Monday, 6 June 2016

70 Computer Science Students project topics


1


.       Accelerating Ranking System Using Webgraph

Introduction

The Page-Rank System of the Needle Search Engine is designed and implemented using Cluster Rank algorithm, which is similar to famous Google's Page Rank [4] algorithm. Google's Page Rank [4] algorithm is based on the link structure of the graph. A "Web Graph" package is used to represent the graph in most efficient manner, which helps in accelerating the ranking procedure of the World Wide Web.
Two latest Page-Rank algorithms called Source Rank, Truncated Page Rank are taken to compare the existing ranking system, which is Cluster Rank [4], and deploy the best in the Needle Search Engine. Two attributes are taken in to consideration for selecting the best algorithm.
The first one is the time and second one is human evaluation for the quality of the search. A survey is conducted with the help of the research team on finding the best algorithm on different search nSowhe .

Related Work

The existing Page-Rank system of the Needle Search Engine takes long update time as the number of URLs increases. Research was done on the published ranking system papers, and below are the details of those papers.
There is a paper called "Efficient Computation of page-rank" written by Taher H.Haveliwala. This paper discusses efficient techniques for computing Page-Rank, a ranking metric for hypertext documents and showed that the Page-Rank can be computed for very large sub graphs of the Web on machines with limited main memory. They discussed several methods for analyzing the convergence of Page-Rank based on the induced ordering of pages.
The main advantage of the Google's Page Rank measure is that it is independent of the query posed by user, this means that it can be pre computed and then used to optimize the layout of the inverted index structure accordingly.
However, computing the Page-Rank requires implementing an iterative process on a massive graph corresponding to billions of Web pages and hyperlinks. There is a paper written by Yen-Yu Chen and Qingqing gan on Page-Rank calculation by using efficient techniques to perform iterative computation. They derived two algorithms for Page-Rank and compared those with two existing algorithms proposed by Havveliwala], and the results were impressive.
In this paper [6], the authors namely Lawrence Page, Sergey Brin, Motwani and Terry Winograd took advantage of the link structure of the Web to produce a global "importance" ranking of every Web page. This ranking, called PageRank [6], helps search engines and users quickly make sense of the vast heterogeneity of the World Wide Web.
This paper introduces a family of link-based ranking algorithms that propagate page importance through links. In these algorithms there is a damping function that decreases with distance, so a direct link implies more endorsement than a link through a long path.
Page Rank is the most widely known ranking function of this family. The main objective of the paper is to determine whether this family of ranking techniques has some interest per se, and how different choices for the damping function impact on rank quality and on convergence speed.
The Page Rank is computed similar to Google's Page Rank, except that the supporters that are too close to a target node, do not contribute to wards it ranking. Spammers can afford spam up to few levels only. Using this technique, a group of pages that are linked together with the sole purpose of obtaining an undeservedly high score can be detected. The authors of this paper apply only link-based methods that are they study the topology of the Web graph with out looking at the content of the web pages.


2.       Comparison Of Clustering Algorithms
Introduction
Clustering is one of the important streams in data mining useful for discovering groups and identifying interesting distributions in the underlying data.
This project aims in analyzing and comparing the partition and hierarchical clustering algorithms namely DBSCAN and k-means (partition) with Agglomerative and CURE (hierarchical).
The comparison is done based on the extent to which each of these algorithms identify the clusters, their pros and cons and the timing that each algorithm takes to identify the clusters present in the dataset.
Among each clustering algorithm, computation time was measures as the size of data set increased. This was used to test the scalability of the algorithm and if it could be disintegrated and executed concurrently on several machines.
k-means is a partition clustering technique that helps to identify k clusters from a given set of n data points in d-dimensional space. It starts with k random centers and a single cluster, and refines it at each step arriving to k clusters. Currently, the time complexity for implementing k - means is O (I * k * d * n), where I is the number of iterations. If we could use the KD-Tree data structure in the implementation, it can further reduce the complexity to O (I * k * d * log (n)).
DBSCAN discovers clusters of arbitrary shape relying on a density based notion of clusters. Given eps as the input parameter, unlike k-means clustering, it tries to find out all possible clusters by classifying each point as core, border or noise.
DBSCAN can be expensive as computation of nearest neighbors requires computing all pair wise proximities. Additional implementation includes KD-Trees to store the data which would allow efficient retrieval of data and bring down the time complexity from O(m^2) to O(m log m).
Agglomerative Hierarchical Clustering is one of the non-parametric approaches to Clustering which is based on the measures of the dissimilarities among the current cluster set in each iteration. In general we will start with the points as individual clusters and at each step merge the closest pair of clusters by defining a notion of cluster proximity.
We will implement three algorithms, namely, Single-Linkage Clustering and Complete-Linkage Clustering. We will be analyzing the advantages and drawbacks of Agglomerative Hierarchical Clustering by comparing it with the other Algorithms CURE, DBSCAN and K-Means.
CURE clustering algorithm helps in attaining scalability for clustering in large databases without sacrificing quality of the generated clusters. The algorithm uses KD-Trees and Min Heaps for efficient data analysis and repetitive clustering. The random sampling, partitioning of clusters and two pass merging helps in scaling the algorithm for large datasets. Our implementation would provide a comparative study of CURE against other partitioning and hierarchical algorithm.
Observations regarding DBSCAN Issues
The following are our observations:
DBSCAN algorithm performs efficiently for low dimensional data.
The algorithm is robust towards outliers and noise points
Using KD Tree improves the efficiency over traditional DBSCAN algorithm
DBSCAN is highly sensitive to user parameters MinPts and Eps. Slight change in the values may produce different clustering results and prior knowledge about these values cannot be inferred that easily.
The dataset cannot be sampled as sampling would affect the density measures.
The Algorithm is not partitionable for multi-processor systems.
DBSCAN fails to identify clusters if density varies and if the dataset is too sparse.


