application / webservices / web application / project / projects
DESCRIPTION
Dear StudentsIngenious techno Solution offers expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domainJAVA.NETEMBEDDED SYSTEMSROBOTICSMECHANICALMATLAB etcFor further details contact us: [email protected] 044-42046028 or 8428302179.Ingenious Techno Solution#241/85, 4th floorRangarajapuram main road,Kodambakkam (Power House)http://www.ingenioustech.in/TRANSCRIPT
APPLICATION PROJECTS
1. Video Conferencing using Windows Communication Foundation and
Windows Presentation Foundation on Distance Education:
Videoconferencing provides students with the opportunity to learn by
participating in a 2-way communication platform. Furthermore, teachers and
lecturers from all over the world can be brought to classes in remote or
otherwise isolated places. Students from diverse communities and
backgrounds can come together to learn about one another. Students are able
to explore, communicate, analyze and share information and ideas with one
another. Through videoconferencing students can visit another part of the
world to speak with others, visit a zoo, a museum and so on, to learn. These
"virtual field trips can bring opportunities to children, especially those in
geographically isolated locations, or the economically disadvantaged. Small
schools can use this technology to pool resources and teach courses (such as
foreign languages) which could not otherwise be offered.
2. Live Chatting using Silverlight tool:
A Live chat is a system that allows users to communicate in real
time using easily accessible web interfaces. It is a type of internet online
chat distinguished by its simplicity and accessibility to users who do not
wish to take the time to install and learn to use specialized chat software.
This trait allows users instantaneous access and only a web browser is
required to chat. Users will always get the latest version of a chat service
because no software installation or updates are required.
3. Microsoft Content Management Server:
Microsoft Content Management Server (MCMS) is a Microsoft product
intended for small to medium enterprises that require content management
functionality on their web site, intranet or portal. Features like Built-in
security and role-based permissions model for authors, editors, moderators,
template designers, channel managers, and administrators and Support for
multi-language content through parallel channels and connected postings.
4. Sharing Resources in a Secured Network using RC4 Algorithm:
A shared resource or network share is a device or piece of
information on a computer that can be remotely accessed from another
computer, typically via a local area network or an enterprise Intranet, as if it
were a resource in the local machine. Examples are shared file access,
shared scanner access, etc. The shared resource is called a shared disk,
shared drive volume, shared folder, shared file, shared document, shared
printer or shared scanner. The term file sharing traditionally means shared
file access, especially in the context of operating systems and LAN and
Intranet services, for example in Microsoft Windows documentation.
Though, as Bit Torrent and similar applications became available in the
early 2000's, the term file sharing increasingly has become associated with
peer-to-peer file sharing over the Internet.RC4 is the most widely-used
software stream cipher and is used in popular protocols such as Secure
Sockets Layer (SSL) (to protect Internet traffic) and WEP (to secure wireless
networks).
5. Synchronization of Local Desktop to Internet using File Transfer Protocol:
File synchronization in computing is the process of making sure that files in
two or more locations are updated through certain rules. In one-way file
synchronization, also called mirroring, updated files are copied from a
'source' location to one or more 'target' locations, but no files are copied back
to the source location. In two-way file synchronization, updated files are
copied in both directions, usually with the purpose of keeping the two
locations identical to each other. In this article, the term synchronization
refers exclusively to two-way file synchronization.
6. Online Social Networks:
The popularity and complexity of online social networks (OSNs) continues
to grow unabatedly with the most popular applications featuring hundreds of
millions of active users. Ranging from social communities and discussion
groups, to recommendation engines, tagging systems, mobile social
networks, games, and virtual worlds, OSN applications have not only shifted
the focus of application developers to the human factor, but have also
transformed traditional application paradigms such as the way users
communicate and navigate in the Internet. Indeed, understanding user
behaviour is now an integral part of online services and applications, with
system and algorithm design becoming in effect user-centric. As expected,
this paradigm shift has not left the research community unaffected,
triggering intense research interest in the analysis of the structure and
properties of online communities.
7. Including both static and dynamic typing in the same
programming language:
Dynamic languages are becoming increasingly popular for different software
development scenarios such as Web engineering, rapid prototyping or the
construction of applications that require runtime adaptiveness. These languages are
built on the idea of supporting reasoning about (and customising) program
structure, behaviour and environment at runtime. The dynamism offered by
dynamic languages is, however, counteracted by two main limitations: no early
type error detection and fewer opportunities for compiler optimisations. To obtain
the benefits of both dynamically and statically typed languages, the authors have
designed the StaDyn programming language that provides both approaches.
