Global Soft Solutions
Global Soft Solutions
No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]
________________________________________________________ Route Stability in MANETs under the Random Direction Mobility Model Dotnet
A fundamental issue arising in mobile ad hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work, we study both the availability and the duration probability of a routing path that is subject to link failures caused by node mobility. In particular, we focus on the case where the network nodes move according to the Random Direction model, and we derive both exact and approximate (but simple) expressions of these probabilities. Through our results, we study the problem of selecting an optimal route in terms of path availability. Finally, we propose an approach to improve the efficiency of reactive Routing protocols.
________________________________________________________ INTEGRATED DATA MIGRATION Dotnet Abstract: Integrated data migration is a semi enterprise application which provides data transfer between two applications along with data format conversion, platform independence.
Server Operations
Displays the menu Creates the new Instance of a server when requested User Authentication is done in server User Management is a main Operation of server Accepts the User information and connects to the database and checks for a valid user If valid user Client gui will be displayed for further actions If not, an error message will be displayed Receives the user details and registers the user as an valid user Option is provided to edit user details after registration Administrator can view the user details If required, administrator can also delete the user
Mysql connection-Provides access to MySQL Oracle connection -Provides access to Oracle Client Operations Displays the client Main Menu If Select menu item is selected you are provided with two panels You can enter the database name and save the data in the text file if you have chosen Text File panel You can choose Database File panel if you need to convert from one data format to another (for ex oracle to mysql) If Database File panel is chosen we enter the database name, the available table will be displayed You can choose any table that needed to be converted Once you choose the table, the content of the table will be displayed along with options to convert the table to required format
Client [Middle Format Data Conversion] Once the table is selected the data in the table are copied in to text file and the fields are separated using the delimiter % You can choose any type of conversion According to the option the details of conversion and required format should be provided
Advantages
Enables the data in one database format [MYSQL, Oracle ,MS-Access] to be transferred to another database [MYSQL, Oracle, MS-Access]
Enables the data to be transferred across two different platforms Avoids Manual Insertion of Data into the Database
________________________________________________________ A Compressed Video Database Structured for Active Browsing and Search Dotnet Abstract: In this project, we describe a unique new paradigm for video database management known as ViBE (video indexing and browsing environment). ViBE is a browseable / searchable paradigm for organizing video data containing a large number of sequences. The system first segments video sequences into shots by using a new feature vector known as the Generalized Trace obtained from the DC-sequence of the compressed data. Each video shot is then represented by a hierarchical structure known as the shot tree. The shots are then classified into pseudo-semantic classes that describe the shot content. Finally, the results are presented to the user in an active browsing environment using a similarity pyramid data structure. The similarity pyramid allows the user to view the video database at various levels of detail. The user can also define semantic classes and reorganize the browsing environment based on relevance feedback. We describe how ViBE performs on a database of MPEG sequences.
________________________________________________________ E-CITIZENSHIP CARD Dotnet This project entitled E-CITIZENSHIP CARD which is used to view the integrated details of the individual citizen. Basically each person have their own bank accounts, voter id , passport, driving license, pancard, mobile number, ration card details. And all their details are integrated and viewed with the photograph verification. This project deals with multiple criteria linking for viewing the individual citizen details and to generate the report. All the personal details of the individual citizen are maintained by the administrator. The modules in this project are: Administrator module Ration card module Passport module Voter id module Driving license module PAN card module Bank details module Mobile number module Report generation module.
Java 1. INTRODUCTION Steganography provides for the embedding of information in a block of host data in conditions where perceptible modification of the host data is intolerable. steganography techniques are highly dependent on the character of the host data. A technique for embedding information in image makes subtle changes in hue, while a method for embedding information in audio data could exploit the limitations of the human ear by encoding the encapsulated information in audible frequency ranges. Current implementations of textual steganography exploit tolerances in type setting by making minute changes in line placement in order to encapsulate hidden information, making them vulnerable to simple retype setting attacks. Manipulating digital media in an effort to disable or remove the embedded messages is a simpler task than detecting the messages. Any image can be manipulated with the intent of destroying some hidden information whether an embedded message exists or not. Detecting the existence of a hidden message will save time in the activity to disable or remove messages by guiding the analyst to process only the media that contain hidden information Because the most successful hiding method is the uncommon one, but it is unthinkable one and needs a knowledge and experience to be discovered. Every few years, computer security has to re-invert itself. New technologies and new applications bring new
threats, and force us to invent new protection mechanisms. Cryptography has become important when business started to build networked computer system; Virus epidemics started once large numbers of Personal Computer (PC) users were swapping programs; and when the Internet took off, the firewall industry was one of the first to benefit. One of the newest hot spots in security application is information hiding. It is driven by two of the biggest policy issues of the information age-copyright protection (watermark) and state surveillance (steganography). In the proposed system have implemented the scheme of watermark as a method of authentication.
