project offered april 2010
Post on 08-Apr-2018
219 Views
Preview:
TRANSCRIPT
-
8/7/2019 Project Offered April 2010
1/47
Dept. of CSE @JIET
1
List of Projects Offered to B. Tech. (IV year ) Batch 2007-11
Project Number-1 Name of Faculty Member- Neeraj Rathore
Project Title- To Explore the Efficient scheduling Algorithm which reduces the load balance in
suitable Environment.
Batch Size-3Area/ Concept involved: Distributed System, OS, parallel system.
Language / Tools that may be used: Dot Net/JAVA /C#
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Basic concepts on Computer
Network, Distributed
System,OS etc Dot Net/JAVA /C#
Brief Description about project:The rapid development in computing resources has enhanced the performance of computers and
reduced their costs. This availability of low cost powerful computers coupled with the popularity
of the Internet and high-speed networks has led the computing environment .Distributed system
which supports the sharing and coordinated use of resources, independently from their physical
type and location, in dynamic virtual organizations that share the same goal. This technologyallows the use of geographically widely distributed and multi-owner resources to solve large
scale applications like meteorological simulations, data intensive applications. In order to fulfill
the user expectations in terms of performance and efficiency.
Expected Outcome at the End of 7th Semester-
Literature reviews of all scheduling algorithm and find out the efficient algorithm use for load
balancing.
Expected outcome at the End of 8th Semester-
Load Balancing simulator with the help of the scheduling algorithm
Project Number-2 Name of Faculty Member- Neeraj Rathore
Project Title- Develop an Efficient checkpoint algorithm as compare to existing checkpoint
schemes.
Batch Size- 3
Area/ Concept involved: Distributed System, Computer Network, OS etc
Language / Tools that may be used: Dot Net/JAVA /C#
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Basic concepts on Computer Network, Distributed
System,OS etc
Dot Net/JAVA /C#
-
8/7/2019 Project Offered April 2010
2/47
-
8/7/2019 Project Offered April 2010
3/47
Dept. of CSE @JIET
3
Review all existing scheduling algorithm and compare all of them with different parameters and
design an architecture of propose scheme.
Expected outcome at the End of 8th Semester-Develop scheduling algorithm and make a simulator which will work same as a real time system.
Project Number-4 Name of Faculty Member- Jaytrilok Choudhary
Project Title- Personalization of Web Search results based on user profile
Batch Size- 3
Area/ Concept involved: Web Mining
Language / Tools that may be used: Java (JSP Servlet)/ Web Search API
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Web Mining Java
Search Engine Tomcat web server
Brief Description about project:
The main function of Search engine is to search Web for the documents that are related to thegiven topic specified by the user. The Web pages available on WWW (World Wide Web)increases day-by-day and it is very difficult to find relevant information for a particular user.
There are various approaches for personalization of web search but it is unclear whether
personalization is working efficiently and effectively for different user on different queries with
different search context. For example, a zoologist may use query mouse to get information
about rats, while computer programmer may use the same query to find information about
computer peripherals.
Expected Outcome at the End of 7th Semester-
The analysis and designing must be completed with GUI.
Access search results from the search engine.
Expected outcome at the End of 8th Semester-
The results obtained from search engine must me personalized based on user profile.
Project Number-5 Name of Faculty Member- Jaytrilok Choudhary
Project Title- Document ranking system using Vector space model
Batch Size- 3
Area/ Concept involved: Data Mining
-
8/7/2019 Project Offered April 2010
4/47
Dept. of CSE @JIET
4
Language / Tools that may be used: Java
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Data mining Java
Vector space model
Brief Description about project:Document ranking is a concept in the field of information retrieval. In information retrievalsystems, documents should be ranked in order of decreasing probability of relevance. Most
existing text retrieval techniques rely on indexing keywords. Unfortunately, keywords or index
terms alone cannot adequately capture the document contents, resulting in poor retrieval
performance. There is a technique to rank the documents using vector space model. In this
technique, the documents ranked based on the cosine similarity measurement.
Expected Outcome at the End of 7th Semester-
The analysis and designing must be completed with GUI.
Vector space model should be prepared.
Expected outcome at the End of 8th Semester-
The documents must be ranked.
Project Number-6 Name of Faculty Member- Jaytrilok Choudhary
Project Title- Implementation of Page Rank Algorithm
Batch Size- 3
Area/ Concept involved: Web mining
Language / Tools that may be used: Java
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Web mining Java
Page rank algorithm,search engine
Brief Description about project:
PageRank is a link analysis algorithm used by the Google search engine that assigns a numericalweighting to each element of a hyperlinked set of documents with the purpose of measuring its
relative importance within the set. The algorithm may be applied to any collection of entities.
The PageRank of a page is defined recursively and depends on the number and PageRank metric
of all pages that link in to it (incoming links) and out to it ( outgoing ).
-
8/7/2019 Project Offered April 2010
5/47
Dept. of CSE @JIET
5
Expected Outcome at the End of 7th Semester-
The analysis and designing must be completed.
Prepare a virtual network to implement page rank algorithm.
Expected outcome at the End of 8th Semester-
Page rank algorithm must be implemented and worked on World Wide Web.
Project Number-7 Name of Faculty Member-Abhishek Srivastava
Project Title-External Memory Algorithms for processing line segments in GIS.
Batch Size-3
Area/ Concept involved: Computational Geometry,Algorithm Analysis and complexity theory
Language / Tools that may be used:C++,TPIE on linux
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Computational
Geometry
External Memory
Algorithms
TPIE
Brief Description about project: (Minimum 100 words)-In the design of algorithms for large-scale applications it is essential to consider the problem of
minimizing I/O communication. Geographical information systems (GIS) are good examples of
such large-scale applications as they frequently handle huge amounts of spatial data. Typical
subproblems that need to be solved in GIS systems include point location, triangulating maps,generating contours from triangulated elevation data, and producing map overlays, all of which
require manipulation of line segments. This project aims at designing an I/O efficient algorithmhaving less I/O complexity than existing external memory algorithms.
Expected Outcome at the End of 7th Semester-Data modeling for the given problem, Implementation of existing external memory algorithms
on TPIE. Performance comparison of existing external memory algorithms with existing incore
algorithms (Theoretical as well as Experimental)
Expected outcome at the End of 8th Semester-An improved external memory algorithm. Proof of correctness of Algorithm. Performance
comparison of existing external memory algorithm with the proposed algorithm (Theoretical as
well as experimental)
Project Number-8 Name of Faculty Member-Abhishek Srivastava
-
8/7/2019 Project Offered April 2010
6/47
Dept. of CSE @JIET
6
Project Title-Utility based scheduling using machine learning in resourse constrained systems.
Batch Size-3
Area/ Concept involved: Operating System, Artificial Intelligence
Language / Tools that may be used:C / C++
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Operating System
Artificial Intelligence
Brief Description about project:
The classical real-time scheduling problem is that of deciding on the order in which the currently
unscheduled jobs should be executed by a single processor, with no possibility of processor
sharing. In the case ofhard real-time systems, each job is characterized by an execution time and
a deadline. A soft real-time system is the one where each job receives some utility as a function
of its completion time. Each job arriving into the system requires a certain number of CPU time
to be executed. The final job utility decays as its waiting + execution time increases.
The objective of project is to design an utility based scheduling algorithm where reinforcementlearning is used to update the value function for each machine based on the state of its resources,
the jobs it is executing and the jobs waiting to be scheduled. Once such a value function is
obtained, any kind of scheduling decisions can be considered on each machine, which can now
be driven by maximization of the machines state value following the scheduling decision.
Expected Outcome at the End of 7th Semester-
Simulation of existing scheduling algorithm and their performance analysis.Implementation of reinforcement learning.
Expected outcome at the End of 8th Semester-Design and implementation of utility based scheduling.
