0824 4233176


List Of Java Projects
Web Template

  1. Text Encryption And Decryption
  2. X

    Text Encryption And Decryption

    Cryptosystems, highly technical systems that provide privacy through secret encoding, have been an important part of the electronic information world for many years. These systems are the foundation for all electronic information exchange. For example, financial institutions and banks rely upon cryptography to securely transmit critical and private information over the Internet. Especially now, during the e-commerce explosion, secure and reliable exchange systems are vital for the world's economy. These cryptosystems protect data by using hardware and software in a process that protects data by performing mathematical operations/algorithms on it. The result is data rendered unintelligible, which is called cipher text. This cipher text is then transmitted over insecure phone lines or networks such as the Internet. If someone intercepts this cipher text, it is indecipherable and meaningless to him or her. When the cipher text reaches its final destination, it can be decrypted into the original state of the data.

    more info

  3. Automated ballot vote
  4. X

    Automated ballot vote

    Automated ballot vote is an information management system that has been developed for automating the process of election proceedings that take place between the people, and the government. The system needs consistent flow of information at different levels within the automated ballot vote, any interruption in the flow of major data can cause the final verdict to get stalled or pending. These kinds of situations should be holding our automated ballot vote system. Data maintenance becomes a vital component with proper relation at all different stages. Any relational mismatch upon the actual information can change the actual meaning of the verdict, which is a great concern in the departments. The systems also become false proof for data attractions at any stage, because the overall control of information is kept in the hands of different administrations working at different levels. The subjective authority of data manipulation is handled lay with proper authentication, but all the recognized actions in the system can execute queries upon the system as per the substantial standardizations as they arise when the system is under the operational standards.

    more info

  5. Data Leakage Detection
  6. X

    Data Leakage Detection

    We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages.

    more info

  7. Mobile Phone Tracking
  8. X

    Mobile Phone Tracking

    MOBILE TRACKING” is based on J2ME and PHP. In today’s fast world, mobile has become one of the important commodities of a human being. It has become a necessity rather than a luxurious commodity. The Mobile Tracking helps to track the current location of the mobile. It is a web application. This application tracks the mobile location in every 5 seconds in connection with the central tower. The Mobile Tracking application will be deployed in Symbian supporting mobile phones. This system sends the following information to the server. 1. Mobile ID 2. Location 3. Time at which the device was present on the above location The users of the mobile application can get the shop details of a place by providing the location. The application will fetch the shop information on that location and display the details on the mobile screen. In the proposed system we have created an application by means of which we can track the movement of the mobile phone of the desired user. Each mobile phone has a unique Id and it is this ID that sets apart a mobile phone from other mobile phones. By means of this ID can identify each mobile and track the mobile phone anywhere we want.

    more info

  9. Remote Administration using Mobile
  10. X

    Remote Administration using Mobile

    The mobile devices are becoming more and more popular and powerful and are providing a new notion of communication that we could once only imagine. A truly wireless mobile is new to the vast majority of computer users. We know wireless mobile phones, but the idea of being able to connect to the Internet in a similar fashion is something with ramifications we've yet to fully realize. The vast majority of us are still accustomed to plugging a modem into a phone back to connect to the Internet remotely. The enhancements in the technologies help us to have the Internet accessing facilities even on the mobiles. Our project is related to accessing a remote PC using a mobile. The system gives the user the user the ability to access remote computer via mobile phone from everywhere in the world. The user is connected to the Internet server by a service provider according to the IP address specified by him. If a connection is established the user can access the remote system. The user can read, write and can execute specific files on the remote PC.

    more info

  11. Steganography In Audio Files
  12. X

    Steganography In Audio Files

    In our system Steganography involves the method of acquiring insignificant bits in the audio file. We acquire the insignificant bits in the audio header and replace them with significant bits of data Steganography has been used on a message, the viewer would not be able to tell that the message contains a hidden message within it. The data to be concealed is compressed and hidden within another file. The hidden message may be placed inside the white space of text messages or the dark areas of a photographic image, or within the unused portions of a audio file format. The first item needed for Steganography is called a carrier or a container. This can be a text file, graphic file or sound file which will host the message that is desired to be hidden. Here in our system Steganography involves the method of acquiring insignificant bits in the audio file. We acquire the insignificant bits in the audio header and replace them with significant bits of data. When performing data hiding on audio, first the data is encrypted by password based encryption using DES algorithm to generate the cipher text. Now the cipher text is kept hidden in the audio file using low bit encoding method. When extracting the data from audio first cipher text is separated from audio then the plain text is generated by decrypting the cipher text.

