project offered april 2010

Upload: siddhartha-sarkar

Post on 08-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Project Offered April 2010

    1/47

    Dept. of CSE @JIET

    1

    List of Projects Offered to B. Tech. (IV year ) Batch 2007-11

    Project Number-1 Name of Faculty Member- Neeraj Rathore

    Project Title- To Explore the Efficient scheduling Algorithm which reduces the load balance in

    suitable Environment.

    Batch Size-3Area/ Concept involved: Distributed System, OS, parallel system.

    Language / Tools that may be used: Dot Net/JAVA /C#

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Basic concepts on Computer

    Network, Distributed

    System,OS etc Dot Net/JAVA /C#

    Brief Description about project:The rapid development in computing resources has enhanced the performance of computers and

    reduced their costs. This availability of low cost powerful computers coupled with the popularity

    of the Internet and high-speed networks has led the computing environment .Distributed system

    which supports the sharing and coordinated use of resources, independently from their physical

    type and location, in dynamic virtual organizations that share the same goal. This technologyallows the use of geographically widely distributed and multi-owner resources to solve large

    scale applications like meteorological simulations, data intensive applications. In order to fulfill

    the user expectations in terms of performance and efficiency.

    Expected Outcome at the End of 7th Semester-

    Literature reviews of all scheduling algorithm and find out the efficient algorithm use for load

    balancing.

    Expected outcome at the End of 8th Semester-

    Load Balancing simulator with the help of the scheduling algorithm

    Project Number-2 Name of Faculty Member- Neeraj Rathore

    Project Title- Develop an Efficient checkpoint algorithm as compare to existing checkpoint

    schemes.

    Batch Size- 3

    Area/ Concept involved: Distributed System, Computer Network, OS etc

    Language / Tools that may be used: Dot Net/JAVA /C#

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Basic concepts on Computer Network, Distributed

    System,OS etc

    Dot Net/JAVA /C#

  • 8/7/2019 Project Offered April 2010

    2/47

  • 8/7/2019 Project Offered April 2010

    3/47

    Dept. of CSE @JIET

    3

    Review all existing scheduling algorithm and compare all of them with different parameters and

    design an architecture of propose scheme.

    Expected outcome at the End of 8th Semester-Develop scheduling algorithm and make a simulator which will work same as a real time system.

    Project Number-4 Name of Faculty Member- Jaytrilok Choudhary

    Project Title- Personalization of Web Search results based on user profile

    Batch Size- 3

    Area/ Concept involved: Web Mining

    Language / Tools that may be used: Java (JSP Servlet)/ Web Search API

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Web Mining Java

    Search Engine Tomcat web server

    Brief Description about project:

    The main function of Search engine is to search Web for the documents that are related to thegiven topic specified by the user. The Web pages available on WWW (World Wide Web)increases day-by-day and it is very difficult to find relevant information for a particular user.

    There are various approaches for personalization of web search but it is unclear whether

    personalization is working efficiently and effectively for different user on different queries with

    different search context. For example, a zoologist may use query mouse to get information

    about rats, while computer programmer may use the same query to find information about

    computer peripherals.

    Expected Outcome at the End of 7th Semester-

    The analysis and designing must be completed with GUI.

    Access search results from the search engine.

    Expected outcome at the End of 8th Semester-

    The results obtained from search engine must me personalized based on user profile.

    Project Number-5 Name of Faculty Member- Jaytrilok Choudhary

    Project Title- Document ranking system using Vector space model

    Batch Size- 3

    Area/ Concept involved: Data Mining

  • 8/7/2019 Project Offered April 2010

    4/47

    Dept. of CSE @JIET

    4

    Language / Tools that may be used: Java

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Data mining Java

    Vector space model

    Brief Description about project:Document ranking is a concept in the field of information retrieval. In information retrievalsystems, documents should be ranked in order of decreasing probability of relevance. Most

    existing text retrieval techniques rely on indexing keywords. Unfortunately, keywords or index

    terms alone cannot adequately capture the document contents, resulting in poor retrieval

    performance. There is a technique to rank the documents using vector space model. In this

    technique, the documents ranked based on the cosine similarity measurement.

    Expected Outcome at the End of 7th Semester-

    The analysis and designing must be completed with GUI.

    Vector space model should be prepared.

    Expected outcome at the End of 8th Semester-

    The documents must be ranked.

    Project Number-6 Name of Faculty Member- Jaytrilok Choudhary

    Project Title- Implementation of Page Rank Algorithm

    Batch Size- 3

    Area/ Concept involved: Web mining

    Language / Tools that may be used: Java

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Web mining Java

    Page rank algorithm,search engine

    Brief Description about project:

    PageRank is a link analysis algorithm used by the Google search engine that assigns a numericalweighting to each element of a hyperlinked set of documents with the purpose of measuring its

    relative importance within the set. The algorithm may be applied to any collection of entities.

    The PageRank of a page is defined recursively and depends on the number and PageRank metric

    of all pages that link in to it (incoming links) and out to it ( outgoing ).

  • 8/7/2019 Project Offered April 2010

    5/47

    Dept. of CSE @JIET

    5

    Expected Outcome at the End of 7th Semester-

    The analysis and designing must be completed.

    Prepare a virtual network to implement page rank algorithm.

    Expected outcome at the End of 8th Semester-

    Page rank algorithm must be implemented and worked on World Wide Web.

    Project Number-7 Name of Faculty Member-Abhishek Srivastava

    Project Title-External Memory Algorithms for processing line segments in GIS.

    Batch Size-3

    Area/ Concept involved: Computational Geometry,Algorithm Analysis and complexity theory

    Language / Tools that may be used:C++,TPIE on linux

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Computational

    Geometry

    External Memory

    Algorithms

    TPIE

    Brief Description about project: (Minimum 100 words)-In the design of algorithms for large-scale applications it is essential to consider the problem of

    minimizing I/O communication. Geographical information systems (GIS) are good examples of

    such large-scale applications as they frequently handle huge amounts of spatial data. Typical

    subproblems that need to be solved in GIS systems include point location, triangulating maps,generating contours from triangulated elevation data, and producing map overlays, all of which

    require manipulation of line segments. This project aims at designing an I/O efficient algorithmhaving less I/O complexity than existing external memory algorithms.

    Expected Outcome at the End of 7th Semester-Data modeling for the given problem, Implementation of existing external memory algorithms

    on TPIE. Performance comparison of existing external memory algorithms with existing incore

    algorithms (Theoretical as well as Experimental)

    Expected outcome at the End of 8th Semester-An improved external memory algorithm. Proof of correctness of Algorithm. Performance

    comparison of existing external memory algorithm with the proposed algorithm (Theoretical as

    well as experimental)

    Project Number-8 Name of Faculty Member-Abhishek Srivastava

  • 8/7/2019 Project Offered April 2010

    6/47

    Dept. of CSE @JIET

    6

    Project Title-Utility based scheduling using machine learning in resourse constrained systems.

    Batch Size-3

    Area/ Concept involved: Operating System, Artificial Intelligence

    Language / Tools that may be used:C / C++

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Operating System

    Artificial Intelligence

    Brief Description about project:

    The classical real-time scheduling problem is that of deciding on the order in which the currently

    unscheduled jobs should be executed by a single processor, with no possibility of processor

    sharing. In the case ofhard real-time systems, each job is characterized by an execution time and

    a deadline. A soft real-time system is the one where each job receives some utility as a function

    of its completion time. Each job arriving into the system requires a certain number of CPU time

    to be executed. The final job utility decays as its waiting + execution time increases.

    The objective of project is to design an utility based scheduling algorithm where reinforcementlearning is used to update the value function for each machine based on the state of its resources,

    the jobs it is executing and the jobs waiting to be scheduled. Once such a value function is

    obtained, any kind of scheduling decisions can be considered on each machine, which can now

    be driven by maximization of the machines state value following the scheduling decision.

    Expected Outcome at the End of 7th Semester-

    Simulation of existing scheduling algorithm and their performance analysis.Implementation of reinforcement learning.

    Expected outcome at the End of 8th Semester-Design and implementation of utility based scheduling.

