schemes in a much more effective and efficient manner. By analyzing financial data, AML solutions allow the financial establishment to deter potential money launders before they are able to proceed, providing protection in the form of full compliance as part of a strategic anti-money laundering technology plan within today’s financial organizations. Failure to meet these anti-money laundering (AML) regulations or to allow suspicious transactions to go undetected can have a severe impact on any financial
70
entity, including damage to its reputation, market capitalization, as well as its customer perception and loyalty. The implementation of this software, that relies on sophisticated behavior detection techniques to correctly assess an organization’s current level of risk exposure, and ensure complete regulatory compliance for all of their financial operations. Software Requirements: Language
: Java JDK1.5
Java Technologies : Servlet, JSP, JDBC Web Server
: Tomcat Server
Operating System
: Windows 2000
71