application / webservices / web application / project / projects

19
APPLICATION PROJECTS 1.Video Conferencing using Windows Communication Foundation and Windows Presentation Foundation on Distance Education: Videoconferencing provides students with the opportunity to learn by participating in a 2-way communication platform. Furthermore, teachers and lecturers from all over the world can be brought to classes in remote or otherwise isolated places. Students from diverse communities and backgrounds can come together to learn about one another. Students are able to explore, communicate, analyze and share information and ideas with one another. Through videoconferencing students can visit another part of the world to speak with others, visit a zoo, a museum and so on, to learn. These "virtual field trips can bring opportunities to children, especially those in geographically isolated locations, or the economically disadvantaged. Small schools can use this technology to pool resources and teach courses

Upload: colege-buz

Post on 25-Jun-2015

376 views

Category:

Education


2 download

DESCRIPTION

Dear StudentsIngenious techno Solution offers expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domainJAVA.NETEMBEDDED SYSTEMSROBOTICSMECHANICALMATLAB etcFor further details contact us: [email protected] 044-42046028 or 8428302179.Ingenious Techno Solution#241/85, 4th floorRangarajapuram main road,Kodambakkam (Power House)http://www.ingenioustech.in/

TRANSCRIPT

Page 1: Application / Webservices / Web Application / Project / Projects

APPLICATION PROJECTS

1. Video Conferencing using Windows Communication Foundation and

Windows Presentation Foundation on Distance Education:

Videoconferencing provides students with the opportunity to learn by

participating in a 2-way communication platform. Furthermore, teachers and

lecturers from all over the world can be brought to classes in remote or

otherwise isolated places. Students from diverse communities and

backgrounds can come together to learn about one another. Students are able

to explore, communicate, analyze and share information and ideas with one

another. Through videoconferencing students can visit another part of the

world to speak with others, visit a zoo, a museum and so on, to learn. These

"virtual field trips can bring opportunities to children, especially those in

geographically isolated locations, or the economically disadvantaged. Small

schools can use this technology to pool resources and teach courses (such as

foreign languages) which could not otherwise be offered.

2. Live Chatting using Silverlight tool:

A Live chat is a system that allows users to communicate in real

time using easily accessible web interfaces. It is a type of internet online

chat distinguished by its simplicity and accessibility to users who do not

wish to take the time to install and learn to use specialized chat software.

This trait allows users instantaneous access and only a web browser is

required to chat. Users will always get the latest version of a chat service

because no software installation or updates are required.

Page 2: Application / Webservices / Web Application / Project / Projects

3. Microsoft Content Management Server:

Microsoft Content Management Server (MCMS) is a Microsoft product

intended for small to medium enterprises that require content management

functionality on their web site, intranet or portal. Features like Built-in

security and role-based permissions model for authors, editors, moderators,

template designers, channel managers, and administrators and Support for

multi-language content through parallel channels and connected postings.

4. Sharing Resources in a Secured Network using RC4 Algorithm:

A shared resource or network share is a device or piece of

information on a computer that can be remotely accessed from another

computer, typically via a local area network or an enterprise Intranet, as if it

were a resource in the local machine. Examples are shared file access,

shared scanner access, etc. The shared resource is called a shared disk,

shared drive volume, shared folder, shared file, shared document, shared

printer or shared scanner. The term file sharing traditionally means shared

file access, especially in the context of operating systems and LAN and

Intranet services, for example in Microsoft Windows documentation.

Though, as Bit Torrent and similar applications became available in the

early 2000's, the term file sharing increasingly has become associated with

peer-to-peer file sharing over the Internet.RC4 is the most widely-used

software stream cipher and is used in popular protocols such as Secure

Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless

networks).

Page 3: Application / Webservices / Web Application / Project / Projects

5. Synchronization of Local Desktop to Internet using File Transfer Protocol:

File synchronization in computing is the process of making sure that files in

two or more locations are updated through certain rules. In one-way file

synchronization, also called mirroring, updated files are copied from a

'source' location to one or more 'target' locations, but no files are copied back

to the source location. In two-way file synchronization, updated files are

copied in both directions, usually with the purpose of keeping the two

locations identical to each other. In this article, the term synchronization

refers exclusively to two-way file synchronization.

6. Online Social Networks:

The popularity and complexity of online social networks (OSNs) continues

to grow unabatedly with the most popular applications featuring hundreds of

millions of active users. Ranging from social communities and discussion

groups, to recommendation engines, tagging systems, mobile social

networks, games, and virtual worlds, OSN applications have not only shifted

the focus of application developers to the human factor, but have also

transformed traditional application paradigms such as the way users

communicate and navigate in the Internet. Indeed, understanding user

behaviour is now an integral part of online services and applications, with

system and algorithm design becoming in effect user-centric. As expected,

this paradigm shift has not left the research community unaffected,

triggering intense research interest in the analysis of the structure and

properties of online communities.