    Performance analysis of the proposed system

    Project Number-9 Name of Faculty Member- Abhishek Srivastava

    Project Title- Distributed Data Directories and Parallel Data Management System

    Batch Size- 3

    Area/ Concept involved: Dynamic Load Balancing

  • 8/7/2019 Project Offered April 2010

    7/47

    Dept. of CSE @JIET

    7

    Language / Tools that may be used: C/C++/UNIX

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Distributed Computing GNU C/C++

    Distributed Processing MPICH, Zoltan

    Brief Description about Project:The aim of this project is to design a general-purpose tool for parallel data management for

    unstructured, dynamic applications. This system includes a suite of load-balancing algorithms,an unstructured communication package, distributed data directories, and dynamic debugging

    tools that can be used by a variety of applications. It simplifies the load-balancing, data

    movement, unstructured communication, and memory usage difficulties that arise in dynamic

    applications such as adaptive finite-element methods, particle methods, and crash simulations. Its

    data-structure design also lets a wide range of applications use it without imposing restrictions onapplication data structures. Its object-based interface provides a simple and inexpensive way for

    application developers to use the library and researchers to make new capabilities availableunder a common interface. This system provides tools that help developers of parallel

    applications.

    A suite of parallel partitioning algorithms and data migration tools dynamically

    redistribute data to reflect, say, changing processor workloads.

    Distributed data directories and unstructured communication services let applicationsperform complication communication using only a few simple primitives.

    Dynamic memory management tools enhance common memory allocation functions to

    simplify debugging of dynamic memory usage.

    A parallel application has been already developed as Zoltan. Zoltan's data-structure neutral

    design allows it to be used by a variety of applications without imposing restrictions on

    application data structures. Its object-based interface provides a simple and inexpensive way forapplication developers to use the library and researchers to make new capabilities available

    under a common interface.

    Expected outcome at the End of 7th Semester-

    Design and architecture of the proposed system, proposed algorithm, modules for fulfillment of

    the algorithm.

    Expected outcome at the End of 8th Semester-Experimental results should be achieved in the process of distributed data and data management

    in heterogeneous environment of any LAN. These results must be verified on the basis of

    suitable graphs and required tables.

    Project Number-10 Name of Faculty Member-Deepshikha Tiwari

    Project Title- A secure architecture for internet protocol

  • 8/7/2019 Project Offered April 2010

    8/47

    Dept. of CSE @JIET

    8

    Batch Size-3

    Area/ Concept involved: Network

    Language / Tools that may be used: Java, C, C++

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Network basics Java , C, C++

    TCP/IP Protocol suit

    Brief Description about project:

    The Internet provides amazing opportunities, but not without some risk. Without the proper controls, your

    data is subject to several types of attacks as follows: Loss of Privacy, Data Integrity, Identity Spoofing etc.

    To provide solution for these problems we will use a mechanism called IPSec (IP Security Architecture).

    Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by

    authenticating and encrypting each IP packet of a data stream. IPsec also includes protocols for

    establishing mutual authentication between agents at the beginning of the session and negotiation of

    cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair

    of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls),

    or between a security gateway and a host. IPsec is a dual mode, end-to-end, security scheme operating

    at the Internet Layer of the Internet Protocol Suite or OSI model Layer 3.

    Expected Outcome at the End of 7th Semester-

    Literature survey on IPSec, design document and development of client module

    Expected outcome at the End of 8th Semester-

    Development of server module, integration of other module and final report

    Project Number-11 Name of Faculty Member-Deepshikha Tiwari

    Project Title- Development of tool forLinux Network Administration

    Batch Size- 3

    Area/ Concept involved: Network

  • 8/7/2019 Project Offered April 2010

    9/47

    Dept. of CSE @JIET

    9

    Language / Tools that may be used: C, PHP, Red Hat Packages

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Computer Networks

    OOPS, Operating

    Systems

    C, RHEL5/CentOS 5

    Brief Description about project:In this project a Linux based well defined network of our college will be developed. We will

    implement a Proxy server, DNS server, software firewall, FTP server, LDAP server, an attractivewebsite of our college and a mail server will be established. By using RHEL 5/CentOS 5 as the

    platform, we will add some more functionality in the mail server other than just send or receive

    mail. We will have a postfix SMTP server, Dovecot POP3 and IMAP server, mailboxes, quota

    for mailboxes, a antivirus to scan mail, anti spam filter and mail scanner to integrate antivirusand anti spam filter into postfix. We will also be having integrated active directory in ourmailboxes to turn Linux mail server into lean and mean exchange like machine and MySQL to

    administer multiple domains and the users will be facilitated to have a vacation massage.

    Expected Outcome at the End of 7th Semester-

    High level design document for the all the modules and Development of mail server.

    Expected outcome at the End of 8th Semester-

    Development of rest of the rest of the modules and integration of all the modules.

    Project Number-12 Name of Faculty Member- Deepshikha Tiwari

    Project Title- Analysis and implementation of Q-learning Method

    Batch Size- 3

    Area/ Concept involved: Artificial intelligence and Machine learning

    Language / Tools that may be used: JAVA, C/C++

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Machine learning JAVA , C/C++

    Reinforcement

    Learning

  • 8/7/2019 Project Offered April 2010

    10/47

    Dept. of CSE @JIET

    10

    Brief Description about project:

    Reinforcement learning has received much attention in the past decade. The primary thrust ofthis project has to explore the field of reinforcement learning from a computer scienceperspective and analyze, implement Q-learning method. Reinforcement learning is the study ofhow an autonomous agent (animals and artificial systems), the learner, can acquire andimprove skills within an environment without having an explicit teacher. One way in whichanimals acquire complex behaviors is by learning to obtain rewards and to avoid punishments. Itis considered especially suitable for unpredictable environments, robot learning and goaloriented learning. In these situations the goal is well known, but not how to achieve the goal.Reinforcement learning is also called learning with a critic

    In Q-learning method the role of an agent using is to set up a Q-function, which is anestimate of the reward it can expect from performing the possible actions from its current state.This Q-function can thus be utilized to select the most appropriate action. As with allreinforcement learning strategies, an external reward is used to inform the agent when it hascorrectly or incorrectly carried out an action, or set of actions. At the end of project, we will try tosuggest some improvement in Q-learning method.

    Expected Outcome at the End of 7th Semester-

    Study of Reinforcement learning, Q- learning, Design document, development of TDmethod

    Expected outcome at the End of 8th Semester-

    Final simulator of Q-learning with some improvement suggestion.

    Project Number-13 Name of Faculty Member- Punit Pandey

    Project Title- Learning an agent through Relative Reward

    Batch Size-3

    Area/ Concept involved: Artificial Intelligence, Reinforcement Learning Algorithms, and

    Swarm Intelligence

    Language / Tools that may be used: Java, Eclipse

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Artificial Intelligence Java, Java Swing,

    Applet

    Brief Description about project:

  • 8/7/2019 Project Offered April 2010

    11/47

  • 8/7/2019 Project Offered April 2010

    12/47

    Dept. of CSE @JIET

    12

    provide the information to the end user whenever the memory leak is detected in any process of a

    cluster. It will also provide the information to the user to take corrective action on affectedprocess. Current memory leak detection techniques for clusters are reactive and display the

    memory leak information after the execution of the Process it means they detect memory leakonly after it occurs.

    Expected Outcome at the End of 7th Semester-1. Design phase has to be completed with all high level design2. Development of Dynamic Memory Monitoring tool pseudo code3. Development of pseudo code of all processes state in terms of memory leak like bad state

    or good state

    Expected outcome at the End of 8th Semester-

    1. Implementation of tool with by using Java or C.2. All deliverables related to Dynamic Memory Monitoring tool

    Project Number-15 Name of Faculty Member- Punit Pandey

    Project Title- Multi Agent Based Distributed Intrusion Detection System

    Batch Size- 3

    Area/ Concept involved: Network Security, Distributed System

    Language / Tools that may be used: Java, Eclipse

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Socket Programming Java, Java Swing,

    Applets

    Brief Description about project:The primary goal of this project is to provide intrusion detection and real-time prevention

    capability against insider attacks in distributed and fully automated environments. IDS (Intrusion

    Detection System) must analyze and correlate a large volume of data collected from different

    critical network access points. This task requires IDS to be able to characterize distributed

    patterns and to detect situations where a sequence of intrusion events occurs in multiple hosts.

    Different type of Agents has to develop that work as entities to detect and take predefined actionsagainst malicious activity. The heart of this project is the Interpreter Agent. It collaborates with

    the Analyzer Agent for detecting complex local attacks, and uses the Correlate agent with theMobile Agent for determining whether some suspicious activities in different node can be

    combined to be a distributed intrusion.

  • 8/7/2019 Project Offered April 2010

    13/47

  • 8/7/2019 Project Offered April 2010

    14/47

    Dept. of CSE @JIET

    14

    Students must be able to able to access, update data from one site of another site through the

    earlier designed web pages with the complete record of students in the database of at least threesites.

