• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
projectsgeek

ProjectsGeek

Download Mini projects with Source Code, Java projects with Source Codes

  • Home
  • Java Projects
  • C++ Projects
  • VB Projects
  • PHP projects
  • .Net Projects
  • NodeJs Projects
  • Android Projects
    • Project Ideas
      • Final Year Project Ideas
      • JSP Projects
  • Assignment Codes
    • Fundamentals of Programming Language
    • Software Design Laboratory
    • Data Structure and Files Lab
    • Computer Graphics Lab
    • Object Oriented Programming Lab
    • Assembly Codes
  • School Projects
  • Forum

ProjectsGeek

Secure Virtual Drive-Final year projects for cse

October 13, 2011 by ProjectsGeek Leave a Comment

Secure Virtual Drive A Final year projects for cse

 

Project Definition

Implementation Of Secure Virtual Drive
Project Statement To reinforce the discretionary access control mechanism on Windows 2000 through the creation of secure Virtual Drives.

Brief Project Description

Motivation and Objectives Windows 2000 has two forms of access control over objects. The first form—discretionary access control—is the protection mechanism that most people think of when they think of protection under Windows 2000. It’s the method by which owners of objects (such as files or printers) grant or deny access to others. When users log in, they are given a set of security credentials, or a security context. When they attempt to access objects, their security context is compared to the access control list on the object they are trying to access to determine whether they have permission to perform the requested operation.
Privileged access control is necessary for those times when discretionary access control isn’t enough. It’s a method of ensuring that someone can get to protected objects if the owner isn’t available. For example, if an employee leaves a company, the administrator needs a way to gain access to files that might have been accessible only to that employee. In that case, under Windows 2000, the administrator can take ownership of the file so that you can manage its rights as necessary.
With a privileged access control over objects, a user with administrative privileges can tamper with the files of other users, make changes in them or even delete them. There are situations where this privileged access of a user over objects is not only undesirable but can also cause heavy damage to the organization (consider a user modifying a tender document). An organization prefers to rely on the system than trusting those with administrative privileges.
We are trying to reinforce the discretionary access in WINDOWS 2000, which enables a user to protect his/her data from being tampered by users with privileged access to the system. Our project is driven by the concept of polyinstantiation of common resources leading to strong separation of users.

Our Solution

The easiest solution that comes to the mind is to provide the user with encryption software. Whatever documents the user wants to protect he simply encrypts it. Even the administrator cannot decrypt this document.
But if one looks carefully at the issue one finds that the administrator can still corrupt or delete the user’s data. Also the existence of the data can be known. Then also if we look from the point of view of the user’s convenience he has to explicitly specify which files need to be encrypted.
Our aim is to provide the user with a convenient mechanism to protect his data. We are providing every user his/her own secure virtual disk drive inaccessible and invisible to every other user, even the system administrator. The secure virtual drive is like a safe or a vault, what is inside it is known and accessible only to the owner.

Software and Hardware Requirements:

  • Win-2000 Operating System
  • Driver Development Kit(DDK)
  • Softice Debugger
  • OSR Loader
  • DBGView
Final year project for CSE-Secure Drive

 

Other Projects to Try:

  1. Final Year Project-Tracking System project
  2. Network Monitoring System-final year projects for cse
  3. Internet E-mail System and P2P Computing-final year projects for cse
  4. Final year engineering projects Ideas for CSE
  5. Virtual Earth Inside final year project

Filed Under: Final Year Projects Tagged With: Project Ideas

Network Monitoring System-final year projects for cse

October 13, 2011 by ProjectsGeek 2 Comments

Final year projects for cse

NETWORK MONITORING SYSTEM

Final year Project statement 

          To develop a network monitoring system that allows the administrator to be able to categorize and monitor the resources on its network.
Technology : C# .Net technology
 