Performance analysis of the proposed system
Project Number-9 Name of Faculty Member- Abhishek Srivastava
Project Title- Distributed Data Directories and Parallel Data Management System
Batch Size- 3
Area/ Concept involved: Dynamic Load Balancing
-
8/7/2019 Project Offered April 2010
7/47
Dept. of CSE @JIET
7
Language / Tools that may be used: C/C++/UNIX
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Distributed Computing GNU C/C++
Distributed Processing MPICH, Zoltan
Brief Description about Project:The aim of this project is to design a general-purpose tool for parallel data management for
unstructured, dynamic applications. This system includes a suite of load-balancing algorithms,an unstructured communication package, distributed data directories, and dynamic debugging
tools that can be used by a variety of applications. It simplifies the load-balancing, data
movement, unstructured communication, and memory usage difficulties that arise in dynamic
applications such as adaptive finite-element methods, particle methods, and crash simulations. Its
data-structure design also lets a wide range of applications use it without imposing restrictions onapplication data structures. Its object-based interface provides a simple and inexpensive way for
application developers to use the library and researchers to make new capabilities availableunder a common interface. This system provides tools that help developers of parallel
applications.
A suite of parallel partitioning algorithms and data migration tools dynamically
redistribute data to reflect, say, changing processor workloads.
Distributed data directories and unstructured communication services let applicationsperform complication communication using only a few simple primitives.
Dynamic memory management tools enhance common memory allocation functions to
simplify debugging of dynamic memory usage.
A parallel application has been already developed as Zoltan. Zoltan's data-structure neutral
design allows it to be used by a variety of applications without imposing restrictions on
application data structures. Its object-based interface provides a simple and inexpensive way forapplication developers to use the library and researchers to make new capabilities available
under a common interface.
Expected outcome at the End of 7th Semester-
Design and architecture of the proposed system, proposed algorithm, modules for fulfillment of
the algorithm.
Expected outcome at the End of 8th Semester-Experimental results should be achieved in the process of distributed data and data management
in heterogeneous environment of any LAN. These results must be verified on the basis of
suitable graphs and required tables.
Project Number-10 Name of Faculty Member-Deepshikha Tiwari
Project Title- A secure architecture for internet protocol
-
8/7/2019 Project Offered April 2010
8/47
Dept. of CSE @JIET
8
Batch Size-3
Area/ Concept involved: Network
Language / Tools that may be used: Java, C, C++
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Network basics Java , C, C++
TCP/IP Protocol suit
Brief Description about project:
The Internet provides amazing opportunities, but not without some risk. Without the proper controls, your
data is subject to several types of attacks as follows: Loss of Privacy, Data Integrity, Identity Spoofing etc.
To provide solution for these problems we will use a mechanism called IPSec (IP Security Architecture).
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by
authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for
establishing mutual authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair
of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls),
or between a security gateway and a host. IPsec is a dual mode, end-to-end, security scheme operating
at the Internet Layer of the Internet Protocol Suite or OSI model Layer 3.
Expected Outcome at the End of 7th Semester-
Literature survey on IPSec, design document and development of client module
Expected outcome at the End of 8th Semester-
Development of server module, integration of other module and final report
Project Number-11 Name of Faculty Member-Deepshikha Tiwari
Project Title- Development of tool forLinux Network Administration
Batch Size- 3
Area/ Concept involved: Network
-
8/7/2019 Project Offered April 2010
9/47
Dept. of CSE @JIET
9
Language / Tools that may be used: C, PHP, Red Hat Packages
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Computer Networks
OOPS, Operating
Systems
C, RHEL5/CentOS 5
Brief Description about project:In this project a Linux based well defined network of our college will be developed. We will
implement a Proxy server, DNS server, software firewall, FTP server, LDAP server, an attractivewebsite of our college and a mail server will be established. By using RHEL 5/CentOS 5 as the
platform, we will add some more functionality in the mail server other than just send or receive
mail. We will have a postfix SMTP server, Dovecot POP3 and IMAP server, mailboxes, quota
for mailboxes, a antivirus to scan mail, anti spam filter and mail scanner to integrate antivirusand anti spam filter into postfix. We will also be having integrated active directory in ourmailboxes to turn Linux mail server into lean and mean exchange like machine and MySQL to
administer multiple domains and the users will be facilitated to have a vacation massage.
Expected Outcome at the End of 7th Semester-
High level design document for the all the modules and Development of mail server.
Expected outcome at the End of 8th Semester-
Development of rest of the rest of the modules and integration of all the modules.
Project Number-12 Name of Faculty Member- Deepshikha Tiwari
Project Title- Analysis and implementation of Q-learning Method
Batch Size- 3
Area/ Concept involved: Artificial intelligence and Machine learning
Language / Tools that may be used: JAVA, C/C++
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Machine learning JAVA , C/C++
Reinforcement
Learning
-
8/7/2019 Project Offered April 2010
10/47
Dept. of CSE @JIET
10
Brief Description about project:
Reinforcement learning has received much attention in the past decade. The primary thrust ofthis project has to explore the field of reinforcement learning from a computer scienceperspective and analyze, implement Q-learning method. Reinforcement learning is the study ofhow an autonomous agent (animals and artificial systems), the learner, can acquire andimprove skills within an environment without having an explicit teacher. One way in whichanimals acquire complex behaviors is by learning to obtain rewards and to avoid punishments. Itis considered especially suitable for unpredictable environments, robot learning and goaloriented learning. In these situations the goal is well known, but not how to achieve the goal.Reinforcement learning is also called learning with a critic
In Q-learning method the role of an agent using is to set up a Q-function, which is anestimate of the reward it can expect from performing the possible actions from its current state.This Q-function can thus be utilized to select the most appropriate action. As with allreinforcement learning strategies, an external reward is used to inform the agent when it hascorrectly or incorrectly carried out an action, or set of actions. At the end of project, we will try tosuggest some improvement in Q-learning method.
Expected Outcome at the End of 7th Semester-
Study of Reinforcement learning, Q- learning, Design document, development of TDmethod
Expected outcome at the End of 8th Semester-
Final simulator of Q-learning with some improvement suggestion.
Project Number-13 Name of Faculty Member- Punit Pandey
Project Title- Learning an agent through Relative Reward
Batch Size-3
Area/ Concept involved: Artificial Intelligence, Reinforcement Learning Algorithms, and
Swarm Intelligence
Language / Tools that may be used: Java, Eclipse
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Artificial Intelligence Java, Java Swing,
Applet
Brief Description about project:
-
8/7/2019 Project Offered April 2010
11/47
-
8/7/2019 Project Offered April 2010
12/47
Dept. of CSE @JIET
12
provide the information to the end user whenever the memory leak is detected in any process of a
cluster. It will also provide the information to the user to take corrective action on affectedprocess. Current memory leak detection techniques for clusters are reactive and display the
memory leak information after the execution of the Process it means they detect memory leakonly after it occurs.
Expected Outcome at the End of 7th Semester-1. Design phase has to be completed with all high level design2. Development of Dynamic Memory Monitoring tool pseudo code3. Development of pseudo code of all processes state in terms of memory leak like bad state
or good state
Expected outcome at the End of 8th Semester-
1. Implementation of tool with by using Java or C.2. All deliverables related to Dynamic Memory Monitoring tool
Project Number-15 Name of Faculty Member- Punit Pandey
Project Title- Multi Agent Based Distributed Intrusion Detection System
Batch Size- 3
Area/ Concept involved: Network Security, Distributed System
Language / Tools that may be used: Java, Eclipse
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Socket Programming Java, Java Swing,
Applets
Brief Description about project:The primary goal of this project is to provide intrusion detection and real-time prevention
capability against insider attacks in distributed and fully automated environments. IDS (Intrusion
Detection System) must analyze and correlate a large volume of data collected from different
critical network access points. This task requires IDS to be able to characterize distributed
patterns and to detect situations where a sequence of intrusion events occurs in multiple hosts.
Different type of Agents has to develop that work as entities to detect and take predefined actionsagainst malicious activity. The heart of this project is the Interpreter Agent. It collaborates with
the Analyzer Agent for detecting complex local attacks, and uses the Correlate agent with theMobile Agent for determining whether some suspicious activities in different node can be
combined to be a distributed intrusion.
-
8/7/2019 Project Offered April 2010
13/47
-
8/7/2019 Project Offered April 2010
14/47
Dept. of CSE @JIET
14
Students must be able to able to access, update data from one site of another site through the
earlier designed web pages with the complete record of students in the database of at least threesites.