    Project Number-17 Name of Faculty Member-Raksha Sharma

    Project Title-Retrieval of file using content based search

    Batch Size-3

    Area/ Concept involved: Networking, Soft Computing

    Language / Tools that may be used: JAVA, Sql Server, ASP.net, JSP

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    DBMS SQL server

    Soft Computing and

    Networking

    .net frame work, java

    Brief Description about project: - This project completely deals with the searching for the

    whole data related to a particular word available on web. Search should be done through two

    fields first is text field in which a user can enter the text and second one is name of domain

    like entries 21 and www.hindustantimes.com respectively should fetch all the datarelated to date 21 available on Hindustantime.com .there should be a provision like if we typea character it should display possible searches related to that character like Google search

    engine.

    Web page should be able to search the images related to the entered text. For example if

    user search for the word BOOK. Project should display all the images available on the web

    related to word book.

    Expected Outcome at the End of 7th Semester-

    Decide on constraints that you have to force while searching. Complete database should be readywith these constraints as attributes. All the web pages should be ready.

    Expected outcome at the End of 8th Semester-All the web pages should be in working condition. User must be able to search the data

    according to his need.

    Project Number-18 Name of Faculty Member-Raksha Sharma

    Project Title- Development of a workflow based Complaint Management System

    Batch Size-3

    Area/ Concept involved: Operating System, Database/understanding of mailing system

  • 8/7/2019 Project Offered April 2010

    15/47

    Dept. of CSE @JIET

    15

    Language / Tools that may be used: Unix/Linux, Shell Scripting, C, Oracle, VB.net

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Operating System Unix/Linux

    Database Oracle

    Brief Description about project: This Project deals with the implementation of mailing systemto provide the customer a friendly environment to post his or her complaints.

    With Every product will have an email id assigned to it. Customers, when they have a

    complaint about the product, will send an email to the email id provided to them for that

    product. these Emails should get logged into the database and a complaint number should be

    generated. The customer should get an acknowledgement back saying that his/her complaintis received. Administrators will be set up for each product and he/she should see all the

    complaints received for that product. Groups of complaint handling executives should be setup for each product. The administrator for a product should be able to assign the complaints

    to specific members of the complaint handling team for that product. The complaint

    management team member should see the complaints assigned to him/her in his inbox. He

    should be able to send mail to the customer through the system with any clarification/solution

    or asking for more information. These subsequent communications should be stored as a part

    of the same complaint. The complaint should show all the communication that happened

    between the customer and the organization. A complaint can be closed with some pre definedstatuses like: Open, Closed, Abandoned, In-progress, etc.Reference information should bemaintained in the system like complaint management team for different products, mail ids for

    different products, default mail texts for products, default mail subjects for products, list of

    users, list of products etc.

    Expected Outcome at the End of 7th Semester-

    Database with Product name and Email Id assigned to the customer for a particular product

    should be ready. Conversation through mails should be displayed.

    Expected outcome at the End of 8th Semester-

    The whole description of the project should be in working condition.

    Project Number-19 Name of Faculty Member- Dinesh Kumar Verma

    Project Title- Vehicle tracking system using GPS and GSM modem

    Batch Size- 3

    Area/ Concept involved: Embedded systems/Microcontroller

  • 8/7/2019 Project Offered April 2010

    16/47

    Dept. of CSE @JIET

    16

    Language / Tools that may be used: Assembly language for microcontroller / C language / Kiel

    or any assembler

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Microcontroller 8051

    family

    Kiel or any tool to

    program the EEPROM

    Serial communication Port programming

    Brief Description about project:

    In this Project it is proposed to design an embedded system which is used for tracking and

    positioning of any vehicle by using Global Positioning System (GPS) and Global system for

    mobile communication (GSM).

    In this project AT89S52 microcontroller is used for interfacing to various hardware peripherals.The current design is an embedded application, which will continuously monitor a moving

    Vehicle and report the status of the Vehicle on demand. For doing so an AT89S52microcontroller is interfaced serially to a GSM Modem and GPS Receiver. A GSM modem is

    used to send the position (Latitude and Longitude) of the vehicle from a remote place. The GPS

    modem will continuously give the data i.e. the latitude and longitude indicating the position of

    the vehicle. The GPS modem gives many parameters as the output, but only the NMEA data

    coming out is read and displayed on to the LCD. The same data is sent to the mobile at the other

    end from where the position of the vehicle is demanded. An EEPROM is used to store the mobile

    number.

    Expected Outcome at the End of 7th Semester- All the design should be prepared

    Expected outcome at the End of 8th Semester- A hardware or any vehicle modules that can

    be track by PC

    Project Number-20 Name of Faculty Member- Dinesh Kumar Verma

    Project Title- Automatic plant Irrigation

    Batch Size- 3

    Area/ Concept involved: Embedded systems/Microcontroller

    Language / Tools that may be used: Assembly language for microcontroller / C language /

    Kiel or any assembler

    Prerequisite Knowledge Required-

  • 8/7/2019 Project Offered April 2010

    17/47

    Dept. of CSE @JIET

    17

    Concept/ Subject Software / Tools

    Microcontroller 8051

    family

    Kiel or any tool to

    program the EEPROM

    Power Electronics Op-Amp

    Brief Description about project: -

    The Project presented here waters your plants regularly when you are out for vocation. Thecircuit comprises sensor parts built using op-amp IC LM324. Op-amp are configured here as a

    comparator. Two stiff copper wires are inserted in the soil to sense the whether the Soil is wet or

    dry.

    The Microcontroller was used to control the whole system it monitors the sensors and when

    more than two sensors sense the dry condition then the microcontroller will switch on the motor

    and it will switch off the motor when all the sensors are in wet. The microcontroller does the

    above job it receives the signals from the sensors, and this signals operated under the control ofsoftware which is stored in ROM.

    Expected Outcome at the End of 7th Semester- All the design should be prepared

    Expected outcome at the End of 8th Semester- A hardware module that can be used to

    ON/OFF the water supply motor under the condition of Soil

    Project Number-21 Name of Faculty Member- Dinesh Kumar Verma

    Project Title- Development of Routine for Improvement in various parameters of a Software

    Architecture Models

    Batch Size- 3

    Area/ Concept involved: Software Engineering

    Language / Tools that may be used: Matlab/ Java

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Software Reliability

    Software Testing Any testing tool

    Computer systems

    organization

    Brief Description about project: (Minimum 100 words)-

  • 8/7/2019 Project Offered April 2010

    18/47

    Dept. of CSE @JIET

    18

    Quantitative prediction of quality properties (i.e. extra functional properties such as performance,

    reliability, and cost) of software architectures during design supports a systematic softwareengineering approach. Designing architectures that exhibit a good trade-off between multiple

    quality criteria is hard, because even after a functional design has been created, many remainingdegrees of freedom in the software architecture span a large, discontinuous design space. In

    current practice, software architects try to find solutions manually, which is time-consuming, can

    be error prone and can lead to suboptimal designs. This project is an automated approach to

    search the design space for good solutions. Starting with a given initial architectural model, the

    approach iteratively modifies and evaluates architectural models. The approach should apply a

    multi-criteria genetic algorithm to software architectures modeled with the Palladio Component

    Model. It supports quantitative performance, reliability, and cost prediction and can be extended

    to other quantitative quality criteria of software architectures.

    Expected Outcome at the End of 7th Semester- All the design should be prepared

    Expected outcome at the End of 8th Semester complete project

    Project Number-22 Name of Faculty Member- Prateek Pandey

    Project Title- Building Processes, Applications and their integration in BPM technologies

    Batch Size-3

    Area/ Concept involved: Business Process Management

    Language / Tools that may be used: Java/J2EE, DBMS, XML

    Prerequisite Knowledge Required- Java/J2EE, DBMS, XML

    Concepts / Subject Software / Tools

    Programming

    Language

    Java

    BPM suite Savvion Business

    Manager

    Brief Description about project- Business Process Management (BPM) software and serviceshelp organizations optimize business performance by discovering, documenting, automating, and

    continuously improving business processes to increase efficiency and reduce costs. The area of

    BPM is new and much scope lies beneath this. The project offers you to learn the Business

    Process Management by taking any BPM product of your choice(Savvion Business Manager,

    BEA Aqualogic, Red Hats jBPM etc.), creating processes, applications, reports, simulations and

    integrating an application with your BPM suite. Working on BPM requires sound knowledge of

  • 8/7/2019 Project Offered April 2010

    19/47

    Dept. of CSE @JIET

    19

    Java/JSP/Servlets . Having equipped with this hot & vibrant technology, anyone can upstage

    others even in cold & blunted job market.

    Expected Outcome at the End of 7th Semester- A prototype application demonstrating various

    features of your suite including some reports.

    Expected outcome at the End of 8th Semester- A functional and meaningful application

    with comprehensive reports and rules implemented .

