Thursday 21 November 2013

Monday 18 November 2013

project-java networking-A Novel Cross Layer Intrusion Detection System in MANET

java networking-

Title-A Novel Cross Layer Intrusion Detection System in MANET

Abstract - Intrusion detection System forms a vital component of internet security. 
To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper, we have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes and different types of DoS attacks by exploiting the information available across different layers of protocol stack in order to improve the accuracy of detection. We have used cooperative anomaly intrusion detection with data mining technique to enhance the proposed architecture. We have implemented fixed width clustering algorithm for efficient detection of the anomalies in the MANET traffic and also generated different types of attacks in the network.The simulation of the proposed architecture is performed in OPNET simulator and we got the result as we expected.

projecct-java-networking-Policy-by-Example for Online Social Networks

java networking:

Title-Policy-by-Example for Online Social Networks

Abstract- We introduce two approaches for improving privacy policy management in online social networks.
 First, we introduce a mechanism using proven clustering techniques that assists users in grouping their friends for group based policy management approaches. Second, we introduce a policy management approach that leverages a user's memory and opinion of their friends to set policies for other similar friends. We refer to this new approach as Same-As Policy Management.To demonstrate the effectiveness of our policy management improvements, we implemented a prototype Facebook application and conducted an extensive user study. 
Leveraging proven clustering techniques, we demonstrated a 23% reduction in friend grouping time.In addition, we demonstrated considerable reductions in policy authoring time using Same- As Policy Management over traditional group based policy management approaches. Finally, we presented user perceptions of both improvements, which are very encouraging.

project-java networking-An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

java networking-

Title-An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server

Abstract - Mobile sinks are vital in many wireless sensor applications for efficient data collection, data querying, and localized sensor reprogramming. Mobile sinks prolong the lifetime of a sensor network. However, when sensor networks with mobile sinks are deployed in a hostile environment, security became a critical issue. They become exposed to varieties of malicious attacks. Thus, anti threats schemes and security services, such as mobile sink’s authentication and pairwise key establishment, are essential components for the secure operation of such networks.

project-java networking-Time Delay On-Demand Multipath Routing Protocol

java networking-

Title-Time Delay On-Demand Multipath Routing Protocol

Abstract-Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. This paper proposes a novel energy-aware multipath ad hoc routing protocol to equalize the energy consumption, thus, to extend the network lifetime of each node in MANETs. The proposed Time Delay On-demand Multipath (TIDOM) routing protocol accommodates the time delay function in flooding RREQ packets.The time delay function is inversely proportional to the residual battery capacity of intermediate nodes themselves.This function avoids nodes with poor residual battery capacity, and promotes nodes with good residual battery capacity joining the routes. Simulation results show that TIDOM improves the network lifetime, energy consumption, and additionally packet delivery ratio over the Ad hoc On-demand Multipath Distance Vector (AOMDV).

java-networking-Packet Loss Control Using Tokens at the Network Edge

java networking:

Title-Packet Loss Control Using Tokens at the Network Edge

Abstract-Presently the Internet accommodates simultaneous audio, video, and data traffic. This requires the Internet to guarantee the packet loss which at its turn depends very much on congestion control. A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion. CSFQ was designed as an open-loop controller to provide the fair best effort service for supervising the per-flow bandwidth consumption and has become helpless when the P2P flows started to dominate the traffic of the Internet. Token-Based Congestion Control (TBCC) is based on a closed-loop congestion control principle, which restricts token resources consumed by an end-user and provides the fair best effort service with O(1) complexity. As Self-Verifying CSFQ and Re-feedback, it experiences a heavy load by policing inter-domain traffic for lack of trust. In this paper, Stable Token-Limited Congestion Control (STLCC) is introduced as new protocols which appends inter-domain congestion control to TBCC and make the congestion control system to be stable. STLCC is able to shape output and input traffic at the inter-domain link with O(1) complexity. STLCC produces a congestion index, pushes the packet loss to the network edge and improves the network performance. Finally, the simple version of STLCC is introduced. This version is deployable in the Internet without any IP protocols modifications and preserves also the packet datagram.

