For Doubts,Sales,support mail us

Latest International projects

1. A Least Grade Page Replacement Algorithm for Web Cache Optimization


2. A Community Based Approach to Customizing Web Search


   DESCRIPTION: Researchers can leverage the latent knowledge crated within search communities by recording users' search activities—the queries they submit and the results they select—at the community level. They can use this data to build a relevance model that guides the promotion of community-relevant results during regular Web search.





                     SCREEN magnifiers are used by visually impaired people (VIPs) to enlarge the information presented on the visual display of a computer system. The key feature of the operation of a screen magnifier is that it enlarges screen information independent of the applications that are running. Thus, a magnifier has to interact with a computer’s operating system and applications to accomplish three major tasks

1) capture the information (the pixels) that would be rendered on the screen;

2) determine the area that is to be presented to the user and to enlarge it;

3) present the enlarged information on the screen.


4. A Secure Group Key Management Scheme for Sensor Networks


 DESCRIPTION: Security is an important issue in sensor networks. Many applications in military, distributed information gathering etc., demand for Secure Group Communication (SGC) in sensor networks. The SGC requires common network-wide group key for confidentiality of control messages and data reports. The group key should be updated when a node is compromised. In this paper we propose a new key management scheme for group key computation and distribution which is based on tree structure. The proposed scheme minimizes

storage as well as communication and computation cost of end user (i.e., sensor nodes). The complex encryption/ decryption operations used to distribute new group key whenever a node is compromised are replaced by one way hash functions and simple XOR operations.



  DESCRIPTION: In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources.

Therefore, once an intruder is identified, it should be known to all innocent nodes such that the intruder or its clones can be recognized when appearing elsewhere. However, secure, efficient and scalable sharing of intruder information remains a challenging and unsolved problem.

To address this problem, we propose a three-tier framework, consisting of a verifiable intruder reporting (VIR) scheme, a quorum based caching (QBC) scheme for efficiently propagating intruder reports to the whole network, and a collaborative Bloom Filter (CBF) scheme for handling intruder information locally. Extensive analysis and evaluations are also conducted to verify the efficiency and scalability of the proposed framework.

6. Applying Semantic Web Technologies in Drug Safety Determination

DESCRIPTION: Identifying signals of events that lead to undesirable outcomes is historically one of the most challenging aspects of determining drug safety, both during the drug discovery and development process and once a drug is released to the market. The information required to identify signals resides in disparate and distributed data repositories located in different functional groups and even separate organizations. The Semantic Web provides new capabilities for data integration that exploits explicit semantics and well-defined ontology’s. These technologies promise to simplify heterogeneous data integration and allow logic to infer additional insights from the data. The Oracle RDF Data Model integrated with Cerebra Server is a composite solution that addresses the complexities of mediating information in drug safety. A use case illustrates the situation and how the composite solution might help.


DESCRIPTION: This project is aimed at developing a repository for the alumni of the college, which is important to a college. The Repository and Search Engine (RASE) is an Internet based application that can be accessed throughout the world. The registered user can access the search Engine to know about Alumni.



   DESCRIPTION:  Agility has been widely accepted in manufacturing industry as a new competitive  concept. This paper proposes a framework for the implementation of agility as a manufacturing strategy and describes the development and analysis of a numerical taxonomy of agility strategies using the framework .Three distinct clusters of strategy groups were observed across the industry studied: Quick, Responsive and Proactive Players. Quick Players (small industries which only purchase and sell the products) are oriented towards a strong customer focus and quickness. They do not emphasize flexibility and responsiveness to changes and they give low priority to proactiveness and partnership. Responsive Players (large industries which produce innovative products) are preoccupied with flexibility and responsiveness to changes. They do not emphasize proactiveness and partnerships and they attach low importance to quickness. Proactive Players (industries which take customer requirements and will do small changes according to customer needs) are characterized by high priorities on proactiveness and customer focus, high values attached to all capabilities, and high importance given to partnerships. The underlying dimensions of agile capabilities along which the three strategy groups differ were investigated changes/uncertainties in the business environment experienced by members of different strategic groups were compared, and “manufacturing strategy choices,” in terms of manufacturing practices for achieving agility, employed by members of different Strategic groups were studied.



DESCRIPTION:  This collaborative web-search approach promotes the idea that community search activities provide a valuable search knowledge and that facilitating the sharing of this knowledge between the individuals and communities makes it to possible to adopt traditional search engine results.

Salient Features:

·         Personalizing web-search.

·         Potential solution strategies capable of delivering more relevant search experiences.