    Project Number-23 Name of Faculty Member-Prateek Pandey

    Project Title- Fuzzy logic Based Inventory Control System & Interfacing with WeighingMachine

    Batch Size-3

    Area/ Concept involved: Application development using Fuzzy Logic

    Language / Tools that may be used: Java/J2EE, DBMS, XML

    Prerequisite Knowledge Required- Java/J2EE, DBMS, XML

    Concepts / Subject Software / Tools

    ProgrammingLanguage

    Java

    Brief Description about project: As the title suggests, the project is about making an inventory

    control system but the concept of fuzzy sets is incorporated into it. Apart from it the project

    includes interfacing of the fuzzy based Inventory system application and the digital weighing

    machine that is commercially available in the market. Indeed, it sounds good to have the

    appropriate quantity of a commodity deducted automatically from the database as and when the

    same quantity is being weighted on the weighing machine and supplied to the customer .

    Expected Outcome at the End of 7th Semester- A working application except reports and

    some cosmetic features.

    Expected outcome at the End of 8th Semester- Fully functional application with

    comprehensive reports.

    Project Number-24 Name of Faculty Member- Prateek Pandey

    Project Title- Integration of Applications based on Java Messaging Service and SOA

    Batch Size-3

  • 8/7/2019 Project Offered April 2010

    20/47

  • 8/7/2019 Project Offered April 2010

    21/47

    Dept. of CSE @JIET

    21

    Brief Description about project: (Minimum 100 words)-

    Agile software development methodologies are becoming important now a day. The movement

    of Agile is now spread around the world. Adopting agile methods means incorporating new

    dynamic approaches in terms of roles, management style, project monitoring and controlling.

    This project work is supposed to focus on study and analysis of software cost estimation in an

    Agile Project as well as implementation of the technique identified. It is mainly a research based

    project aiming to identify the efficient Project estimation technique, Prograaming will be done in

    .Net framework.

    Expected Outcome at the End of 7th Semester-

    Analysis and Thorough Study of existing Software Estimation Techniques in contrast with theAgile Software practice.

    Expected outcome at the End of 8th Semester-

    An Integrated Software estimation tool that helps to overcome the difficulties of agile project

    estimation

    of 7th Semester-

    Thorough Study and analysis of domain.

    Demonstration of initial modules

    Expected outcome at the End of 8th Semester-

    Project Number-26 Name of Faculty Member- Ratnesh Litoriya

    Project Title- Mobile based Path finder System

    Batch Size-3

    Area/ Concept involved: Mobile Application

    Language / Tools that may be used: J2ME , J2EE

    Prerequisite Knowledge Required- Core JAVA , J2ME

    Concepts / Subject Software / Tools

    Utilization of GSM J2ME and other softwarepackages that supports

    Mobile device

  • 8/7/2019 Project Offered April 2010

    22/47

    Dept. of CSE @JIET

    22

    Brief Description about project:

    This Project deals with the problem of finding out the distance and location between twoindividual places within the globe or any geographically restricted area , Path finding is the vast

    issue , but through this title one is supposed to address the problem off finding the correct

    distance with the help of cellular device , because of the fact that almost every person is having

    a mobile with them , and the feature of Any where and Any time opens very interesting

    opportunities in this regard .

    Expected Outcome at the End of 7th Semester-

    Study and analysis of Mobile technology and an efficient algorithm that effectively addresses the

    problem of path finding

    Expected outcome at the End of 8th Semester-A Path finder system (working) which addresses the problem of finding of path through GSM

    Mobile.

    Project Number-27 Name of Faculty Member- Ratnesh Litoriya

    Project Title- Content-Based Image Retrieval Using Multi resolution Color and Texture

    Features

    Batch Size-3

    Area/ Concept involved: Graphics And Multimedia

    Language / Tools that may be used: Java , Net Beans 5.5

    Prerequisite Knowledge Required- .Net programming

    Concepts / Subject Software / Tools

    Pattern Recognition Java

    Image retrieval Jdk 1.6

    Brief Description about project:

    In this project, a content-based image retrieval method based on an efficient combination of

    multi-resolution color and texture features is proposed . We will extract the spatial distribution of

    colours in an image. The dimension of the combined feature vector is determined at a pointwhere the retrieval accuracy becomes saturated. Especially, it demonstrates more excellentretrieval accuracy for queries and target images of various resolutions. It is an automatic process

    to search relevant images based on user input. The input could be parameters, sketches or

    example images. This process first extracts the image features and store them efficiently. Then it

    compares with images from the database and returns the results.

  • 8/7/2019 Project Offered April 2010

    23/47

    Dept. of CSE @JIET

    23

    Expected Outcome at the End of 7th Semester-

    Take the features from the picture that will be used for matching with the database.

    Expected outcome at the End of 8th Semester-

    Matching of the extracted features with the database images

    Project Number-28 Name of Faculty-Mahesh Kumar

    Project Title- Improving Packet Delivery Performance

    Batch Size-3

    Area/ Concept involved: Internet, Computer Networks, Routers

    Language / Tools that may be used: TCL/C++, JAVA, NS2, SSFnet

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Networks Network Simulators

    internet Tcl/Otcl/C++/Java

    Brief Description about project: Computer Networks are supporting huge amount IP traffic

    and doing a great job,

    but some time they take much longer time to transfer traffic on the network,

    we need to find the causes of the delay and improve the performance by either eliminating those

    factors or by introducing some additional features to it.

    Expected Outcome at the End of 7th Semester-

    The students will be able to understand the concept of networking, routing, ASes and applyingrouting protocols on nodes in a network/AS using available network simulator, they will also

    come up with design of their new model of delivering packets.

    Expected outcome at the End of 8th Semester-

    The students will implement their designed model and will display the outcome of their designed

    approach in any of the network simulator.

    Project Number-29 Name of Faculty-Mahesh Kumar

    Project Title- Development of Novel Routing Information Protocol

    Batch Size-3

  • 8/7/2019 Project Offered April 2010

    24/47

    Dept. of CSE @JIET

    24

    Area/ Concept involved: Internet, Computer Networks, Routers

    Language / Tools that may be used: TCL/C, C++, JAVA etc

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Networks UNIX/Linux /

    internet Tcl/Otcl/C/C++/Java

    Brief Description about project: Computer Networks are supporting huge amount of traffic and

    doing a great job, but some improvements are expected if we make certain changes to the

    software use in decision making, we need to find the causes of the performance degradation and

    improve the performance.

    Expected Outcome at the End of 7th Semester-The students will be able to understand the concept of networking, routing and implementingnetworks by creating nodes/links/servers/clients and applying routing protocols using any of the

    available network simulators, they will also come up with design of their new model of routing.

    Expected outcome at the End of 8th Semester-

    The students will implement their designed model and will display the outcome of their designed

    approach in any of the network simulator.

    Project Number-30 Name of Faculty-Mahesh Kumar

    Project Title- Development of a Network Management System (NetMon)

    Batch Size-3

    Area/ Concept involved: Computer Networks, Network Management

    Language / Tools that may be used: TCL/C, C++, JAVA etc

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Networks UNIX/Linux /Windows Svr

    Network management Tcl/Otcl/C/C++/Java

    Brief Description about project: Computer Networks are growing at a rapid speed and network

    administrators are facing difficulties to monitor the status of each component of a networkwithout having a better management system for local area network.

  • 8/7/2019 Project Offered April 2010

    25/47

    Dept. of CSE @JIET

    25

    Expected Outcome at the End of 7th Semester-

    The students will be able to understand the concept of networking, and management related

    issues. They will also be able to understand the importance of network management. They willalso come up with design of their new model of network management system.

    Expected outcome at the End of 8th Semester-

    The students will implement their designed model and will display the outcome of their designed

    approach in either Java or .Net.

    Project Number-31 Name of Faculty Member- Vishnu Sharma

    Project Title-Security Issues in VOIP Applications

    Batch Size-3

    Area/ Concept involved:computer networking

    Language / Tools that may be used:ns-2/c++/java

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer networking NS-2/java/C++

    Brief Description about project: (Minimum 100 words)-

    Recent voice over Internet protocol (VoIP) technology is attracting more and more attention and

    interest in the industry. VoIP applications such as IP telephony systems involve sending voice

    transmissions as data packets over private or public IP networks as well as reassembled and

    decoded on the receiving side. Security concerns are always the major barrier that prevents manybusinesses from employing VoIP technologies. In this project, we discuss various VoIP security

    threats and possible approaches to tackle the threats in VoIP applications

    Expected Outcome at the End of 7th Semester-

    Analysis and Study of voip tecnology

    Expected outcome at the End of 8th Semester-

    Implementaion of Routing security algorithms and data confidentiality for voip and results of

    simulations.

