Software Based Applications
Leading Professional Course Providers
Software Based Applications
|Sl. No:||Project Title||Abstract|
|1.||Network Banking System Java Final year||This Network Banking project is aimed at developing a Network Banking System that is of importance to either college library or public library. All the members of the library are legally the users of the System. The Administrator can add new members, books, Authors, Branches, Racks and also he can create new category for members and books. Here we computerized the existing manual system.|
|2.||Bandwidth Recycling in IEEE 802.16 Networks||IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. For variable bit rate (VBR) applications, however, it is difficult for the subscriber station (SS) to predict the amount of incoming data. To ensure the QoS guaranteed services, the SS may reserve more bandwidth than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme, named Bandwidth Recycling, to recycle the unused bandwidth without changing the existing bandwidth reservation. The idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available.|
|3.||Securable Network in three-party Protocols||This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two mediator protocols, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following: 1) security against such attacks as man-in-the-middle, eavesdropping and replay, 2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and 3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.|
|4.||Harmful Mail Scanning a Java Project||Harmful mail scanning project report explains about developing a software application which can scan mailing information and identify suspicious mails which contain information like bombs, attacks and suicides and store these mails in to database. Administrator can access these mails and identify user location based on ip address and take required action. This project report provide details about modules implemented in this project, hardware and software requirement, system architecture, system design and sample code.|
|5.||Pre-paid Recharging System on Banking||Pre-paid Recharging System aims to customize the existing pre-paid system offered by a pre-paid card Agent to the requirements of a Bank, say, ICICI and a Service provider, say, Airtel and integrate it in their existing enterprise system. The system will become the base system and foundation of complete wireless commerce framework. The primary audience is the bank and service providers. Ultimately, all members of the Project Team are the intended audience. The product must be a web-based and work as stand-alone product.
In practical, our project makes a customer not to venture outside anywhere from his sitting room for recharging the mobile, that is, from his seat itself, he can able to perform recharge applications through a single message. This facility is what we are providing through our project. The product must be platform independent and it must use link to its home page. This software would satisfy the needs of the clients such, by its security aspects and necessary controls that are adopted by the Programmer and save the messages that has been sent over.
|6.||Online Real Estate Property Management||Main Planning of the Project:
|7.||Webmobic||Now a days we are spending a lot to send messages and other information’s to our bellowed ones. “Webmobic” is one of the solutions for this situation. Through this website we can save our money up to a level. “Webmobic” is an online website for sending messages between friend and our bellowed ones. There is a huge data base of SMS and other related quotes. Through this website we can send SMS to different mobile phones inside India . There is a facility to send group messages too.|
|8.||BoobTubeFlourish||The biggest hits of this year are the reality shows in every television channel. They overshadowed the soaps which appeared impossible until last year. It is quite interesting how the backend procedure goes on, how the talented participants are found. The general procedure is to adventure it in the channels or newspapers and call all the participants and test their skills personally. The main disadvantage of this procedure is, it is time consuming, costly as we need to spend money just for informing about the event.|
|9.||Cold Boot Attack||Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist suf?ciently for malicious (or forensic) acquisition of usable full-system memory images. Researchers at Princeton University have shown that there are surprisingly large number of machines where the contents of RAM survive undamaged well after the system BIOS or boot code has finished running, and these can be exploited. To demonstrate this, we will try to capture and analyze the memory content after the system is powered off.|
|10.||Trackerz||Trackerz is a B2B is the term which informs us about the business. This concept is build related to business activities. The main criteria of the project is to build a web portal for transactions like online shopping ,tenders, auctions ,classifieds, Admin controls this web portal and users access through unique id,through the id user can select the product and purchase by entering the details of the transaction. In short we can say that it is a B2B portal.Business-to-business ( B2B ) is a term commonly used to describe commerce transactions between businesses, as opposed to those between businesses and other groups, such as business-to-consumers (B2C) or business-to-government (B2G). More specifically, B2B is often used to describe an activity, such as B2B marketing, or B2B sales, that occurs between businesses and other businesses.|