BRIEF DESCRIPTION OF Network Monitoring System
 
Any large Business entity has a number of locations. To run the business they have an IT structure in place. Each of these locations is part of the IT structure either through a LAN, WAN, VPN etc. The IT structure consists of resources like servers, workstations, laptops, hand-held devices, printers and networking devices that connect them like switches, Routers, Bridges etc.
Most of these resources have attributes such as name, manufacturer, Operating system, processor family, RAM, connections to other resources – Fiber-optic cable, RS232 serial cables, coaxial cables etc.
We need to implement a utility for mapping the network topology, the attributes can be queried from database or by network exploration and presenting them in graphical format to users. The idea is provide an IDE that will help our users to quickly draw n/w diagrams, identify resources uniquely and edit attributes on them. Also, we must be able to keep history of changes to the resource attributes.
It should maintain a database which contains all the resources along with the attributes that were present the last time the network was scanned. This database should be updated dynamically whenever the network is scanned or a resource or attribute is moved / changed. Whenever a user wants to change any attribute he should be provided with a tag where he can enter any relevant details about his status at the present time.
It provides for an Administrator who has full control over the entire network,or a part of it,(centralized control with partial distribution of rights depends on purpose). The administrator can start or stop dedicated services, he can update the required software from one central location, on his part of the network.

 Components Of The Project 

1. GUI based application:
  • This provides the facility to user to initiate the utility, whereby he will get a graphic detail of the entire network. He will be able to visualize every resource on his network and will be able to see every possible connection between resources.
  • He will be able to able to see all the attributes present on any resource he wants.
  • He will be able to update, modify, change or configure the resources with the help of objects representing the actual resources present on the network. This triggers a background process of history keeping.
  • It provides the ability to caution any change of an attribute which may not be compatible with the resource at hand.

2. Back end Processing :

  • This module uses various Algorithms to find the various attributes on every resource.
  • It also maintains a dynamically updated database which contains all the attributes present on every resource along with compatibility problems.
  • This module handles all functionality from finding the resources, attributes, querying with the resources  to re-configuring the resources
  • It can therefore take decisions on compatibility issues and report errors accordingly.
  • We can use raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those  hosts are offering , what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.  It provides complete information about configuration , processes, applications along with their attributes like compatibility , version , status etc.

3. Manager :

  • It provides synchronization between the activities of the user (GUI) and the Backend.
  • It bridges the way in which the GUI displays all the information the Back end provides.
Platform : WINDOWS 2000/XP
Software requirements:
The application should be web based so that it could be deployed on web server
Possible Tools that could be used-:
  • ASP
  • Visual basic
  • Microsoft  Visual Studio .Net
  • IIS service
  • C#

Hardware requirements:

  • PROCESSOR : PENTIUM III/IV , CELERON 1 GHz , AMD ATHLON
  • MEMORY : 256MB onwards
  • Modem / LAN card (100Mbps)
  • Internet connection
Network Monitoring System-Final year project for CSE

Other Projects to Try:

  1. Secure Virtual Drive-Final year projects for cse
  2. Internet E-mail System and P2P Computing-final year projects for cse
  3. Final year engineering projects Ideas for CSE
  4. Networking Projects for Computer Science
  5. Detecting SNMP service on a network Final Year Project

Filed Under: Final Year Projects Tagged With: Project Ideas

Internet E-mail System and P2P Computing-final year projects for cse

October 13, 2011 by ProjectsGeek Leave a Comment

Final year projects for cse

Internet E-mail System Using P2P Computing

Free final year projects SYNOPSIS 

 

Problem Definition To build a software the can be used to communicate between   persons who are separated geographically. It has to transfer files from one resource center to another with trust and security that should indirectly support distributed computing.
 Technology :- Java  And  JXTA . JXTA is open source and freely distributed, and JAVA is also freely distributed.

Software Requirements  

  • Java Development Kit(1.3 or later)                                 
  • Java Achieve Files

Hardware Requirements

  • Hard disk.
  • Any network based on TCP/IP protocol.
  • O.S And Platform Independent
  • 64 MB RAM.
  • Pentium-II  400mhz or later microprocessor.
  • MODEM  (to be tried over internet)