  • 8/7/2019 Project Offered April 2010

    26/47

    Dept. of CSE @JIET

    26

    Project Number-32 Name of Faculty Member- Vishnu Sharma

    Project Title- SOA BASED STOCK MARKET

    Batch Size-3

    Area/ Concept involved: client-sever computing

    Language / Tools that may be used: asp. net,sql server

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    ASP.NET,SQL .NET,TOMCATSQL SERVER

    Brief Description about project:

    In computing, a service-oriented architecture (SOA) is a flexible set of design principles used

    during the phases of systems development and integration. A deployed SOA-based architecture

    will provide a loosely-integrated suite of services that can be used within multiple businessdomains. SOA also generally provides a way for consumers of services, such as web-based

    applications, to be aware of available SOA-based services. For example, several disparate

    departments within a company may develop and deploy SOA services in different

    implementation languages; their respective clients will benefit from a well understood, well

    defined interface to access them. XML is commonly used for interfacing with SOA services,

    though this is not required. SOA defines how to integrate widely disparate applications for aworld that is Web based and uses multiple implementation platforms. Rather than defining an

    API, SOA defines the interface in terms of protocols and functionality. An endpointis the entrypoint for such an SOA implementation.

    Expected Outcome at the End of 7th Semester-

    DESIGN, CODE

    Expected outcome at the End of 8th Semester-

    Implementaion, Testing

    Project Number-33 Name of Faculty Member- Vishnu Sharma

    Project Title-Performance evaluation and simulations of routing protocols in ad hoc networks

    Batch Size-3

    Area/ Concept involved: Ad-hoc Networks

    Language / Tools that may be used: NS-2/C++/Qualnet

    Prerequisite Knowledge Required-

  • 8/7/2019 Project Offered April 2010

    27/47

    Dept. of CSE @JIET

    27

    Concepts / Subject Software / Tools

    Adhoc networks NS-2/C++

    Brief Description about project:In this project, we describe the Optimized Link State Routing Protocol (OLSR) a proactive

    routing protocol for Mobile Ad-hoc NET works (MANETs). We evaluate its performance

    through exhaustive simulations using the Network Simulator 2 (ns2) and compare with other ad-

    hoc protocols, specifically the Ad-hoc On-Demand Distance Vector (AODV) routing protocol

    and the Dynamic Source Routing (DSR) protocol. We study the protocols under varying

    conditions (node mobility, network density) and with varying traffic (TCP, UDP, differentnumber of connections/streams) to provide a qualitative assessment of the applicability of the

    protocols in different scenarios.

    Expected Outcome at the End of 7th Semester-

    Analysis and Study of existing ad-hoc routing protocols Techniques

    Expected outcome at the End of 8th Semester-

    NS-2 tool that helps to overcome the difficulties of Ad-hoc routing protocols and results of

    simulations.

    Project Number-34 Name of Faculty Member- AJAY KUMAR

    Project Title- Efficient Data Mining Using Intelligent Agents

    Batch Size-3

    Area/ Concept involved: Data Mining, Database, and AI

    Language / Tools that may be used: Java/Matlab/.Net

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    DBMS NIL

    OOPS NIL

    Brief Description about project: Data Mining is the process of extraction of interesting (non-

    trivial, implicit, previously unknown and potentially useful) information or patterns from data in

    large databases. Agents are defined as software or hardware entities that perform some set of

    tasks on behalf of users with some degree of autonomy. In order to work for somebody as an

    assistant, an agent has to include a certain amount of intelligence, which is the ability to choose

    among various courses of action, plan, communicate, adapt to changes in the environment, and

    learn from experience.

  • 8/7/2019 Project Offered April 2010

    28/47

    Dept. of CSE @JIET

    28

    In general, an intelligent agent can be described as consisting of a sensing element that can

    receive events, a recognizer or classifier that determines which event occurred, a set of logicranging from hard-coded programs to rule-based inference, and a mechanism for taking action.

    In several steps through knowledge discovery, which include data preparation, mining modelselection and application, and output analysis, intelligent agent paradigm can be used to

    automate the individual tasks. In the experiment setup, we discover association rules in a

    distributed database using intelligent agents. We apply an original approach for effective

    distributed mining association rules: loose-couple incremental methods. We compare the results

    obtained with the similar work done in the field.

    Expected Outcome at the End of 7th Semester- Students will able:

    To analyze the different format of data.

    To Learn Preprocessing Task for Data mining.

    To gain working knowledge of Weka.

    Expected outcome at the End of 8th Semester-

    Student will able to:

    Design its own model based upon the given data source.

    Analyze the outcome of the algorithm and present complete model in the form of tool.

    Project Number-35 Name of Faculty Member-Ajay Kumar

    Project Title-Data mining application in medical: a Case Study

    Batch Size-3

    Area/ Concept involved: Data Mining, Database, and AI

    Language / Tools that may be used: Java/Matlab/.Net

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    DBMS NIL

    OOPS NIL

    Brief Description about project:This is the case study on medical data in order to obtain some useful information or pattern fromthe pool of database. The data used in this project was obtained from the UCI Machine Learning

    Repository. The database has 5 attributes (columns in a database table), 24 instances (rows in the

    table) of data and 3 classes.

    The goal of data mining in this implementation is to classify each of the attributes like Patient

    Ageetc into different class and predict the future outcome of incoming object. Data is a data

  • 8/7/2019 Project Offered April 2010

    29/47

    Dept. of CSE @JIET

    29

    file containing all possible numeric combinations of the attributes (columns in a database table)

    values.

    Expected Outcome at the End of 7th Semester-Students will able:

    To analyze the different format of data.

    To Learn Preprocessing Task for Data mining.

    To gain working knowledge of Weka.

    Expected outcome at the End of 8th Semester-

    Student will able to:

    Present complete analysis of data set taken from UCI Repository.

    Anlaysis of result should be presented in the form of tool.

    Project Number-36 Name of Faculty Member- Ajay Kumar

    Project Title- Web Usage Mining Using Apriori Algorithm (Web Content Mining)

    Batch Size-3

    Area/ Concept involved: Data Mining, Database, and AI

    Language / Tools that may be used: Java/Matlab/.Net

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    DBMS NIL

    OOPS NIL

    Brief Description about project:The enormous content of information on the World Wide Web makes it obvious candidate for

    data mining research. Application of data mining techniques to the World Wide Web referred as

    Web mining where this term has been used in three distinct ways; Web Content Mining, WebStructure Mining and Web Usage Mining. E Learning is one of the Web based application where

    it will facing with large amount of data. In order to produce the JIET portal usage patterns and

    user behaviors, this project implements the high level process of Web Usage Mining using basic

    Association Rules algorithm call Apriori Algorithm. Web Usage Mining consists of three mainphases, namely Data Preprocessing, Pattern Discovering and Pattern Analysis. Server log files

    become a set of raw data where its must go through with all the Web Usage Mining phases toproducing the final results. Here, Web Usage Mining, approach has been combining with the

    basic Association Rules, Apriori Algorithm to optimize the content of the JIET portal. Finally,

    this project will present an overview of results analysis and Web administrator can use the

    findings for the suitable valuable actions.

    Expected Outcome at the End of 7th Semester-

  • 8/7/2019 Project Offered April 2010

    30/47

    Dept. of CSE @JIET

    30

    Students will able:

    1. To analyze the different format of data.2. To learn working of Search engines, Web Spider (Crawlers).3. To gain working knowledge of Weka.

    Expected outcome at the End of 8th Semester-Student will able:

    1. Design its own model based upon the given data source.2. Analyse the outcome of the algorithm and present complete model in the form of tool.

    Project Number-37 Name of Faculty Member -Babita Tiwari

    Project Title- Optimizing Compiler of JAVA SCRIPT

    Batch Size- 3

    Area/ Concept involved: Compiler design, Object Oriented Programming

    Language / Tools that may be used: Java

    Prerequisite Knowledge Required-

    Concept/ Subject Software /

    ToolsCompiler design, Object Oriented Programming Java

    Brief Description about project:

    The Optimizing Compiler is a tool for making JavaScript download and run faster. It is a true

    compiler for JavaScript. Instead of compiling from a source language to machine code, itcompiles from JavaScript to better JavaScript. Optimizing Compiler is a JavaScript optimizing

    compiler. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes

    what's left. It also checks syntax, variable references, and types, and warns about common

    JavaScript pitfalls. This Compiler reduces the size of your JavaScript files and makes them moreefficient, helping your application to load faster and reducing your bandwidth needs. The

    Optimizing Compiler provides warnings for illegal JavaScript and warnings for potentially

    dangerous operations, helping you to produce JavaScript that is less buggy and easier to

    maintain.

