• 0431 - 270 22 33
  • 95855 29144
  • JAVA projects
  • PHP projects
  • .NET projects

This defect tracking system helps to track bug. There are three modules in this tracking system, Administrator, Staff and Customer. The Administrator can login to the app and can enter the details of staff, project, view bugs send from the customers. The admin can also also assign work to staffs, view bug case flow status details, send messages to customers using this bug tracking application. The staff can login to the site using username and password. Then he/she can view the bugs assigned to them. He can directly give solution message to customers or he/she can assign the bugs to other staffs if the bug is related to them. The user may view bug case flow details with which he/she is involved. The customer registers in to the applications and login to the site using username and password. Whenever a bug is raised from his software, he sends the bug details to the administrator with print screen of the bug generated. He/she may see the bug case flow details and bug status along with remedy details at any time using the ticket number generated during new bug entry. This is how bug tracking can be done with this application.

This Project Entitled as 'Intranet Chatting' is used basically for chatting purpose with the remote clients or users on Internet or local networks. Here in this project a java client / server combination is used to chat with remote users. When a Client wants to chat with a user on a remote host, he sends a request to the Server with a identification name like chat-id, the server responds to the request by identifying the client-id which is already registered in the server domain and when matched his request is granted and the client can begin to chat with the remote users present on the internet or local network. The power of Internet is such that it integrates together LANs located across diverse software and hardware forms into a single large communication network that spans the globe. The client needs to have a client software such as Netscape Navigator or Internet Explorer to retrieve information as well as chat on the www. WWW is referred to as Netsurfing. And it supports chatting, text, video and audio. The benefit of using "INTRANET CHATTING" over other chatting tools is that, with the help of java, the programmer can create applet applications which can be use the internet as a server. Applets are machine independent and so java programs can run on any computer on the internet.

Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, to print, to process the information. The widespread adoption of electronic distribution of copyrighted material is accompanied by illicit copying and illicit distribution. This is why people think about how to protect their work, how to prevent such illicit activities and how to trace the distribution of a document. Stegnography is art of hiding information using images without corrupting the images. Stegnography is art of hiding information in ways that prevent the detection of hidden messages. Stegnography and Cryptography are cousins in the spycraft family. Cryptography scrambles a message so it cannot be understood. Stegnography hides the message so it cannot be seen.

Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several replica node detection schemes have been proposed in the literature to defend against such attacks in static sensor networks. However, these schemes rely on fixed sensor locations and hence do not work in mobile sensor networks, where sensors are expected to move. In this work, we propose a fast and effective mobile replica node detection scheme using the Sequential Probability Ratio Test. To the best of our knowledge, this is the first work to tackle the problem of replica node attacks in mobile sensor networks. We show analytically and through simulation experiments that our scheme detects mobile replicas in an efficient and robust manner at the cost of reasonable overheads.

We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lacks this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case. .

Online Rental House Web Portal is an internet portal dedicated to meet every aspect of the consumers needs in the Real Estate industry. It is a forum where Property Owners, Brokers, Tenants and Investors can exchange information, quickly, effectively and inexpensively. It features commercial and residential properties for sale rent and lease the fore properties, rates, locations, property news and also major events and happenings in the genre are the highlights of this portal.

The Card Management System is a Windows based application that takes care of the complete internal Card Processing activities of a Bank (management and maintenance of cards). It is suitable for the management of Debit Cards, Credit Cards as well as Smart Cards. It mainly involves the maintenance and management of card - related information in a Bank. This product caters to all the Credit, Debit and Smart Card based functions of a bank like Registration of Customers for card issue, Opening Card Accounts for the registered customer, Creation of Cards for registered customers, Hot Carding, making the Card ready for Embossing by creation of Card Data file etc. The Card Management System could interact with an external Card Transaction System, thereby making the Card-related information maintained by the bank, up-to-date. The purpose is to build a Card Management System which provides complete card processing, to meet the needs of full-fledged Credit card and Debit card based ATM or Point of Sale network.

ERP is a powerful human resource tool for maintaining employee and company information. More than a data storage program, ERP helps you manage your employees. ERP offers a wide variety of reports that give you exactly the information you need. View payroll information by department, or find everyone who is receiving company

Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics (e.g., search, update). Despite their elegance, the recent attacks and deployment efforts have shown that the optimal asymptotic complexity might not always imply practical performance, especially if the application demands a high privacy. In this article, we introduce a novel Dynamic Searchable Symmetric Encryption (DSSE) framework called Incidence Matrix (IM)-DSSE, which achieves a high level of privacy, efficient search/update, and low client storage with actual deployments on real cloud settings. We harness an incidence matrix along with two hash tables to create an encrypted index, on which both search and update operations can be performed effectively with minimal information leakage. This simple set of data structures surprisingly offers a high level of DSSE security while achieving practical performance. Specifically, IM-DSSE achieves forward-privacy, backward-privacy and size-obliviousness simultaneously. We also create several DSSE variants, each offering different trade-offs that are suitable for different cloud applications and infrastructures. We fully implemented our framework and evaluated its performance on a real cloud system (Amazon EC2). We have released IM-DSSE as an open-source library for wide development and adaptation.

Cloud computing provisions scalable resources for high performance industrial applications. Cloud providers usually offer two types of usage plans: reserved and on-demand. Reserved plans offer cheaper resources for long-term contracts while on-demand plans are available for short or long periods but are more expensive. To satisfy incoming user demands with reasonable costs, cloud resources should be allocated efficiently. Most existing works focus on either cheaper solutions with reserved resources that may lead to under-provisioning or over-provisioning, or costly solutions with on-demand resources. Since inefficiency of allocating cloud resources can cause huge provisioning costs and fluctuation in cloud demand, resource allocation becomes a highly challenging problem. In this paper, we propose a hybrid method to allocate cloud resources according to the dynamic user demands. This method is developed as a two-phase algorithm that consists of reservation and dynamic provision phases. In this way, we minimize the total deployment cost by formulating each phase as an optimization problem while satisfying quality of service. Due to the uncertain nature of cloud demands, we develop a stochastic optimization approach by modeling user demands as random variables. Our algorithm is evaluated using different experiments and the results show its efficiency in dynamically allocating cloud resources.

With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over ciphertext associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data. In this paper, we propose a secure data group sharing and conditional dissemination scheme with multi-owner in cloud computing, in which data owner can share private data with a group of users via the cloud in a secure way, and data disseminator can disseminate the data to a new group of users if the attributes satisfy the access policies in the ciphertext. We further present a multiparty access control mechanism over the disseminated ciphertext, in which the data co- owners can append new access policies to the ciphertext due to their privacy preferences. Moreover, three policy aggregation strategies, including full permit, owner priority and majority permit, are provided to solve the privacy conflicts problem caused by different access policies. The security analysis and experimental results show our scheme is practical and efficient for secure data sharing with multi-owner in cloud computing.

many functions, including benefits of Administration, Accounting, Customer, Inventory, Sales, Purchases, Payroll, recruiting and Reports, analysis and review into one package ERP-HRMS allows the Administrator, employees and HR to perform various operations with in the company using their Employee Number.WEAMS stands for Web Enabled Automated Manufacturing System. It is the implementation of several cohesive systems that will manage all aspects of a Manufacturing Organization.

Testimonials

With the experience over 8 years, our students can brainstorm innovative ideas, uncover new opportunities that transform their future.

HERE ARE THEIR STORIES IN THEIR OWN WORDS.

client
client
client
client