Project Number-17 Name of Faculty Member-Raksha Sharma
Project Title-Retrieval of file using content based search
Batch Size-3
Area/ Concept involved: Networking, Soft Computing
Language / Tools that may be used: JAVA, Sql Server, ASP.net, JSP
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
DBMS SQL server
Soft Computing and
Networking
.net frame work, java
Brief Description about project: - This project completely deals with the searching for the
whole data related to a particular word available on web. Search should be done through two
fields first is text field in which a user can enter the text and second one is name of domain
like entries 21 and www.hindustantimes.com respectively should fetch all the datarelated to date 21 available on Hindustantime.com .there should be a provision like if we typea character it should display possible searches related to that character like Google search
engine.
Web page should be able to search the images related to the entered text. For example if
user search for the word BOOK. Project should display all the images available on the web
related to word book.
Expected Outcome at the End of 7th Semester-
Decide on constraints that you have to force while searching. Complete database should be readywith these constraints as attributes. All the web pages should be ready.
Expected outcome at the End of 8th Semester-All the web pages should be in working condition. User must be able to search the data
according to his need.
Project Number-18 Name of Faculty Member-Raksha Sharma
Project Title- Development of a workflow based Complaint Management System
Batch Size-3
Area/ Concept involved: Operating System, Database/understanding of mailing system
-
8/7/2019 Project Offered April 2010
15/47
Dept. of CSE @JIET
15
Language / Tools that may be used: Unix/Linux, Shell Scripting, C, Oracle, VB.net
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Operating System Unix/Linux
Database Oracle
Brief Description about project: This Project deals with the implementation of mailing systemto provide the customer a friendly environment to post his or her complaints.
With Every product will have an email id assigned to it. Customers, when they have a
complaint about the product, will send an email to the email id provided to them for that
product. these Emails should get logged into the database and a complaint number should be
generated. The customer should get an acknowledgement back saying that his/her complaintis received. Administrators will be set up for each product and he/she should see all the
complaints received for that product. Groups of complaint handling executives should be setup for each product. The administrator for a product should be able to assign the complaints
to specific members of the complaint handling team for that product. The complaint
management team member should see the complaints assigned to him/her in his inbox. He
should be able to send mail to the customer through the system with any clarification/solution
or asking for more information. These subsequent communications should be stored as a part
of the same complaint. The complaint should show all the communication that happened
between the customer and the organization. A complaint can be closed with some pre definedstatuses like: Open, Closed, Abandoned, In-progress, etc.Reference information should bemaintained in the system like complaint management team for different products, mail ids for
different products, default mail texts for products, default mail subjects for products, list of
users, list of products etc.
Expected Outcome at the End of 7th Semester-
Database with Product name and Email Id assigned to the customer for a particular product
should be ready. Conversation through mails should be displayed.
Expected outcome at the End of 8th Semester-
The whole description of the project should be in working condition.
Project Number-19 Name of Faculty Member- Dinesh Kumar Verma
Project Title- Vehicle tracking system using GPS and GSM modem
Batch Size- 3
Area/ Concept involved: Embedded systems/Microcontroller
-
8/7/2019 Project Offered April 2010
16/47
Dept. of CSE @JIET
16
Language / Tools that may be used: Assembly language for microcontroller / C language / Kiel
or any assembler
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Microcontroller 8051
family
Kiel or any tool to
program the EEPROM
Serial communication Port programming
Brief Description about project:
In this Project it is proposed to design an embedded system which is used for tracking and
positioning of any vehicle by using Global Positioning System (GPS) and Global system for
mobile communication (GSM).
In this project AT89S52 microcontroller is used for interfacing to various hardware peripherals.The current design is an embedded application, which will continuously monitor a moving
Vehicle and report the status of the Vehicle on demand. For doing so an AT89S52microcontroller is interfaced serially to a GSM Modem and GPS Receiver. A GSM modem is
used to send the position (Latitude and Longitude) of the vehicle from a remote place. The GPS
modem will continuously give the data i.e. the latitude and longitude indicating the position of
the vehicle. The GPS modem gives many parameters as the output, but only the NMEA data
coming out is read and displayed on to the LCD. The same data is sent to the mobile at the other
end from where the position of the vehicle is demanded. An EEPROM is used to store the mobile
number.
Expected Outcome at the End of 7th Semester- All the design should be prepared
Expected outcome at the End of 8th Semester- A hardware or any vehicle modules that can
be track by PC
Project Number-20 Name of Faculty Member- Dinesh Kumar Verma
Project Title- Automatic plant Irrigation
Batch Size- 3
Area/ Concept involved: Embedded systems/Microcontroller
Language / Tools that may be used: Assembly language for microcontroller / C language /
Kiel or any assembler
Prerequisite Knowledge Required-
-
8/7/2019 Project Offered April 2010
17/47
Dept. of CSE @JIET
17
Concept/ Subject Software / Tools
Microcontroller 8051
family
Kiel or any tool to
program the EEPROM
Power Electronics Op-Amp
Brief Description about project: -
The Project presented here waters your plants regularly when you are out for vocation. Thecircuit comprises sensor parts built using op-amp IC LM324. Op-amp are configured here as a
comparator. Two stiff copper wires are inserted in the soil to sense the whether the Soil is wet or
dry.
The Microcontroller was used to control the whole system it monitors the sensors and when
more than two sensors sense the dry condition then the microcontroller will switch on the motor
and it will switch off the motor when all the sensors are in wet. The microcontroller does the
above job it receives the signals from the sensors, and this signals operated under the control ofsoftware which is stored in ROM.
Expected Outcome at the End of 7th Semester- All the design should be prepared
Expected outcome at the End of 8th Semester- A hardware module that can be used to
ON/OFF the water supply motor under the condition of Soil
Project Number-21 Name of Faculty Member- Dinesh Kumar Verma
Project Title- Development of Routine for Improvement in various parameters of a Software
Architecture Models
Batch Size- 3
Area/ Concept involved: Software Engineering
Language / Tools that may be used: Matlab/ Java
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Software Reliability
Software Testing Any testing tool
Computer systems
organization
Brief Description about project: (Minimum 100 words)-
-
8/7/2019 Project Offered April 2010
18/47
Dept. of CSE @JIET
18
Quantitative prediction of quality properties (i.e. extra functional properties such as performance,
reliability, and cost) of software architectures during design supports a systematic softwareengineering approach. Designing architectures that exhibit a good trade-off between multiple
quality criteria is hard, because even after a functional design has been created, many remainingdegrees of freedom in the software architecture span a large, discontinuous design space. In
current practice, software architects try to find solutions manually, which is time-consuming, can
be error prone and can lead to suboptimal designs. This project is an automated approach to
search the design space for good solutions. Starting with a given initial architectural model, the
approach iteratively modifies and evaluates architectural models. The approach should apply a
multi-criteria genetic algorithm to software architectures modeled with the Palladio Component
Model. It supports quantitative performance, reliability, and cost prediction and can be extended
to other quantitative quality criteria of software architectures.
Expected Outcome at the End of 7th Semester- All the design should be prepared
Expected outcome at the End of 8th Semester complete project
Project Number-22 Name of Faculty Member- Prateek Pandey
Project Title- Building Processes, Applications and their integration in BPM technologies
Batch Size-3
Area/ Concept involved: Business Process Management
Language / Tools that may be used: Java/J2EE, DBMS, XML
Prerequisite Knowledge Required- Java/J2EE, DBMS, XML
Concepts / Subject Software / Tools
Programming
Language
Java
BPM suite Savvion Business
Manager
Brief Description about project- Business Process Management (BPM) software and serviceshelp organizations optimize business performance by discovering, documenting, automating, and
continuously improving business processes to increase efficiency and reduce costs. The area of
BPM is new and much scope lies beneath this. The project offers you to learn the Business
Process Management by taking any BPM product of your choice(Savvion Business Manager,
BEA Aqualogic, Red Hats jBPM etc.), creating processes, applications, reports, simulations and
integrating an application with your BPM suite. Working on BPM requires sound knowledge of
-
8/7/2019 Project Offered April 2010
19/47
Dept. of CSE @JIET
19
Java/JSP/Servlets . Having equipped with this hot & vibrant technology, anyone can upstage
others even in cold & blunted job market.
Expected Outcome at the End of 7th Semester- A prototype application demonstrating various
features of your suite including some reports.
Expected outcome at the End of 8th Semester- A functional and meaningful application
with comprehensive reports and rules implemented .