    Expected out come at the end of 7th Sem-

    Coding of compiler with its Designing parts

    Expected out come at the end of 8th Sem-Code optimization and fully functional closure compiler

  • 8/7/2019 Project Offered April 2010

    31/47

    Dept. of CSE @JIET

    31

    Project Number-38 Name of Faculty Member -Babita Tiwari

    Project Title- Debugger with profiling in Java

    Batch Size- 3

    Area/ Concept involved: Algorithm, Compiler design, Object Oriented Language

    Language / Tools that may be used: Net beans, Abstract window tool kit

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Algorithm ,Compiler design,

    Object Oriented Language

    Net beans, Abstract

    window tool kit

    Brief Description about project:

    The project aims at providing graphic user interface (GUI) for a debugger. Facilities like creatingnew file, running and saving the file in java language will be provided. The debugger will

    provide errors at exact locations with an additional advantage of saving an error log file for

    future reference. Moreover the debugger will be able to correct frequently occurring errors.

    Expected out come at the end of 7th Sem-Requirement analysisDesigning

    Coding for the same

    Expected out come at the end of 8th Sem-

    Code integration

    Testing and validation

    Project Number-39 Name of Faculty Member -Babita Tiwari

    Project Title- Distributed Data mining in Credit Card Fraud Detection Analysis

    Batch Size- 3

    Area/ Concept involved: Data Mining, Distributed System

    Language / Tools that may be used: Java

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

  • 8/7/2019 Project Offered April 2010

    32/47

    Dept. of CSE @JIET

    32

    Data Mining, Distributed System Java

    Brief Description about project:

    Credit card transactions continue to grow in number, taking a larger share of the payment

    system, and have led to a higher rate of stolen account numbers and subsequent losses by banks.Hence, improved fraud detection has become essential to maintain the viability of the payment

    system. Banks have been fielding early fraud warning systems for some years. We seek to

    improve upon the state-of-the-art in commercial practice via large scale data mining. Scalable

    techniques to analyze massive amounts of transaction data to compute efficient fraud detectors in

    a timely manner are an important problem, especially for e-commerce. Besides scalability and

    efficiency, the fraud detection task exhibits technical problems that include skewed distributions

    of training data and non-uniform cost per error, both of which have not been widely studied in

    the knowledge discovery and data mining community. In this Project we survey and evaluate anumber of techniques that we have proposed and implemented that address these three mainissues concurrently. Our proposed methods of combining multiple learned fraud detectors under

    a "cost model" are general and demonstrably useful; our empirical results demonstrate that we

    can significantly reduce loss due to fraud through distributed data mining of fraud models.

    Expected out come at the end of 7th Sem-

    Requirement analysis

    DesigningCoding for the same

    Expected out come at the end of 8th Sem-Code integration

    Testing and validation

    Project Number-40 Name of Faculty Member- Harikesh Singh

    Project Title- Dispatcher based Dynamic Load Balancing on Web Server

    Batch Size- 3

    Area/ Concept involved: Distributed Computing

    Language / Tools that may be used: C++ / JAVA

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Computer Network LAN Trainer

    Distributed System Telnet, C++ / Java

    Brief Description about Project:

  • 8/7/2019 Project Offered April 2010

    33/47

    Dept. of CSE @JIET

    33

    In computer networking, dynamic load balancing is a technique to distribute workload evenly

    across two or more computers, network links, CPUs, hard drives, or other resources, in order toget optimal resource utilization, maximize throughput, minimize response time, and avoid

    overload. Using multiple components with load balancing, instead of a single component, mayincrease reliability through redundancy. The load balancing service is usually provided by a

    dedicated program or hardware device (such as a multilayer switch or a DNS server).

    A distributed Web-server system is any architecture consisting of multiple Web-server hosts,

    distributed on LANs and WANs, with a mechanism to spread incoming client requests among

    the servers. Each server in the system can respond to any client request. Information can be

    distributed among server nodes in two ways: content tree replication on a servers local disk, orinformation sharing by means of a distributed file system. In this project we can classify four

    distributed Web server architectures according to the entity that distributes the incoming requests

    among the servers. The client-based solution requires software modification on the client side;

    the other three (DNS-based, dispatcher-based, and server-based) affect one or more componentsof the Web-server system. We then evaluate the trade-offs among the alternative approaches and

    techniques.

    Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with the functionality ofclient to web server packet distribution.

    Expected outcome at the End of 8th Semester-Experimental results should be achieved in the process of dynamic load balancing in

    heterogeneous environment of any LAN. These results must be verified on the basis of suitable

    graphs and required tables.

    Project Number-41 Name of Faculty Member- Harikesh Singh

    Project Title- Development of a Distributed Monitoring Framework

    Batch Size- 3

    Area/ Concept involved: Distributed Processing

    Language / Tools that may be used: C++ / Java / NetLogger Toolkit

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Network LAN Trainer, NetLogger

    Distributed System Telnet, Globus

    Brief Description about Project:

    The goal of the Distributed Monitoring Framework is to improve end-to-end data throughput for

    data intensive applications in a high-speed WAN environments, and to provide the ability to do

    performance analysis and fault detection in a Grid computing environment. This monitoring

  • 8/7/2019 Project Offered April 2010

    34/47

    Dept. of CSE @JIET

    34

    framework will provide accurate, detailed, and adaptive monitoring of all of distributed

    computing components, including the network. Analysis tools will be able to use this monitoringdata for real-time analysis, anomaly identification, and response. Services for network-aware

    applications will use this monitoring infrastructure in order to provide past, present, and futurepredictions of the network conditions, which the applications can then use to adapt their

    behavior. Applications such as widely distributed workflow management systems can then use

    the DMF as a generalized real-time event service. This system must have the following

    objectives:

    Integration and enhancement of existing monitoring tools and technologies into a Grid

    environment

    Development of non-intrusive methods for network capacity monitoring and estimation

    Determination of what network metrics are needed by network-aware DOE(Department of Energy) Science Grid applications

    Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with the functionality of

    integration and enhancement of existing monitoring tools.

    Expected outcome at the End of 8th Semester-

    Experimental results should be achieved in the process of distributed monitoring in

    heterogeneous environment of any LAN. These results must be verified on the basis of suitablegraphs and required tables.

    Project Number-42 Name of Faculty Member- Harikesh Singh

    Project Title- Development of a Grid Service Provider

    Batch Size- 3

    Area/ Concept involved: Distributed Processing/Grid Computing

    Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX

    Prerequisite Knowledge Required-

    Concepts / Subject Software / ToolsComputer Network C++/ UNIX

    Distributed System Telnet, Globus

    Brief Description about Project:

    The aim of the project is to allow for interoperability between the Globus Toolkit and the

    Shibboleth Identity Federation system. In the first phase of this project basic interoperability

    should be achieve in that a deployment of the Globus Toolkit can query and receive attributes

    from a Shibboleth service regarding a Grid user, and then make an access control decision based

    on those attributes. In the second phase, we will turn our attention to refining this capability as

    well as addressing higher-level management issues such as management of the federation of

  • 8/7/2019 Project Offered April 2010

    35/47

    Dept. of CSE @JIET

    35

    name spaces between the Grid and campus worlds and the management of the trust

    configuration/metadata between the Grid and Shibboleth components. We distinguish two basicmodes of operation, which we can call "pull" and "push". In thepull mode of operation, after the

    client has been authenticated, the Grid Service Provider requests attributes from the client's ownadministrative domain via a back-channel exchange. In the push mode of operation, the client

    provides the attributes up front, obtaining and pushing those attributes to the Grid Service

    Provider at the time of initial request. In both cases, the Grid Service Provider obtains the user

    attributes it needs to make an informed access control decision (authorization).

    A parallel application, GridShib has been developed for Globus Toolkit is an add on package for

    Globus Toolkit (GT). GridShib for GT is an implementation of a Grid Service Provider, asoftware component analogous in function to the Shibboleth Service Provider but for X.509-

    based Grids.

    Expected outcome at the End of 7th Semester-Design and architecture of the proposed system must be complete along with integration ofpull and push modes of operation between the Grid and Shibboleth components.

    Expected outcome at the End of 8th Semester-Experimental results should be achieved through Grid services in heterogeneous environment of

    any LAN. These results must be verified on the basis of suitable graphs and required tables.

    Project Number-43 Name of Faculty Member- P. S. Banerjee

    Project Title- Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP

    Updates.