·         User’s profile and search history are maintained.

·         Results are displayed as per the users preference



    DESCRIPTION: A Distance education portal is designed to help students to enroll for the course they want to undertake. The  students who are enrolling for the course has to register from the website. The details regarding the courses that are offered are kept in the website for quick reference. We provide with the discussion forums, course material, video & audio tutorials, self-assessment test and mail delivery to students. The students can use all these facilities with just  the help of a login. We also provide with a search engine facility that helps students to find out the old posts by the students or the course material in the website


11. Inteli-Web: Adaptation of the Self-Efficacy in an  Intelligent e-Learning System

 DESCRIPTION: An intelligent e-learning system, which has an agent responsible for promoting the sense of self-efficacy and motivating the student. Self-efficacy means the student’s belief on his own capacity of performing a task. This belief affects his behavior, motivation, affectivity and the choices he makes. This environment is composed of the student model manager agent (SMM) and of an animated   pedagogical agent



DESCRIPTION: E-commerce is changing the face of business. It allows better customer management, new strategies for marketing, an expanded range of products, and more efficient operations. A key enabler of this change is the widespread use of increasingly sophisticated data mining tools. The term ‘data mining’ is used to describe the process of analyzing a company’s internal data for customer profiling and targeting.


In ecommerce application, the end goal of data mining is to improve processes that contribute to delivering value to the end customer.


E-commerce data are classified as usage data, content data, structure data, and user data. Usage data contain details of user sessions and page views.


Once the data types are clear, data preparation is easily achieved. The author then proposes association rules, sequential and navigational patterns, and clustering approaches for personalization of transactions as well as web pages.


By using K-Means algorithm to cluster, results from the data were segmented in few clusters. Based on the statistical results of customer usage, e-banking transactions, our desired information have been achieved.


DESCRIPTION:  Byte code obfuscation is a technique that transforms a Java class file into another Java class file that has the same functionality but makes reverse engineering practically difficult. It is an advanced form of obfuscation that makes byte code difficult to decompile or recompile. While every program written in Java can be compiled to byte code by a Java compiler, it is possible to create class files which no Java compiler can produce, and yet, which pass the Java Verifier with flying colors. Such class files are said to be deviant. The goal of byte code obfuscation is to produce deviant class files, such that when class files are decompiled it becomes difficult to recompile them. Therefore, the byte code file gets stronger protection against the reverse engineering. The approaches to make  decompiled program uncompilable are introducing illegal identifiers, nested type name, and static methods versus instance methods. A simple approach to deobfuscate these techniques is to rename identifiers and class names. Other techniques of byte code obfuscation include, removal of debugging information, encrypting string literals, and replacing instructions with other ones. Removal of debugging information does not prevent De-compilers from doing their job, in fact debugging information can be removed by Java compiler itself if it is requested and encrypting string literals and replacing instructions with other ones may impose performance penalty.



 DESCRIPTION: This project is a solution for improving the security of web forms from web bots (robots). This project delivers the best result than the existing system. The emphasis is on the CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) method that is most often used method.


DESCRIPTION: The main objective of online submission system project is to enable users to submit their manuscript, or carry out a review on an assigned manuscript, over the Internet and in a professional way.

16. Face Recognition System


 DESCRIPTION: A facial recognition system is a computer-driven application for automatically identifying or verifying a person from a digital still or video image. It does that by comparing selected facial features in the live image and a facial database.

This project is a stimulation of Eigen face algorithm. The stimulation based on the police in Tamp Bay, Florida used to search for potential criminals and terrorists in attendance at the event. This project is completely based on graphic processing and rendering.

The project requires study about the Discrete Fourier Transformations as dependent on DCT Algorithm


17. Scalable and Efficient End-to-End Network Topology Inference

DESCRIPTION: To construct an efficient overlay network, the information of underlay is important. We consider using end-to-end measurement tools such as traceroute to infer the underlay topology among a group of hosts. Previously, Max-Delta has been proposed to infer a highly accurate topology with a low number of traceroutes. However, Max-Delta relies on a central server to collect traceroute results and to select paths for hosts to traceroute. It is not scalable to large groups.

In this paper, we investigate a distributed inference scheme to support scalable inference. In our scheme, each host joins an overlay tree before conducting traceroute. A host then independently selects paths for tracerouting and exchanges traceroute results with others through the overlay tree. As a result, each host can maintain a partially discovered topology

18. Effective Plan Recognition In a Weather Dialogue System

 DESCRIPTION:  MeteoBayes, a meteorological information dialogue system, lets users employ natural language to clarify their goals. MeteoBayes uses a Bayesian networks-based inference engine to establish user intentions by consulting its past dialogue repository. Because unknown terms are likely to come up, MeteoBayes's unknown term disambiguation module learns word similarities from texts to avoid unnecessary system inquiries, thus speeding up the understanding process.