Sunday 17 November 2013

project-java networking-Privacy- and Integrity-Preserving Range Queries in Sensor Networks

java-networking:

Title:Privacy- and Integrity-Preserving Range Queries in Sensor Networks

Abstract-The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing.However, the importance of storage nodes also makes them attractive to attackers. In this paper, we propose SafeQ, a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.To preserve integrity, we propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains—to generate integrity verification information so that a sink can use this information to verify whether the result of a query contains exactly the data items that satisfy the query. To improve performance, we propose an optimization technique using Bloom filters to reduce the communication cost between sensors and storage nodes.

project-java networking-Detecting and Resolving Firewall Policy Anomalies

java- networking:

Title:Detecting and Resolving Firewall Policy Anomalies

Abstract - As the network dramatically extended security considered as major issue in networks. 
There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack.
 We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. 
The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data.


project-Java-networking-Title:Denial-of-Service Defense through Web Referral

Java-networking:

Title:Denial-of-Service Defense through Web Referral:

 Abstract - The web is a complicated graph, with millions of websites interlinked together. 
In this paper, we propose to use this web site graph structure to mitigate flooding attacks on a website,
 using a new web referral architecture for privileged service (?WRAPS?). WRAPS allows a legitimate client to obtain a privilege URL through a click on a referral hyperlink, from a website trusted by the target website. Using that URL, the client can get privileged access to the target website in a manner that is far less vulnerable to a DDOS flooding attack. WRAPS does not require changes to web client software and is extremely lightweight for referrer websites, which eases its deployment. The massive scale of the web site graph could deter attempts to isolate a website through blocking all referrers. We present the design of WRAPS, and the implementation of a prototype system used to evaluate our proposal. Our empirical study demonstrates that WRAPS enables legitimate clients to connect to a website smoothly in spite of an intensive flooding attack, at the cost of small overheads on the website?s ISP?s edge routers.

Thursday 14 November 2013

Key board short cut keys for windows7 operating system

Keyboard Shorcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
...... 3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
                                                                                               Read more

AP DIDECET /TTC SEAT ALLOTMENT ORDER WILL BE SOON

 AP DIETCET/TTC WEB COUNSELING  AND SEAT ALLOTMENT DATES

AP DIETCET/TTC web counseling dates likely to be published very soon in its official website of DIETCET 2013. DIETCET/TTC exam was conducted by AP Government. This DIETCET results released on 18th June 2013. So already most of the students visit official website or online results portals and obtain their results.

Next process is all the candidates are awaiting for web counseling dates and also for OMR sheets of DIETCET/TTC. The DIETCET/TTC omr sheets are available from 4th week of June in on its official website http://dietcet.cgg.gov.in/ , So all the candidates be on touch with official website for web counseling dates and also for TTC OMR sheets.

This year 2013 the total dietcet or TTC qualified percentage is 54%. The DIETCET/TTC web counseling process in 2 phases. So all the candidates touch with official website or everresults for more updates about TTC web counseling and also for OMR Sheets.
                                                                                                    Read more

Monday 11 November 2013

Cloud Computing Pros and Cons:


Cloud Computing has become the most critical new trend in IT nowadays. 
With many companies opting this technology, lets see what it has to offer.
Benefits of Cloud Computing:

Cloud computing costs less, because there is no need to pay for all the people, products, and facilities to run them.
When the apps used by companies run in the cloud, they don’t buy anything. It’s all rolled up into a predictable monthly subscription, so the companies only pay for what they actually use.
More scalable, secure, reliable and sustainable than most applications.
Upgrades are taken care of by the provider, so applications get security and performance enhancements and new features automatically.
Data can be accesses at all times – not just while in the office.
Lets companies focus on deploying new projects and innovation.
Cloud Computing Drawbacks:
                                                                                         Read more

Cloud Computing – The most critical new trend in IT:

Cloud Computing – The most critical new trend in IT:

Traditional business applications like those from SAP, Microsoft, and Oracle have always been too complicated and expensive for enterprises.
They need a data center with office space, power, cooling, bandwidth, networks, servers, and storage.
 The applications have a complicated software stack requiring a team of experts to install, configure, and run them.
They also need development, testing, staging, production environments along with availability of some critical resources in case of failover.

When these headaches are multiplied across dozens or hundreds of applications, it’s easy to see why the biggest companies with the best IT departments aren’t getting the applications they need.
Small businesses don’t even have a chance.