3.       DEMOS Online Quiz

Introduction

DEMOS ONLINE QUIZ is Windows based web application for facilitating quizzes on any subject based on the data provided to the application. This will be a data driven application whose behavior is mostly controlled by the data provided to this application which makes the application very flexible and powerful.
The features are:
• The application will list, the available subjects of quizzes to the end user where the user can select and execute the Quiz.
• The selected Quiz will have its own characteristics such as total number of questions, marks for each correct answer.
• A new quiz can be added to the system by proving the Quiz data.

Types Of Users

• Administrator: Person who is granted access to database.
The functions of administrator are:
• Add or edit Subjects
• Add or edit Questions
• Check the status of the on-going quiz
• Adds new participants and keep their details
• Controls registration of participants
• Add new News about the site
• Keeps the Login History
• Participants : These are the users who participate in the quiz competition .Each user has a unique user name and password with which they can log on to the system. User selects the category of quiz to participate in.

Modules

DEMOS is mainly divided into four modules, namely
• User Management Module
• Question management module
• Quiz Execution Module
• Mark calculation module
User Management Module
The functions of this module are:
• Add new users to the user table.
• Authenticating users in the system.
We use user table for user authentication purpose and for storing user data.

Question Management Module

The functions of this module are:
• To add new subjects
• To delete the subject
• Add questions to each category of subject.
• Update questions
Here we use a single table for each subject .
Each subject has 10 questions and each question has 4 choices.

Quiz Execution Module

The functions of this module are:
• Quiz Selection
• Listing a single question and its choices at a time
• Verifying selected answer
• Displaying the mark
• Navigating to the next question

Mark calculation module

The functions of this module are:
• Calculation of marks for each of the participants.
• Toppers of each Subject are found
The marks are stored in Marks detail table.
The Toppers are stored in Subject Table

 

 