Brief Description of P2P Computing

 There are products available in market that facilitate either instant messaging, file transfer or remote controlling of a system. Our project efforts to bring all these facilities under one roof and to allow them interoperate within themselves.
Our main aim is to build a software the can be used to communicate between   persons who are separated geographically. It has to transfer files from one resource center to another with trust and security which would indirectly facilitate distributed computing.
We will use JAVA/JXTA technology to build our software. JXTA is a technology, which enables to build a peer-peer application without much considering the underlying aspects.
JXTA defines a series of  XML message formats or protocols. Peers use these protocols to discover each other, advertise and discover network resources, and communication and route messages. There are six JXTA protocols:-
  • Peer Discovery Protocol
  • Peer Information Protocol
  • Peer Resolver Protocol
  • Pipe Binding Protocol
  • Endpoint Routing Protocol
  • Rendezvous Protocol
JXTA peers are not required to implement all six protocols; they only need implement the protocols they will use. The Java programming language API is used to access operations supported by these protocols, such as discovering peers or joining a peer group.
 We will also use java archive files such as:-
  • jxta.jar
  • jxtasecurity.jar
  • beepcore.jar
  • cryptix32.jar
Internet E-mail System-Final year Project Downlaod

Other Projects to Try:

  1. Networking Projects for Computer Science
  2. Application Independent Caching final Year project
  3. Secure Virtual Drive-Final year projects for cse
  4. Network Monitoring System-final year projects for cse
  5. Final year engineering projects Ideas for CSE

Filed Under: Final Year Projects Tagged With: Project Ideas

Final year telecommunication engineering project-Intercom Over LAN

October 13, 2011 by ProjectsGeek 2 Comments

Final year telecommunication engineering project

Intercom Over LAN

 

Java Project Definition

        Our project is to implement Intercom over LAN. In this our main aim is to transmit and receive voice data over local area network. The data can be from a file on disk or from a microphone connected to a computer. The resulting software can act as a substitute for existing Intercom in organizations having Local Area Network.
Brief Description. 

VOIP is a technology in which the voice data is transferred over IP network. In our project we are implementing same. For this users has to specify computer name or ip address of the destination computer, so that data reaches the destination We have to implement transmission and reception in between two computers. 

        As our work is to transmit and receive the voice data over LAN so we will divide our problem mainly in two sub problems, which is transmission and reception. So we will write two separate subroutines for each. For communication both subroutines will be running on each computer at the same time.

In our project we are implementing following functionalities:

1. Voice Chat
2. Media File transmission.
3. Automatic Storing of  all Incoming Calls.
4. Calls Forwarding
5. Online friend’s list 

Technology

 Java 2, Java Media Framework (JMF) API.
For developing the above mentioned software we will use JAVA. We have chosen to program in JAVA because of the vast ready made networking libraries which we can use. Java is a “simple , object –oriented , distributed , interpreted , robust , secure, architecture neutral , portable , high – performance , multithreaded  and dynamic language.”

                                     The other main points of using JAVA are that the Java Media Framework (JMF) API provides the support for media capture, transmission, reception and also additional control over media processing and rendering. It also provides a plug-in architecture that provides direct access to media data and enables JMF to be more easily customized. 

Intercom Over LAN Synopsis Download
 
 
 

Other Projects to Try:

  1. Voice Chat Server Final Year Project
  2. Internet E-mail System and P2P Computing-final year projects for cse
  3. Network Monitoring System-final year projects for cse
  4. Detecting SNMP service on a network Final Year Project
  5. Final year engineering projects Ideas for CSE

Filed Under: Final Year Projects Tagged With: Project Ideas

Dataware House

October 13, 2011 by ProjectsGeek Leave a Comment

Final Year PROJECT
 
“DATA WAREHOUSE”: An Implementation ,Supporting Decision making And Report Generation 

 

 
 
We have implemented an interactive report generation that supports decision making for the client regarding there performance. Following is the architecture of the prototype that is being implemented:
 
Dataware House 1
 
 
Tools used to implement this are as follows: 

 

1. SQL SERVER 2000 Ent Edition: It is used to implement the data warehouse which acts as data repository to which data is supplied from all the data sources. It is the offline data base that is updated as per the schedule defined by the administrator.
2. SQL Analysis SERVER: It hosts the OLAP server which contains the multidimensional data that is used by the client for generating the reports based on his queries submitted to it.
3. Microsoft Inter Development Environment: Used for creating the Front end Which is the basic GUI an d the reports generated are also displayed using this tool. .
ADD ONS: 