Here comes the importance of Cloud computing, a better way to run business.
Instead of running applications by companies themselves, cloud computing runs on a shared data center.
For using any application that runs in the cloud, they just needs to log in, customize it, and start using it.
That’s the power of cloud computing.
                                                                                                               Read more

Java Clouc Computing project: A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations

Java Cloud Computing :

A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations:

Abstract:
Service Level Agreements (SLAs) between grid users and providers have been proposed as mechanisms for ensuring that the users’ Quality of Service (QoS) requirements are met, and that the provider is able to realise utility from its infrastructure. This paper presents a bilateral protocol for SLA negotiation using the Alternate Offers mechanism wherein a party is able to respond to an offer by modifying some of its terms to generate a counter offer. We apply this protocol to the negotiation between a resource broker and a provider for advance reservation of compute nodes, and implement and evaluate it on a real grid system.



Java Cloud Computing project: Privacy-Preserving Updates to Anonymous and Confidential Databases.


Java Cloud Computing:

Privacy-Preserving Updates to Anonymous and Confidential Databases:

Abstract:
Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the database is strictly controlled, because for example data are used for experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob; on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the database respectively. In this paper, we propose two protocols solving this problem on suppression-based and generalization based k-anonymous databases. The protocols rely on well-known cryptographic assumptions, and we provide experimental results illustrating their efficiency.

Java Cloud Computing Project: DAC MACS: Effective Data Access Control for Multi Authority Cloud Storage Systems

Java Cloud Computing:

DAC MACS: Effective Data Access Control for Multi Authority Cloud Storage Systems:

Abstract:
Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Existing access control schemes are no longer applicable to cloud storage systems, because they either produce multiple encrypted copies of the same data or require a fully trusted cloud server. Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data. It requires a trusted authority manages all the attributes and distributes keys in the system. In cloud storage systems, there are multiple authorities co-exist and each authority is able to issue attributes independently. However, existing CP-ABE schemes cannot be directly applied to the access control for multi-authority cloud storage systems, due to the inefficiency of decryption and revocation

Java Cloud Computing project: Cloud Computing Security: From Single to Multi Clouds

Java Cloud Computing:

Cloud Computing Security: From Single to Multi Clouds:

Abstract:
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words, “interclouds” or “cloud-of- clouds” has emerged recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi- cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.

java-cloud computing project:Reliable Re-encryption in Unreliable Clouds

Java cloud computing:

Reliable Re-encryption in Unreliable Clouds:

Abstract:
A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users.
Then, when a user is revoked, the data owner will issue re-encryption commands to the cloud to re-encrypt the data, to prevent the revoked user from decrypting the data, and to generate new decryption keys to valid users, so that they can continue to access the data.
However, since a cloud computing environment is comprised of many cloud servers, such commands may not be received and executed by all of the cloud servers due to unreliable network communications.
 In this paper, we solve this problem by proposing a time based re-encryption scheme, which enables the cloud servers to automatically re-encrypt data based on their internal clocks.
Our solution is built on top of a new encryption scheme, attribute based encryption, to allow ?ne-grain access control, and does not require perfect clock synchronization for correctness.

java-cloud computing: projets titles with abstracts:for engineering final year students

Android Mobile Computing project:Google Place Finder

Android Mobile Computing :
Google Place Finder:
Abstract: Global positioning system find nearby location Street Address, City, Country and Zip code. Also Show you’re way to reach the place with speed of travelling. This application is used for emergency case we able to find location of nearby hospitals and contact detail. It’s providing automatically emergence call to the particular location. Google map find distance of the two places. Also know driving direction of the two cities and Travelling time and distance of the place. Application is finding nearby ATM via the GPS and also driving direction.

Android Moblie Computing project:Speech to text Convertor for SMS

Android Mobile Computing:

Speech to Text Convertor for SMS:

Abstract: The mobile phone users are increase day by day and everyone wants to develop new things which is improved version of existing one. The SMS user might want the faster SMS technology which can convert their voice into text and SMS will be transferred. This project based on evaluating voice versus keypad as a means for entry and editing of texts. In other words, we can say messages can be voice/speech typed. A speech to text converter is developed to send SMS .It is found that large-vocabulary speech recognition can offer a very competitive alternative to traditional text entry.

Andriod Mobile Computing Project:GPS location finding

Android Mobile Computing:

ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION:

Abstract: Global positioning system find nearby location Street Address, City, Country and Zip code. Also Show you’re way to reach the place with speed of travelling. This application is used for emergency case we able to find location of nearby hospitals and contact detail. It’s providing automatically emergence call to the particular location. Google map find distance of the two places. Also know driving direction of the two cities and Travelling time and distance of the place. Application is finding nearby ATM via the GPS and also driving direction.

