ISI SOFTWARE SOLUTION JAVA J2EE J2ME PROJECTS

Document Sample
ISI SOFTWARE SOLUTION JAVA J2EE J2ME PROJECTS Powered By Docstoc
					                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

                                   JAVA / J2EE / J2ME PROJECTS LIST
                                           2010 – 2011 IEEE Papers

J2E 6001. IMPACT OF ADAPTIVE RESOURCE ALLOCATION IN UTILITY CLUSTER
COMPUTING ENVIRONMENTS

Maximizing resource provider profit and satisfying user requirements at the same time is a challenging problem
in utility computing environments. In this paper, we intro- duce adaptive resource allocation requests and
investigate the impact of using them in utility cluster computing environments. The Service Level Agreements
established between users and resource providers rely not only on fixed values, but also on functions that
associate allocation parameters. In addition, the resource provider scheduler can automatically modify the
number of resources and usage time of allocation requests, as well as split them into sub requests. Users may
receive incentives for supplying flexible requests which produce more scheduling options. By using
rescheduling, resource providers are able to prioritize the most profitable requests dynamically and still satisfy
the requirements of the already accepted user requests. From our experimental results we observed an increase
of 14% in the resource provider profit and a reduction of 20% in the average response time of user requests
when compared to traditional approaches.

J2E 6002. RANK AGGREGATION FOR AUTOMATIC SCHEMA MATCHING

Schema matching is a basic operation of data integration and several tools for automating it have been proposed
and evaluated in the database community. Research in this area reveals that there is no single schema matcher
that is guaranteed to succeed in finding a good mapping for all possible domains, and thus an ensemble of
schema matchers should be considered. In this paper we introduce schema meta-matching, a general framework
for composing an arbitrary ensemble of schema matchers, and generating a list of best-ranked schema mappings.
Informally, schema meta-matching stands for computing a “consensus” ranking of alternative mappings
between two schemata, given the “individual” graded rankings provided by several schema matchers. We
introduce several algorithms for this problem, varying from adaptations of some standard techniques for general
quantitative rank aggregation to novel techniques specific to the problem of schema matching, and to
combinations of both. We provide a formal analysis of the applicability and relative performance of these
algorithms, and evaluate them empirically on a set of real-world schemata.

J2E 6003. AUTOMATIC FUZZY ONTOLOGY GENERATION FOR SEMANTIC WEB

Ontology is an effective conceptualism commonly used for the Semantic Web. Fuzzy logic can be incorporated
to ontology to represent uncertainty information. Typically, fuzzy ontology is generated from a predefined
concept hierarchy. However, to construct a concept hierarchy for a certain domain can be a difficult and tedious
task. To tackle this problem, this paper proposes the FOGA (Fuzzy Ontology Generation framework) for
automatic generation of fuzzy ontology on uncertainty information. The FOGA framework comprises the
following components: Fuzzy Formal Concept Analysis, Concept Hierarchy Generation, and Fuzzy Ontology
Generation. We also discuss approximating reasoning for incremental enrichment of the ontology with new
upcoming data. Finally, a fuzzy-based technique for integrating other attributes of database to the ontology is
proposed.

J2E 6004. ADAPTIVE DATA FUSION FOR ENERGY EFFICIENT ROUTING IN WIRELESS
SENSOR NETWORKS

While in-network data fusion can reduce data redundancy and, hence, curtail network load, the fusion process
itself may introduce significant energy consumption for emerging wireless sensor networks with vectorial data
and/or security requirements. Therefore, fusion-driven routing protocols for sensor networks cannot optimize
over communication cost only—fusion cost must also be accounted for. In our prior work [2], while a
randomized algorithm termed MFST is devised toward this end, it assumes that fusion shall be performed at any
intersection node whenever data streams encounter. In this paper, we design a novel routing algorithm, called

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering. Not only does AFST jointly optimize
over the costs for both data transmission and fusion, but also AFST evaluates the benefit and cost of data fusion
along information routes and adaptively adjusts whether fusion shall be performed at a particular node.
Analytically and experimentally, we show that AFST achieves better performance than existing algorithms,
including SLT, SPT, and MFST.

J2E 6005. WIRELESS MAC PROTOCOL USING IMPLICIT PIPELINING

Abstract: In distributed multiple access control protocols, two categories of overhead are usually associated with
contention resolution. One is channel idle overhead, where all contending stations are waiting to transmit.
Another is collision overhead, which occurs when multiple contending stations attempt to transmit
simultaneously. Either idle overhead or collision overhead being large, contention resolution algorithm would be
inefficient. Prior research work tries to minimize both the idle and the collision overheads using various
methods. In this paper, we propose to apply “pipelining” techniques to the design of multiple access control
protocol so that channel idle overhead could be (partially) hidden and the collision overhead could be reduced.
While the concept of pipelined scheduling can be applied to various MAC protocol designs in general, in this
paper, we focus on its application to IEEE 802.11 DCF. In particular, an implicitly pipelined dual-stage
contention resolution MAC protocol (named DSCR) is proposed. With IEEE 802.11, the efficiency of
contention resolution degrades dramatically with the increasing load due to high probability of collision. Using
the implicit pipelining technique, DSCR hides the majority of channel idle time and reduces the collision
probability, hence, improves channel utilization, average access delay, and access energy cost over 802.11
significantly both in wireless LANs and in multihop networks. The simulation results, as well as some analysis,
are presented to demonstrate the effectiveness of DSCR.

J2E 6006. DISTRIBUTED CACHE UPDATING FOR THE DYNAMIC SOURCE ROUTING
PROTOCOL

          The goal of our project is to proactively disseminating the broken link information to the nodes that
have that link in their caches. We define a new cache structure called a cache table and present a distributed
cache update algorithm. Each node maintains in its cache table the information necessary for cache updates.
When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a
distributed manner. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an
adaptive timeout mechanism for link caches. We conclude that proactive cache updating is key to the adaptation
of on-demand routing protocols to mobility.

J2E 6007. ON SELFISH ROUTING IN INTERNET-LIKE ENVIRONMENT

 A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either
choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such
approaches result in selfish routing, because routing decisions are no longer based on system-wide criteria but
are instead designed to optimize host-based or overlay-based metrics. A series of theoretical results showing that
selfish routing can result in suboptimal system behavior have cast doubts on this approach. In this paper, we use
a game-theoretic approach to investigate the performance of selfish routing in Internet-like environments based
on realistic topologies and traffic demands in our simulations. We show that in contrast to theoretical worst
cases, selfish routing achieves close to optimal average latency in such environments. However, such
performance benefits come at the expense of significantly increased congestion on certain links. Moreover, the
adaptive nature of selfish overlays can significantly reduce the effectiveness of traffic engineering by making
network traffic less predictable.



J2E 6008. DISTRIBUTED COLLABORATIVE KEY AGREEMENT AND AUTHENTICATION
PROTOCOLS FOR DYNAMIC PEER GROUPS

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

We consider several distributed collaborative key agreement and authentication protocols for dynamic peer
groups. There are several important characteristics which make this problem different from traditional secure
group communication. They are: 1) distributed nature in which there is no centralized key server; 2)
collaborative nature in which the group key is contributory (i.e., each group member will collaboratively
contribute its part to the global group key); and 3) dynamic nature in which existing members may leave the
group while new members may join. Instead of performing individual rekeying operations, i.e., recomputing the
group key after every join or leave request, we are going to re key for a batch of join and leave operations.

J2E 6009. TCP-LP: LOW-PRIORITY SERVICE VIA END-POINT CONGESTION CONTROL

Service prioritization among different traffic classes is an important goal for the Internet. Conventional
approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt
to develop mechanisms that provide “better-than-best-effort” service.

We explore the opposite approach, and devise a new distributed algorithm to realize a low-priority service (as
compared to the existing best effort)from the network endpoints. To this end, we develop TCP Low Priority
(TCP-LP), a distributed algorithm whose goal is to utilize only the excess network bandwidth as compared to
the “fair share” of bandwidth as targeted by TCP.

The key mechanisms unique to TCP-LP congestion control are the use of one-way packet delays for early
congestion indications and a TCP-transparent congestion avoidance policy.

J2E 6010. A DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN NEXT
GENERATION MOBILE NETWORKS

The next-generation mobile network will support terminal mobility, personal mobility, and service provider
portability, making global roaming seamless. A location-independent personal telecommunication number
(PTN) scheme is conducive to implementing such a global mobile system. However, the nongeographic PTNs
coupled with the anticipated large number of mobile users in future mobile networks may introduce very large
centralized databases.