4.      Query Processing in Global Information Systems

Introduction

This paper demonstrates an application of Conceptual Graphs (CGs) in the area of software engineering. We employ CGs as a meta-representation language to enhance consistency checking within a multiperspective development environment, i.e. one which employs and utilises a number of ViewPoints. We have built a ViewPoint-based prototype called the √iewer+CG to show such application of CGs.
A ViewPoint is a loosely coupled, locally managed, self-contained object. It encapsulates representation knowledge, development knowledge, and specification knowledge of a problem domain. ViewPoints constitute partial specifications which can be independently constructed by a group of developers. Thus a complex and large-scale application can be decomposed into, and jointly managed as, a collection of ViewPoints.
Partitioning development tasks and specifications in this manner necessitates a consistency checking procedure to ensure that the ViewPoints can consistently work as an 'integrated' whole. The difficulties in constructing such procedure arise from the diversity of ViewPoint representation styles. We employ CGs to provide meta-representation of ViewPoints.
As CGs form a strong basis for logical reasoning, we are able to use the resulting concepts and relations from the metarepresentation to establish consistency checking rules within and across ViewPoints. By abstracting a ViewPoint specification up one level to CGs, we are able to augment a ViewPointsbased environment with an automated consistency checking procedure which is independent of ViewPoint representation styles.
ViewPoints, or generally written as viewpoints, are used to represent a scope of knowledge or interests of a system. The definition of viewpoints was initially employed to formalise requirement acquisition and elicitation (Mullery, 1979; Leite, 1989). In requirement engineering, viewpoints are seen as, for example, functions, sources and sinks of dataflows.
The word ViewPoint distinguishes this particular notion from other multiperspective approaches. The ViewPoints concept (Finkelstein, et al., 1992) emphasises the partition of perspectives corresponding to actors or roles in a development process. This notion of ViewPoints does not constraint its use only for requirement analysis. It can also be applied to specification analysis and design by partitioning both development tasks and specifications into ViewPoints.
A ViewPoint contains three different types of knowledge, i.e. representation, development and specification knowledge.
The style slot, which specifies the notations or representation styles for a ViewPoint. The notations are instantiated to produce the specification of the ViewPoint.
(2) The work plan slot, which defines the following development actions.
(2.1) Assembly actions, which are basic editing actions to construct the specification
(2.2) Check actions, which are actions for consistency checking of the specification. Check actions are divided into in-ViewPoint and inter-ViewPoint actions. In-ViewPoint actions are for checking consistency within the ViewPoint in which the actions are invoked. Inter- ViewPoint actions are for checking consistency of relations among ViewPoints.
(2.3) Guide actions, which provide guidance to developers. The actions suggest what kinds of actions to do in the circumstances. For example, inconsistency handling actions provide guidance for possible corrections when inconsistency is encountered in a specification.
(3) The domain slot, which is the area of concern, i.e. the problem domain, that the ViewPoint describes.
(4) The specification slot, which is the actual partial specification of the ViewPoint.
(5) The work record slot, which contains the development history, rationale and current development stage of the specification.
The realisation of the ViewPoints concept is developed as a prototype tool called the √iewer (Nuseibeh, 1994). In the √iewer, a problem is composed of a set of ViewPoints. A ViewPoint merely is a self-contained partial specification of the problem.


5.       A Conceptual Graph Approach to Support Multiperspective Development Environments
Introduction
This paper demonstrates an application of Conceptual Graphs (CGs) in the area of software engineering. We employ CGs as a meta-representation language to enhance consistency checking within a multiperspective development environment, i.e. one which employs and utilises a number of ViewPoints. We have built a ViewPoint-based prototype called the √iewer+CG to show such application of CGs. A ViewPoint is a loosely coupled, locally managed, self-contained object. It encapsulates representation knowledge, development knowledge, and specification knowledge of a problem domain. ViewPoints constitute partial specifications which can be independently constructed by a group of developers. Thus a complex and large-scale application can be decomposed into, and jointly managed as, a collection of ViewPoints.
Partitioning development tasks and specifications in this manner necessitates a consistency checking procedure to ensure that the ViewPoints can consistently work as an 'integrated' whole. The difficulties in constructing such procedure arise from the diversity of ViewPoint representation styles. We employ CGs to provide meta-representation of ViewPoints. As CGs form a strong basis for logical reasoning, we are able to use the resulting concepts and relations from the metarepresentation to establish consistency checking rules within and across ViewPoints. By abstracting a ViewPoint specification up one level to CGs, we are able to augment a ViewPointsbased environment with an automated consistency checking procedure which is independent of ViewPoint representation styles.
ViewPoints, or generally written as viewpoints, are used to represent a scope of knowledge or interests of a system. The definition of viewpoints was initially employed to formalise requirement acquisition and elicitation (Mullery, 1979; Leite, 1989). In requirement engineering, viewpoints are seen as, for example, functions, sources and sinks of dataflows. The word ViewPoint distinguishes this particular notion from other multiperspective approaches. The ViewPoints concept (Finkelstein, et al., 1992) emphasises the partition of perspectives corresponding to actors or roles in a development process. This notion of ViewPoints does not constraint its use only for requirement analysis. It can also be applied to specification analysis and design by partitioning both development tasks and specifications into ViewPoints. A ViewPoint contains three different types of knowledge, i.e. representation, development and specification knowledge.
The style slot, which specifies the notations or representation styles for a ViewPoint. The notations are instantiated to produce the specification of the ViewPoint.
(2) The work plan slot, which defines the following development actions.
(2.1) Assembly actions, which are basic editing actions to construct the specification
(2.2) Check actions, which are actions for consistency checking of the specification. Check actions are divided into in-ViewPoint and inter-ViewPoint actions. In-ViewPoint actions are for checking consistency within the ViewPoint in which the actions are invoked. Inter- ViewPoint actions are for checking consistency of relations among ViewPoints.
(2.3) Guide actions, which provide guidance to developers. The actions suggest what kinds of actions to do in the circumstances. For example, inconsistency handling actions provide guidance for possible corrections when inconsistency is encountered in a specification.
(3) The domain slot, which is the area of concern, i.e. the problem domain, that the ViewPoint describes.
(4) The specification slot, which is the actual partial specification of the ViewPoint.
(5) The work record slot, which contains the development history, rationale and current development stage of the specification.
The realisation of the ViewPoints concept is developed as a prototype tool called the √iewer (Nuseibeh, 1994). In the √iewer, a problem is composed of a set of ViewPoints. A ViewPoint merely is a self-contained partial specification of the problem.