Android mobile computing project:Online password gussing attacks

Android Mobile computing:

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS ANDRO :

Abstract : Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done to analyze graphical passwords that are still immature. There for, this project work merges persuasive cued click points and password guessing resistant protocol. The major goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess. Well known security threats like brute force attacks and dictionary attacks can be successfully abolished using this method.

Andriod Mobile Computing project:Extended Mobile Captcha implementation

Android Mobile Computing:

EXTENDED MOBILE CAPTCHA IMPLEMENTATION:

Abstract:  A CAPTCHA is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are assumed to be unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. Thus, it is sometimes described as a reverse Turing test, because it is administered by a machine and targeted at a human, in contrast to the standard Turing test that is typically administered by a human and targeted at a machine. A common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen.Most interactive sites today are run by databases and become quickly clogged and sluggish when a database table exceeds capabilities the operating server can handle.

Andriod Mobile computing project:Authentication schemes for Session password using Color and images for mobile phones

Android  Mobile Computing:

Authentication Schemes for Session Passwords using Color and Images for mobile phones:

 Abstract: Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text can be combined with images or colors to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this paper, two techniques are proposed to generate session passwords using text and colors which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.

Cloud Computing in android

Cloud Computing in Android:
The open source Android operating system has allowed for sophisticated Cloud Computing applications to run wherever you are. Designed to be highly efficient on battery-powered devices like the T-Mobile G1 smartphone, at heart, Android is Linux. Learn more about the several layers to the Android programming model that permit the creation of secure applications that are tailor-made for Cloud Computing.Clouds, of course, consist of a huge multitude of particles of water vapor numbering in the hundreds of millions. Clouds have no central control and basically go where the wind blows. From this perspective, the Internet's multitude of client and server computers coupled with the many different purposes and controlling entities that drive the progress of it resemble clouds. Couple this with the wireless-data revolution that the cell-phone companies have brought us, and it does indeed seem like we're all awash in an invisible "cloud" of computing power.Since the dawn of electronic computers, there has been a clear division of labor between the four main functional parts of a computer:
Input/output (I/O) devices that provide the human-computer interface
Central processing unit
Volatile random access memory (RAM)
Nonvolatile memory
The first three parts put the "computing" in computers. It is in the fourth part, where the valuable data assets are typically stored, that has changed most radically with the advent of cloud computing. Valuable data assets reside in nonvolatile memory so they are protected against the loss of electrical power — regardless of whether the loss is deliberate. Typically, nonvolatile memory devices are hard disks, but they can also be solid-state devices like secure digital (SD) cards and even magnetic tape devices (all but obsolete now). But such storage devices have their limitations.Time marches on, technology has progressed, and along came computer networks, on which an organization's valuable data assets can be centralized in a computer shared by multiple terminals and backed up regularly as a necessary base IT function. This model (known as the mainframe model) offered many advantages — one being that it lightened the load each terminal location had. Small offices with little more than a tiny terminal (keyboard, mouse, display, and PC) could access gigabytes of company data and the processing power of large mainframes without cluttering up the place — so long as they were tethered by wires.The next big paradigm shift came along with the network of networks we affectionately know of as the Internet, where absolutely gargantuan computer systems (local networks) can service huge populations of tiny terminals anywhere in the world a satellite dish can be raised. 
The wireless remote nature of this configuration came to be known of as the cloud.Then along come personal digital assistants (PDAs), mobile phones, and smart phones, where the miniaturization of computers has progressed to the handheld form factor we know and love so well. Suddenly, smart terminals are in the hands of countless millions of productive people, producing and consuming information at prodigious rates.In the mid- to late 1990s, e-mail and the World Wide Web were the most popular applications to dominate the cloud. Most people interacted with the cloud using a Web browser and understood the Internet to be a relatively simple application. With the advent of commercial successes like Yahoo! and Google, terabyte servers and network connections have replaced local hard disks as the preferred nonvolatile storage devices. Just as many forward-thinking visionaries predicted, the cloud has become a modern utility like water, phones, and electricity. Using the mobile-telephone digital network as a primary Internet Service Provider (ISP), the cloud grew to use millions of tiny handheld devices as the main tool for displaying the data residing on those servers.Companies no longer need to maintain large and costly server "farms" round the clock when there is another less-expensive alternative: contracting out those services through vendors like Google, Amazon, and IBM®. Through virtualization, applications that formerly ran in custom environments can be duplicated, or "imaged," to run in the cloud on the vendor servers. And with the proper metering of those services, the company will not need to pay peak prices for those times when its services are being minimally used. As hardware technology marched on, so did software, and we have seen the creation of new applications. For example, location-based services that map out businesses close to where the cell tower or built-in global positioning system (GPS) determined you are. New markets cropped up for downloading and testing useful programs and data files, such as the Android Market and the Amazon MP3 Market for purchasing and downloading music. No doubt, we'll see further advances in these unique new applications of cloud computing — for example, companies could sort out and select regional contact information, then automatically transfer today's list of cold calls to the regional salesperson's Android-based mobile phone while he sleeps.Cloud computing, where portable devices complement powerful servers, requires an operating system that maximizes what the server architects and programmers can do on a small client machine. Android is such an operating system.