J2E 6011. SHORTEST PATH FINDING USING GPS BASED NAVIGATION SYSTEM IN CRITICAL
SITUATION

In this Project we propose a system which would be very useful for the Patients who have Critical Heart Attacks
and their Condition could be informed to the nearest Hospital, so as to save the life of the Patient. Here in this
project if the patient gets Heart attack, h/she has to give a input to the GPS system, so that GPS is get activated,
this immediately transmits the Longitude and Latitude Values to the Central Station or the Server where all the
Longitude and Latitude Values of Hospital would be maintained. Here in the Central Server the data is getting
processed and it could able to find the Nearest Hospital to the Patient’s House and the Server sends the message
to the Nearest Hospital. Nearest Hospital will get the data and immediately the Ambulance is send to the
Patient’s House, so as to save the Human Life.

J2E 6012. NETWORK INTRUSION DETECTION

         Network intrusion detection has generally been dealt with using sophisticated software and statistical
analysis tools. However, occasionally network intrusion detection must be performed manually by
administrators, either by detecting the intruders in real-time or by revising network logs, making this a tedious
and time-consuming labor.

To support this, intrusion detection analysis has been carried out using visual, auditory or tactile sensory
information in computer interfaces. However, little is known about how to best integrate the sensory channels
for analyzing intrusion detection. We propose a multimodal human-computer interface to analyze malicious
attacks during forensic examination of network logs.

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                        ISI SOFTWARE SOLUTION
                                      JAVA / J2EE / J2ME PROJECTS

J2E 6013.HONEY POTS – A SECURITY SYSTEM TO IDENTIFY BLACK HAT COMMUNITY IN
             THE NETWORKS

With a majority of Internet service subscribers changing over from conventional dial up connections to faster
and cheaper T1, Cable, ISDNS, DSL, it yields new problems for the existing subscriber base that contain
majority of novice users in terms of Internet Security. Today’s Internet security is restricted to personal and
network firewalls installed either on the host’s computer or a network gateway or a router.

          A Honey pot is a comprehensive security system, which attracts hackers to attack them thereby finding
out the types of attacks and black hat community motives.

          A Honey pot is a security resource whose value lies in being probed, attacked, or compromised. The
key point with this definition is honey pots are not limited to solving only one problem. They have a number of
different applications. To better understand the value of honey pots, we can break them down into two different
categories:

     Production
     Research
         Production honey pots are used to protect your network. They directly help secure your organization.
Research honey pots are different; they are used to collect information. That information can then be used for a
variety of purposes, such as early warning and prediction, intelligence gathering, or law enforcement.

            Honey pots can be made more efficient by simulating some services, which will lure the attackers in to
the trap.

J2E 6014.INTERANET TRANSFERMATION OF VOICE WITH DATA USING VOICE OVER
              INTERNET PROTOCOL(VOIP)


         Voice over IP (VOIP) is new technology that allows the passing of speech information over IP data
networks. In contrast to common traditional telecommunications, which moves voice traffic over the special
Public Switched Telephone Network (PSTN), VOIP technology means that the voice shares the same network
with the data in a true voice−data convergence. VOIP has all the well publicized advantages inherent in having a
unified data network infrastructure to manage all communications needs. Care must be taken, however to ensure
that the voice quality is preserved when a data network is used to pass voice information. Traditionally, voice
and data networks have been supported by two separated infrastructures.

          The voice transport over IP (VOIP) offers service providers the advantage of integrating their networks
into a single infrastructure. The substitution of traditional voice networks by VOIP will depend on the capability
to offer to the end user a similar quality.

        From a practical standpoint it makes no sense to transmit digitized voice samples that contain only a
period of silence. Packets containing period of silence add to network traffic and can adversely affect the
transmission and delivery of other packets carrying digitized voice samples from the same or different callers.
The bandwidth is not effectively used due to the transmission of unnecessary silence packets across the
networks. Hence, the Quality of Service is affected due wastage of bandwidth.

J2E 6015. GPS BASED VEHICLE LOCATION TRACKING SYSTEM

Vehicle tracking using GPS (Global Positioning System) is fully integrated into the VTS (Vehicle Tracking
System). GPS was developed by the U.S. military to enable accurate navigation. 24 satellites have been placed
in orbit some 20.000 km from the earth's centre. The vehicle to be tracked is fitted with a GPS receiver and a
small antenna. GPS satellites are continuously transmitting a radio message containing information including
when the data was sent, which satellite sent it and the current reliability of the system. The GPS receiver fitted
                           31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                    Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                         www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

in the vehicle receives information from at least 4 satellites and carries out the necessary calculations to
determine its current position. The vehicle tracking device VTU is the total security protection and fleet
management solution. By using the latest GPS and GSM technology to protect and monitor your car, truck, bike,
boat (or moveable asset) virtually anywhere and then locate it to within a few meters. The device incorporates a
covertly installed module (which works and communicates independently) but has the ability to run in
conjunction with your local GSM network (DTMF, voice message, SMS, GPRS or GSM modem call). The
external data processing of data and communication are done using ATMEL AT89c51 OR ARM ARM7TDMI-
S (T.M) core logic 32bit controller as per the choice. Anyway both of these projects can also be integrated to PC
using java background via RS232 communication or can be displayed on a local 2 X 16 LCD panel. For
mapping on Google Earth.

J2E 6016. SIP - COMMUNICATOR BASED TELE- CONFERENCING SYSTEM

      A teleconferencing project has been implemented in java1.5, sip alpha and Asterisk server1.4 server
provides the customer care and the call centers for secured way for telemarketing in real-time environment
(salesman of the company contacts customer for product sales or customer contacts salesman for queries about
the product) this project featured with Music On hold, Voice Recording, and Authentication through DTMF
technology. Session initiation protocol integration involves registering services to the Locating Service either
within LAN network or using proxy server.

J2E 6017. ONLINE LIVE SECURITY SYSTEM USING MEDIA CONVERGING & MOTION
          DETECTION TECHNIQUE

         During nighttime, the possibility of theft is more. Hence, a camera is switched on. If it finds any
movement on the pointed place, it immediately sends the mail and give the Beep sound to the Security guard on
alert. Else if motion is detected, it alerts everybody on Security Guard. Unless and otherwise, security guard
switch of the camera and System, the process goes on.

J2E 6018. LOCATION AIDED ROUTING (LAR) PROTOCOL BASED ROUTE IDENTIFICATION,
     MAINTENANCE DATA TRANSFER IN AD-HOC NETWORKS

          Ad Hoc Network (MANET) process consists of two nodes. Because of the limited range of
communication of a wireless host, it is necessary to perform multi hopping. Routing protocol is used to find
routes along which multi-hoping will be performed. Location Aided Routing (LAR) protocol is one which
utilizes the location information of a node to limit the search.

            Location Aided Routing is an on-demand routing protocol in which the routes are found only when
required.

                  Route Discovery: Identifies and establishes route between hosts.          In LAR, restrictive
flooding of control packets is done to discover the route.



                  Route Maintenance: Supervises the data transfer between the two nodes. If any error occurs
during data transfer, necessary steps are executed to continue transfer of data.

By Implementing the LAR algorithms, we have further reduced the flooding region and eliminated looping
problems.

J2E 6019. RFID BASED HOSPITAL MANAGEMENT SYSTEM

   RFID based access card used by the hospital employee , project has been implemented to maintain the
hospital details in an centralized database using MySql5.0 as the backend where the employee could able to


                          31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                   Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                        www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

manage the hospital details using the front end tool which has been designed using java1.5 .Employee
Authentication done through RFID based access card, integrated with the RFID card reader.

J2E 6020. NETWORK LOAD BALANCING AND REDISTRIBUTION OF THE TRAFFIC OVER
       THE NETWORKS USING GRID COMPUTING SYSTEM

In a Network Grid computing enhances the scalability and availability of mission-critical, TCP/IP-based
services, such as Web, Terminal Services, virtual private networking, and streaming media servers. This
component runs within cluster hosts as part of a operating system and requires no dedicated hardware support.
To scale performance, Network Traffic Analyzer distributes IP traffic across multiple cluster hosts. It also
ensures high availability by detecting host failures and automatically redistributing traffic to the surviving hosts.
Network Traffic Analyzer provides remote controllability and supports rolling upgrades from a operating
system.

The unique and fully distributed architecture of Network Clustering enables it to deliver very high performance
and failover protection, especially in comparison with dispatcher-based load balancers. This project describes
the key features of this technology and explores its internal architecture and performance characteristics in
detail. The unique and fully distributed software architecture of Network Traffic Analyzer enables it to deliver
the industry's best load balancing performance and availability.

J2E 6021. MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT

“Video Streaming” is an application designed to transfer the stored video images from one node to another. The
application allows the mobile user to see video file with the intranet networks with which server (J2EE
SERVER) running on the other machine. Video Streaming gives the user high quality images with much less
(General Packet Radio Service) GPRS or Universal Mobile Telecommunication System (UMTS) traffic, so the
communication with the intranet.