Project Number-23 Name of Faculty Member-Prateek Pandey
Project Title- Fuzzy logic Based Inventory Control System & Interfacing with WeighingMachine
Batch Size-3
Area/ Concept involved: Application development using Fuzzy Logic
Language / Tools that may be used: Java/J2EE, DBMS, XML
Prerequisite Knowledge Required- Java/J2EE, DBMS, XML
Concepts / Subject Software / Tools
ProgrammingLanguage
Java
Brief Description about project: As the title suggests, the project is about making an inventory
control system but the concept of fuzzy sets is incorporated into it. Apart from it the project
includes interfacing of the fuzzy based Inventory system application and the digital weighing
machine that is commercially available in the market. Indeed, it sounds good to have the
appropriate quantity of a commodity deducted automatically from the database as and when the
same quantity is being weighted on the weighing machine and supplied to the customer .
Expected Outcome at the End of 7th Semester- A working application except reports and
some cosmetic features.
Expected outcome at the End of 8th Semester- Fully functional application with
comprehensive reports.
Project Number-24 Name of Faculty Member- Prateek Pandey
Project Title- Integration of Applications based on Java Messaging Service and SOA
Batch Size-3
-
8/7/2019 Project Offered April 2010
20/47
-
8/7/2019 Project Offered April 2010
21/47
Dept. of CSE @JIET
21
Brief Description about project: (Minimum 100 words)-
Agile software development methodologies are becoming important now a day. The movement
of Agile is now spread around the world. Adopting agile methods means incorporating new
dynamic approaches in terms of roles, management style, project monitoring and controlling.
This project work is supposed to focus on study and analysis of software cost estimation in an
Agile Project as well as implementation of the technique identified. It is mainly a research based
project aiming to identify the efficient Project estimation technique, Prograaming will be done in
.Net framework.
Expected Outcome at the End of 7th Semester-
Analysis and Thorough Study of existing Software Estimation Techniques in contrast with theAgile Software practice.
Expected outcome at the End of 8th Semester-
An Integrated Software estimation tool that helps to overcome the difficulties of agile project
estimation
of 7th Semester-
Thorough Study and analysis of domain.
Demonstration of initial modules
Expected outcome at the End of 8th Semester-
Project Number-26 Name of Faculty Member- Ratnesh Litoriya
Project Title- Mobile based Path finder System
Batch Size-3
Area/ Concept involved: Mobile Application
Language / Tools that may be used: J2ME , J2EE
Prerequisite Knowledge Required- Core JAVA , J2ME
Concepts / Subject Software / Tools
Utilization of GSM J2ME and other softwarepackages that supports
Mobile device
-
8/7/2019 Project Offered April 2010
22/47
Dept. of CSE @JIET
22
Brief Description about project:
This Project deals with the problem of finding out the distance and location between twoindividual places within the globe or any geographically restricted area , Path finding is the vast
issue , but through this title one is supposed to address the problem off finding the correct
distance with the help of cellular device , because of the fact that almost every person is having
a mobile with them , and the feature of Any where and Any time opens very interesting
opportunities in this regard .
Expected Outcome at the End of 7th Semester-
Study and analysis of Mobile technology and an efficient algorithm that effectively addresses the
problem of path finding
Expected outcome at the End of 8th Semester-A Path finder system (working) which addresses the problem of finding of path through GSM
Mobile.
Project Number-27 Name of Faculty Member- Ratnesh Litoriya
Project Title- Content-Based Image Retrieval Using Multi resolution Color and Texture
Features
Batch Size-3
Area/ Concept involved: Graphics And Multimedia
Language / Tools that may be used: Java , Net Beans 5.5
Prerequisite Knowledge Required- .Net programming
Concepts / Subject Software / Tools
Pattern Recognition Java
Image retrieval Jdk 1.6
Brief Description about project:
In this project, a content-based image retrieval method based on an efficient combination of
multi-resolution color and texture features is proposed . We will extract the spatial distribution of
colours in an image. The dimension of the combined feature vector is determined at a pointwhere the retrieval accuracy becomes saturated. Especially, it demonstrates more excellentretrieval accuracy for queries and target images of various resolutions. It is an automatic process
to search relevant images based on user input. The input could be parameters, sketches or
example images. This process first extracts the image features and store them efficiently. Then it
compares with images from the database and returns the results.
-
8/7/2019 Project Offered April 2010
23/47
Dept. of CSE @JIET
23
Expected Outcome at the End of 7th Semester-
Take the features from the picture that will be used for matching with the database.
Expected outcome at the End of 8th Semester-
Matching of the extracted features with the database images
Project Number-28 Name of Faculty-Mahesh Kumar
Project Title- Improving Packet Delivery Performance
Batch Size-3
Area/ Concept involved: Internet, Computer Networks, Routers
Language / Tools that may be used: TCL/C++, JAVA, NS2, SSFnet
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Networks Network Simulators
internet Tcl/Otcl/C++/Java
Brief Description about project: Computer Networks are supporting huge amount IP traffic
and doing a great job,
but some time they take much longer time to transfer traffic on the network,
we need to find the causes of the delay and improve the performance by either eliminating those
factors or by introducing some additional features to it.
Expected Outcome at the End of 7th Semester-
The students will be able to understand the concept of networking, routing, ASes and applyingrouting protocols on nodes in a network/AS using available network simulator, they will also
come up with design of their new model of delivering packets.
Expected outcome at the End of 8th Semester-
The students will implement their designed model and will display the outcome of their designed
approach in any of the network simulator.
Project Number-29 Name of Faculty-Mahesh Kumar
Project Title- Development of Novel Routing Information Protocol
Batch Size-3
-
8/7/2019 Project Offered April 2010
24/47
Dept. of CSE @JIET
24
Area/ Concept involved: Internet, Computer Networks, Routers
Language / Tools that may be used: TCL/C, C++, JAVA etc
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Networks UNIX/Linux /
internet Tcl/Otcl/C/C++/Java
Brief Description about project: Computer Networks are supporting huge amount of traffic and
doing a great job, but some improvements are expected if we make certain changes to the
software use in decision making, we need to find the causes of the performance degradation and
improve the performance.
Expected Outcome at the End of 7th Semester-The students will be able to understand the concept of networking, routing and implementingnetworks by creating nodes/links/servers/clients and applying routing protocols using any of the
available network simulators, they will also come up with design of their new model of routing.
Expected outcome at the End of 8th Semester-
The students will implement their designed model and will display the outcome of their designed
approach in any of the network simulator.
Project Number-30 Name of Faculty-Mahesh Kumar
Project Title- Development of a Network Management System (NetMon)
Batch Size-3
Area/ Concept involved: Computer Networks, Network Management
Language / Tools that may be used: TCL/C, C++, JAVA etc
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Networks UNIX/Linux /Windows Svr
Network management Tcl/Otcl/C/C++/Java
Brief Description about project: Computer Networks are growing at a rapid speed and network
administrators are facing difficulties to monitor the status of each component of a networkwithout having a better management system for local area network.
-
8/7/2019 Project Offered April 2010
25/47
Dept. of CSE @JIET
25
Expected Outcome at the End of 7th Semester-
The students will be able to understand the concept of networking, and management related
issues. They will also be able to understand the importance of network management. They willalso come up with design of their new model of network management system.
Expected outcome at the End of 8th Semester-
The students will implement their designed model and will display the outcome of their designed
approach in either Java or .Net.
Project Number-31 Name of Faculty Member- Vishnu Sharma
Project Title-Security Issues in VOIP Applications
Batch Size-3
Area/ Concept involved:computer networking
Language / Tools that may be used:ns-2/c++/java
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer networking NS-2/java/C++
Brief Description about project: (Minimum 100 words)-
Recent voice over Internet protocol (VoIP) technology is attracting more and more attention and
interest in the industry. VoIP applications such as IP telephony systems involve sending voice
transmissions as data packets over private or public IP networks as well as reassembled and
decoded on the receiving side. Security concerns are always the major barrier that prevents manybusinesses from employing VoIP technologies. In this project, we discuss various VoIP security
threats and possible approaches to tackle the threats in VoIP applications
Expected Outcome at the End of 7th Semester-
Analysis and Study of voip tecnology
Expected outcome at the End of 8th Semester-
Implementaion of Routing security algorithms and data confidentiality for voip and results of
simulations.