IEEE 2013 Android Projects Titles:for Engineering final year students

IEEE 2013 Android Projects Titles - ANDROID SDK 2.3 & SQLite
CODE                                                         Title                                                                   Domain

AD 01 Evaluating Implementation Strategies for Location-Based Multicast Addressing       Android
AD 02 A multi-domain service composition platform                                                       Android
AD 03 MobSched: Customizable scheduler for mobile cloud computing                       Android
AD 04 Distributed Spatial Correlation-based Clustering for
                       Approximate Data Collection in WSNs                                                            Android
AD 05 Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data             Android
AD 06 Toward Privacy Preserving and Collusion Resistance in a
                                           Location Proof Updating System                                                  Android
AD 07 Face recognition system based on feature extraction                                                Android
AD 08 Channel Allocation and Routing in Hybrid
                    Multichannel Multiradio Wireless Mesh Networks                                               Android
AD 09 Energy-aware VM Allocation on an Opportunistic Cloud Infrastructure               Android
AD 10 A Survey of XML Tree Patterns                                                                       Android
AD 11 Ranking Through Clustering: An Integrated Approach to
                       Multi-Document Summarization                                                                       Android
AD 12 Dynamic Audit Services for Outsourced Storages in Clouds                               Android
AD 13 Evaluation of a multi-agent approach for a real transportation system                       Android
AD 14 Adding persuasive features in graphical
 password to increase the capacity of KBAM                                                                       Android
AD 15 A Generic Query Model for the Unified Discovery of Heterogeneous Services       Android
AD 16 An efficient cluster based routing protocol for MANET                                       Android
AD 17 Automatic medical disease treatment system using datamining                               Android

AD 18              Safe Driving Using Mobile Phones                                                               Android
AD 19             Quantitative and Qualitative Mobile Data collection                                       Android
AD 20          nearest atm mobile navigation through global positioning system                       Android
AD 21 design and implementation of improved authentication
                         system for android smartphone users                                                       Android
AD 22 Designing a Peer-Facilitated Self-Management Mobile Application:
                         A User-Centred Approach                                                                           Andriod

IEEE 2013 Android Projects Titles with Abstracts : for final year Engineering students

Tuesday 5 November 2013

Oreilly HTML and XHTML text book free download

Oreilly HTML and XHTML text book





Index.........................
HTML and XHTML Pocket Reference 1
HTML 4.01 Overview 2
HTML5 Overview 4
XHTML Overview 8
Common Attributes and Events 12
Alphabetical List of Elements 17
Elements Organized by Function 151
Character Entities 153
Specifying Color 166




Oracle.Database.11 SQL. Programming text book free download

McGraw.Hill.Oracle.Database.11g.PL.SQL.Programming


This book is designed to be read from beginning to end by those new to
PL/SQL.
Part I covers PL/SQL fundamentals. Part II covers the backbone
of the programming language, which consists of functions, procedures,
packages, triggers, and large objects.
Part III dives into some advanced
topics that should help you immediately with your development projects.
The appendixes in Part IV provide primers on Oracle DBA tasks, SQL programming,
PHP scripting, Java development, regular expressions, and wrapping PL/SQL.
Introductory primers are provided to help you learn about the PL/SQL Hierarchical Profiler and PL/Scope.
There is also an appendix that reviews reserved words and built-in functions that support
your programming tasks.
Part I: PL/SQL Fundamentals
Part I introduces you to recent Oracle Database 10g Release 2 features and Oracle

                                                                                         Read more

Data Mining and Data Ware Housing Lab Manual free download

Data Mining and Data Ware Housing Lab Manual

INDEX 

1
Lab Objective
3
2
Introduction About Lab
4
3
Standard Operating Procedure – SOP
6
3
Guidelines to Students
7
4
Description about SQL, PL/SQL statements and D2K.
8
5
List of Lab Exercises
4.1 Syllabus Programs (JNTU)
4.2 Additional Programs
9
6
Background Theory
14
7
Solutions for Programs
20
8
PL-Sql Programs
50
9
Additional Viva Question
88
10
References
94