StaDyn keeps gathering-type information at compile time, even when dynamic
variables are used. This type information is used to offer early type error detection,
direct interoperation between static and dynamic codes and better runtime
performance. Following the Separation of Concerns principle, it is possible to
customise the trade-off between runtime flexibility of dynamic typing and safety,
performance and robustness of static typing. A runtime performance assessment is
presented to show an estimate of the benefits of combining dynamic and static
typing in the same programming language.
8. Design principles of web-based distance education system and
sample application in Afyon Kocatepe University:
In recent years, number of web-based distance education systems has rapidly
increased as a result of improvements in the Internet. Universities have an
important role in this situation. Having substantial infrastructures in point of
accessing the Internet, permanent education staff and system design team has made
distance education more attractive for universities. Distance education systems
have begun to make their education activities by using tools and services such as
electronic books, electronic mails and conference calls. With the increasing
number of these methods and by developing them consistently, the structure that
covers the whole system was named the web-based distance education system
(WBDES). Although there are many data and information about these systems,
there is no detailed information about the software-preparing process and obtained
experiences. In this study, a universal WBDES that can be used by all distance
education entities has been designed. This WBDES is compatible with any
institution or organization and suitable for universal SCORM standards. It includes
many features and functions such as student account creation, user roles, lessons,
examinations, security applications, student affairs, counseling services, internal
communication, executive functions and assessment, etc. With designed systems, a
software infrastructure that is necessary for a virtual academic institution is
provided. The system is currently used in Afyon Kocatepe University. While
designing the system, MS SQL Server 2005, ASP.NET and C#.NET programming
languages were used for the database, web interfaces and programming,
respectively. Studies and experiments in designing the system were explained in
detail.
9. The Phish-Market Protocol: Secure Sharing Between
Competitors:
One way banks mitigate phishing's effects is to remove fraudulent websites or
suspend abusive domain names. The removal process, called a "take-down," is
often subcontracted to specialist firms, who refuse to share feeds of phishing
website URLs with each other. Consequently, many phishing websites aren't
removed. The take-down companies are reticent to exchange feeds, fearing that
competitors with less comprehensive lists might free-ride off their efforts. Here,
the authors propose the Phish-Market protocol, which enables companies to be
compensated for information they provide to their competitors, encouraging them
to share. The protocol is designed so that the contributing firm is compensated only
for those websites affecting its competitor's clients and only those previously
unknown to the receiving firm. The receiving firm, on the other hand, is
guaranteed privacy for its client list. The protocol solves a more general problem
of sharing between competitors; applications to data brokers in marketing, finance,
energy exploration, and beyond could also benefit.
10. Knowledge-first web services an E-Government example:
Although semantic technologies aren't used in current software systems on a large
scale yet, they offer high potential to significantly improve the quality of electronic
services especially in the E-Government domain. This paper therefore presents an
approach that not only incorporates semantic technologies but allows to create E-
Government services solely based on semantic models. This multiplies the benefits
of the ontology modeling efforts, minimizes development and maintenance time
and costs, improves user experience and enforces transparency.
11. A managerial community of Web Services for management of
communities of Web Services
Nowadays, Web services are considered as new and attracting distributed approach
of application/services integration over the Internet. As the number of Web
Services is exponentially growing and expected to do so for the next decade, the
need for categorizing and/or classifying Web Services is very crucial for their
success and the success of the underlying SOA. Categorization aims at
systematizing Web Services according to their functionalities and their Quality of
Service attributes. Communities of Web Services have been used to gather Web
Services based on their functionalities. In fact, Web Services in a community
usually offer similar and/or complementary services. In this paper, we augment
Web Services communities' classification by adding a new support layer for
Quality of Service classification. This is done through Quality of Services
specification, monitoring, and certification of different Web Services. A Web
Service might be admitted to a community thanks to its high Quality of Service or
might be ejected from a community due to its low Quality of Service. We propose
a managerial community of Web Services that is able to monitor and certify
Quality of Web Services in other communities. This managerial community offers
services to other communities, Web Services providers, and Web Services clients
by monitoring and certifying Web Services. The focus of this paper is the use of
the managerial community to select Web Services.