-
8/7/2019 Project Offered April 2010
26/47
Dept. of CSE @JIET
26
Project Number-32 Name of Faculty Member- Vishnu Sharma
Project Title- SOA BASED STOCK MARKET
Batch Size-3
Area/ Concept involved: client-sever computing
Language / Tools that may be used: asp. net,sql server
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
ASP.NET,SQL .NET,TOMCATSQL SERVER
Brief Description about project:
In computing, a service-oriented architecture (SOA) is a flexible set of design principles used
during the phases of systems development and integration. A deployed SOA-based architecture
will provide a loosely-integrated suite of services that can be used within multiple businessdomains. SOA also generally provides a way for consumers of services, such as web-based
applications, to be aware of available SOA-based services. For example, several disparate
departments within a company may develop and deploy SOA services in different
implementation languages; their respective clients will benefit from a well understood, well
defined interface to access them. XML is commonly used for interfacing with SOA services,
though this is not required. SOA defines how to integrate widely disparate applications for aworld that is Web based and uses multiple implementation platforms. Rather than defining an
API, SOA defines the interface in terms of protocols and functionality. An endpointis the entrypoint for such an SOA implementation.
Expected Outcome at the End of 7th Semester-
DESIGN, CODE
Expected outcome at the End of 8th Semester-
Implementaion, Testing
Project Number-33 Name of Faculty Member- Vishnu Sharma
Project Title-Performance evaluation and simulations of routing protocols in ad hoc networks
Batch Size-3
Area/ Concept involved: Ad-hoc Networks
Language / Tools that may be used: NS-2/C++/Qualnet
Prerequisite Knowledge Required-
-
8/7/2019 Project Offered April 2010
27/47
Dept. of CSE @JIET
27
Concepts / Subject Software / Tools
Adhoc networks NS-2/C++
Brief Description about project:In this project, we describe the Optimized Link State Routing Protocol (OLSR) a proactive
routing protocol for Mobile Ad-hoc NET works (MANETs). We evaluate its performance
through exhaustive simulations using the Network Simulator 2 (ns2) and compare with other ad-
hoc protocols, specifically the Ad-hoc On-Demand Distance Vector (AODV) routing protocol
and the Dynamic Source Routing (DSR) protocol. We study the protocols under varying
conditions (node mobility, network density) and with varying traffic (TCP, UDP, differentnumber of connections/streams) to provide a qualitative assessment of the applicability of the
protocols in different scenarios.
Expected Outcome at the End of 7th Semester-
Analysis and Study of existing ad-hoc routing protocols Techniques
Expected outcome at the End of 8th Semester-
NS-2 tool that helps to overcome the difficulties of Ad-hoc routing protocols and results of
simulations.
Project Number-34 Name of Faculty Member- AJAY KUMAR
Project Title- Efficient Data Mining Using Intelligent Agents
Batch Size-3
Area/ Concept involved: Data Mining, Database, and AI
Language / Tools that may be used: Java/Matlab/.Net
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
DBMS NIL
OOPS NIL
Brief Description about project: Data Mining is the process of extraction of interesting (non-
trivial, implicit, previously unknown and potentially useful) information or patterns from data in
large databases. Agents are defined as software or hardware entities that perform some set of
tasks on behalf of users with some degree of autonomy. In order to work for somebody as an
assistant, an agent has to include a certain amount of intelligence, which is the ability to choose
among various courses of action, plan, communicate, adapt to changes in the environment, and
learn from experience.
-
8/7/2019 Project Offered April 2010
28/47
Dept. of CSE @JIET
28
In general, an intelligent agent can be described as consisting of a sensing element that can
receive events, a recognizer or classifier that determines which event occurred, a set of logicranging from hard-coded programs to rule-based inference, and a mechanism for taking action.
In several steps through knowledge discovery, which include data preparation, mining modelselection and application, and output analysis, intelligent agent paradigm can be used to
automate the individual tasks. In the experiment setup, we discover association rules in a
distributed database using intelligent agents. We apply an original approach for effective
distributed mining association rules: loose-couple incremental methods. We compare the results
obtained with the similar work done in the field.
Expected Outcome at the End of 7th Semester- Students will able:
To analyze the different format of data.
To Learn Preprocessing Task for Data mining.
To gain working knowledge of Weka.
Expected outcome at the End of 8th Semester-
Student will able to:
Design its own model based upon the given data source.
Analyze the outcome of the algorithm and present complete model in the form of tool.
Project Number-35 Name of Faculty Member-Ajay Kumar
Project Title-Data mining application in medical: a Case Study
Batch Size-3
Area/ Concept involved: Data Mining, Database, and AI
Language / Tools that may be used: Java/Matlab/.Net
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
DBMS NIL
OOPS NIL
Brief Description about project:This is the case study on medical data in order to obtain some useful information or pattern fromthe pool of database. The data used in this project was obtained from the UCI Machine Learning
Repository. The database has 5 attributes (columns in a database table), 24 instances (rows in the
table) of data and 3 classes.
The goal of data mining in this implementation is to classify each of the attributes like Patient
Ageetc into different class and predict the future outcome of incoming object. Data is a data
-
8/7/2019 Project Offered April 2010
29/47
Dept. of CSE @JIET
29
file containing all possible numeric combinations of the attributes (columns in a database table)
values.
Expected Outcome at the End of 7th Semester-Students will able:
To analyze the different format of data.
To Learn Preprocessing Task for Data mining.
To gain working knowledge of Weka.
Expected outcome at the End of 8th Semester-
Student will able to:
Present complete analysis of data set taken from UCI Repository.
Anlaysis of result should be presented in the form of tool.
Project Number-36 Name of Faculty Member- Ajay Kumar
Project Title- Web Usage Mining Using Apriori Algorithm (Web Content Mining)
Batch Size-3
Area/ Concept involved: Data Mining, Database, and AI
Language / Tools that may be used: Java/Matlab/.Net
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
DBMS NIL
OOPS NIL
Brief Description about project:The enormous content of information on the World Wide Web makes it obvious candidate for
data mining research. Application of data mining techniques to the World Wide Web referred as
Web mining where this term has been used in three distinct ways; Web Content Mining, WebStructure Mining and Web Usage Mining. E Learning is one of the Web based application where
it will facing with large amount of data. In order to produce the JIET portal usage patterns and
user behaviors, this project implements the high level process of Web Usage Mining using basic
Association Rules algorithm call Apriori Algorithm. Web Usage Mining consists of three mainphases, namely Data Preprocessing, Pattern Discovering and Pattern Analysis. Server log files
become a set of raw data where its must go through with all the Web Usage Mining phases toproducing the final results. Here, Web Usage Mining, approach has been combining with the
basic Association Rules, Apriori Algorithm to optimize the content of the JIET portal. Finally,
this project will present an overview of results analysis and Web administrator can use the
findings for the suitable valuable actions.
Expected Outcome at the End of 7th Semester-
-
8/7/2019 Project Offered April 2010
30/47
Dept. of CSE @JIET
30
Students will able:
1. To analyze the different format of data.2. To learn working of Search engines, Web Spider (Crawlers).3. To gain working knowledge of Weka.
Expected outcome at the End of 8th Semester-Student will able:
1. Design its own model based upon the given data source.2. Analyse the outcome of the algorithm and present complete model in the form of tool.
Project Number-37 Name of Faculty Member -Babita Tiwari
Project Title- Optimizing Compiler of JAVA SCRIPT
Batch Size- 3
Area/ Concept involved: Compiler design, Object Oriented Programming
Language / Tools that may be used: Java
Prerequisite Knowledge Required-
Concept/ Subject Software /
ToolsCompiler design, Object Oriented Programming Java
Brief Description about project:
The Optimizing Compiler is a tool for making JavaScript download and run faster. It is a true
compiler for JavaScript. Instead of compiling from a source language to machine code, itcompiles from JavaScript to better JavaScript. Optimizing Compiler is a JavaScript optimizing
compiler. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes
what's left. It also checks syntax, variable references, and types, and warns about common
JavaScript pitfalls. This Compiler reduces the size of your JavaScript files and makes them moreefficient, helping your application to load faster and reducing your bandwidth needs. The
Optimizing Compiler provides warnings for illegal JavaScript and warnings for potentially
dangerous operations, helping you to produce JavaScript that is less buggy and easier to
maintain.