ADVANTAGES

    1.   Video Streaming captures the Video file from the server to the client mobile.
    2.   Here the images are transferred byte-by-byte mode.
    3.   The server will store the images accordingly to the user and each image will be captured and each
         image will be transmitted to the mobile.

J2E 6022. NETWORK CONGESTION AVOIDANCE USING NETWORK BORDER PATROL (NBP)

The end-to-end nature of congestion control is an important factor in its scalability and robustness. However,
end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair
bandwidth allocations created by applications, which are unresponsive to network congestion. In this project,
we propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP). NBP
is a core-stateless congestion avoidance mechanism and Parallel downloading is a technique to improve the
performance of transferring large files. It assumes that many nodes (servers) in the network have the requested
file. A node (client) that wants to get that file can connect to some or all of the servers in parallel and download
different parts of the file from each of them. The aggregate transfer rate that the client observes is the sum of the
transfer rates on the paths from each of the servers to the client. In order for the aggregate transfer rate to be
higher that the maximum transfer rate which can be obtained by connecting to only one server.

J2E 6023. JAVA-BASED HOME AUTOMATION SYSTEM

                     This project is aimed to control devices by achieving Java based Home automation. Here we
use Java application (J2ME) in PC, AT89c51, parallel port and Load Driving Circuit. Here the user can give the
control command for a particular device through Java mobile application (J2ME) in PC, which is then
transmitted through parallel port. In the receiving end the microcontroller receives the device command and
recognizes the command and controls the corresponding device through the Load driving circuit. The load
driving circuit consists of a Darlington pair IC for current amplification and relays, which are used to switch the
devices ON/OFF.
                         31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                  Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                       www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

J2E 6024. GSM BASED REMOTE BIO- MEDICAL INVETIGATION

 With the J2ME as back end, the project is used to send SMS and monitor the status of a person. Such as heart
beat and temperature and informs it to the mobile number specified; the heart of the chip is the at89c52
controller and java back end. The heart rate detector unit and the temperature sensor unit is fitted to the patient
and the data output is fed to the microcontroller via the analog to digital converter the data from the adc is in 8
bit format, it is then processed by the microcontroller and whenever the safe ranges is violated the controller
produces a alarm, and visual display, as well as initiates the pc to send the SMS to a specified mobile number
using a mobile phone which is interfaced with the pc.


J2E 6025. AUTENTICATION OF DIGITAL IMAGES BY ENCYPTION AND DECRYPTION WITH
PRIMARY KEY IMPELMENTATION USING LSB ALGORITHM AND STEGANOGRAPHY

This Project is to provide the security for images by using key concepts. This project uses the LSB algorithm for
data hiding and data extraction. There is a growing importance of steganography in intelligence work, as it is
viewed as a serious threat to some governments. In future we would like to implement steganography using
audio and video files. A major advantage of the LSB algorithm is it is quick and easy. There has also been
steganography software developed which work around LSB color alterations via palette manipulation. LSB
insertion also works well with gray-scale images. The project that is implemented deals with digital images
acting as a cover medium to store secret data in such a manner that becomes undetectable. Hence it provides a
very high means of security without suspicion


J2E 6026. RFID BASED TRAIN SPEED AND TIME MONITORING

The project uses the RFID readers and tags, the tag is fitted on the train engine, each train carries its own
identified tag, and the readers are fitted in each side on level crossing with a clearance of 3 km from the level
crossing. The reads the tag id once the train nears the level crossing and passes to the microcontroller, the
microcontroller in turn notes the id and displays the train name, and also closes the gate, and at once the train
crosses the other end the reader reads the tag and feeds it the microcontroller, the microcontroller in turn opens
the gate. The microcontroller can also be programmed to send the Rfid data to the system, so that with the java
backend we maintain the database, time of crossing and speed of the train.

J2E 6027. ENHANCING THE QUALITY OF SERVICE IN VOIP

        Supporting dedicated bandwidth
        Improving loss characteristics
        Avoiding and managing network congestion
        Shaping network traffic
        Setting traffic priorities across the network

QoS usually refers to the fidelity of the transmitted voice and facsimile documents, it can also be applied to
network availability (call capacity or level of all blocking), telephone feature availability (conferencing, calling
number display), and scalability(any-to-any, universal and expandable).

The common part in the two modules is the requirement of ‘Sound Recorder and Player’ for recording the voice
and playing back the voice to user. The connection is to be established between the users for transmission of
voice across the network. For establishing connection, the existing TCP/IP protocol is to be used in the LOCAL
AREA NETWORK.
Quality of Service for Voice over IP discusses various QoS concepts and features that are applicable to VoIP.

        It must include silence tag to generate silence at the receiver’s end.
        The quality of service is enhanced by utilizing the available bandwidth.
        In another Technique, text data is inserted in the place of the silence.
        The text is extracted from the voice.


                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

J2E 6028. AUDIO CONFERENCE THROUGH SPEEX AND ILBC CODEC

    Speex / ILBC codec are one of the solutions to the problem study done on the latency, delay and bandwidth,
audio quality of java media framework. speex / ilbc codec meant for encoding and decoding audio data through
RTP protocol , where usage of speex / ilbc codec improves better voice quality when compare to ulaw,alaw and
gsm codec presents in existing java media framework.

J2E 6029. MOBILE AGENT BASED STORING AND RETRIEVAL OF MULTIMEDIA FILES FROM
THE DISTRIBUTED MULTIMEDIA DATABASE

This project mobile agent are used to store and retrieve a multimedia data from the distributed multimedia
database using mobile agents based on host database provide the result to the user upon request. This project
uses the mobile agents effectively to retrieve multimedia database at a faster rate and at lower bandwidth using
agents in a distributed environment. One of the paradigms that have been suggested for allowing efficient access
to remote resources is a transportable agent. A transportable agent is a named program that can migrate from
machine to machine in a heterogeneous network. The program chooses when and where to migrate. It can
suspend its execution at an arbitrary point, transport to another machine and resume execution on the new
machine. Transportable agents have several advantages over the traditional client/server model. Transportable
agents consume less network bandwidth and do not require a connection between communicating machines -
this is attractive in all networks and particularly attractive in wireless networks.

J2E 6030. MOBILE BASED REMOTE NETWORK MONITORING AND CONTOL SYSTEM USING
               HTTP TUNNELING, RMI & SOCKET

The Objective of this project is to monitor the client machines, which are all present in the network (LAN,
WAN, MAN) through user mobile from any remote location. The main technologies used in this project was
HTTP tunneling, RMI, Socket connection. Here user could see the client list which are all connected to the
online server through his mobile, the mobile user can create a text file and it can be stored into the PC (client
machine) by selecting client name from client list.
         Administrator (mobile user) can view the content of the text file, which is residing in the client
         machine from his mobile. He can explore the drive list, directory list and file list from his mobile. Here
         the mobile user can compile a error free java file which is residing in the pc or he can execute the
         compiled file from his mobile. Administrator can broadcast or unicast messages to his client’s from his
         mobile or he can chat with the client by selecting the client name from the client list.
J2E 6031. REMOTE PACKET CAPTURE, EPHEMERAL PORT ANALYSIS, DATA MONITORING
              IN THE NETWORKS


The success of the Internet has brought networking in each and every day new applications and technologies
that are created. In this scenario, the power and complexity of computer networks are growing every day. Thus,
network and system security has become an increasingly important issue during the past few years.

 Security specialists can use a port scanner to check whether people on the network are running software they
should not be, making sure that servers are appropriately sealed off and many other things. The knowledge of
which ports are open on a system gives an administrator a general idea of the services a system is running.

 Remote Ephemeral Port Analysis is a piece of software that runs on a distributed system and allows us to
analyze the status of the software ports on a remote machine. That is, it determines whether each of the ports is
open or not on a host (IP address). Ports that are open on a host represent services, servers, and sometimes
Internet applications. Different ports are used for different protocols. This software provides user authentication,
so that only the authenticated users can use the software. The users are added, deleted and edited only by the
administrator. The software also has the ability to find all the computers currently connected on the network.
This software also determines the amount of information transferred across the network. Apart from port status
analysis, a very important feature added to this software is the packet capture mechanism. This utility seizes


                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

information from each packet transferred across a network and determines several conclusions related to
network security and network administration.

J2E 6032. SECURITY COMMUNICATION FOR GSM NETWORK USING KERBEROS V5
                 PROTOCOL


Today more then ever, secure communication is a must. Most companies now user network infrastructure to
conduct their business, whether internally( intranet model or externally to reach partners or customers
(extranet/Internet models).

