Java IEEE Projects

         
   Page-2                                          Page-1 | 2 | 3                        Back to Project List

    21. DNSSEC HASHED AUTHENTICATED DENIAL OF EXISTENCE PROCESS     (IEEE-2008)

                                                                                                    View Abstract

                 The domain name system is the global lookup service for network resources. To protect DNS information, the DNS security extensions have been developed and deployed on branches of the DNS to provide authentication and integrity protection using digital signatures. However, signed DNS nodes were ound to have an unfortunate side effect: an attacker canquery them as reconnaissance before attacking hosts on a particular network. There are different ways a zone administrator can minimize information leakage and still take advantage of DNSSEC for integrity and source authentication. This article describes the risk and examines the protocol and operational options and looks at their advantages and drawbacks

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : perating System: Windows xp, Platform: JAVA,  Algorithm:SHA, Back end: MySql
HARDWARE : Processor:  Pentium-IV      Speed: 1.8 GHZ , RAM: 512 MB,  HDD: 80 GB

    22. DESIGN AND IMPLEMENTATION OF DENIAL OF SERVICE ATTACKS USING THE DOMAIN
         NAME  SYSTEM AND FIREWALL SECURITY.    (IEEE)

                                                                                                    View Abstract

              In the distributed denial of service (DDos) attack, attacker requests the target IP Address to the DNS server. Then he takes over many computers that have vulnerabilities in advance. Hosts that are taken over called zombie hosts (a machine which cant protect itself from unauthorized access, like the remote system may not have firewall).
By employing many zombie hosts, attacker can send vast amount of data packet to the target host. It makes huge traffic in the host network. If the network traffic increased, the speed of the data transmission will be very less.
           There is a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules. To overcome this DoS attack in netwrk, we are implementing Filtering technique based on DNS query response and creating a Hashed value table using the IP address of source and destination machines. Firewall is employed for DoS countermeasure. By limiting packet rate at which it passes to inner network, it can protect inner network from flooding.

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : Operating System: windows xp Platform: JAVA, DB: SQL Server
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ RAM: 512 MB HDD: 80 GB

    23. CONGESTION NOTIFICATION & PROBING MECHANISMS FOR ENDPOINT ADMISSION
          CONTROL  (IEEE)

                                                                                                    View Abstract

               In this paper we analyze three mechanisms for providing Endpoint Admission Control: virtual-queue making, random-early marking and tail drop. For each scheme, we analyze the probing duration necessary to guarantee the required QoS (Quality of Service) and achieve high link utilization.
              Our main conclusion is that very few probe packets have to be sent when early marking is used (eg: 5KB), whereas tail drop requires a large number of probe packets (eg: 1KB). Very few probe packets have to be sent when virtual queue marking is used, Virtual queue marking strategy is based on virtual queue, router maintain the state of a virtual queue, which correspond to a buffer of size B. Arriving packets are queued in the real queue but a counter which tracks of the content of the virtual queue is incremented by one for each arriving packet

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING SECURITY
SOFTWARE : Operating System: windows xp ,Platform: JAVA
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB , HDD: 80 GB

    24. A DISTRIBUTED INTRUSION DETECTION SYSTEM USING MOBILE AGENTS (IEEE)

                                                                                                    View Abstract

                  Current research trend towards mobile computing emphasizes the need for distribution of data among various clients in wireless environment. Sharing the data in J2ME opens the data to be accessible for all MIDLETs present on the device, hence creating a number of vulnerabilities to the confidential information that is intended to be shared with specific MIDLETs, e.g. a malicious MIDLET can delete, copy or move the Shared Record Store, in J2ME based application. This project aims at overcoming record store sharing problem through the concept of Multi- Agent System by providing a shared storage with explicit access to authenticated & authorized MIDLETs. With this mechanism data can be shared among specific MIDLETs. The implementation uses the SAGE-Lite framework as a solution to our proposed work.

System Requirement Specification:-
DOMAIN      : TRANSACTION ON NETWORKING
SOFTWARE : Operating System: windows xp; Platform: JAVA, Protocol : TCP /IP, Back End: Ms-access
HARDWARE  : Processor: Pentium-IV, Speed: 1.8 GHZ, RAM: 512 MB, HDD: 80 GB

    25. DOS PACKET FILTER USING DNS INFORMATION. (IEEE)

                                                                                                    View Abstract

                 This is a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules.
                 To overcome this DoS attack in network, we are implementing Filtering technique based on DNS query response and creating a Hashed value table using the IP address of source and destination machines. Firewall is employed for DoS countermeasure. By limiting packet rate at which it passes to inner network, it can protect inner network from flooding

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : Operating System: windows xp, Platform: JAVA, Back end: :My SQL
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    26. IDENTIFYING INTERESTING VISITORS THROUGH WEB LOG CLASSIFICATION (IEEE)

                                                                                                    View Abstract

                Web mining is a popular technique for analyzing visitor activities in e-service systems. The ultimate goal of Web mining is to identify actionable information that can help, for example, acquire new customers, retain old customers, and grow customers profitability.