Expected out come at the end of 7th Sem-
Coding of compiler with its Designing parts
Expected out come at the end of 8th Sem-Code optimization and fully functional closure compiler
-
8/7/2019 Project Offered April 2010
31/47
Dept. of CSE @JIET
31
Project Number-38 Name of Faculty Member -Babita Tiwari
Project Title- Debugger with profiling in Java
Batch Size- 3
Area/ Concept involved: Algorithm, Compiler design, Object Oriented Language
Language / Tools that may be used: Net beans, Abstract window tool kit
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Algorithm ,Compiler design,
Object Oriented Language
Net beans, Abstract
window tool kit
Brief Description about project:
The project aims at providing graphic user interface (GUI) for a debugger. Facilities like creatingnew file, running and saving the file in java language will be provided. The debugger will
provide errors at exact locations with an additional advantage of saving an error log file for
future reference. Moreover the debugger will be able to correct frequently occurring errors.
Expected out come at the end of 7th Sem-Requirement analysisDesigning
Coding for the same
Expected out come at the end of 8th Sem-
Code integration
Testing and validation
Project Number-39 Name of Faculty Member -Babita Tiwari
Project Title- Distributed Data mining in Credit Card Fraud Detection Analysis
Batch Size- 3
Area/ Concept involved: Data Mining, Distributed System
Language / Tools that may be used: Java
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
-
8/7/2019 Project Offered April 2010
32/47
Dept. of CSE @JIET
32
Data Mining, Distributed System Java
Brief Description about project:
Credit card transactions continue to grow in number, taking a larger share of the payment
system, and have led to a higher rate of stolen account numbers and subsequent losses by banks.Hence, improved fraud detection has become essential to maintain the viability of the payment
system. Banks have been fielding early fraud warning systems for some years. We seek to
improve upon the state-of-the-art in commercial practice via large scale data mining. Scalable
techniques to analyze massive amounts of transaction data to compute efficient fraud detectors in
a timely manner are an important problem, especially for e-commerce. Besides scalability and
efficiency, the fraud detection task exhibits technical problems that include skewed distributions
of training data and non-uniform cost per error, both of which have not been widely studied in
the knowledge discovery and data mining community. In this Project we survey and evaluate anumber of techniques that we have proposed and implemented that address these three mainissues concurrently. Our proposed methods of combining multiple learned fraud detectors under
a "cost model" are general and demonstrably useful; our empirical results demonstrate that we
can significantly reduce loss due to fraud through distributed data mining of fraud models.
Expected out come at the end of 7th Sem-
Requirement analysis
DesigningCoding for the same
Expected out come at the end of 8th Sem-Code integration
Testing and validation
Project Number-40 Name of Faculty Member- Harikesh Singh
Project Title- Dispatcher based Dynamic Load Balancing on Web Server
Batch Size- 3
Area/ Concept involved: Distributed Computing
Language / Tools that may be used: C++ / JAVA
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Computer Network LAN Trainer
Distributed System Telnet, C++ / Java
Brief Description about Project:
-
8/7/2019 Project Offered April 2010
33/47
Dept. of CSE @JIET
33
In computer networking, dynamic load balancing is a technique to distribute workload evenly
across two or more computers, network links, CPUs, hard drives, or other resources, in order toget optimal resource utilization, maximize throughput, minimize response time, and avoid
overload. Using multiple components with load balancing, instead of a single component, mayincrease reliability through redundancy. The load balancing service is usually provided by a
dedicated program or hardware device (such as a multilayer switch or a DNS server).
A distributed Web-server system is any architecture consisting of multiple Web-server hosts,
distributed on LANs and WANs, with a mechanism to spread incoming client requests among
the servers. Each server in the system can respond to any client request. Information can be
distributed among server nodes in two ways: content tree replication on a servers local disk, orinformation sharing by means of a distributed file system. In this project we can classify four
distributed Web server architectures according to the entity that distributes the incoming requests
among the servers. The client-based solution requires software modification on the client side;
the other three (DNS-based, dispatcher-based, and server-based) affect one or more componentsof the Web-server system. We then evaluate the trade-offs among the alternative approaches and
techniques.
Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with the functionality ofclient to web server packet distribution.
Expected outcome at the End of 8th Semester-Experimental results should be achieved in the process of dynamic load balancing in
heterogeneous environment of any LAN. These results must be verified on the basis of suitable
graphs and required tables.
Project Number-41 Name of Faculty Member- Harikesh Singh
Project Title- Development of a Distributed Monitoring Framework
Batch Size- 3
Area/ Concept involved: Distributed Processing
Language / Tools that may be used: C++ / Java / NetLogger Toolkit
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Network LAN Trainer, NetLogger
Distributed System Telnet, Globus
Brief Description about Project:
The goal of the Distributed Monitoring Framework is to improve end-to-end data throughput for
data intensive applications in a high-speed WAN environments, and to provide the ability to do
performance analysis and fault detection in a Grid computing environment. This monitoring
-
8/7/2019 Project Offered April 2010
34/47
Dept. of CSE @JIET
34
framework will provide accurate, detailed, and adaptive monitoring of all of distributed
computing components, including the network. Analysis tools will be able to use this monitoringdata for real-time analysis, anomaly identification, and response. Services for network-aware
applications will use this monitoring infrastructure in order to provide past, present, and futurepredictions of the network conditions, which the applications can then use to adapt their
behavior. Applications such as widely distributed workflow management systems can then use
the DMF as a generalized real-time event service. This system must have the following
objectives:
Integration and enhancement of existing monitoring tools and technologies into a Grid
environment
Development of non-intrusive methods for network capacity monitoring and estimation
Determination of what network metrics are needed by network-aware DOE(Department of Energy) Science Grid applications
Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with the functionality of
integration and enhancement of existing monitoring tools.
Expected outcome at the End of 8th Semester-
Experimental results should be achieved in the process of distributed monitoring in
heterogeneous environment of any LAN. These results must be verified on the basis of suitablegraphs and required tables.
Project Number-42 Name of Faculty Member- Harikesh Singh
Project Title- Development of a Grid Service Provider
Batch Size- 3
Area/ Concept involved: Distributed Processing/Grid Computing
Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX
Prerequisite Knowledge Required-
Concepts / Subject Software / ToolsComputer Network C++/ UNIX
Distributed System Telnet, Globus
Brief Description about Project:
The aim of the project is to allow for interoperability between the Globus Toolkit and the
Shibboleth Identity Federation system. In the first phase of this project basic interoperability
should be achieve in that a deployment of the Globus Toolkit can query and receive attributes
from a Shibboleth service regarding a Grid user, and then make an access control decision based
on those attributes. In the second phase, we will turn our attention to refining this capability as
well as addressing higher-level management issues such as management of the federation of
-
8/7/2019 Project Offered April 2010
35/47
Dept. of CSE @JIET
35
name spaces between the Grid and campus worlds and the management of the trust
configuration/metadata between the Grid and Shibboleth components. We distinguish two basicmodes of operation, which we can call "pull" and "push". In thepull mode of operation, after the
client has been authenticated, the Grid Service Provider requests attributes from the client's ownadministrative domain via a back-channel exchange. In the push mode of operation, the client
provides the attributes up front, obtaining and pushing those attributes to the Grid Service
Provider at the time of initial request. In both cases, the Grid Service Provider obtains the user
attributes it needs to make an informed access control decision (authorization).
A parallel application, GridShib has been developed for Globus Toolkit is an add on package for
Globus Toolkit (GT). GridShib for GT is an implementation of a Grid Service Provider, asoftware component analogous in function to the Shibboleth Service Provider but for X.509-
based Grids.
Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with integration ofpull and push modes of operation between the Grid and Shibboleth components.
Expected outcome at the End of 8th Semester-Experimental results should be achieved through Grid services in heterogeneous environment of
any LAN. These results must be verified on the basis of suitable graphs and required tables.
Project Number-43 Name of Faculty Member- P. S. Banerjee
Project Title- Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP
Updates.