Proposed system Techniques for embedding information as digital watermarks have been widely explored and a great variety of embedding and retrieval techniques have been presented for image as well as other digital media. However in context of ID documents, there are no problems with watermarking techniques. The embedding retrieval processes are solely depending on the key and algorithm chosen. Secondly, the data capacity is quite limited due to poor SNR ratios and, particularly in the case of ID documents, due to the rather small area available on the document. Nevertheless, first approaches to include biometric data in ID cards using watermarking have been published. Watermarks have been suggested to store references of handwritten signatures in the facial image although a media specific compression technique has been applied to the data, this approach clearly unveils the capacity limitations of reasonably robust watermarks and consequently, severe difficulties can be expected in practical applications. As most reference data sizes exceed several hundreds of bytes. However digital watermarks appear to be qualified to cryptographically bind visible representations to of the ID document to biometric data stored by other techniques.
Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets.
The Internets excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion-avoidance mechanism called network border patrol (NBP). NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network.
No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]
requirement for future programmers. Some of the information of our service can intelligently identify through the web are listed below.
Web Service can identify our consumer. It shows whether the consumer is an individual, a business entity or another Web Service. The physical location of the consumer
is traceable by the Web Service. The Service knows the security and privacy policies related to the consumer. Service level agreements that exist between the consumer and the service provider are open to the Web Services.URL names and Authorities are identified easily. It
highly maintains the relationship among the consumers and web services.
in
fast in
moving making to
of
realize the to
to
need
applications
Business-To-Customer communication work. Services may also be provided to the customer to get closer to the organization. The inherent complexities of automating such services are the interoperability between platforms. Web Service is emerging as the most solution to this need. promising
No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]
________________________________________________________ DIGITAL SECURITY MANAGEMENT SYSTEM Front End: ASP.NET Back End: SQL Server
Your companys website has been changed to a message and images that are extremely offensive to your customers. Or very private information from your personnel and financial records has been sent to all company employees. Or your main competitor now has all of your confidential marketing plans and proprietary company information. Any of these scenarios can occur from an insecure network system. The break-ins can be from outside or inside a competitor doing it for profit, a teenager doing it for fun. Any
break-in will be costly, whether you discover it or not. Some break-ins could spell the end of your company. Recently, with the growth technologies, millions of small to medium size companies and businesses are wide open to the ravages of the Internet. It is a very simple task for anyone to have full access to all the data contained in the hard drive. Digital Security specializes in securing your company computer network against any or all such disasters. The admin only register the employee details that are going to work in that particular concern. They will give member Id for the employee. Through that id he can retain his/her user name and password. So the admin know their user id and password. With out the permission of the admin the single employee cannot do anything. They will watch the workers status. If they are sending message to other worker and at what time he/she had sent, they will find all information. So there will not be any disaster of data from the company. Protection will be there for the data.
________________________________________________________ Title Front End Back End : E-Stamping : Active Server Pages : Ms Access
This aim of our project is to develop a Web application for the E-Registration, by using Font-end as Active Server Pages (ASP), HTML and Back-end as MS Access. We can run our project in any type of Web Browser with the help of Personal Web Server (PWS) and Internet Information Server (IIS).
This project entitled E-STAMPING was developed for the end users to register there forms online in Chit Funds, Marriage, Land and Company. This project includes Static pages, Dynamic page and database. This project consists the following modules.
LOGIN PAGE ADMINISTRATION CHIT REGISTRATION MARRIAGE REGISTRATION LAND REGISTRATION COMPANY REGISTRATION USER SEARCH FOR CHIT REGISTRATION SEARCH FOR MARRIAGE REGISTRATION SEARCH FOR LAND REGISTRATION SEARCH FOR COMPANY REGISTRATION
Each of the modules is been developed for the end users in a user friendly way. So that user can upload a file easily
Allows any persons to view the site & able to register themselves When user forgot password he can retrieve his password. Upload files with out any restriction.
Member Registration
In this module the user will register their profile and also register their nominee details. Member Id should be unique and auto generated. Reference details include the person who introduced him into this multi level marketing criteria. These information are stored for the future use and the report preparation.
Account Maintenance
This module consists of the payment details from the members. Payment will be paid in stage wise and amount entered by the member with the date. These details are to be modifying, so there is an option to update the information and delete the information through this module.
Incentive Calculation
Master level person will have a tree like structure. ML will pay some amount to get a membership same way he can make 5 members to join in this group to get membership by paying Rs.500 like him. If that 5 member paid Rs.500 then the ML will get an incentive of 40% of the total amount and the company will get an incentive of 40% of the total amount, remaining 20% for using their networking maintenance fund.
Report
Reports are generated to view the member wise details, member wise account details, company account details and network maintenance fund details.
________________________________________________________
This project Mobile Networking Administration System automates the operation of five Call Centers by taking the order for the cell phones and the particular customer is attached and finally the cell phone is dispatched to the customer. All the five call centers databases are updated by administrator. By adding more entries to the database, store the application can respond to more number of queries from the customers. The importance is given for delivery of the cell phones to the customers. It is divided into two modules: Client Based Module. Server Based Module.