System Requirement Specification:-
DOMAIN     : TRANSACTION ON DATA MINING
SOFTWARE : Operating System: Windows xp, Platform: JAVA, Back end:Ms-access
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    27. MANET-GLOBAL CONNECTIVITY FOR MOBILE IPV6-BASED AD HOC NETWORKS(IEEE)

                                                                                                    View Abstract

                In this paper, we address the issue of connecting MANETs to global IPv6 networks while supporting IPv6 mobility. Specifically, we propose a self-organizing, self-addressing, self-routing IPv6-enabled MANET infrastructure, referred to as IPv6-based MANET. The proposed self-organization addressing protocol automatically organizes nodes into tree architecture and configures their global IPv6 addresses.
             We have implemented a prototype system to demonstrate the feasibility and efficiency of the IPv6-based MANET and the P2P information sharing system. Simulations are also conducted to show the efficiency of the proposed routing protocol and the P2P file sharing system

System Requirement Specification:-
DOMAIN     : AD-HOC NETWORK
SOFTWARE : Operating System: Windows xp, Platform:JAVA, Protocol: IPV6, 
      &bsp;           Back end : MS Access
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    28. NETWORK BORDER PATROL PREVENTING CONGESTION COLLAPSE (IEEE)

                                                                                                    View Abstract

                 This paper aims to address of modeling video behavior captured in surveillance video for the applications of online normal behavior recognition and anomaly detection. A novel framework is developed for automatic behavior profiling and online anomaly sampling detection with out any manual labeling of the training data set. The frame work consists of the following key components: 1) A compact and effective behavior representation method is developed based on discrete scene event detection. The similarity between behavior patterns is measured based on modeling each pattern using Dynamic Bayesian Network (DBN). 2) The natural grouping of behavior patterns is discovered through novel spectral clustering algorithm with unsupervised model selection and future selection on the eigenvectors of a normalized affinity matrix. 3) A composite generative behavior model is constructed that is capable of generalizing from a small training set to accommodate variations in unseen normal behavior patterns.4) A runtime accumulative anomaly measure is introduced to detect abnormal behavior, where as normal behavior patterns are recognized when sufficient visual evidence has become available based on online Likelihood Ratio Test(LRT) method. This ensures robust and reliable anomaly detection and normal behavior recognition at the shortest possible time. The effectiveness and robustness of our approach is demonstrated through experiments using noisy and sparse data sets collected from both indoor and outdoor surveillances scenarios. In particular, it is shown that a behavior model trained using unlabeled data set is superior to those trained using same but labeled data set indetecting anomaly from an unseen video. The experiments also sggest that our online LRT-based behavior recognition is advantageous over the commonly used maximum Likelihood (ML) method in differentiating ambiguities among different behavior classes observed on line at their advantages and drawbacks

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : Operating System Windows xp, Platform JAVA, Back end MySql,ProtocolUDP sp;
HARDWARE : Processor Pentium-IV Speed 1.8 GHZ , RAM 512 MB, HDD 80 GB

    29. APPLICATION DRIVEN OPTIMIZATION FOR VIDEO STREAMING OVER LAN NETWORKS 
         (IEEE)

                                                                                                    View Abstract

                This project based on IEEE Papers Application - Driven Cross-Layer Optimization for Video Streaming over Wireless Networks involves that a Video file in a format is to be transferred over networks. In the Existing system, the transformation of video file over networks cause a more traffic and it affects the other resources using the same network.
In the proposed system, this network traffic can be overcome by, that we are taking a video file and splitting into a frames (images) and these frames are stored in a jpeg format, those jpeg images are compressed by a method, so that it is easy to transfer over networks, then the compressed images are stored in server.
                If any client in the network request for a video file, then server response to a particular client by sending those compressed images of video file by receiving it, Clients have a provision to decompress it and again convert it to a video file. In this transformation, the original size of a video file is somewhat reduced, but we overcomed to get the file as good quality

System Requirement Specification:-
DOMAIN     : VIDEO STREAMING
SOFTWARE : Operating System: Windows xp, Platform: JAVA, Back end: Ms-access, Tool: JMF
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    30. PRICING NETWORK RESOURCES FOR ADAPTIVE APPLICATIONS. (IEEE)

                                                                                                    View Abstract

         This project concentrates on pricing network service dynamically based on the level of service, usage and congestion allows the network resources to be used more effectively. We integrate the proposed Service dependent pricing scheme with dynamic pricing and service negotiation environment.
          This increases network resource utilization and avoid high call blocking rate. Users are able to maintain stable expenditure, and allowing user to migrate between services classes in response to price increase further stabilizes the individual service prices.