Batch Size- 3
Area/ Concept involved: Computer Networks and Security
Language / Tools that may be used: Java and Network Simulator
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Computer Networks Network simulator
Programming java
Brief Description about project: In this project we will propose an inter-domain packet filter
(IDPF) architecture that can mitigate the level of IP spoofing on the Internet. IDPFs areconstructed from the information implicit in BGP route updates and are deployed in network
border routers. A key feature of the scheme is that it does not require global routing
information. Based on extensive simulation studies, we will show that even with partial
deployment on the Internet, IDPFs can proactively limit the spoofing capability of
attackers. In addition, they can help localize the origin of an attack packet to a small number of
candidate networks.
-
8/7/2019 Project Offered April 2010
36/47
Dept. of CSE @JIET
36
Project Number-44 Name of Faculty Member- P. S. Banerjee
Project Title- Artificial intelligence based approach for mobility prediction in wireless networks
Batch Size- 3
Area/ Concept involved: AI and Computer Networks
Language / Tools that may be used: H/W base to be developed
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
AI
Computer Networks
Brief Description about project: Wireless networks are required to support nomadic computing
providing seamless mobility without call drops. The number of mobile users must be known for
allocating the channel bandwidth. This part is most essential for predicting the next step that is
predicting the move which we will try to optimize out here.
Project Number-45 Name of Faculty Member- P. S. Banerjee
Project Title- Wearable Computing Systems
Batch Size- 3
Area/ Concept involved: AI and Expert System
Language / Tools that may be used:Simulation Enviornment
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Algorithms
AI
Brief Description about project: The purpose of this project is to review various miniaturecomputing architectures and evaluate the role of wearable computers in road accidents
prevention. Wearable computers can help to monitor state of alertness and reflexes of drivers by
-
8/7/2019 Project Offered April 2010
37/47
Dept. of CSE @JIET
37
means of non-invasive sensors and can therefore be exploited for saving human lives through
prevention and recovery mechanisms.
Project Number-46 Name of Faculty Member- U.S.Rawat
Project Title- Implementation of Elliptic Curve Cryptography Algorithms
Batch Size- 3
Area/ Concept involved: Cryptography
Language / Tools that may be used: Java
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Cryptography Java
Brief Description about project:A major requirement for e-commerce applications is the provision of security. In this work we
consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides
with small key sizes. ECC is ideal for use on constrained environments such as pagers, personal
digital assistants, cellular phones and smart cards. We implement the ECC algorithms approved
by the National Institute of Standards and Technology (NIST) in Java. The speed of the variousECC algorithms has to be measured & comparison with RSA algorithm has to be made.
Expected Outcome at the End of 7th Semester-
Study of NIST approved ECC algorithms.
Minimum one NIST approved ECC algorithm has to be implemented.
Expected outcome at the End of 8th Semester-
Implementation of various NIST approved ECC algorithms & performance comparisonwith RSA algorithm.
Project Number-47 Name of Faculty Member- U.S.Rawat
Project Title- Design and Implementation of Real Time Operating System
Batch Size- 3
Area/ Concept involved: Real Time Operating System
Language / Tools that may be used: C/C++
-
8/7/2019 Project Offered April 2010
38/47
Dept. of CSE @JIET
38
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Data structures C/C++
Operating Systems
Brief Description about project:A real-time operating system (RTOS) is an operating system (OS) intended for real-time
applications. Such operating systems serve application requests nearly real-time. A real-time OSthat can usually or generally meet a deadline is a soft real-time OS.
The main objective includes designing the kernel with its basic modules such as Memory
management, Process management, File System, security, Drivers that meets the requirements of
a soft real time operating system.
Expected Outcome at the End of 7th Semester-Memory Management and I\O request handling.
Expected outcome at the End of 8th Semester-
Scheduling, Job Synchronization and Swapping
Project Number-48 Name of Faculty Member- U.S.Rawat
Project Title- Design and Implementation of Encrypted File System (EFS) in Hybrid Space
Batch Size- 3
Area/ Concept involved: System and Network Programming, Cryptography
Language / Tools that may be used: C on Linux Platform
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
System and Network
Programming
C
Brief Description about project: Encrypted file system secures users data with maximumcomfort and minimum additional requirements on their part. It is a security system that can
protect any files used by any of the applications, without resorting to application-specific
encryption methods. Performance is an important factor to users since encryption can be time
consuming. So, main issues that should be considered while designing EFS are Security,
Performance and Portability. Also, It should be as transparent as possible.
-
8/7/2019 Project Offered April 2010
39/47
Dept. of CSE @JIET
39
In this project, design and implementation of encrypted file system in hybrid space has to be
done using stackable Vnode layer loadable kernel module. It will be more portable than existingkernel space EFS and more secure, transparent and efficient than user space EFS.
Expected Outcome at the End of 7th Semester-
Study and Analysis of various existing EFS in user space, kernel space and hybrid space.
Study of concepts for hybrid space EFS design.
Design and implementation of hybrid space EFS that should incorporate all features ofexisting hybrid space EFS and few new features like keys should be based on processsession IDs as well as user IDs for providing more security, selection of cipher for better
performance etc.
Comparison with the existing EFS designs.
Expected outcome at the End of 8th Semester-
Design and implementation of hybrid space EFS for optimum performance when used fornetwork attached storage (NAS).
Project Number- 49 Name of Faculty member-AMIT KUMAR
Project Title- Artificial Immune Classifier
Batch Size-3
Area/ Concept involved: Artificial Intelligence, Soft Computing.
Language / Tools that may be used: C, C++
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Artificial Intelligence ,
Soft Computing,
C, C++
Brief Description about project:In this project student will develop a new supervised learning paradigm, resource limited
artificial immune classifiers which will be inspired by mechanism exhibited in natural and
artificial immune system. This project will include recourses competition, clone selection,
affinity maturation, and memory cell retention. The main work in this project is the ability to
recognize previously encountered substances and to generalize beyond recognition in order toprovide appropriate responses to pathogens not seen before. In this project students will make
software based artificial immune system by using latest feature of AI.
Expected out come at the end of 7th Sem-
Design of the project should be completed.
Expected out come at the end of 8th Sem-
-
8/7/2019 Project Offered April 2010
40/47
Dept. of CSE @JIET
40
Full Implementation
Project Number-50 Name of Faculty member-AMIT KUMAR
Project Title- A Sense of Self and Non-self for Operating System Processes
Batch Size-3
Area/ Concept involved: Artificial Intelligence, Soft Computing, UNIX and Computer Security.
Language / Tools that may be used: C, C++
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Artificial Intelligence , UNIX C, C++
Brief Description about project:
In this project student will develop a tool aimed at building computer security systems that
incorporate the mechanisms and algorithms used by natural immune systems. This tool will have
richer notions of identity and protection than those afforded by current operating systems, and
they could provide a layer of general-purpose protection to augment current computer security
systems. An important feature of this tool is to appropriate identification of self and non-selfwhich is the subject of this project.
Expected out come at the end of 7th Sem-
Design of the project should be completed.
Expected out come at the end of 8th Sem-
Full Implementation
Project Number-51 Name of Faculty member-AMIT KUMAR
Project Title- The Computer Defense Immune System
Batch Size-3
Area/ Concept involved: Artificial Intelligence, Soft Computing and Computer Security.
Language / Tools that may be used: C, C++, C# (.net)
Prerequisite Knowledge Required-
-
8/7/2019 Project Offered April 2010
41/47
Dept. of CSE @JIET
41
Concept/ Subject Software / Tools
Artificial Intelligence C, C++
Brief Description about project:
In this project student will develop software that will work as a Computer Defense Immune
System. This software is an artificial immune system for detecting computer viruses and network
intrusions. This project will describe the system architecture, presents current research and
results in enhancing the system. This project will be used to improve the system's capabilities to
provide the better defense for a computer system or network.
Expected out come at the end of 7th Sem. -
Design of the project should be completed.
Expected out come at the end of 8th Sem. -
Full Implementation
Project Number-52 Name of Faculty Member- Dr Vipin Tyagi
Project Title- Development of a Face Recognition System
Batch Size- 03
Area/ Concept involved: Pattern Recognition, Image Processing
Language / Tools that may be used: JAVA/C ++, MATLAB
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Image Processing MATLAB
Data Structures JAVA, C ++
Brief Description about project:
A face recognition system is used for identifying or verifying a person from a digital image. In
the present project we will take a set of images of a group of people and the software willdetermine whether this matches with a known individual or not. This will be achieved by
comparing the selected features of the face and by comparing with those of stored in the
database.