Page 4: Application / Webservices / Web Application / Project / Projects

7. Including both static and dynamic typing in the same

programming language:

Dynamic languages are becoming increasingly popular for different software

development scenarios such as Web engineering, rapid prototyping or the

construction of applications that require runtime adaptiveness. These languages are

built on the idea of supporting reasoning about (and customising) program

structure, behaviour and environment at runtime. The dynamism offered by

dynamic languages is, however, counteracted by two main limitations: no early

type error detection and fewer opportunities for compiler optimisations. To obtain

the benefits of both dynamically and statically typed languages, the authors have

designed the StaDyn programming language that provides both approaches.

StaDyn keeps gathering-type information at compile time, even when dynamic

variables are used. This type information is used to offer early type error detection,

direct interoperation between static and dynamic codes and better runtime

performance. Following the Separation of Concerns principle, it is possible to

customise the trade-off between runtime flexibility of dynamic typing and safety,

performance and robustness of static typing. A runtime performance assessment is

presented to show an estimate of the benefits of combining dynamic and static

typing in the same programming language.

8. Design principles of web-based distance education system and

sample application in Afyon Kocatepe University:

In recent years, number of web-based distance education systems has rapidly

increased as a result of improvements in the Internet. Universities have an

important role in this situation. Having substantial infrastructures in point of

Page 5: Application / Webservices / Web Application / Project / Projects

accessing the Internet, permanent education staff and system design team has made

distance education more attractive for universities. Distance education systems

have begun to make their education activities by using tools and services such as

electronic books, electronic mails and conference calls. With the increasing

number of these methods and by developing them consistently, the structure that

covers the whole system was named the web-based distance education system

(WBDES). Although there are many data and information about these systems,

there is no detailed information about the software-preparing process and obtained

experiences. In this study, a universal WBDES that can be used by all distance

education entities has been designed. This WBDES is compatible with any

institution or organization and suitable for universal SCORM standards. It includes

many features and functions such as student account creation, user roles, lessons,

examinations, security applications, student affairs, counseling services, internal

communication, executive functions and assessment, etc. With designed systems, a

software infrastructure that is necessary for a virtual academic institution is

provided. The system is currently used in Afyon Kocatepe University. While

designing the system, MS SQL Server 2005, ASP.NET and C#.NET programming

languages were used for the database, web interfaces and programming,

respectively. Studies and experiments in designing the system were explained in

detail.

9. The Phish-Market Protocol: Secure Sharing Between

Competitors:

One way banks mitigate phishing's effects is to remove fraudulent websites or

suspend abusive domain names. The removal process, called a "take-down," is

often subcontracted to specialist firms, who refuse to share feeds of phishing

Page 6: Application / Webservices / Web Application / Project / Projects

website URLs with each other. Consequently, many phishing websites aren't

removed. The take-down companies are reticent to exchange feeds, fearing that

competitors with less comprehensive lists might free-ride off their efforts. Here,

the authors propose the Phish-Market protocol, which enables companies to be

compensated for information they provide to their competitors, encouraging them

to share. The protocol is designed so that the contributing firm is compensated only

for those websites affecting its competitor's clients and only those previously

unknown to the receiving firm. The receiving firm, on the other hand, is

guaranteed privacy for its client list. The protocol solves a more general problem

of sharing between competitors; applications to data brokers in marketing, finance,

energy exploration, and beyond could also benefit.

10. Knowledge-first web services an E-Government example:

Although semantic technologies aren't used in current software systems on a large

scale yet, they offer high potential to significantly improve the quality of electronic

services especially in the E-Government domain. This paper therefore presents an

approach that not only incorporates semantic technologies but allows to create E-

Government services solely based on semantic models. This multiplies the benefits

of the ontology modeling efforts, minimizes development and maintenance time

and costs, improves user experience and enforces transparency.

Page 7: Application / Webservices / Web Application / Project / Projects

11. A managerial community of Web Services for management of

communities of Web Services

Nowadays, Web services are considered as new and attracting distributed approach

of application/services integration over the Internet. As the number of Web

Services is exponentially growing and expected to do so for the next decade, the

need for categorizing and/or classifying Web Services is very crucial for their

success and the success of the underlying SOA. Categorization aims at

systematizing Web Services according to their functionalities and their Quality of

Service attributes. Communities of Web Services have been used to gather Web

Services based on their functionalities. In fact, Web Services in a community

usually offer similar and/or complementary services. In this paper, we augment

Web Services communities' classification by adding a new support layer for

Quality of Service classification. This is done through Quality of Services

specification, monitoring, and certification of different Web Services. A Web

Service might be admitted to a community thanks to its high Quality of Service or

might be ejected from a community due to its low Quality of Service. We propose

a managerial community of Web Services that is able to monitor and certify

Quality of Web Services in other communities. This managerial community offers

services to other communities, Web Services providers, and Web Services clients

Page 8: Application / Webservices / Web Application / Project / Projects

by monitoring and certifying Web Services. The focus of this paper is the use of

the managerial community to select Web Services.