While it is utopian to consider today’s networks as being safe, there are solutions to make them more secure and
use them with a bit of trust. The key aspects to securing communications over a distributed environment are
authentication, integrity, confidentiality and authorization. Kerberos is a network protocol that addresses the
authentication part. This application aims at using Kerberos V5 to secure the communication between a J2Me
MIDlet communicating over the GPRS, and a Banking Transaction Server. This project mainly covers at
gaining the initial ticket provided by the authentication server. Authentication server checks its database to
authenticate the user. If the username and the password matches it generates and initial ticket by which we can
obtain many service tickets to access the services provided by the banking transaction server.

J2E 6033. DESIGN OF AN INTELLIGENT AGENT FOR NETWORK FAULT DETECTION


As the Internet becomes a critical component of our society, a key challenge is to maintain network availability
and reliability. The increasing number of networks is making downtime more costly. Network management
tools and techniques must therefore become better at detecting and identifying network faults.

          Current fault management implementations generally rely on the expertise of a human network
manager. As networks become more complex and changes occur more frequently, the human network manager
will find it hard to maintain a sufficient level of expertise on a particular network’s behavior. Fault management
research has covered approaches such as expert systems, finite state machines, advanced database techniques,
and probabilistic methods.

        Intelligent agent is one that processes information collected by Simple Network Management Protocol
agents and uses it to detect the network anomalies that typically precede a fault. The intelligent agent approach
has several benefits. It can detect unknown faults and correlate information in space and time. Also it is possible
to make an Intelligent Agent to detect the failure in one of the sub network’s components even before it can be
occur.

J2E 6034. FACE RECOGNITION

Security and authentication of a person is a crucial part of any industry. There are many techniques used for this
purpose. One of them is face recognition. Face recognition is an effective means of authenticating a person. The
advantage of this approach is that, it enables us to detect changes in the face pattern of an individual to an
appreciable extent. Hence face recognition can be used as a key factor in crime detection mainly to identify
criminals. There are several approaches to face recognition of which Principal Component Analysis (PCA) and
Neural Networks have been incorporated in our project. The system consists of a database of a set of facial
patterns for each individual. The characteristic features called ‘eigenfaces’ are extracted from the stored images
using which the system is trained for subsequent recognition of new images.

         MODULES

          Training
          Testing
TRAINING:
                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

         To train the users face with already present ID in the database

TESTING:

         To authenticate the user with the face recognition algorithm

J2E 6035. DATA MIGRATION, TRANSLATION & TRANSFERMATION TO OPTIMIZE THE DATA
              MANAGEMENT SYSTEM


                   Data Migration is the process of translating data from one format to another. Data migration is
necessary when an organization decides to use a new computing system or database management system
incompatible with the current system. Typically, data migration is performed by a set of customized programs
that transfer the data. By the use of this project, the following data migrations can be processed easily.

1.From SQL Server To Oracle
2.From SQL Server To Access
3.From SQL Server To HTML
4.From Oracle To SQL Server
5.From Oracle To Access
6.From Access To SQL Server
7.From Access To Oracle

J2E 6036. SIP-COMMUNICATOR BASED ACTIVE LISTENING AND PASSIVE LISTENING

      An telecom project implemented using java1.5, sip-communicator alpha and Asterisk 1.4 server featured
with Active Listening (Manager of an organization chanspy the conversion between the salesman and the
customer. And can communicate with the salesman), Passive Listening (Manager of an organization chanspy the
conversion between the salesman and the customer) which is a secured way of communication with the
implementation of sip protocol.

J2EE 6037. RFID BASED ATM MACHINE TRANSACTION AND PROCESS SYSTEM

                          Integrated with RFID reader for authenticating the customer using RFID based
access card where the RFID ID has been read through serial port using java technology and the front end design
has been done using jdk1.5 , customer details has been uploaded into MS-Access database, After authentication
customer can view his/her Balance Enquiry, Fund Transfer and Mini Statement.

J2E 6038. MULTIPLE MAIL ACCOUNTS COLLABORATION MANAGER

Nowadays, web users have multiple email accounts. But individual authentication is essential for accessing each
account, which is time-consuming. Currently, no integrated system exists for individuals to manage multiple
email accounts.

Our solution provides a common, uniform API for managing various email accounts using the Java
programming language .It allows users to access mails from various accounts by logging in once. All the
registered mail accounts of the user will be displayed as hyperlinks. Clicking on each link will lead the user to a
new page where he can check for new mails, reply for a mail, forward a mail, compose mails and delete mails.
In this way, this solution saves time in authenticating multiple accounts by providing a single authentication for
all the registered mail accounts and also reduces the burden on the web server.

J2E 6039. BANDWIDTH CONGESTION CONTROL USING AND AUTHENTICATION SERVICE
              FOR AUTOMATIC DYNAMIC RECONFIGURATION SYSTEM

In any company, the effective utilization of the available bandwidth is of paramount importance. Every person
must use the entire available bandwidth in a satisfactory manner (i.e.) The entire bandwidth must not be locked
to some high bandwidth user refraining other users of the company due to traffic congestion.
 Considering these difficulties, we propose the following solution.
                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

     Parting the available bandwidth among the special permission and normal users.
     Authentication of the users using Kerberos.
            In order to avoid the congestion, the normal and the special permission users will be routed through
    two different paths. Each user will be allocated a username and password, which will be stored in a
    database. In addition, their access permission details will also be maintained. Based on these details the user
    is routed either to the FTP server or to the Domain Server dynamically.

J2E 6040.           REMOTE AND LIVE MEDIA STREAMING IN MOBILE USING J2ME TOOLKIT
                    USABLE FOR TRAFFIC VIEWING & CONTROL SYSTEM

This is an Internet Browser application designed to display traffic web cam links. The application allows the
user to view traffic images from several sources, cities, countries and continents all over the world, as long as
the user subscribes the link packages that he intends to use. This application is particularly meant for traffic
police to monitor the city with their mobile from any remote location, where a web cam will be provided at each
and every signal location.

J2E 6041. INTERNET BASED MACHINE CONTROL SYSTEM

The aim of the project is to control the electronic appliances via the internet. Thus thereby enabling the
controlling of the devices via all over the world is possible. The project utilizes the Html and Java as the front
end, the embedded system as the firmware ends of the project. Thus the project is firmware based. This project
allows a person, to control the electronic appliances via the internet. The devices carry a specific codes, which is
typed in the explorer address bar is sent to the server. The server reads the data from the html page, with the
help of java. And then provides the respective codes for the co running dynamic link library files. The output
from the parallel port is fed to the controller for further processing, and the output from controller is fed for
relays for controlling of appliances.

J2E 6042. EDGE DETECTING, IMAGE QUERYING, MATCHING, & RANKING USING SPATIAL
              SIMILARITY MATCHING SYSTEM


Like traditional databases, an image database (IDB) is a collection of unique images. Each of these
images are composed of a set of different objects. However, to improve the overall performance of
the search and retrieval process, spatial similarity data modeling and retrieval scheme is used.
Similarity-based search reduces the search space to a limited number of matched instances and thus retrieving depends on the
nature and measure of similarity specified in the query. Edge detection
algorithm is used to detect the outline of the queried image. Image processing is performed
by generating a signature for each queried image, comparing it with the database, ranking the
retrieved images and then displaying the images. This makes searching much more efficient.

J2E 6043. EXTRACTION, RETRIEVAL AND STORAGE OF IMAGES, DATA CONTENTS IN THE
INTERNET


With this concept we can extract the contents of current on line web page or a web page stored from a hard disk
file and we can store it to another file. Web page contents like images, text, paragraphs, etc. Storing all images
to .html file and text to .txt file. This project is developed on core java for creating user interface window ,
creating connections and execution.

Modules:

Homepage

                    Main module for connecting to the URL and to invoke content extractor or feature extractor
                    modules

Content extractor
                          31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                   Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                        www.isiindia.com, admin@isiindia.com
                                        ISI SOFTWARE SOLUTION
                                      JAVA / J2EE / J2ME PROJECTS

                    For extracting words in tokenized format and paragraphs and for storing it

                    In a text file

Feature extractor

                    For extracting images and storing it in a html file

J2E 6044. CROSS PLATFORM INTEGRATION AND GLOBAL EDITOR SYSTEM

There are editors for languages such as C, C++, JAVA that exists separately for each. But there is no editor that
supports all languages in one. Moreover they take more memory space to run. The editor, which we are
designing, supports all languages in one environment. It is a package, which provides user to program the
languages such as C, C++, JAVA. Since the editors, which already exist, do not support all languages .we are
designing an editor that overcomes this problem. The compilers for all languages are present in the system itself.
This editor needs very less memory space to run. The features in this editor are automatically insert header files,
insert comment lines, insert closing braced to an opened brace. The other features are shortcut to compiler, auto
display of output window, auto help and auto quick insert. We are developing the user interface design using
swing concepts in java. The call to respective compilers and interface between user and database is done by
means of core java. This system would prove to be friendly to programmer since it reduces the precious coding
time as well as giving help to most of the methods syntax so no need to remember large number of methods.