System Requirement Specification:-
DOMAIN     : NETWORK
SOFTWARE : Operating System: Windows xp , Platform: JAVA, Back end: MySql
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ , RAM: 512 MB, HDD:80 GB

    31. PUBLIC KEY VALIDATION FOR DNS SECURITY EXTENSION (IEEE)

                                                                                                    View Abstract

                  To provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key. The DNS security uses Message Digest Algorithm to encrypt the Message (text file) and PRNG (Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key.

System Requirement Specification:-
DOMAIN     : TRANSACTION ON NETWORKING
SOFTWARE : Operating System: Windows xp, Platform: JAVA, Algorithm: DSA, 
                  Protocol: TCP/IP
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    32. SECURING MEDIA FOR ADAPTIVE STREAMING (ACM)

                                                                                                    View Abstract

                The main aim of this project to remove the problems faced by the streaming meia, the server sends a media file to clients with seure and with out packet loss. The objective of this project is to provide a quality of service to streaming media, which gives the solution of streaming media, faced problems. Securing and authenticating media files use cipher and ISMA standard specified RTP. Using this media file can be transfer with secure and without packet loss.            
                The main motivation of the Securing and Authenticating Media Files System is to remove the streaming media faced problems. Such as network infrastructure that cannot accommodate a secure and real time nature of streaming content, components cannot adapt to varying network conditions and no standardized streaming formats. The securing and authenticating is an important field in the streaming media.
               This system is to provide the authenticated client only have the rights to access the media file, the server adapts a stream even though the network conditions automatically changed, adapts a stream to available bandwidth and without packet loss it sends the voluminous streams to client and the ISMA standardization provide the end-to-end security model.
                This System is used to remove the problems faced by the streaming media, the server sends a media file to clients with secure and with out packets loss. It provides a quality of service to streaming media, which gives the solution for streaming media faced problems. Securing and authenticating media files use the stream cipher and ISMA standard specified RTP. Using this media file can be transfer with secure and with out packet loss

System Requirement Specification:-
DOMAIN     : VIDEO STREAMING
SOFTWARE : Operating System: Windows xp, Platform: JAVA, Algorithm:ISMA,TOOL: JMF
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ , RAM: 512 MB, HDD:80 GB

    33. DISCOVERING E-MAIL SPAM AND ANTICIPATION VIA COLLABORATION AND
        AI TECHNIQUES (IEEE)

                                                                                                    View Abstract

                  Spam has become a very necessary topic of discussion these days. It is especially assuming alarming proportions due to the fact that genuine emails get buried in the horde of Spam. More so that in recent days free email service providers like yahoo are considering ways to charge the senders of emails to preferred accounts.

System Requirement Specification:-
DOMAIN     : ARTIFICIAL INTELLIGENCE
SOFTWARE : Operating System: Windows xp , Platform: JAVA, Back end: Ms Access
HARDWARE : Processor: Pentium-IV, Speed:1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    34. A SECURE IMAGE STEGANOGRAPHY USING LSB, DCT & COMPRESSION TECHNIQUES ON
          RAW IMAGES. (IEEE)

                                                                                                     View Abstract

           Steganography is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. In this paper we present an image-based steganography that combines Least Significant Bit (LSB), Discree Cosine Transform (DCT), and compression techniques on raw images to enhance the security of the payload. Initially, the LSB algorithm is used to embed the payload bits into the cover image to derive the stego-image.

System Requirement Specification:-
DOMAIN     : IMAGE PROCESSING
SOFTWARE : Operating System: Windows xp , Platform: JAVA, Back end: Ms Accessl
HARDWARE : Processor: Pentium-IV Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

    35. FACE RECOGNITION USING LAPLACIAN FACES.  (IEEE)

                                                                                                    View Abstract

                 We propose an appearance-based face recognition method called the Laplacianface approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA), which effectively see only the Euclidean structure of face space, LPP finds an embedding that preserves local information, and obtains a face subspace that best detects the essential face manifold structure. The Laplacianfaces are the optimal linear approximations to the eigenfunctions of the Laplace Beltrami operator on the face manifold. In this way, the unwanted variations resulting from changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis shows that PCA, LDA, and LPP can be obtained from different graph models. We compare the proposed Laplacianface approach with Eigenface and Fisher face methods on three different face data sets. Experimentl results suggest that the proposed Laplacianface approach provides a better representation and achieves lower error rates in ace recognition.

System Requirement Specification:-
DOMAIN     : IMAGE PROCESSING
SOFTWARE : Operating System: Windows xp, Platform: JAVA
HARDWARE : Processor: Pentium-IV, Speed: 1.8 GHZ , RAM: 512 MB, HDD: 80 GB

                                                                                             
                                                       
   Page-2                                                Page-1 | 2 | 3                                              Back to Project List