    Batch Size- 3

    Area/ Concept involved: Computer Networks and Security

    Language / Tools that may be used: Java and Network Simulator

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Computer Networks Network simulator

    Programming java

    Brief Description about project: In this project we will propose an inter-domain packet filter

    (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. IDPFs areconstructed from the information implicit in BGP route updates and are deployed in network

    border routers. A key feature of the scheme is that it does not require global routing

    information. Based on extensive simulation studies, we will show that even with partial

    deployment on the Internet, IDPFs can proactively limit the spoofing capability of

    attackers. In addition, they can help localize the origin of an attack packet to a small number of

    candidate networks.

  • 8/7/2019 Project Offered April 2010

    36/47

    Dept. of CSE @JIET

    36

    Project Number-44 Name of Faculty Member- P. S. Banerjee

    Project Title- Artificial intelligence based approach for mobility prediction in wireless networks

    Batch Size- 3

    Area/ Concept involved: AI and Computer Networks

    Language / Tools that may be used: H/W base to be developed

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    AI

    Computer Networks

    Brief Description about project: Wireless networks are required to support nomadic computing

    providing seamless mobility without call drops. The number of mobile users must be known for

    allocating the channel bandwidth. This part is most essential for predicting the next step that is

    predicting the move which we will try to optimize out here.

    Project Number-45 Name of Faculty Member- P. S. Banerjee

    Project Title- Wearable Computing Systems

    Batch Size- 3

    Area/ Concept involved: AI and Expert System

    Language / Tools that may be used:Simulation Enviornment

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Algorithms

    AI

    Brief Description about project: The purpose of this project is to review various miniaturecomputing architectures and evaluate the role of wearable computers in road accidents

    prevention. Wearable computers can help to monitor state of alertness and reflexes of drivers by

  • 8/7/2019 Project Offered April 2010

    37/47

    Dept. of CSE @JIET

    37

    means of non-invasive sensors and can therefore be exploited for saving human lives through

    prevention and recovery mechanisms.

    Project Number-46 Name of Faculty Member- U.S.Rawat

    Project Title- Implementation of Elliptic Curve Cryptography Algorithms

    Batch Size- 3

    Area/ Concept involved: Cryptography

    Language / Tools that may be used: Java

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Cryptography Java

    Brief Description about project:A major requirement for e-commerce applications is the provision of security. In this work we

    consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides

    with small key sizes. ECC is ideal for use on constrained environments such as pagers, personal

    digital assistants, cellular phones and smart cards. We implement the ECC algorithms approved

    by the National Institute of Standards and Technology (NIST) in Java. The speed of the variousECC algorithms has to be measured & comparison with RSA algorithm has to be made.

    Expected Outcome at the End of 7th Semester-

    Study of NIST approved ECC algorithms.

    Minimum one NIST approved ECC algorithm has to be implemented.

    Expected outcome at the End of 8th Semester-

    Implementation of various NIST approved ECC algorithms & performance comparisonwith RSA algorithm.

    Project Number-47 Name of Faculty Member- U.S.Rawat

    Project Title- Design and Implementation of Real Time Operating System

    Batch Size- 3

    Area/ Concept involved: Real Time Operating System

    Language / Tools that may be used: C/C++

  • 8/7/2019 Project Offered April 2010

    38/47

    Dept. of CSE @JIET

    38

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Data structures C/C++

    Operating Systems

    Brief Description about project:A real-time operating system (RTOS) is an operating system (OS) intended for real-time

    applications. Such operating systems serve application requests nearly real-time. A real-time OSthat can usually or generally meet a deadline is a soft real-time OS.

    The main objective includes designing the kernel with its basic modules such as Memory

    management, Process management, File System, security, Drivers that meets the requirements of

    a soft real time operating system.

    Expected Outcome at the End of 7th Semester-Memory Management and I\O request handling.

    Expected outcome at the End of 8th Semester-

    Scheduling, Job Synchronization and Swapping

    Project Number-48 Name of Faculty Member- U.S.Rawat

    Project Title- Design and Implementation of Encrypted File System (EFS) in Hybrid Space

    Batch Size- 3

    Area/ Concept involved: System and Network Programming, Cryptography

    Language / Tools that may be used: C on Linux Platform

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    System and Network

    Programming

    C

    Brief Description about project: Encrypted file system secures users data with maximumcomfort and minimum additional requirements on their part. It is a security system that can

    protect any files used by any of the applications, without resorting to application-specific

    encryption methods. Performance is an important factor to users since encryption can be time

    consuming. So, main issues that should be considered while designing EFS are Security,

    Performance and Portability. Also, It should be as transparent as possible.

  • 8/7/2019 Project Offered April 2010

    39/47

    Dept. of CSE @JIET

    39

    In this project, design and implementation of encrypted file system in hybrid space has to be

    done using stackable Vnode layer loadable kernel module. It will be more portable than existingkernel space EFS and more secure, transparent and efficient than user space EFS.

    Expected Outcome at the End of 7th Semester-

    Study and Analysis of various existing EFS in user space, kernel space and hybrid space.

    Study of concepts for hybrid space EFS design.

    Design and implementation of hybrid space EFS that should incorporate all features ofexisting hybrid space EFS and few new features like keys should be based on processsession IDs as well as user IDs for providing more security, selection of cipher for better

    performance etc.

    Comparison with the existing EFS designs.

    Expected outcome at the End of 8th Semester-

    Design and implementation of hybrid space EFS for optimum performance when used fornetwork attached storage (NAS).

    Project Number- 49 Name of Faculty member-AMIT KUMAR

    Project Title- Artificial Immune Classifier

    Batch Size-3

    Area/ Concept involved: Artificial Intelligence, Soft Computing.

    Language / Tools that may be used: C, C++

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Artificial Intelligence ,

    Soft Computing,

    C, C++

    Brief Description about project:In this project student will develop a new supervised learning paradigm, resource limited

    artificial immune classifiers which will be inspired by mechanism exhibited in natural and

    artificial immune system. This project will include recourses competition, clone selection,

    affinity maturation, and memory cell retention. The main work in this project is the ability to

    recognize previously encountered substances and to generalize beyond recognition in order toprovide appropriate responses to pathogens not seen before. In this project students will make

    software based artificial immune system by using latest feature of AI.

    Expected out come at the end of 7th Sem-

    Design of the project should be completed.

    Expected out come at the end of 8th Sem-

  • 8/7/2019 Project Offered April 2010

    40/47

    Dept. of CSE @JIET

    40

    Full Implementation

    Project Number-50 Name of Faculty member-AMIT KUMAR

    Project Title- A Sense of Self and Non-self for Operating System Processes

    Batch Size-3

    Area/ Concept involved: Artificial Intelligence, Soft Computing, UNIX and Computer Security.

    Language / Tools that may be used: C, C++

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Artificial Intelligence , UNIX C, C++

    Brief Description about project:

    In this project student will develop a tool aimed at building computer security systems that

    incorporate the mechanisms and algorithms used by natural immune systems. This tool will have

    richer notions of identity and protection than those afforded by current operating systems, and

    they could provide a layer of general-purpose protection to augment current computer security

    systems. An important feature of this tool is to appropriate identification of self and non-selfwhich is the subject of this project.

    Expected out come at the end of 7th Sem-

    Design of the project should be completed.

    Expected out come at the end of 8th Sem-

    Full Implementation

    Project Number-51 Name of Faculty member-AMIT KUMAR

    Project Title- The Computer Defense Immune System

    Batch Size-3

    Area/ Concept involved: Artificial Intelligence, Soft Computing and Computer Security.

    Language / Tools that may be used: C, C++, C# (.net)

    Prerequisite Knowledge Required-

  • 8/7/2019 Project Offered April 2010

    41/47

    Dept. of CSE @JIET

    41

    Concept/ Subject Software / Tools

    Artificial Intelligence C, C++

    Brief Description about project:

    In this project student will develop software that will work as a Computer Defense Immune

    System. This software is an artificial immune system for detecting computer viruses and network

    intrusions. This project will describe the system architecture, presents current research and

    results in enhancing the system. This project will be used to improve the system's capabilities to

    provide the better defense for a computer system or network.

    Expected out come at the end of 7th Sem. -

    Design of the project should be completed.

    Expected out come at the end of 8th Sem. -

    Full Implementation

    Project Number-52 Name of Faculty Member- Dr Vipin Tyagi

    Project Title- Development of a Face Recognition System

    Batch Size- 03

    Area/ Concept involved: Pattern Recognition, Image Processing

    Language / Tools that may be used: JAVA/C ++, MATLAB

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Image Processing MATLAB

    Data Structures JAVA, C ++

    Brief Description about project:

    A face recognition system is used for identifying or verifying a person from a digital image. In

    the present project we will take a set of images of a group of people and the software willdetermine whether this matches with a known individual or not. This will be achieved by

    comparing the selected features of the face and by comparing with those of stored in the

    database.