J2E 6045. NETWORK ENABLED EMBEDDED CONTROL

            This project is very much useful and applicable in the college, and office environment. The project
utilizes the Java as the front end, The embedded system as the firmware end of the project thus the project is
firmware based this project allows a person to control the electronic appliances via the internet. Thereby
allowing the access of devices via the local area network with greater flexibility and user friendly The devices
carry a specific codes, which is typed in the explorer address bar is sent to the server .the server reads the data
from the html page with the help of java, and then provides the respective codes for the co running dynamic link
library files, which is designed with the help of vc++ For further communication with parallel port. The output
from the parallel port is fed to the controller for further processing, and the output from controller is fed for
relays for controlling of appliances.

J2E 6046. IMPLEMENTATION OF SECURITY KERNEL AND FIREWALL USING JAVA

Internet is a dynamic place and is liable for various forms of attack. It is necessary to guarantee the integrity
and safety of the private network connected to it. There are various methods to safeguard our trusted network.
One among them is firewall.

A firewall separates a private network from a public one, the Internet. It screens and filters all connections
coming from the Internet to the private network and vice versa, through a single, concentrated security
checkpoint. A firewall makes sure that you cannot reach the Internet from the Internet network, or vice versa,
unless you pass through this checkpoint.

There are several models and configurations of firewalls out there. But the basic idea behind them is always the
same. Our firewall’s primary security component is the security kernel. The security kernel evaluates each
incoming and outgoing network packet traversing the firewall server and enforces security policy against all
such packets.


J2E 6047. SECURED DATA COMMUNIACTION USING BASE 64 (BSF) ENCODING AND
                 DECODING – FOR IMAGE, TEXT, AUDIO, FILE ETC.

The main stay of this project is secured data or information or file Communication. The program provides a
User Interface to convert any file type to base64. The base64 conversion is to remove unreadable characters

                           31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                    Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                         www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

from your file. You can save your base64 code in a separate file and then convert it back to the original format
whenever you want.

This program provides a complete graphical interface to look like a wizard, which make conversion easy,
understandable and manageable with following FEATURES.

1.Image encoding & decoding

2.Text encoding & decoding

3.Audio encoding & decoding

4.File encoding & decoding

J2E 6048. WIRELESS VIRTUAL NETWORK COMPUTING

WVNC (Wireless Virtual Network Computing) software makes it possible to view and fully-interact with one
computer from mobile device anywhere on the Internet. WVNC software is cross-platform, allowing remote
control between different types of computer. For ultimate simplicity, there is even a Java viewer, so that any
desktop can be controlled remotely from within a browser without having to install software. WVNC has a wide
range of applications including system administration, IT support and helpdesks. It can also be used to support
the mobile user, both for hot desking within the enterprise and also to provide remote access at home, or on the
road. The system allows several connections to the same desktop, providing an invaluable tool for collaborative
or shared working in the workplace or classroom. Computer support within the geographically spread family is
an ever popular use.

J2E 6049. REMOTE DATA CAPTURE , ACQUISITION AND
SENDING SMS TO REMOTE MOBILE USING JSMS


This project developed to monitor the temperature or humidity of a remote area to notify the users through his
mobile. The remote area can be hospital (monitoring patient temperature), here the device which is going to
monitor will be connected to the PC through parallel port. The client application was implemented in java and
JSMS (java SMS API) used to send SMS to the users mobile.

J2E 6050. RFID BASED EMPLOYEE DATABASE MANAGEMENT SYSTEM

   RFID based access card used by the employer of any type of organization has been implemented using
java1.5 and struts1.2,MsAccess where an employee login and the logout time will be monitored with the help of
RFID and the pay slip of the employee will be calculated and updated upto date and time, where the Manager of
the organization is responsible controlling the Database(Updating and modifying new employee details ,
monitoring and managing the employee details with the access card reader.).

J2E 6051. REMOTE WEBCAM MONITORING SYSTEM

“Remote Web Cam” allows users to view their web cam images from any remote location. This project was
implemented in java(applet).here users are allowed to select their web cam from remote location to view latest
snapshot of the web cam images. The remote application directs web cam to take snapshots in the order of
frames these frames will be send to remote user. This application helps administrator to monitor their staff if
they are out of station.

J2E 6052. IMPLEMENTATION OF CROSS PLATFORM DATABASE ACCESS SYSTEM TO
REDUCE SERVER MAINTENANCE & MEMORY COST

Traditionally all the databases are stored only in the server node which in turn increases the cost to the server to
some extent. In order to avoid this, the new proposed system paves a new way by maintaining the databases not
in the server but distributed among the client nodes.
                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                         ISI SOFTWARE SOLUTION
                                       JAVA / J2EE / J2ME PROJECTS

If the database resides in the server as the traditional method the cost of the server such as maintenance costs,
memory cost, etc. becomes very high which in turn increases the application or the system cost. To avoid such
unnecessary cost the new proposed system enhances the maintenance of the databases.

Moreover the access time of the data from the database residing in a client machine is very much less when
compared to the database residing in the server so the data access time is very much reduced and the
performance of the system increases. The database does not reside in the server instead it is distributed locally in
the clients and so the RMI and RPC has to be used to access the database present over the remote clients.

J2E 6053. LIVE MEDIA STREAMING, CONVERGING AND TRANSMITTING USING REAL TIME
PROTOCOL (RTP)

Live Media can be transmitted from one computer (System to which Camera is attached) using RTP protocol.
The main part is to transmit the media from this system to other system. Setting up RTP sessions with several
distributed clients and streams can be a tedious and complicated task. It allows to stream media containing any
number of tracks to a number of different hosts/clients on the network simultaneously.
          Media can be received from the Server to which the Camera is attached and live images are captured.
Sitting in different place, we can view what’s going on in another place. The main use may be in places where
cash transaction is going on. Setting up RTP sessions with several distributed clients and streams can be a
tedious and complicated task.


J2E 6054. IMPLEMENTATION OF WIRELESS COMMUNICATION GATEWAY USING
                   INTERNET PROTOCOL

Wireless Communication Gateway over IP, details with communication between computer and cell phone using
Internet protocol. WCGOIP deals sending a short message from the PC to the intermediate server. Then from
the intermediate server it is sent to the Gateway [Simple Wire Server], which has an ip address, which is used by
the TCP \ IP to delivery the message to the Gateway. The Gateway connects the Internet to the cell network.
The gateway passes the message sent along with the cell number to the appropriate cell network and waits for
the response. The cell network route message to the receiver cell phone and sends the status of the message sent
to the gateway. Gateway in urn sends the status of the message sent to the intermediate server.

J2E 6055. CRYPTOGRAPHY IMPLEMENTATION OF SECURED DATA TRANSFERMATION

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's
arsenal. Cryptography provides three services that are crucial in secure programming.

            Files can be encrypted and the encrypted file can be decrypted using this system via a local network or
Internet.

            This project is implemented by core java, swing, awt.


J2E 6056. CROSS PLATFORM INTEGRATION TOOL FOR ACCESS, MONITORING AND
CONTROL OF LINUX & WINDOWS THROUGH JAVA

         When THIS TOOL starts, you should see a split window. In the upper half you'll see your DOS drives,
in the lower half you will see your LINUX drives. Your Linux filesystem is set to read only by default. Uncheck
menu item 'File - Linux read only' first, if you want to write to your Linux disk. Modifying or deleting is only
possible with Ext2 and Ext3 partitions. ReiserFS partitions are always read only. No files or directories can be
modified, deleted or created on or copied to a REISERFS Partition.




                           31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                    Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                         www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

Add another drive

    •   Choose in the Menu 'FILE' the 'Add DOS Drive' or 'Add Linux Drive' menu item or right click in the
        tree and choose the 'Add Drive ...' menu item of the contextmenu. NOTE: Running CROSS TOOL
        under Linux, you have to add Linux-drives in this dialog because "ldir -part" of the CROSS TOOL
        doesn't work under Linux.
    •   Enter a valid disk name in the text field 'Drive' and a valid directory in the text field 'Directory' of the
        shown dialog.
    •   To find out, which partitions do contain Linux filesystems, click on the 'PARTITIONS' button in the
        toolbar.
    •   Extended 2/3 partitions should be entered as /dev/hdxY, with x=a,b,c,... and y=1,2,3,..., ReiserFS
        partitions should be entered as /dev/rdxY (note the "r" instead of "h"!).
    •   ReiserFS partitions are read only.

Removing a Drive

    •   Right Click on a Drive in the directory tree and choose the 'Remove Drive' menu item of the
        contextmenu.

