Type Here to Get Search Results !

Project Titles with Abstract For CS Students - TamilYoungsters.


CRIME INVESTIGATION NETWORK


Crime Branch's tasks are to investigate criminal cases, which spans across multiple districts or even states. The CB CID may also take up complicated cases like   communal riot cases, circulation of counterfeit currency, or very complicated murder cases. The local police along with their normal duties would find it tough to allot men to these complicated cases. Crime Branch investigation is ordered either by a judicial court, by the Director General of Police, or the government.
 This website acts as an inter mediator between the admin and the users.  Each user and the admin can have unique username and password. So this project  provides the strong authentication to admin, employees and all users. And this site  gives many safety tips to avoid accidents. It has details about the crime and final reports of that particular crime. This project contains following modules: Admin, user and Employee module. These three modules are used to give the information about the crime and also provide the interaction between the crime investigation employee and their users. These are helps to provide interaction to all at any time without any hesitation.

EDUCATION LOAN

Most students and parents today realize how expensive an education is. Whether you hope to study at a private high school, a college, university, or an overseas school, tuition costs plus the costs of books and living can quickly add up. If you are worrying about the cost of school, you should not feel that money has to decide your education.         If you want to study abroad in India, it is possible to obtain education loans. While getting these loans was difficult in the past, it has now become easier than ever before. A large number of national banks in India have created education loans. The terms of these loans will vary with each institution, so it is important to do your research before using them.

Loans designed to help students pursue an education recognize that students should spend their school time studying, not working to repay a loan. For this reason, many loans created for students allow students to pay back their debts very gradually .

Estimation of Defects Based onDefect Decay Model: ED3M 

 An accurate prediction of the number of defects in a software product during system testing contributes not only to the management of the system testing process but also to the estimation of the product’s required maintenance. Here, a new approach, called Estimation of Defects based on Defect Decay Model (ED3M) is presented that computes an estimate the defects in an ongoing testing process. ED3M is based on estimation theory. Unlike many existing approaches, the technique presented here does not depend on historical data from previous projects or any assumptions about the requirements and/or testers’ productivity. It is a completely automated approach that relies only on the data collected during an ongoing testing process. This is a key advantage of the ED3M approach as it makes it widely applicable in different testing environments. Here, the ED3M approach has been evaluated using five data sets from large industrial projects and two data sets from the literature. In addition, a performance analysis has been conducted using simulated data sets to explore its behavior using different models for the input data. The results are very promising; they indicate the ED3M approach provides accurate estimates with as fast or better convergence time in comparison to well-known alternative techniques, while only using defect data as the input.


 HBA: Distributed Metadata Management forLarge Cluster-Based Storage Systems                                         

To create metadata of all the files in the network and finds a particular file using a search engine in fast and easy. Rapid advances in general-purpose communication networks have motivated the employment of inexpensive components to build competitive cluster-based storage solutions to meet the increasing demand of scalable computing. In the recent years, the bandwidth of these networks has been increased by two orders of magnitude. , which greatly narrows the performance gap between them and the dedicated networks used in commercial storage systems. Since all I/O requests can be classified into two categories, that is, user data requests and metadata requests, the scalability of accessing both data and metadata has to be carefully maintained to avoid any potential performance bottleneck along all data paths. This paper proposes a novel scheme, called Hierarchical Bloom Filter Arrays (HBA), to evenly distribute the tasks of metadata management to a group of MSs. A Bloom filter (BF) is a succinct data structure for probabilistic membership query. A straightforward extension of the BF approach to decentralizing metadata management onto multiple MSs is to use an array of BFs on each MS. The metadata of each file is stored on some MS, called the home MS.

                                                

 KNOWLEDGE PROCESSING OUTSOURCE


                                      
  KPO is one of the fast growing services company involved in IT services, BPO and KPO   It is being claimed that KPO is one step extension of Business Processing Outsourcing (BPO) because BPO Industry is shaping into Knowledge Process Outsourcing because of its favorable advantageous and future scope. Knowledge process can be defined as high added value processes chain where the achievement of objectives is highly dependent on the skills, domain knowledge and experience of the people carrying out the activity. And when this activity gets outsourced a new business activity emerges, which is generally known as Knowledge Process Outsourcing.
  As a service provider KPO always strive to service the customer and makes sure that its services fulfill customer's requirements and bring cost cutting and efficiency in business productivity.

NETWORK LOAD BALANCING 



         Many distributed real-time applications, such as audio- and video-conferencing, require the network to construct a multicast path (tree) from a sender to multiple receivers. Furthermore, real-time applications have Quality-of-Service (QoS) requirements (e.g. bandwidth). The objective of the routing protocol is to build a tree that is both feasible (i.e. satisfies the requested QoS) and least costly. The cost of a tree depends on the costs of its links. The cost of a link should reflect the effect of allocating resources to the new connection on existing and future connections. Many studies have proposed multicast algorithms to construct low-cost QoS-constrained trees. However, these studies assume that some cost is given for each link, and they do not examine the effect of the link cost function. In this paper, we examine the effect of various link cost functions on the performance of two classes of multicast routing algorithms under both uniform and skewed real-time workload. We also investigate the impact of inaccurate network state information. Our simulation results show that when network state information is accurate (most up-to-date) at each router, the choice of the link cost function only has a negligible effect, if any, on the routing performance. More interestingly, we find that, a link cost function that is more sensitive to load performs better when link state information is relatively accurate, while when link state information is more stale, a link cost function that is less sensitive to load performs better. This is more pronounced under higher load and when multicast groups are denser.

 
NETWORK MONITORING SYSTEM


Most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose. This Project deals with monitoring the Network Screen Activities. It has two methodologies one for Client and another for Server. In the proposed system we introduce current session option to monitor the network systems at the same time and in the accesses folder option shows the username and user accessed folders. While client logins to the server, the Client IP Address and System names are added to the server. Server will display all the user names, from server we can monitor the particular Client Screen Activities like that currently opened screens, what are all the files created, modified and deleted.Remote Desktop Services is one of Microsoft Windows components to access a remote computer through the network. Only the user interface of the application is presented at the client. Any input is redirected over to the remote computer over the network. At work, we use Remote Desktop a great deal. It allows us to login to a remote server to perform health checks, deploy applications, troubleshoot problems, etc. We also use remote desktop often when we do WFH (work from home).
This project is an effort in to develop a simple IP Subnet Calculator tool only for class C IP. The IP Subnet Calculator was to give the user a quick and interactive method to calculate available subnet and hosts. Due to the repetitiveness of such calculates, tools such as an IP Subnet Calculator were developed to eliminate common mathematical mistakes. Furthermore, these tools also provide a means for the user to do such calculations without actually understanding the details behind calculating IP subnets.



DISTANCE LEARNING SYSTEM

 The system consists of registration module for the students to login and also a new user signup where the new students can register themselves. The students who were successfully registered, they can access the library books. While accessing the books there is a condition as the books are arranged in the form of levels a student who accessed the first level can have a test in that particular level and is not eligible to take a test in the other levels.

    In the existing learning system all the students are required to gather at a common location at a particular time to attend the lectures, because of which it lacks Geographical independence and Time independence. The students must attend the training classes as per the pre-defined schedule and they need to contact the training administrator if they desire to do a course and wait for the administrator to grant permission for taking the course Since the evaluation of test papers is done manually it takes more time and there is a chance that errors may creep in during the evaluation.                      




Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Below Post Ad