Client based module deals with the relationship between the customers and call centers. In this models user can view the cell phone models and order products from any one of the call centers. For this Job user need not go to shop request for his facilities. Users do the same job in their place. If there is any query also user can send them to get a valid reply.
The Server based module deals with the call center details, cell phone, model details, customer details, cell phone description, talk plan details. The Server based module deals with the analysis of purchases with the call centers and give necessary service to the customers.
No :6, III Floor, Chitra Complex, Chatram Bus Stand, Trichy 620 002 Ph: 0431 4544308 Cell : 94431 22110 Url : www.globalsoftsolutions.in Email: [email protected]
The main objective of the project is divided into two parts. The first is to develop a software module for the user. The second is to develop a suitable software for the administrator.
In the User side, the software consists of three modules. The first module deals with registration. In this module, a new user can register their name in this session. The second module deals with the company information. The information will be based on the relevant scheme of shares and mutual funds and as well as company details. The third module deals with stock review. The user can buy the shares and sell it. The investment rate will be compared with the current market rate and the calculations are done to display the corresponding profit and loss.
In the Admin side, the software consists of three modules. The first module deals with the company address and details of the company. The second module displays the users information and the third module deals with the company name and the current rate, and the rate will be given by the administrator.
This software is designed in such a way that future updates and enhancement can be made easily for multi-user.
Client based module deals with the relationship between the Customers and sales of the vehicle. In this modules is can view the stock, purchasing the products, display the Sales Bills and servicing the vehicle.
The Server based module deals with the business in which the business can view the orders received from the customers, checks the stocks and dispatches the orders. The Server based module deals with the analysis of purchases and verification of service period.
are provided to the user. The comments and valedictory messages provide a way to get away with the
redundant data. In this System is also expected to reduce the amount of paper work involved.
The hard copies of only necessary documents need to be taken the rest can be avoided.
Some of the information that a Web Service can intelligently identify is listed below Web Service can identify the consumer whether the consumer is an individual, a business entity or another Web Service. The Physical location of the consumer is traceable by the Web Service. The Security and Privacy policies related to the consumer are known to a Web Service. Service level Agreements that exist between the consumer and the service provider are open to the web services. URL names and URL Authorities are identified and maintain the relationship between the consumers and Web Services. Today in fast moving world of E-Commerce, companies realize to stay competitive in making their products available over the Internet. These services also need to talk to the partner applications to make the business to business communication work. Services may also be provided to the customer to get the interactivity in the website and get the customer closer to the organization. The inherent complexities of automating such services are the
interoperability between platforms. Web Services is emerging as the most promising solution to this need.
2. Cellular Phone Service and Maintenance 3. Dispenser Management System 4. Online Deposit Management 5. International Trading Management 6. Online Income Tax Tariff System 7. E-Banking System 8. Online Book Mal 9. Cargo Management System 10. Insurance Payment 11. Online Pharmaceutical Maintenance 12. Textile Management System 13. Product Sales Analysis 14. Share Marketing 15. Financial Services 16. Computer Sales and Marketing 17. Super Market Maintenance 18. Online Electricity Bill Payment 19. Equal Monthly Installment Loan System 20. LPG Registration and Customer Maintenance 21. Online Mutual Funds 22. Online Poultry Farm Management System 23. Online Telephone Billing
24. Stock Maintenance System 25. Online Vegetable Shopping 26. Web Response System 27. Credit Card Banking 28. Petro Card Management System 29. Online Estimation System 30. Vehicle Information System 31. Corporation Information System 32. Web Based Order Processing 33. Online Aptitude Test 34. Endeavor Resource Improvement 35. E-Shopping 36. Educational Loan System 37. Telephone Index and Customer Services 38. Jewellery Management System 39. Bugs Tracking System 40.News Agency Information System 41. Photoroom for Net 42. Smart Card Banking 43. Tamilnadu Arts & Science Colleges Information System 44. Business - Business Organization System 45. Business Consumer Organization System 46. E-Caf 47. Blood Donors Encyclopedia 48. Funster Encyclopedia 49. Child Care Information System 50. Mobile Info Provider 51. E-Career Consulting 52. Personal Coordinator 53. Commercial Real Estate System 54. Matriculation Schools Information System (Search Engine)
55. Mail Processing System 56. Digital Security 57. Airways Information System 58. Fixed Deposit Bond System 59. Gift Services Management System 60. Global Agency System 61. Hr Planning System 62. Library Management System 63. Material Planning System 64. Mobile Networking & Administration System 65. Online Ticket Reservation 66. Resume Data Processing 67. Universal Travel Agency 68. University Information 69. Vertical Marketing 70. Marketing Analysis 71. Health Care Management System 72. E-Governance 73. Bank Education Loan System 74. Housing Loan Information System 75. Query Response 76. Lan Messenger 77. Signature Storage & Retrieval System 78. Tours and Travels Information System 79. Zap Card Information or Cluster Info Fling Card 80. Office Maintenance System 81. Safety Bond Information System 82. Accounting Financial Transaction 83. Customer Relation and Management System