Connecting and disconnecting to a remote host (host must be running LREADjav)

    •   To connect CROSS TOOLgui to a remote host, which is running LREADjav, click on the 'CONNECT'
        button in the toolbar or in the Menu 'File' on 'Remote connect ...'. In the dialog box enter the host name
        and the portnumber (if lreadjav is not running on standard-port) and click OK.
    •   To disconnect, click on the 'DISCONNECT button' in the toolbar or in the Menu 'File' on 'Remote
        disconnect'. Using wildcards

    •   If you for example just want to see files with the extension "java" you can set a pattern(*.java) for the
        DOS and Linux-lists. Choose in the Menu 'File' the item 'DOS Pattern ...' to set the pattern for DOS-
        files or the item 'Linux Pattern ...' to set the pattern for Linux-files.

J2E 6057. TRANSACTION AND RECHARGE OF MOBILE TRHOUGH SMS & ATM SYSTEMS

        SMS or Short Message Service allows Cellular or Mobile GSM phones to send and receive Text
        Messages. The use of SMS is a convenient and fast means of communication with cellular telephone
        and pagers.

 This can be alphanumeric and more recently graphical. A sent SMS message is stored at an SMS Center
(SMSC) until the receiver’s phone receives it. The receiver can identify the sender by his/her telephone number
that is included in the message itself. SMS supports several input mechanisms that allow interconnection with
different message sources and destinations including voice-mail systems, Web-based messaging and E-mail
integration
The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the
requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become
the base system and a foundation of the complete wireless commerce framework, which will be implemented
later by ATech Wireless

There are 2 modules:

Mobile Recharge
The scope of this project is to customize the existing pre-paid system offering by ATech wireless to the
requirements of ICICI and Reliance and integrate it in their existing enterprise systems. The system will become
the base system and a foundation of the complete wireless commerce framework, which will be implemented
later by ATech Wireless


                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

Transaction on mobile:

Transaction on mobile is used to money between two peoples. this two peoples must be registered in a bank.
And they should have mobile transaction. this transaction starts with SMS. if user 1 wants to pay Rs.3000 to
User 2 .user 1 simply type SMS to particular Bank with his 4 Digit PIN, Amount and Account No. the request is
processed by the bank server and Amount is transferred to designation account.

J2E 6058. DESIGN AND DEVELOPMENT OF A NOVEL DISTRIBUTED , SCALABLE FILE
              SHARING AND ACCESS SYSTEM WITH GUARANTEED SECURITY

 There has been a huge growth in the use of file sharing software over the last year, making file sharing one of
the top uses of the Internet. Napster was the first technology that empowered users with his ability to share files
amongst themselves. The demise of Napster led to the development of numerous file sharing technologies, most
of which are based on the Gnutella protocol. The problem with all current file-sharing technologies is that none
of them can guarantee the security of the shared file. This report describes the design, development and
evaluation of a file sharing that proposes a novel solution to the shared file security problem. The system will
allow user to share files in a secure manner and comprises of client and server applications.

          The client allows users to connect to a server and shares their files amongst all other system users. The
client also gives users the ability to search for files shared by the other system users, and when a file is found it
could be transferred from the other user securely, as the file would be encrypted. The server allows valid users
to connect, records their shared file list enables connected users to search this list. The server authenticates
connected users by performing a test that only a valid user can respond to in the correct manner. The report
outlines research in the area of networking, including technological backgrounds such as distributed file system
architectures, cryptographic techniques and network programming methods. The novel feature of the system is
the method used to address the security problem inherent to all current file-sharing technologies. The system
developed uses cryptographic techniques to implement a framework in which to model system security,
including authentication of system users and the files that they share. We can also implement the direct client-
to-client communication, so the ideal time of the client must be greatly reduced. Log files are not to be created.
This project is highly scalable; it can be applied to WAN.

J2E 6059. ENHANCED MULTIPURPOSE IMAGING APPLICATION BASED ON IMAGE
STATISTICS CONCEPTS


The main objective of the project is Image processing .the system to reduce the noise in image and provide the
graphical user interface to apply the different properties like applying contrast, brightness, threshold level, color
balance and to change the property of the image and provide the useful information about the image .the system
is developed in java (SWINGS)

Platform :OS independent


MODULES

        Image editing
        GUI image
        Process
        Analyze
        Window




                         31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                  Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                       www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

J2E 6060. REMOTE AND ADVANCED WEB BASED FILE ACCESS AND MANIPULATION
               SYSTEM

This JSP program allows remote web-based file access and manipulation. You can copy, create, move, rename
and delete files. Text files can be edited and groups of files and folders can be downloaded as a single zip file
that is created on the fly. If you want to copy or move a file, please enter the target directory name in the Edit
field (absolute or relative). If you want to create a new file or directory, Enter the name in the edit field. If you
click on a header name (e.g. size) the entries will be sorted by this property. If you click two times, they will be
sorted descending.

The button "Download as zip" let you download the selected directories and files packed as One zip file. The
buttons "Delete Files", "Move Files", "Copy Files", delete, move and copy also selected Directories with
subdirectories. If you click on a .zip or .jar filename, you will see the entries of the packed file. You can unpack
.zip, .jar and .gz direct on the server. For this file type the entry in the Last column is "Unpack". If you click at
the "Unpack" link, the file will be unpacked in The current folder. Note, that you can only unpack a file, if no
entry of the packed file Already exist in the directory (no overwriting). If you want to unpack this file, you have
To delete the files on the server which correspond to the entries. This feature is very useful, If you would like to
upload more than one file. Zip the files together on your computer, Then upload the zip file and extract it on the
server. You can execute commands on the server (if you are allowed to) by clicking hit "Launch command"
Button, but beware that you cannot interact with the program. If the execution time of the program

J2E 6061. SCREEN CAPTURE, REMOTE MULTICASTING AND INTEGRATION SYSTEM USING
             MEDIA TRACKING, BUFFERING & GEOMETRIC CONCEPTS

The main objective of this project is to capture the current viewing screen and to multicast the image to different
remote system that is the networking System.

FOLLOWING ARE THE MODULES

     SCREEN CAPTURE

         This module capture the current viewing screen using the concept of media tracking, buffer and geo
         metric methods

     IMAGE CANVAS

         This module creates image file from captured screen and multicast the different networking system
         based on the concept of socket programming and buffered image.

     TEST MODULE

           This module implements integration framework based on captured screen module

J2E 6062. HIERARCHY DETECTION AND MANIPULATION SYSTEM

A program's object model captures the essence of its design. It is a graph that represents the objects in the
program and the relationships between them. For some programs, no object model was developed during design;
for others, an object model exists but may be out-of-sync with the code. In maintenance of a project, an object
model is invaluable; it is hard to make any progress fixing or reworking a program without an understanding of
what objects exist and how they are related to one another.

The aim of this project is to automatically generates an object model for a given Java application.. This project
performs a lightweight analysis of the bytecodes in the given Java class files and constructs the object model
and displays it to the user. It displays the object model in the form of a graph, which is easily understood by the
user.

                         31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                  Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                       www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

J2E 6063. SECURED DATA COMMUNICATION BY ENCODING AND DECODING OF DATA IN
          J2ME MOBILE TOOLKIT


The objective of this project is to send a private (encrypted) SMS between two users to avoid hacking of data
while transferring. Here the client and the server application will be installed in two different users mobiles.

The client server application will be having two modules that is Encoding and Decoding

    Encoding is used for encrypting the SMS and Decoding is used for decryption
    Encoding: original data will be converted into image format
Decoding: image format data will be converted into original data.

J2E 6064. DEVELOPMENT OF WEB ENABLED ONLINE, DYNAMIC ATM CARD MANAGEMENT
SYSTEM

        ATM CARD MANAGEMENT SYSTEM, deals with the process of issuing ATM cards to the bank
customers. TO avail the ATM (automatic teller machine) services a customer has to possess a valid ATM card.
         This project concentrate how to get a ATM card and how it works. A customer has to apply for the
ATM card. His application is registered first and then processed. The card is sent to the database and check if
the number is present. If it is present, check the amount. It is sufficient then reduces the amount how much he
purchase/ want from the database. Or otherwise it print the error message. Once processing is over, the
customer's application is genuine, and then ATM card is issued to the customer. There on the customer can
perform anytime anywhere transactions on his accounts with the help ATM card by means of various ATM
kiosks available in public places or through the internet.
J2E 6065. IMPLEMENTATION OF 3DES, 168 BIT STRONG
ENCRYPTION ALGORITHM IN MOBILE PHONES

The Mobile Safe Manager application enables users that require to save sensitive information such as Credit
Card, Bank Account Computer Login and General details to store such details in encrypted form on the phone.
All data stored on the phone is protected by 3DESede 168 bit strong encryption. The key for the user generates
this encryption when the application is installed, so there is not secret key held in the application. Only you, the
user know the key that will unlock your data.
New mobile phones can do more than just provide communications, they have the ability to run downloadable
programs and even store data. This Project We have developed Mobile Safe Manager to take advantage of these
new mobile phones.
If the Mobile is lost with the application running, all about the private information is available With mobile Safe
after a 2 minute of inactivity period, the screen is locked automatically and the user has to re-enter the password
to log inside again.