12. Automatic Composition of Semantic Web Services An Enhanced State

Space Search Approach

The web services paradigm has enabled an increasing number of providers to

deploy and host autonomic and remotely accessible services. However, the true

potential of such a distributed infrastructure can only be reached when existing

services can be composed into more complex services to meet the requirements of

users automatically. Therefore, automatic web service composition portends a

future where the Web can behave more intelligently for solving general real-life

problem. Due to the intelligence during automatic web service composition

process, automatic web service composition can be achieved by using AI planning

techniques. Moreover, automatic web service composition can be regarded as

different AI planning problems. Among these techniques, search is a basic but

effective way to solve this problem. From this point, we enhance the traditional

state space search approach in AI planning domain toward service composition

domain. The approach we proposed is not only for web service composition

domain, but also for general problem solving domain.

13. Internet Filtering Issues And Challenges

Various governments have been considering mechanisms to filter out illegal or

offensive Internet material. The accompanying debate raises a number of questions

from a technical perspective. This article explores some of these questions, such as,

what filtering techniques exist? Are they effective in filtering out the specific

Page 9: Application / Webservices / Web Application / Project / Projects

content? How easy is circumventing them? Where should they be placed in the

Internet architecture?

14. The applied research of cloud computing platform architecture in the E-

Learning area

This paper firstly introduces the characteristics of the current E-Learning, and then

analyzes the concept and characteristics of cloud computing, and describes the

architecture of cloud computing platform; by combining the characteristics of E-

Learning and learning from current major infrastructure approach of cloud

computing platform, this paper structures a relatively complete set of integration

and use in one of the E-Learning platform, puts the cloud computing platform

apply to the study of E-Learning, and focus on the application in order to improve

the resources' stability, balance and utilization; under the conditions, this platform

will meet the demand for the current teaching and research activities, improve the

greatest value of the E-Learning.

15. IT Auditing to Assure a Secure Cloud Computing

In this paper we discuss the evolvement of cloud computing paradigm and present

a framework for secure cloud computing through IT auditing. Our approach is to

establish a general framework using checklists by following data flow and its

lifecycle. The checklists are made based on the cloud deployment models and

Page 10: Application / Webservices / Web Application / Project / Projects

cloud services models. The contribution of the paper is to understand the

implication of cloud computing and what is meant secure cloud computing via IT

auditing rather than propose a new methodology and new technology to secure

cloud computing. Our holistic approach has strategic value to those who are using

or consider using cloud computing because it addresses concerns such as security,

privacy and regulations and compliance.

16. PEACE - Privacy And Security Using Trusted Third Party

Wireless Mesh Network is being increase attention and deployment of low cost

approach to provide high speed internet access at metropolitan cities. Security and

privacy are the most fear in pushing the success of WMNs for wide deployment

which is also for service-oriented applications. Due to its open and distributed

nature, it is necessary to implement network access control to manage with both

free riders and nasty attackers. In a metro scale community mesh network, a citizen

can access WMNs from anywhere within the community such as office, home etc.

Through WMNs, they can access the public internet in different roles and interact

with other local computer for resource sharing etc.

17. Web-Application Security: From Reactive to Proactive

Here's a sobering thought for all managers responsible for Web applications:

Without proactive consideration for an application's security, attackers can bypass

Page 11: Application / Webservices / Web Application / Project / Projects

nearly all lower-layer security controls simply by using the application in a way its

developers didn't envision. Learn how to address vulnerabilities proactively and

early on to avoid the devastating consequences of a successful attack.

18. Active Re-ranking For Web Image Search

Image search re-ranking methods usually fail to capture the user’s intention when

the query term is ambiguous. Therefore, re-ranking with user interactions, or

active re-ranking, is highly demanded to effectively improve the search

performance. The essential problem in active re-ranking is how to target the user’s

intention. To complete this goal, this paper presents a structural information based

sample selection strategy to reduce the user’s labelling efforts. Furthermore, to

localize the user’s intention in the visual feature space, a novel local-global

discriminative dimension reduction algorithm is proposed. In this algorithm, a sub

manifold is learned by transferring the local geometry and the discriminative

information from the labelled images to the whole (global) image database.

Experiments on both synthetic datasets and a real Web image search dataset

demonstrate the effectiveness of the proposed active re-ranking scheme, including

both the structural information based active sample selection strategy and the local-

global discriminative dimension reduction algorithm.