Sunday, February 6, 2011

2011 latest J2ME Projects - JAVA

2011 latest J2ME Projects - JAVA 

       Share your J2me Project ideas through comments
       share your knowledge and help others
       Share your data and project codes through comments

ProjectNameStudy on Travel Route Intelligent Navigation System Based on WEBGIS
Abstractthis paper presents the system architecture, key technology and system realization for the travel route intelligent navigation system based on WEBGIS. Combining with Oracle spatial database and MapXtreme technology and using comprehensively position service, GIS and data mining and according to the traveler’s type, preference, characteristics and requirement, the system can provide user information management, intelligent information processing and travel route planning services intelligently and personally.
DomainsWeb Data Mining, WEBGIS, GIS, MaxExtreme.
Keywordsweb gis; tourism; travel route planning; travel route navigation
H/w & S/wJava, J2ME.

ProjectNameSpeedy, Mini and Totally Fuzzy: Three Ways for Fuzzy Sequential Patterns Mining
AbstractMost real world databases are constituted from historical and numerical data such as sensors, scienti c or even demographic data. In this context, algorithms extracting sequential patterns, which are well adapted to the temporal aspect of the data, do not allow processing numerical information. Therefore the data are pre-processed to be transformed into a binary representation which leads to a loss of information. Algorithms have been proposed to process numerical data using intervals and particularly fuzzy intervals. With regards to the search of sequential patterns based on fuzzy intervals, both existing methods are incomplete either in the processing of sequences or in the support computation. Therefore this paper proposes three methods to mine fuzzy sequential patterns (SPEEDYFUZZY MINIFUZZY and TOTALLYFUZZY). We detail these algorithms by highlighting their different fuzzi cation levels.
DomainsFuzzy Sequential Pattern, Data Minining
H/w & S/wJava,Windows/Linux

ProjectNameAutomatic Form Filling on Mobile Devices
AbstractFilling out forms of web based services on mobile devices is a very time consuming and frustrating task for users because of the limited text input capabilities. This is a critical point to get a wide acceptance of such services, especially mobile commerce that often requires filling user data. We developed an architecture based on a local proxy on a mobile device and a lightweight algorithm for a comprehensive analysis of forms, which leads to the highest probable user data to be filled in, driven by an initial rule set [1]. We further discuss our implementation and the evaluation results of the algorithm as well as the usability of the prototype.
DomainsJ2ME, J2SE
KeywordsMobile, NTT DoCoMo, PDA,
H/w & S/wJava,Windows/Linux

ProjectNameOptimal resource allocation on grid systems for maximizing service reliability using a genetic algorithm
AbstractGrid computing system is different from conventional distributed computing systems by its focus on large-scale resource sharing and open architecture for services. The global grid technologies and the Globus Toolkit in particular, are evolving toward an open grid service architecture (OGSA) with which a grid system provides an extensible infrastructure so that various organizations can offer their own services and integrate their resources. Hence, this paper aims at solving the problem of optimally allocating services on the grid tomaximize the grid service reliability. Since no existing study has analyzed the grid service reliability, this paper develops initial modeling and evaluation algorithms to evaluate the grid service reliability. Based on the grid service reliability evaluation, we present an optimization model for the grid service allocation problem and develop a genetic algorithm (GA) to effectively solve it. A numerical example is given to show the modeling procedures and efficiency of the GAs.
DomainsGrid Computing, Open grid servic architecture
KeywordsGrid service reliability; Genetic algorithm; Graph theory; Optimization; Resource management
H/w & S/wJava,windows/Linux

ProjectNameWeb Service Composition in UML
AbstractAs the number of available web services is steadily increasing, there is a growing interest for reusing basic web services in new, composite web services. Several organizations have proposed composition languages (BPML, BPMN, BPEL4WS, BPSS, WSCI), but no winner has been declared so far. This paper proposes a method that uses UML Activity models to design web service compositions, and OMG's Model Driven Architecture (MDA) to generate executable specifications in different composition languages. The method utilizes standard UML constructs with a minimal set of extensions for web services. An important step in the method is the transformation of WSDL descriptions into UML. This information is used to complete the composition models.Another key aspect of the method is its independence of the web service composition language. The user can thus select his preferred composition language.
DomainsWeb Service,UML
H/w & S/wJava,Windows/Linux

ProjectNamePing Identity over the cloud computing
AbstractNow days, the mechanism of ping identity is widely in order to provide the security and digital identity to the important products. Thus the services of ping identity means the digital identity management are crucial in order to authenticate the users and providing the dynamic access control to services in the infrastructures of cloud computing. These kinds of mechanisms are mostly based on the properties of user identity and histories of past interactions. This services needs to preserve the user’s privacy, during the same time enhancing the multiple domains interoperability and simplifying the identity verification management. Therefore in this proposed research work, we are introducing the new methods and approaches in order to address such requirement which is based on the policies for the high level verification presented in terms of protocols of zero knowledge proof, identity attributes, techniques of semantic matching etc. Our main aim is to design the architecture with the proposed basic techniques and analyze the performance results for the same.
DomainsCloud Computing, Ping Idenity
KeywordsUsers Privacy, Zero Knowledge proof, Web Policies
H/w & S/wJava and Ms-Sqlserver