J2ME 6066. DESIGN AND DEVELOPMENT OF A REMOTE

CITY MAPPING SYSTEM

This Project teaches us how to develop a Remote City Mapping. This Guide will help a visitor to a city to obtain
information about places of importance, Bus route, Train Details and including all related details on a Java-
enabled device such as a mobile phone. We can develop the application using J2ME (Java 2 Micro Edition), to
understand the development of embedded applications for mobile devices, which have limited processing power
and memory .A server contains a database of the cities and the places of interest, along with details about each
place. A user can access this information through a GUI provided on the mobile device using the API’s - MIDP
(Mobile Information Device Profile).

 General Information Guide
 Boarding Guide
 Recreation Guide

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                     ISI SOFTWARE SOLUTION
                                   JAVA / J2EE / J2ME PROJECTS

   Tourism Guide
   Transportation Guide
   Industrial Guide
   Institutional Guide


J2E 6067. THREE DIMENSIONAL (3D) GRAPHICS, IMAGE PROCESSING AND TERRAIN
              RENDERING SYSTEM



The objective of this project is Image processing developed in advanced java by Using Java 3D Software. It
provides fast way to create 3 Dimensional graphics applications. The Java3D API is a hierarchy of Java classes
which serve as the interface to a sophisticated three-dimensional graphics rendering.

The programmer works with high-level constructs for creating and manipulating 3D Geometric objects

     Textured rendering
     Resolution
     Rotation
     Wire Frame Rendering

J2E 6068. IMPLEMENTATION OF VIRTUAL SIMULATION OF REALTIME ATM

        Now-a-days ATM is widely used by the peoples of all communities. The bank installs ATM in every
        location of a city in order to have a quick and safe withdrawal of the money. Before installing the
        original ATM in a particular location, the transactions, operations and efficiency are tested with the
        help of the ATM Simulator.


ATM Simulator allows banks to view ATM downloads directly from their desktop PC, exactly as they would
appear on a real ATM (NCR, Diebold, Wincor-Nixdorf etc.). ATM Simulator connects as a virtual ATM into
your existing host system, and behaves in exactly the same way as a real ATM. Through the unique use of ATM
hardware "personalities", any type of ATM can be simulated in this way, avoiding the need for costly ATM
hardware simply to test transactions.ATM Simulator allows banks to automate the regression testing of their
ATM transactions. No longer must bank staff spend time manually testing transactions on real ATMs, and
simulating hardware faults by jamming the ATM devices. Test scripts can be replayed at any time without the
intervention of an operator, and the results tabulated in a graphical easy-to-read format.

J2E 6069. ROBOT CONTROL FROM MOBILE

The project was developed in J2ME toolkit and servlet using web logic server as web server. The objective of
this project is to control the mechanism of a ROBOT by the human through his mobile. Here J2ME toolkit will
be used to design client application, which can be executed from any java enabled GPRS mobile.

The client applet which is running the mobile will be interacting with the servlet which is running in the web
server (Web logic) through which the ROBOT which has been connected with the PC will be controlled based
on the users command

J2E 6070. JAVA BASED FIRE ALARMING

The project was developed using java & J2ME, the objective Of this project is to control the fire within the
normal and maximum limits and if it exceeds the limits, then to alert the authorized person by sending sms from
system(PC) to his mobile.


                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

Software Requirement:

     JDK 1.5
     J2ME toolkit
     JSMS API


Hardware Requirement:

     Mobile
     Data cable
     Parallel port


J2E 6071. NETWORK PACKET SNIFFER AND NETWORK ANALYSER

         A packet sniffer (also known as a network analyzer or protocol analyzer or, for particular types of
networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept
and log traffic passing over a digital network or part of a network. As data streams travel back and forth over the
network, the sniffer captures each packet and eventually decodes and analyzes its content according to the
appropriate RFC or other specifications.

          On wired broadcast LANs, depending on the network structure (hub or switch), one can capture traffic
on all or just parts of the traffic from a single machine within the network; however, there are some methods to
avoid traffic narrowing by switches to gain access to traffic from other systems on the network (e.g. ARP
spoofing). For network monitoring purposes it may also be desirable to monitor all data packets in a LAN by
using a network switch with a so-called monitoring port, whose purpose is to mirror all packets passing through
all ports of the switch.

         On wireless LANs, one can capture traffic on a particular channel.

          On wired broadcast and wireless LANs, in order to capture traffic other than unicast traffic sent to the
machine running the sniffer software, multicast traffic sent to a multicast group to which that machine is
listening, and broadcast traffic, the network adapter being used to capture the traffic must be put into
promiscuous mode; some sniffers support this, others don't. On wireless LANs, even if the adapter is in
promiscuous mode, packets not for the service set for which the adapter is configured will usually be ignored; in
order to see those packets, the adapter must be put into monitor mode.

J2E 6072. ONLINE JAVA COMPILER AND SECURITY EDITOR

This Project is mainly used to create, compile the java program. The client machine doesn’t having the any java
compiler. That is client machine doesn’t having the java development kit. the client machine having only to
connect to the java server. The client machine only write a java program and to send to server. The server
having java compiler. The server create the new directory and save the client file and then compile java file
and generate the error message .this message is going to send the client .if the java program haven’t any error
means then server send message to the client ”No Error”.

In this project is also creating the security editor. This editor is performing encryption and decryption process.
The client creates text and save it to the server. The server perform encrypt the file and save it to the file. The
server also perform decrypts the file and save it to the file. These two processes are doing by means of the
security algorithms. In this project use very famous security algorithms is “RSA Algorithms”.




                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

J2E 6073. LIVE BROADCASTING, MULTICASTING, & UNICASTING OF VIOCE AND TEXT
               ENCRYPTION

The communication module deals with the various aspects involved during a conversation between the users.
The conference module involves with the way of communication between the various users. The security
module provides auto security to both voice and data. The communication module is further divided into two
modules. They are client module and server module. The client module deals with the various information
required for the various clients to involve in the conferencing. The client module does the validation process on
the information given by the user attached to the server. The server module does the authentication process on
the clients attached for the conferencing. Then those clients who are recognized are allowed to communicate
with each other. The conference module is further divided into two modules. They are the broadcasting module
and unicasting module. The conference may be in either text format or audio format. The users are free to
choose their requirement. In broadcasting module, the clients are allowed to communicate with each other,
without any restriction to the number of clients attached to the server. In the unicasting module, any two or
group members connected to the server can communicate within themselves. That is messages secured within
that group.

                                      IEEE PROJECTS ( 2008-2009-2010)

          JIEEE01: SECURE MOBILE PAYMENT SYSTEM IN WIRELESS ENVIRONMENT

Mobile payments are payments that are carried out through mobile devices in wireless environment. Mobile
payment is considered as the accelerator of e-commerce and m-commerce. Currently mobile payments deal with
several problems to improve requirements of m-commerce such as: simplifying the mobile payment processes
for consumers, improving the security of payment, especially the application of digital signing in mobile
payment. The proposed work introduces alternative ways for providing mobile banking services aimed at J2ME
enabled mobile phones over Bluetooth communication. The scope of the proposed solution is the combination
of J2EE and J2ME capabilities, means of overcoming the API and technical limitations, as well as security
consideration. This paper defines the secure mobile payment system to allow mobile users to conduct mobile
transactions over Bluetooth communications but also supports the related secured transactions between the
payment server and mobile clients. Finally, we have discussed some of the performance parameters such as:
time required to password hack for various character lengths, delay and probability error rate

JIEEE02: DRUPAL CONTENT MANAGEMENT SYSTEM ON MOBILE PHONE.

By adapting the Drupal system to mobile phones we try to target multiple goals:

• Content management system makes content creation and management of the personal website of your mobile
phone easy.

• Via the additional modules developing personal web sites for a variety of purposes becomes easier.

• With the creation of APIs that allow Drupal to access data in the core applications of the mobile phone we can
create new website functionality that takes advantage of features available in the mobile devices.

• Drupal provides a very good test case for the underlying layers of the architecture.

JIEEE03: J2ME AND SMART PHONES AS PLATFORM FOR A BLUE TOOTH BODY AREA
     NETWORK FOR PATIENT-TELEMONITORING

This project deals with problems of utilization of mobile equipment working in the biomedicine field,
particularly telemedicine. The basic idea is to create a system that controls important information about the state
of wheelchair bound person like monitoring of ECG and pulse in early phases, then other optional values like
temperature or oxidation of blood.