    Expected Outcome at the End of 7th Semester-

    Identification of required features in an image

  • 8/7/2019 Project Offered April 2010

    42/47

    Dept. of CSE @JIET

    42

    Expected outcome at the End of 8th Semester-

    Software that can recognize faces

    Project Number-53 Name of Faculty Member- Dr Vipin Tyagi

    Project Title- Hand-Gesture Recognition

    Batch Size- 03

    Area/ Concept involved: Pattern Recognition, Image Processing

    Language / Tools that may be used: MATLAB, JAVA/ C++

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Image Processing MATLAB

    Data Structures JAVA, C ++

    Brief Description about project:

    Gestures are a powerful means of communication among humans, so a natural interactionbetween humans and computing device can be achieved by using hand-gesture forcommunication. In the project we will try to study the movement of hands and try to recognize

    the meaning of these movements.

    Expected Outcome at the End of 7th Semester-

    Identification of features required for recognition

    Expected outcome at the End of 8th Semester-

    Software that can recognize hand gestures

    Project Number-54 Name of Faculty Member- Dr. Vipin Tyagi

    Project Title- Context Based- Image Search

    Batch Size- 03

    Area/ Concept involved: Pattern Recognition, Image Processing

    Language / Tools that may be used: MATLAB, JAVA/C++

  • 8/7/2019 Project Offered April 2010

    43/47

    Dept. of CSE @JIET

    43

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Image Processing MATLAB

    Data Structures JAVA, C ++

    Brief Description about project:

    In our routine search on internet, if we want to retrieve information about a particular topic, wekey-in the title of the object to be searched for. The result contains irrelevant data in addition to

    actual requirement, thus increasing overhead. In the present project a software will be developed

    that will analyze the actual contents of the image which may be colour, shape, texture or someother information derived from the image and give result of search accordingly.

    Expected Outcome at the End of 7th Semester-

    Analysis of contents from the image to be used for search.

    Expected Outcome at the End of 8th Semester-Software that can search the images based on the contents

    Project Number-55 Name of Faculty Member- Dr. Shishir Kumar

    Project Title- Smart Card Development & Implementation

    Area/ Concept involved:Embedded systems & Database Connectivity

    Language / Tools that may be used:Java Swing, Java Servlet Programming, DB2-IBM

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Database Connectivity DB2-IBM

    Front End Software Java SwingSmart Card Programming Embedded Systems

    Smart Card Reader Interfacing

    Brief Description about project:

    The project intend to develop a Smart Card Development Kit, which takes care of all the needs and

    requirements of a student studying in a college, including the attendance system, library book

    issuing, and many more. Every individual will be provided with a (Magnetic Strip Based) /

    (Microprocessor Based) Smart Card Tag, which will contain all his/her personal information. ASmart Card is any pocket-sized card with embedded integrated circuits which can process

    data. Contact smart cards have a contact area, comprising several gold-plated contact pads, that

    is about 1 cm square. When inserted into a reader, the chip makes contact with electrical

    connectors that can read information from the chip and write information back. Smart Card

    Reader, Contact smart card readers are used as a communications medium between the smart

  • 8/7/2019 Project Offered April 2010

    44/47

    Dept. of CSE @JIET

    44

    card and a host, e.g. a computer or a point of sale terminal. SMART CARD DATABASE: This

    database contains a list of known smart cards, the interfaces and the primary service provider ofeach card, and any known smart card readers and reader groups.

    Expected out come at the end of 7th Sem-

    Completion of the Smart Card Reader with the Smart Card Tags and Front end softwaredesigning.

    The database connectivityExpected out come at the end of 8th Sem-

    Testing & ValidationImplementation of the Smart Card system

    Project Number-56 Name of Faculty Member- Dr. Shishir Kumar

    Project Title- Traffic Control System

    Area/ Concept involved:Image Processing

    Language / Tools that may be used:Java , MATLAB

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Image Processing Java/ MATLAB

    Brief Description about project:

    Vehicular traffic is a major problem in modern cities. We collectively waste huge amounts oftime and resources while traveling through traffic congestion and waiting for green signal of

    traffic lights. Significant savings of fuel and time could be achieved if traffic control mechanism

    could be effectively discovered which could reduce the waiting time of a vehicle on the crossing. With the help of tools available in image processing we could estimate traffic density and

    assign appropriate time to the lane keeping all constraints of the traffic laws intact and avoiding

    deadlock of any lane .We shall give higher priority to special vehicles like school buses , firebrigade and ambulance. The method will work on real time traffic data.

    To achieve this method we are using digital image processing to calculate the number of cars in a

    lane and using logical technique for edge detection and background removal. The priority to lane

    will be set according to the traffic density in it and the lanes will be opened in a circular queue

    fashion. Further cars can be attached with devices for shorter route discovery and routemaintenance to decrease trip time and save fuel.

    Expected out come at the end of 7th Sem-

    Study on : Problem Definition, Research Papers, Congestion Control Algorithm,

    Mathematical Transforms ,Edge Detection , Homography, Counting objects technique,

    Integration of Algorithm in a single unit.

    Implementation Congestion Control Algorithm, Using Matlab for Mathematical

    Transform, Edge Detection and object(vehicle) counting on test image.

    Priority Algorithm for special vehicles, Lane.

  • 8/7/2019 Project Offered April 2010

    45/47

    Dept. of CSE @JIET

    45

    Forming a shortest path algorithm used in later stage for making user interface so that

    they could find a least congested path to save time.

    Expected out come at the end of 8th Sem.-

    Implementing Homography and deciding camera angles.

    Working with real scenario. Day and night condition and weather dependency.

    How to take real time input in our software.

    Storage of data and processing it in real time by our software.

    Making an interface for the users who want to find the least congested part on the

    road map and the connectivity to user (Internet etc.) .

    Project Number-57 Name of Faculty Member- Dr. Shishir KumarCo Guide-

    Project Title- Development of Intrusion Detection system Using Honeypot

    Area/ Concept involved: Network Security

    Language / Tools that may be used: C & Linux Shell Programming

    Prerequisite Knowledge Required-

    Concept/ Subject Software / Tools

    Socket Programming C

    Java

    Brief Description about project:

    The project using Honeypots is a multifaceted attempt to take honeypots out of the shadows of

    the network security model and to make them an active participant in system defense. To do this,a system will be developed that reacts to hostile intrusion attempts by redirecting all hostile

    traffic to a honeypot that is partially mirroring your production system. Once switched, theexpected hacker is unknowingly attacking the honeypot instead of the real data and clients and/or

    users still safely accessing the real system. In this stage the data will remain safe and the Intruder

    will be identified as an added benefit. A better way to think of a honeypot is an internet attached

    server which acts as a decoy, luring in potential hackers in order to study their activities.

    Expected out come at the end of 7th Sem-

    Following modules will be completed in the 7th

    Semester-

    MODULE 1: Detecting the packets

    MODULE 2: Identity whether the packet has been tampered or belongs to theright source or not.

  • 8/7/2019 Project Offered April 2010

    46/47

    Dept. of CSE @JIET

    46

    Expected out come at the end of 8th Sem-

    Following modules will be completed in the 8th Semester-

    MODULE 3: Fully working intrusion detection system USING HONEYPOTS

    MODULE 4: Along with system protection this module will provider additionalinformation about hackers.

    Project Number-58 Name of Faculty Member- Dr. Shishir Kumar

    Co Guide-

    Project Title- Development of GRID infrastructurefor Image TransformationBatch Size- 3

    Area/ Concept involved: Distributed Processing/Grid Computing

    Language / Tools that may be used: C++ / GLOBUS Toolkit/UNIX

    Prerequisite Knowledge Required-

    Concepts / Subject Software / Tools

    Computer Network C++/ UNIX

    Distributed System Telnet, Globus

    Brief Description about Project:

    The grid infrastructure forms the core foundation for successful grid applications. This

    infrastructure is a complex combination of a number of capabilities and resources identified for

    the specific problem and environment being addressed. In initial stages of delivering any Grid

    Computing application infrastructure, the developers/service providers must consider thefollowing aspects in order to identify the core infrastructure support required for that

    environment:

    1. What problem(s) are we trying to solve for the user? How do we address grid enablementsimpler, while addressing the user's application simpler? How does the developer(programmatically) help the user to be able to quickly gain access and utilize the

    application to best fit their problem resolution needs?

    2. How difficult is it to use the grid tool? Are grid developers providing a flexibleenvironment for the intended user community?

    3. Is there anything not yet considered that would make it easier for grid service providersto create tools for the grid, suitab