ProjectNameJava Based Intelligent Drip Irrigation Control
AbstractThis project defines the implementation of a Java driven intelligent and completely automated drip irrigation system. The software and hardware combined together provide a very advanced control over the currently implemented manual system. The implementation involves use of valve control, drip control and pump control using a microcontroller based board. The java driven software is used to interface and control the valve timings. An additional ADC board is provided to collect moisture level feedback from various regions of the field. This helps the user in collecting different feedback from different areas of the field where separate breeds of crops can be cultivated accordingly.
DomainsNetworking Based
KeywordsADC board
H/w & S/wJava

ProjectNameMobile Based Remote Process Control
AbstractThis project describes mobile remote hardware control architecture. It is very suitable for industries, remote laboratories, etc. The idea is to set up a central terminal equipped with a GSM Modem at the industry/laboratory, which can be used to transmit/receive data and/or commands to and from the administrator/s. The data can be anything from boiler temperature to gas concentration values, etc. and the commands can be anything from Relay on/off to Motor control, speed control, PWM control, threshold setting, etc. The entire process control job can be made remote using this architecture.
DomainsMobile Computing
KeywordsSTP,T145,GSM,PWM control.
H/w & S/wJava,J2ME

ProjectNameEnforcing Minimum-Cost Multicast Routing against Selfish Information Flows
AbstractWe study multicast in a noncooperative environment where information flows selfishly route themselves through the cheapest paths available. The main challenge is to enforce such selfish multicast flows to stabilize at a socially optimal operating point incurring minimum total edge cost, through appropriate cost allocation and other economic measures, with replicable and encodable properties of information flows considered. We show that known cost allocation schemes are not sufficient. We provide a shadow-price-based cost allocation for networks without capacity limits and show that it enforces minimum-cost multicast. This improves previous result where a approximate multicast flow is enforced. For capacitated networks, computing cost allocation by ignoring edge capacities will not yield correct results. We show that an edge tax scheme can be combined with a cost allocation to strictly enforce optimal multicast flows in this more realistic case. If taxes are not desirable, they can be returned to flows while maintaining weak enforcement of the optimal flow. We relate the taxesto VCGpaymentschemesand discussan efficientprimal-dualalgorithmthatsimultaneously computesthe taxes,the cost allocation, and the optimal multicast flow, with potential of fully distributed implementations.
DomainsParallel & Distributed Systems
KeywordsLP Formulations, Primal & Dual, Communication/networking, multicast, graph algorithms.
H/w & S/wjava with windows/Linux

ProjectNameEncrypted Voice Calls with IP enabled Wireless Phones over GSM/ CDMA/ WiFi Networks
AbstractA research on the related technology and implementation of IP phone based on WiFi network is discussed in this paper; it includes the net structure of the technology used in designing the terminal of IP phone. This technology is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. A WiFi enabled IP phone is used which is preinstalled with the Symbian Operating System and a software application is developed using J2ME which allows free and secured communication between selected IP phones in the WiFi network. This communication is done with the use of routing tables organized in the WiFi routers. Using the free bandwidth of 2.4 GHz communication channels are established. The communication channel being a free bandwidth is vulnerable to external attacks and hacking. Thereby this challenge of creating a secure communication channel is addressed by using two different encryption mechanisms. The payload and header of the voice data packets encrypted using two different algorithm techniques. Hence the communication system is made almost fully secure. Also the WiFi server can tunnel the calls to the GSM network using UNC. Moreover the creation of a vertical handoff protocol will provide seamless communication for users. This handoff is defined in the context of a diverse network environment. It is cost effective, it allows easier communication, is great for international usages, and it can be very useful for large corporations. In time this will become a cheap and secure way to communicate and will have a large effect on university, business and personal communication.
DomainsMobile Computing, Network Security.
KeywordsIP phones, Wifi ,Symbian, J2ME, encryption, GSM,UNC.
H/w & S/wJava with windows/Linux

ProjectNameRemote Surveillance and Face Tracking with Mobile Phones (Smart Eyes)
AbstractThis thesis addresses analysis, evaluation and simulation of low complexity face detection algorithms and tracking that could be used on mobile phones. Network access control using face recognition increases the user-friendliness in human-computer interaction. In order to realize a real time system implemented on handheld devices with low computing power, low complexity algorithms for face detection and face tracking are implemented. Skin color detection algorithms and face matching have low implementation complexity suitable for authentication of cellular network services. Novel approaches for reducing the complexities of these algorithms and fast implementation are introduced in this thesis. This includes a fast algorithm for face detection in video sequences, using a skin color model in the HSV (Hue-Saturation-Value) color space. It is combined with a Gaussian model of the H and S statistics and adaptive thresholds. These algorithms permit segmentation and detection of multiple faces in thumbnail images. Furthermore we evaluate and compare our results with those of a method implemented in the Chromatic Color space (YCbCr). We also test our test data on face detection method using Convolutional Neural Network architecture to study the suitability of using other approaches besides skin color as the basic feature for face detection. Finally, face tracking is done in 2D color video streams using HSV as the histogram color space. The program is used to compute 3D trajectories for a remote surveillance system.
DomainsMobile Computing, Intelligant Systems, J2ME.
KeywordsRemote Surveillance, Face Tracking, Mobile Phones, Face Detection, HSV Color Space, Face Recognition, Color Histogram, Skin Color Pixel, intensity gradient.
H/w & S/wjava with windows/Linux