   DESCRIPTION: Performance Appraisal is an objective system to judge the ability of an individual employee to perform his tasks. Performance Evaluation System is a process that involves review and analysis of performance of an Associate who is employed with a company.        E-Appraisal is an online performance Appraisal Management System for the employees of our client companies.

               HEAVY PROJECTS


DESCRIPTION: XMLPad offers an intuitive and simple user interfacethat graphically represents the tree structure of XML data. Working with the standard building blocks of XML (Elements, Attributes and Text), authors are able to create reproducible data structures that can be easily filled.

XMLPad enables you to create data sets quickly and easily. XML-based data is displayed graphically in XMLPad so you don't have to spend time explaining the structure of your data set. XMLPad saves you time and effort, allowing you to place a greater emphasis on creating your applications than on typing syntax


DESCRIPTION: This project is designing a web server that can run on any platform. We are aimed to include full support for Java server side technologies. We listed our objectives in designing this web server. With an Internet connection and Java Web server, you can serve and send information about anything in the server. Just click the topics below to get started. You'll find more information to help you browse the Internet in the Help Contents.


DESCRIPTION: The project ‘Project Management Information System’ is the automated system of managing project estimations and project metrics in software engineering process. This system reduces the complexities in project development and also reduces the manual interaction, which increases throughput of the development center. Using this system one can plan the work, track the time spent on each activity and carry out a postmortem to analyze. Also, this system provides measures to quantify the quality of work done by simple metrics for quality measurement.

            The main objective of this system is to completely automate project management process. The objective also includes efficient user interface to interact with the system. A well defined set of reports like performance reports, status reports and job scheduling reports


DESCRIPTION: Marketing is the important branch in a company as a revenue-generating branch. A well developed information system for marketing can give a competitive advantage there by offering better service to customers and better information for market penetration efforts. Today with the emerging technology of WWW marketing systems extended their range to online marketing. This is popularly known as, E-commerce. In this web marketing technique there are two major categories, Business To Business, Business To Consumer. Our project is designing a powerful B-C e-com site.


DESCRIPTION: This project is the implementation of online version of traditional ad and classified agency. The aim of this project is to make the information fast and efficient manner to the required people through the classifieds. And with the ads business firms can explore themselves which is better in each and every respect than the traditional ad systems.

            The objective of our system is to attract people with good and useful content by presenting it in simple and efficient manner. There must be very good interface to the users to browse the classifieds they want with category wise browsing and with searching. The important aspect of the project is designing a good control panel to the users to maintain their ads and classifieds.


DESCRIPTION: This project is designing a web browser that can run on any platform. We are aimed to include full support for Java client side technologies. We listed our objectives in designing this web browser. With an Internet connection and Java Web Browser, you can find and view information about anything on the Web. Just click the topics below to get started. You'll find more information to help you browse the Internet in the Help Contents.

Java web Browser makes it easier to get the most from the World Wide Web, whether you are searching for new information or browsing your favorite Web sites. Built-in IntelliSense technology can save you time completing routine Web tasks, such as automatically completing Web addresses and forms for you, and automatically detecting your network and connection status.


DESCRIPTION: This is an application that implements the FTP server side. We want design an FTP server that can run on any platform with out any source modifications. Our objectives are as mentioned below.

  • “FTPServer” is an implementation of server side FTP (File Transfer Protocol) and provides rich user interface to administrate the FTP server side.
  • Support for both passive and active data connections defined in FTP.
  • Support for account login and also anonymous login.
  • Support for selected data format like ASCII, EBCDIC etc and file format like File, Record or Page etc and transmission mode like Stream, Block or Compressed etc.
  • Complete support for FTP command set which are classified as Access Commands, File Management Commands, Data Formatting Commands, Port Defining Commands, File Transfer Commands and Miscellaneous.
  • A well-defined log writer facility that logs access, operations and errors. And an up to date statistical report.
  • An easy way to create users, encryption security for their passwords and allot different resource permissions to different accounts.
  • A dynamic connection reporter for displaying live connections and their related statistics.
  • Support for LDAP services with password authentication and also Database support with user authentication.

Supporting sessions to eliminate the connection problems when user downloading or uploading some large files.

For Doubts,Sales,support mail us