Expected Outcome at the End of 7th Semester-
Identification of required features in an image
-
8/7/2019 Project Offered April 2010
42/47
Dept. of CSE @JIET
42
Expected outcome at the End of 8th Semester-
Software that can recognize faces
Project Number-53 Name of Faculty Member- Dr Vipin Tyagi
Project Title- Hand-Gesture Recognition
Batch Size- 03
Area/ Concept involved: Pattern Recognition, Image Processing
Language / Tools that may be used: MATLAB, JAVA/ C++
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Image Processing MATLAB
Data Structures JAVA, C ++
Brief Description about project:
Gestures are a powerful means of communication among humans, so a natural interactionbetween humans and computing device can be achieved by using hand-gesture forcommunication. In the project we will try to study the movement of hands and try to recognize
the meaning of these movements.
Expected Outcome at the End of 7th Semester-
Identification of features required for recognition
Expected outcome at the End of 8th Semester-
Software that can recognize hand gestures
Project Number-54 Name of Faculty Member- Dr. Vipin Tyagi
Project Title- Context Based- Image Search
Batch Size- 03
Area/ Concept involved: Pattern Recognition, Image Processing
Language / Tools that may be used: MATLAB, JAVA/C++
-
8/7/2019 Project Offered April 2010
43/47
Dept. of CSE @JIET
43
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Image Processing MATLAB
Data Structures JAVA, C ++
Brief Description about project:
In our routine search on internet, if we want to retrieve information about a particular topic, wekey-in the title of the object to be searched for. The result contains irrelevant data in addition to
actual requirement, thus increasing overhead. In the present project a software will be developed
that will analyze the actual contents of the image which may be colour, shape, texture or someother information derived from the image and give result of search accordingly.
Expected Outcome at the End of 7th Semester-
Analysis of contents from the image to be used for search.
Expected Outcome at the End of 8th Semester-Software that can search the images based on the contents
Project Number-55 Name of Faculty Member- Dr. Shishir Kumar
Project Title- Smart Card Development & Implementation
Area/ Concept involved:Embedded systems & Database Connectivity
Language / Tools that may be used:Java Swing, Java Servlet Programming, DB2-IBM
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Database Connectivity DB2-IBM
Front End Software Java SwingSmart Card Programming Embedded Systems
Smart Card Reader Interfacing
Brief Description about project:
The project intend to develop a Smart Card Development Kit, which takes care of all the needs and
requirements of a student studying in a college, including the attendance system, library book
issuing, and many more. Every individual will be provided with a (Magnetic Strip Based) /
(Microprocessor Based) Smart Card Tag, which will contain all his/her personal information. ASmart Card is any pocket-sized card with embedded integrated circuits which can process
data. Contact smart cards have a contact area, comprising several gold-plated contact pads, that
is about 1 cm square. When inserted into a reader, the chip makes contact with electrical
connectors that can read information from the chip and write information back. Smart Card
Reader, Contact smart card readers are used as a communications medium between the smart
-
8/7/2019 Project Offered April 2010
44/47
Dept. of CSE @JIET
44
card and a host, e.g. a computer or a point of sale terminal. SMART CARD DATABASE: This
database contains a list of known smart cards, the interfaces and the primary service provider ofeach card, and any known smart card readers and reader groups.
Expected out come at the end of 7th Sem-
Completion of the Smart Card Reader with the Smart Card Tags and Front end softwaredesigning.
The database connectivityExpected out come at the end of 8th Sem-
Testing & ValidationImplementation of the Smart Card system
Project Number-56 Name of Faculty Member- Dr. Shishir Kumar
Project Title- Traffic Control System
Area/ Concept involved:Image Processing
Language / Tools that may be used:Java , MATLAB
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Image Processing Java/ MATLAB
Brief Description about project:
Vehicular traffic is a major problem in modern cities. We collectively waste huge amounts oftime and resources while traveling through traffic congestion and waiting for green signal of
traffic lights. Significant savings of fuel and time could be achieved if traffic control mechanism
could be effectively discovered which could reduce the waiting time of a vehicle on the crossing. With the help of tools available in image processing we could estimate traffic density and
assign appropriate time to the lane keeping all constraints of the traffic laws intact and avoiding
deadlock of any lane .We shall give higher priority to special vehicles like school buses , firebrigade and ambulance. The method will work on real time traffic data.
To achieve this method we are using digital image processing to calculate the number of cars in a
lane and using logical technique for edge detection and background removal. The priority to lane
will be set according to the traffic density in it and the lanes will be opened in a circular queue
fashion. Further cars can be attached with devices for shorter route discovery and routemaintenance to decrease trip time and save fuel.
Expected out come at the end of 7th Sem-
Study on : Problem Definition, Research Papers, Congestion Control Algorithm,
Mathematical Transforms ,Edge Detection , Homography, Counting objects technique,
Integration of Algorithm in a single unit.
Implementation Congestion Control Algorithm, Using Matlab for Mathematical
Transform, Edge Detection and object(vehicle) counting on test image.
Priority Algorithm for special vehicles, Lane.
-
8/7/2019 Project Offered April 2010
45/47
Dept. of CSE @JIET
45
Forming a shortest path algorithm used in later stage for making user interface so that
they could find a least congested path to save time.
Expected out come at the end of 8th Sem.-
Implementing Homography and deciding camera angles.
Working with real scenario. Day and night condition and weather dependency.
How to take real time input in our software.
Storage of data and processing it in real time by our software.
Making an interface for the users who want to find the least congested part on the
road map and the connectivity to user (Internet etc.) .
Project Number-57 Name of Faculty Member- Dr. Shishir KumarCo Guide-
Project Title- Development of Intrusion Detection system Using Honeypot
Area/ Concept involved: Network Security
Language / Tools that may be used: C & Linux Shell Programming
Prerequisite Knowledge Required-
Concept/ Subject Software / Tools
Socket Programming C
Java
Brief Description about project:
The project using Honeypots is a multifaceted attempt to take honeypots out of the shadows of
the network security model and to make them an active participant in system defense. To do this,a system will be developed that reacts to hostile intrusion attempts by redirecting all hostile
traffic to a honeypot that is partially mirroring your production system. Once switched, theexpected hacker is unknowingly attacking the honeypot instead of the real data and clients and/or
users still safely accessing the real system. In this stage the data will remain safe and the Intruder
will be identified as an added benefit. A better way to think of a honeypot is an internet attached
server which acts as a decoy, luring in potential hackers in order to study their activities.
Expected out come at the end of 7th Sem-
Following modules will be completed in the 7th
Semester-
MODULE 1: Detecting the packets
MODULE 2: Identity whether the packet has been tampered or belongs to theright source or not.
-
8/7/2019 Project Offered April 2010
46/47
Dept. of CSE @JIET
46
Expected out come at the end of 8th Sem-
Following modules will be completed in the 8th Semester-
MODULE 3: Fully working intrusion detection system USING HONEYPOTS
MODULE 4: Along with system protection this module will provider additionalinformation about hackers.
Project Number-58 Name of Faculty Member- Dr. Shishir Kumar
Co Guide-
Project Title- Development of GRID infrastructurefor Image TransformationBatch Size- 3
Area/ Concept involved: Distributed Processing/Grid Computing
Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX
Prerequisite Knowledge Required-
Concepts / Subject Software / Tools
Computer Network C++/ UNIX
Distributed System Telnet, Globus
Brief Description about Project:
The grid infrastructure forms the core foundation for successful grid applications. This
infrastructure is a complex combination of a number of capabilities and resources identified for
the specific problem and environment being addressed. In initial stages of delivering any Grid
Computing application infrastructure, the developers/service providers must consider thefollowing aspects in order to identify the core infrastructure support required for that
environment:
1. What problem(s) are we trying to solve for the user? How do we address grid enablementsimpler, while addressing the user's application simpler? How does the developer(programmatically) help the user to be able to quickly gain access and utilize the
application to best fit their problem resolution needs?
2. How difficult is it to use the grid tool? Are grid developers providing a flexibleenvironment for the intended user community?
3. Is there anything not yet considered that would make it easier for grid service providersto create tools for the grid, suitab
top related