ProjectNameGrid Banking System Structure
AbstractHighly computational resource sharing environments like grids pose major security issues. Secure interoperability has been a growing concern for such multi domain computing systems. Collaboration in such a diverse environment requires integration of all local policies to compose a global access control policy for controlling information and resource. Access control in such an environment is still an open problem. The much standardized Role Based Access Control (RBAC) is yet to be fully utilized in a multi domain grid environment like the Grids. Here, we present an architectural framework for adaptation and implementation of RBAC for grid access control. Our approach includes solutions for delegation and revocation in a single domain grid enterprise like bank. The classical Role Based Access Control, though an effective access control standard, does not address the issue of resolving a local role into a global role. So, we also propose architecture based on RBAC, which can establish role equivalence among the domains by mapping a local domain role to its equivalent global role. We use the approach of weighted ranking for the same. The final authorization decision is made based on the mapped global role ranking. And also the resource access policies.
DomainsGrid Banking, Grid Computing.
KeywordsRole Based Access Control, Grid Banking, resource sharing, authorization policies.
H/w & S/wjava with windows 2000 onwards and Linux,SQL server 2000 onwards

ProjectNameA Role and Attribute Based Access Control System Using Semantic Web Technologies
AbstractWe show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attributes. Our approach provides for the dynamic association of roles with users. A Description Logic (DL) reasoner is used to classify both users and resources, and verify the consistency of the access control policies. We mitigate the limited expressive power of the DL formalism by refining the output of the DL reasoner with SPARQL queries. Finally, we provide a proof-ofconcept implementation of the system written in Java
DomainsWeb Based Collaboration, Authorization Models
KeywordsRBAC (Role based access control), ABAC (Attribute Based access control),
H/w & S/wJava, J2ME, windows/Linux

ProjectNameA Fully Automatic CAD-CTC System Based on Curvature Analysis for Standard and Low-Dose CT Data
AbstractComputed tomography colonography (CTC) is a rapidly evolving noninvasive medical investigation that is viewed by radiologists as a potential screening technique for the detecby radiologists as a potential screening technique for the detection of colorectal polyps. Due to the technical advances in CT system design, the volume of data required to be processed by radiologists has increased significantly, and as a consequence the manual analysis of this information has become an increasingly time consuming process whose results can be affected by inter time consuming process whose results can be affected by interand intrauser variability. The aim of this paper is to detail the implementation of a fully integrated CAD-CTC system that is able to robustly identify the clinically significant polyps in the CT data.The CAD-CTC system described in this paper is a multistage implementation whose main system components are: 1) automatic colon segmentation; 2) candidate surface extraction; 3) feature extraction; and 4) classification. Our CAD-CTC system performs at 100% sensitivity for polyps larger than 10 mm, 92% sensitivity for polyps in the range 5 to 10 mm, and 57.14% sensitivity for polyps smaller than 5 mm with an average of 3.38 false positives per dataset. The developed system has been evaluated on synthetic and real patient CT data acquired with standard and low-dose radiation levels.
DomainsImage Processing.
KeywordsClassification, computed tomography (CT), convexity
H/w & S/wjava,windows/Linux

ProjectNamePatient Centric Medical Information System using Web Services
AbstractThis Software Requirements Specification provides a complete description of all the functions and specifications for the purpose of the project on Patient Centric Medical Information System Using Web Services. This Medical Information System deals with the Tuberculosis related data for the patients provided by means of Web Services. This system is beneficial for use mainly by the outdoor patients and medical professionals.
DomainsWeb Services
KeywordsProxy Server,Web Portal.
H/w & S/wJava,

ProjectNameE-Learning as a Web Service
AbstractE-learning has been a topic of increasing interest in recent years. It is often perceived as a group effort, where content authors, instructional designers, multimedia technicians, teachers, trainers, database administrators, and people from various other areas of expertise come together in order to serve a community of learners On the other hand, there are increasingly many activities which aim at providing services of any kind on the Web [9]; these can occur as business-tobusiness or as business-to-consumer services and are generally subsumed under the term Web services. In this paper we suggest to combine the areas of e-learning and Web services, by providing electronic learning offerings as (individual ) Web services as well. We elaborate on this by showing how content providers and content consumers (i.e., learners) can communicate appropriately through a Web service platform with its common description publication, and retrieval functionalities. Finally, we indicate how a corresponding system can be realized.
DomainsWeb Services
H/w & S/wJava,J2ME.Windows/Linux
Related Posts Plugin for WordPress, Blogger...


Popular java Topics