Monday 4 November 2013

The complete Reference J2ME text book free download

The Complete Reference J2ME  text book



Java technology has evolved from a programming language designed to create machine-independent embedded systems into a robust, vendor-independent, machine-independent, server-side technology, enabling the corporate community to realize the full potential of web-centric applications.
Java began with the release of the Java Development Kit (JDK). It was obvious from the start that Java was on a fast track to becoming a solution to the problems of many corporate systems.
More interface and libraries were extended in the JDK as the corporate world demanded—and received—application programming interfaces (API) that addressed real-world situations. 
JDK API extensions fully integrated into the JDK with the release of the Java 2 Standard Edition (J2SE) of the JDK. J2SE contains all the APIs needed to build industrial strength Java applications.
 However, the corporate world felt J2SE lacked the strength required for developing enterprise-wide applications and for servicing the needs of developers of mobile and embedded systems.
Again the corporate community pushed Sun Microsystems, Inc. to revise Java technology to address needs of an enterprise.
Sun Microsystems, Inc. then launched  the Java Community Program (JCP) that brought together corporate users, vendors, and technologists to develop a standard for enterprise Java APIs. The result is the
                                                                                  Read more

Beginning PHP and MySQL: From Novice to Professional book free download

Beginning PHP and MySQL:From Novice to Professional ,third Edition


INDEX:..................
CHAPTER 1 Introducing PHP . . . . . . . . . . . . . . . . . . . . . . . . . .  . . . . . .. 1
CHAPTER 2 Configuring Your Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
CHAPTER 3 PHP Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
CHAPTER 4 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
CHAPTER 5 Arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . 127
CHAPTER 6 Object-Oriented PHP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
CHAPTER 7 Advanced OOP Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
CHAPTER 8 Error and Exception Handling . . . . . . . . . . . . . . . . . . . . . . . . . .. 213
CHAPTER 9 Strings and Regular Expressions . . . . . . . . . . . . . . . . . . . . . . . . . 231
CHAPTER 10 Working with the File and Operating System . . . . . . . . . . . . . . . . ..... 277
CHAPTER 11 PEAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
CHAPTER 12 Date and Time . . . . . . . . . . . . . . . . . . . . . . . . . . .  . . . . . . 323
CHAPTER 13 Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . 349
CHAPTER 14 Authenticating Your Users . . . . . . . . . . . . . . . . . . . . . . . . . . .. 365
CHAPTER 15 Handling File Uploads . . . . . . . . . . . . . . . . . . . . . . . . . .  . . . 387
CHAPTER 16 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
CHAPTER 17 PHP and LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
CHAPTER 18 Session Handlers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
CHAPTER 19 Templating with Smarty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
CHAPTER 20 Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
CHAPTER 21 Secure PHP Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
CHAPTER 22 SQLite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
CHAPTER 23 Building Web Sites for the World . . . . . . . . . . . . . . . . . . . . . . . . 591
CHAPTER 24 MVC and the Zend Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
CHAPTER 25 Introducing MySQL . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . 621
CHAPTER 26 Installing and Configuring MySQL . . . . . . . . . . . . . . . . . . . . . . . . 635
CHAPTER 27 The Many MySQL Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
CHAPTER 28 MySQL Storage Engines and Datatypes . . . . . . . . . . . . . . . . . . . . . .. 693
CHAPTER 29 Securing MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
CHAPTER 30 Using PHP with MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
CHAPTER 31 Introducing PDO . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . 793
CHAPTER 32 Stored Routines . . . . . . . . . . . . . . . . . . . . . . .  . . . . . . . . . 819
CHAPTER 33 MySQL Triggers . . . . . . . . . . . . . . . . . . . . . . . ... . . . . . . . . 849
CHAPTER 34 MySQL Views . . . . . . . . . . . . . . . . . . . . . . . . .  . . . . . . . . . 863
CHAPTER 35 Practical Database Queries . . . . . . . . . . . . . . . . . . . . . . .. . . .. 879
CHAPTER 36 Indexes and Searching . . . . . . . . . . . . . . . . . . . . .  . . . . . . . . 907
CHAPTER 37 Transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
CHAPTER 38 Importing and Exporting Data . . . . . . . . . . . . . . . . . . . . ... . . . . 939
                    
                                                                                     Read more