    more info

  13. Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking
  14. X

    Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking

    The goal of topic-oriented text summarization is to produce informative short description according to the given topic or query. This is somewhat similar to the target of question answering which retrieves exact answers from large text collections. In this paper, we present a lightweight and rule-free summarization technique. Our method relies on a two-pass re-ranking framework. The first pass is to order the concepts which were clustered via conventional top-down clustering algorithm. The second pass generates the representative sentences from the top N concepts. The main advantage of our work is that we do not need to build external knowledge or pre-defined rules. This is our first time to participate in DUC. Although the result of our system is not comparable with most top-performed methods, the light-weight and rule free techniques still encourage us to further improve via integrating rich sources.

    more info

  15. Effective Audio Video Transfer Using Real Time Protocol
  16. X

    Effective Audio Video Transfer Using Real Time Protocol

    This system provides the complete information and the implementation of the video conferencing technology. The main aim of the project is to create a system for the effective videoconference over the intranet with in the Organization. Currently there are many systems available for videoconference. These systems use the TCP/IP protocols for communicate and also for transfer the frames from one system to another. These systems also follow the stored and forwarded procedure for transfer the frames. Normally these systems can transmit and re-transmit the copy of the frames from the source or server

    more info

  17. Personal Authentication Based On Iris Recognition
  18. X

    Personal Authentication Based On Iris Recognition

    T Iris recognition is the process of recognizing a person by analyzing the apparent pattern of his or her iris. There is a strong scientific demand for the proliferation of systems, concepts and algorithms for iris recognition and identification. This is mostly because of the comparatively short time that iris recognition systems have been around. In coparison to face, fingerprint and other biometric traits there is still a great need for substantial mathematical and computervision research and insight into iris recognition. One evidence for this is the total lack of publicly available adequate datasets of iris images. The program converts a photo of an eye to an 'unrolled' depiction of the subject's iris and matches the eye to the agent's memory. If a match is found, it outputs a best match. The current functionality matches that proposed in the original requirements.

    more info

  19. Natural Image Segmentation Based On Tree Equipartition
  20. X

    Natural Image Segmentation Based On Tree Equipartition

    We propose a general purpose image segmentation framework, which involves feature extraction and classification in feature space, followed by flooding and merging in spatial domain. Region growing is based on the computed local measurements and distances from the distribution of features describing the different classes. Using the properties of the label dependent distances spatial coherence is ensured, since the image features are described globally. The distribution of the features for the different classes are obtained by block-wise unsupervised clustering based on the construction of the minimum spanning tree of the blocks' grid using the Mallows distance and the equipartition of the resulting tree. The final clustering is obtained by using the centroids algorithm. With high probability and under topological constraints, connected components of the maximum likelihood classification map are used to compute a map of initially labelled pixels. An efficient flooding algorithm is introduced, namely, Priority Multi-Class Flooding Algorithm (PMCFA), that assign pixels to labels using Bayesian dissimilarity criteria. A new region merging method, which incorporates boundary information, is introduced for obtaining the final segmentation map.

    more info

    Browse More Projects...

    1. Citizen Card management system

    2. Fingerprint Recognition System

    3. Credit card Fraud Detection

    4. E-Voting

    5. Secure Health care System

    6. Deting Suspicous URL's in Twitter Stream

    7. Earthquake Reporting System in Twitter Stream

    8. Hospital mgmt System

    9. Office automation system

    10. Optimized path selection low cost package for travelling user

    11. Optimized System for minimizing file download time in P2p

    12. A System for Timely and Controlled Information Sharing in Emergency Situations

    13. Enhanced data distribution model in p2p File Sharing

    14. System for Secure IMAGE HASHING Mechanism

    15. Dynamic Swarm Management System

    16. Mobile Health Monitoring System

    17. Jhoneypot-Java Honey pot System

    18. Telemedicine Service in Virtual Servers

    19. Web Crawler System

    20. Secure Authentication system in proxy mobile networks

    21. Online Shortest path Computation System

We Offer Project For

B. E (Computer Science)

B. E (Electronics and Communication)

B. E (Electrical and Electronics Eng.)

B. E (Information Technology)

B. E (Instrumentation Control and Eng.)

M. E (Computer Science)

M. E (Power Electronics)

M. E (Control System)

M. E (Software Engg)

M. E (Applied Electronics)

M. SC (IT , IT&M , CS&M, CS)



B.Sc. (IT , CS)