1. BACKUP: Standby server is implemented for the main data ware house repository.
2. E-mail compatibility using the exchange server.
3. Security: Is defined as per the specifications on the SQL SERVER 2000 and Windows 200 server family.
TEAM MEMBERS: 

xyz
ytsx

DOWNLOAD SYNOPSIS

Other Projects to Try:

  1. TestPage
  2. Final Year Project-Tracking System project
  3. Mail Server Final Year Project Idea
  4. Web Service for Multiple clients Project Idea
  5. 100+ .Net mini Projects with Source Code

Filed Under: Final Year Projects Tagged With: Project Ideas

Covert Communication , Diigtal Images

October 13, 2011 by ProjectsGeek Leave a Comment

Final Year PROJECT SYNOPSIS
 
Project Definition 

 

“COVERT COMMUNICATION BETWEEN USING DIGITAL IMAGES” 

SPONSORED by 

                                       INTEC Pvt. Ltd 

technology 

        We have implemented the hiding of data in digital images in spatial domain ( Least Significant Bit (LSB))  and in transform domain (Discrete Cosine Transform (DCT)). We have used Visual C++ to implement the LSB part and for the DCT we have used MATLAB.
 Brief DESCRIPTION    

In the past decade,  steganography was present in various forms e.g. shaving of the head, using invisible ink etc… Steganography as we all know is hiding the very existence of data which separates from the encryption of data in which the data which is transferred is always visible   in some unreadable form.
In today’s world or the digital era we are giving steganography new bounds. By this line  we mean that we are hiding the important message of the user in the digital image, then transferring the stego-image ( image  + data ) to the other end where the original message can be extracted using the user authentication.
The intruder is thus unaware of the communication taking place between the intended users. Hence we enhance the security of the message against any tampering, leakage, modification etc… Thus we are providing a very efficient software in today’s world which preserves the original message at any cost which can be used for many purposes such as :
    • Between two branch officers of the same company you can easily transfer the tender information

 

    • Across the boundaries of two nations,  violation of the human rights can be made aware of.
    • Digital watermarking or copyright protection can be provided.
    • Some anti-social elements can also take advantage of this software to create disasters.

 

PLATFORM USED 

    • Microsoft Windows

 

SOFTWARE AND HARDWARE REQUIREMENTS 

This project has the following software requirements:-
    • MS Visual Studio Package

 

    • MATLAB 6.0

 

This project has the following hardware requirements:-
    • Multimedia PC configuration

 

    • Other conventional resources

 

GROUP MEMBERS 

DOWNLOAD SYNOPSIS

Other Projects to Try:

  1. Coloured Image , Copyright Protection
  2. Chroma Based Image Retrival System Project
  3. Network Based Image Retrieval System Project
  4. Implement a Program for Feature Extraction in 2D Colour Images (any features like Colour, Texture etc.)
  5. Global Communication Media Project

Filed Under: Final Year Projects Tagged With: Project Ideas

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 112
  • Page 113
  • Page 114
  • Page 115
  • Page 116
  • Interim pages omitted …
  • Page 135
  • Go to Next Page »

Primary Sidebar

Tags

.Net Projects Download Android Project Ideas Android Projects Angular 2 Assembly Codes C # Projects C & C++ Projects C++ Projects Class Diagrams Computer Graphics Database Project Data Mining Projects DataScience Projects Datastructure Assignments Download Visual Basic Projects Electronics project Hadoop Projects Installation Guides Internet of Things Project IOS Projects Java Java Interview Questions Java Projects JavaScript JavaScript Projects java tutorial JSON JSP Projects Mechanical Projects Mongodb Networking Projects Node JS Projects OS Problems php Projects Placement Papers Project Ideas Python Projects seminar and presentation Struts

Search this Website


Footer

Download Java Project
Download Visual Basic Projects
Download .Net Projects
Download VB Projects
Download C++ Projects
Download NodeJs Projects
Download School Projects
Download School Projects
Ask Questions - Forum
Latest Projects Ideas
Assembly Codes
Datastructure Assignments
Computer Graphics Lab
Operating system Lab
australia-and-India-flag
  • Home
  • About me
  • Contact Form
  • Submit Your Work
  • Site Map
  • Privacy Policy