12. Automatic Composition of Semantic Web Services An Enhanced State
Space Search Approach
The web services paradigm has enabled an increasing number of providers to
deploy and host autonomic and remotely accessible services. However, the true
potential of such a distributed infrastructure can only be reached when existing
services can be composed into more complex services to meet the requirements of
users automatically. Therefore, automatic web service composition portends a
future where the Web can behave more intelligently for solving general real-life
problem. Due to the intelligence during automatic web service composition
process, automatic web service composition can be achieved by using AI planning
techniques. Moreover, automatic web service composition can be regarded as
different AI planning problems. Among these techniques, search is a basic but
effective way to solve this problem. From this point, we enhance the traditional
state space search approach in AI planning domain toward service composition
domain. The approach we proposed is not only for web service composition
domain, but also for general problem solving domain.
13. Internet Filtering Issues And Challenges
Various governments have been considering mechanisms to filter out illegal or
offensive Internet material. The accompanying debate raises a number of questions
from a technical perspective. This article explores some of these questions, such as,
what filtering techniques exist? Are they effective in filtering out the specific
content? How easy is circumventing them? Where should they be placed in the
Internet architecture?
14. The applied research of cloud computing platform architecture in the E-
Learning area
This paper firstly introduces the characteristics of the current E-Learning, and then
analyzes the concept and characteristics of cloud computing, and describes the
architecture of cloud computing platform; by combining the characteristics of E-
Learning and learning from current major infrastructure approach of cloud
computing platform, this paper structures a relatively complete set of integration
and use in one of the E-Learning platform, puts the cloud computing platform
apply to the study of E-Learning, and focus on the application in order to improve
the resources' stability, balance and utilization; under the conditions, this platform
will meet the demand for the current teaching and research activities, improve the
greatest value of the E-Learning.
15. IT Auditing to Assure a Secure Cloud Computing
In this paper we discuss the evolvement of cloud computing paradigm and present
a framework for secure cloud computing through IT auditing. Our approach is to
establish a general framework using checklists by following data flow and its
lifecycle. The checklists are made based on the cloud deployment models and
cloud services models. The contribution of the paper is to understand the
implication of cloud computing and what is meant secure cloud computing via IT
auditing rather than propose a new methodology and new technology to secure
cloud computing. Our holistic approach has strategic value to those who are using
or consider using cloud computing because it addresses concerns such as security,
privacy and regulations and compliance.
16. PEACE - Privacy And Security Using Trusted Third Party
Wireless Mesh Network is being increase attention and deployment of low cost
approach to provide high speed internet access at metropolitan cities. Security and
privacy are the most fear in pushing the success of WMNs for wide deployment
which is also for service-oriented applications. Due to its open and distributed
nature, it is necessary to implement network access control to manage with both
free riders and nasty attackers. In a metro scale community mesh network, a citizen
can access WMNs from anywhere within the community such as office, home etc.
Through WMNs, they can access the public internet in different roles and interact
with other local computer for resource sharing etc.
17. Web-Application Security: From Reactive to Proactive
Here's a sobering thought for all managers responsible for Web applications:
Without proactive consideration for an application's security, attackers can bypass
nearly all lower-layer security controls simply by using the application in a way its
developers didn't envision. Learn how to address vulnerabilities proactively and
early on to avoid the devastating consequences of a successful attack.
18. Active Re-ranking For Web Image Search
Image search re-ranking methods usually fail to capture the user’s intention when
the query term is ambiguous. Therefore, re-ranking with user interactions, or
active re-ranking, is highly demanded to effectively improve the search
performance. The essential problem in active re-ranking is how to target the user’s
intention. To complete this goal, this paper presents a structural information based
sample selection strategy to reduce the user’s labelling efforts. Furthermore, to
localize the user’s intention in the visual feature space, a novel local-global
discriminative dimension reduction algorithm is proposed. In this algorithm, a sub
manifold is learned by transferring the local geometry and the discriminative
information from the labelled images to the whole (global) image database.
Experiments on both synthetic datasets and a real Web image search dataset
demonstrate the effectiveness of the proposed active re-ranking scheme, including
both the structural information based active sample selection strategy and the local-
global discriminative dimension reduction algorithm.