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

Sometimes middle-aged people have a collapse, breakdown or heart attack and must be in hospitals or health
resorts for a long time to regenerate their bodies. The time that they spend in these institutions, is nonutilisable
and very long for them. Possibilities of today physics are restricted by many of prescripts so patients cannot use
some of the newest techniques (like hyperbaric or arctic chambers), which make it possible to reduce the
regeneration time by weeks or months.

This system consists of several interconnected parts that can communicate among themselves, so they can
approach their function. These parts are measuring sensor, PDA or embedded device, and server for data
processing and evaluation. Beside these, the most important parts that are worth mentioning are various kinds of
accessories, such as

GPRS, WiFi, GSM, Bluetooth or GPS modules. By means of them we can communicate. We mostly use the
fastest technology in signal coverage

JIEEE04: DEVICE INDEPENDENT MOBILE APPLICATION CONTROLLER FOR REMOTE

        ADMINISTRATION OF A SERVER OVER A GPRS LINK USING A J2ME CELLULAR

         Unhindered connectivity to a computer & the need of the hour. The ability to connect to e remote
machine and control it will have inflate advantages. J2ME (JAVA 2 Micro Edition) is a platform created to
enhance application development for mobile phones. Using the platform we have crested an application which
can control any desktop computer or a server by sending the required commands over an HTTP Connection.

        The main aim of the application is to remote & access and control different applications on a static IP
PC by connecting to it over a GPRS link from a J2ME enabled cell phone. The possible applications are:

         1.) Launching Word pad.

         2.) Shutting down and restarting or logging off from your machine.

         3.) Open & Save WordPad Files into the Remote machines.

JIEEE05: MOBILE BANKING SECURITY USING STEGANOGRAPHY

         Upon development of m-commerce as one of the new branches of e-commerce, m-banking has
emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has
embarked upon supply of various services based on different systems and with the aid of various services such
as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some
challenges as well. One of these challenges is the issue of security of this system.

         This paper presents a method for increasing security of the information requested by users with the use
of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture
by the password and is put on a site. Then the address of the picture is sent to the user. After receiving the
address of the picture through SMS, the user downloads the picture by a special program. After entering the
password, the user can witness the information extracted from the picture if the password is entered correctly.

JIEEE06:ON-DEMAND VIDEO STREAMING IN MOBILE OPPORTUNISTIC NETWORKS

Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a
challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a mobile peer-to-peer video-on-
demand application based on ubiquitous WiFi enabled devices such as smartphones and Ultra Mobile PCs.
MOVi poses new challenges in on-demand video streaming caused by limited
                         31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                  Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                       www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

wireless communication range, user mobility and variable user population density. MOVi addresses these
challenges by exploiting the opportunistic mix use of downlink and direct peer-to-peer communication to
significantly improve achievable overall system throughput. Through simulation and actual implementation, we
observed that MOVi is able to increase the number of supported concurrent users two fold compared with
unicast based on-demand video streaming, as well as reducing video start-up delay by half. Significantly, these
performance improvements can be achieved without increasing power consumption at the end device. Using
MOVi, users not only share and distribute on-demand video such as YouTube clips for their own performance
gain but also for the benefit of the collaborative group.

JIEEE07:RFID CREDIT CARDS SYSTEM.

         Online shopping using electronic payment scheme has gained a lot of popularity in recent years. In an
electronic payment scheme using normal credit cards there is no way to genuinely identify owner of the credit
card. Credit card fraud is the fastest growing crime all over the world. Any effort to plug the security hole
especially for online payment is considered worthwhile.

         A contactless smartcard is a smartcard that can communicate with other devices without any physical
connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming
increasingly popular, with applications like credit-cards, national-ID, passports, and physical access. The
security of such applications is clearly critical. A key feature of RFID-based systems is their very short range:
typical systems are designed to operate at a range of ≈ 10cm.

         RFID enabled credit cards are becoming increasingly popular as contactless credit cards. We envision a
future where RFID credit cards will be used for online shopping. RFID system has tremendous potential to
render electronic payments more secure than normal credit cards. The word RFID enable credit cards may bring
in mixed passion, enthusiasm and perhaps even rage! This is partly paranoia and partly reality. The reality is that
an intruder can read RFID cards without the user even noticing it. This brings in a zone of discomfort and leads
to paranoia. Certain interactivity should exist to bring back this comfort to the user. This paper tries to make an
effort in that direction. In this paper we propose mobile phone based architecture for secured electronic
payments using RFID credit cards.

JIEEE08:ROBOT TELEPORTATION SYSTEM BASED ON GPRS

In this project we present a strategy for using the cellular network, and specifically the general Packet Radio
Service, to teleoperate a mobile robot. This allows the system user a wider mobility range and coverage. The
system application is developed using Java Programming Language, implementing two teleoperation methods:
predefined sequences and instant actions.

JIEEE09:ADDRESS AUTOCONFIGURATION AND ROUTE DETERMINATION MECHANISMS
FOR THE MANET ARCHITECTURE OVERCOMING THE MULTI-LINK SUBNET MODEL

The mobile ad hoc network (MANET) is a wireless network composed of mobile nodes which can communicate
with each other via multiple wireless links. Previously, the MANET has been considered as a single subnetwork,
so all nodes in a MANET are assigned the same subnet prefix, which is the multi-link subnet model. In order to
                         31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                  Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                       www.isiindia.com, admin@isiindia.com
                                       ISI SOFTWARE SOLUTION
                                     JAVA / J2EE / J2ME PROJECTS

resolve the multi-link subnet problem, the modified MANET architecture was proposed in [12]. In this paper,
we propose an address autoconfiguration mechanism and a route establishment mechanism for the modified
MANET architecture. Our proposed mechanism can prevent the performance degradation caused by
broadcasting control messages of a reactive routing protocol such as the Ad-hoc On-demand Distance Vector
(AODV). We evaluate the performance of the proposed mechanisms by carrying out NS-2 based simulations


JIEEE10:PIDS: A PACKET BASED APPROACH TO NETWORK INTRUSION DETECTION AND
PREVENTION

Computer networks are one of those unique gifts of modern science which enriched human life with the blessing
of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network
security has come into issue. Now-a-days intrusion detection systems have become a standard component in
security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host
and after that approaching for further malicious attacks. The techniques used for intrusion detection have their
particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. And
practically all of them require some kind of termination in network connections So, the quest for betterment
continues. In this progression, here we present PIDS: a complete intrusion detection system which reduces most
of the problems contained by the previous systems and it doesn’t need to terminate any network connections to
detect the intruder. This system generates quick responses against intrusions and stops the intruder to proceed
for further attacks.


JIEEE11: RIMOM: A DYNAMIC MULTISTRATEGY ONTOLOGY ALIGNMENT FRAMEWORK

Ontology alignment identifies semantically matching entities in different ontologies. Various ontology
alignment strategies have been proposed; however, few systems have explored how to automatically combine
multiple strategies to improve the matching effectiveness. This paper presents a dynamic multistrategy ontology
alignment framework, named RiMOM. The key insight in this framework is that similarity characteristics
between ontologies may vary widely. We propose a systematic approach to quantitatively estimate the similarity
characteristics for each alignment task and propose a strategy selection method to automatically combine the
matching strategies based on two estimated factors. In the approach, we consider both textual and structural
characteristics of ontologies. With RiMOM, we participated in the 2006 and 2007 campaigns of the Ontology
Alignment Evaluation Initiative (OAEI). Our system is among the top three performers in benchmark data sets.


JIEEE12: MINING OF DEFECT IN SOFTWARE AND DEFECT CORRECTION EFFORT
PREDICTION

Much current software defect prediction work focuses on the number of defects remaining in a software system.
In this paper, we present association rule mining based methods to predict defect associations and defect
correction effort. This is to help developers detect software defects and assist project managers in allocating
testing resources more effectively. We applied the proposed methods to the SEL defect data consisting of more
than 200 projects over more than 15 years. The results show that, for defect association prediction, the accuracy
is very high and the false-negative rate is very low. Likewise, for the defect correction effort prediction, the

                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com
                                      ISI SOFTWARE SOLUTION
                                    JAVA / J2EE / J2ME PROJECTS

accuracy for both defect isolation effort prediction and defect correction effort prediction are also high. We
compared the defect correction effort prediction method with other types of methods—PART, C4.5, and Naı¨ve
Bayes—and show that accuracy has been improved by at least 23 percent. We also evaluated the impact of
support and confidence levels on prediction accuracy, false negative rate, false-positive rate, and the number of
rules. We found that higher support and confidence levels may not result in higher prediction accuracy, and a
sufficient number of rules is a precondition for high prediction accuracy.




                        31-B, II Floor, Thangam Complex, Murugankurichi, Tirunelveli-2.
                                 Ph:0462-2584899, Cell:98433 86666, 98435 86666
                                      www.isiindia.com, admin@isiindia.com