6.      Congestion control in ATM-based Broadband ISDNs

Introduction

In this paper, a new congestion control technique for ATM networks is presented. The technique includes admission control, and traffic shaping. The network traffic consists of real-time traffic and data traffic. Call acceptance is based upon the effective bandwidth and data traffic flow is controlled by effective buffer. Effective bandwidth for a switching node is defined as a vector of bandwidth and an estimated maximum delay at the node. Effective buffer is defined as a scalar of buffer size. The proposed scheme is analyzed by simulation and the results are presented in comparison with other studies under similar traffic conditions.

Proposed Technique

The proposed congestion control technique features parameterized call acceptance. Available bandwidth and maximum node delay are two crucial parameters used for setting up connections. Bandwidth is pre-allocated for real-time traffic based on prescribed mean bit rates. Available buffers are the control parameter for admitting non-real-time cell transfers on a link-by-link basis. Details are shown below [4].
1. Two types of traffic are defined in the model: a) Real-time Traffic (RT): Cells of this type are delay-sensitive. They must be delivered to the destination within a predefined time frame. b) Data Traffic (DT): Cells of this type are delay-insensitive, but they are loss-sensitive. All cells must be delivered.
2. EB ( E ffective B andwidth) is the criterion used for call acceptance. There exists a separate EB for each type of traffic and for each node. EB is a two-element vector with the format of EB = (x, y).
The EB of a node is defined as follows:
EB i = (C AVAIL i , M i ) (1)
Where
EB i = the EB of node i
C AVAIL i = the available (unallocated) channel capacity at node i
M i = the maximum node delay at node i
Note: For simplicity, all definitions in this model are time-implicit. The time factor is syntactically omitted but intuitively understood. For example, EB i is short for EB i ( t ), denoting the EB of node i at time t (the time node i is inquired).
The EB of a RT traffic is defined as:
EB RT i,j = (B RT i , D RT i,j ) (2)
Where
EB RT i,j = the EB of the i th RT traffic at node j
B RT i = the prespecified mean bit rate of the i th RT traffic
D RT i,j = the allowable maximum node delay of the i th RT traffic at node j , and
D RT i,j = D RT i,pred(i,j) - M pred(i,j)
Where
pred(i,j) = the predecesor of the j th node of the i th traffic
The EB of a DT traffic is defined as:
EB DT i,j = (0 DT i , D + DT i,j ) (3)
Where
EB DT i,j = the EB of the i th DT traffic at node j
0 DT i = the prescribed mean bit rate of the i th RT traffic is zero (at the connection
setup time)
D + DT i,j = a quantity that is larger than the allowable maximum node delay for the
i th RT traffic at node j
EB 1 = ( x 1 , y 1 ) and EB 2 = ( x 2 , y 2 )
A RT connection request is granted only if its EB can be satisfied by all intermediate nodes on the route; i.e., RT i can be granted its connection request only if O(EB j , EB RT i,j ) = 1 is true for all j 's on the routes. A DT traffic is also connection-oriented. However, a DT connection request is always granted. From the EB definition for DT traffic (Definition 3) we know that acceptance is instantaneous. In this case, a route can be selected randomly by the entrance node. EF ( EF ective buffers) is the major criterion used to grant cell transfer requests for DT traffic from node to node. There exists a separate EF for each DT cell transfer request and for each node. EF is a scalar quantity.
The performance of the proposed congestion control technique is evaluated by using simulations. We assume the following for all our simulations: a) Channel capacity allocation is based on the prescribed mean arrival rate for each input source. b) RT traffic is shaped by employing a leaky bucket method [5] based on the channel capacity allocated. In our simulations, the leaking rate of a leaky bucket queue coincides with the service rate for that queue. c) Each DT input source is allocated a large buffer (a fat bucket policy) to accommodate sudden bursts of cells without risking any loss. d) The system is in equilibrium and running at full speed (all channel capacity allocated) when it is analyzed

7.      Secure Group Communication

Introduction

Peer to Peer (P2P) communication is emerging as technology having a high potential to provide scalable and flexible structure in communicating, sharing and collaborative applications etc. But to make it secure and more flexible we need a framework which provide key management along with admission control for peer into a group. Key management is important because we need a group key to encrypt all messages with it thus groups secrecy and confidentiality is maintained.
Also many group communications require a secure infrastructure that provides multiple levels of access privilege for group members. We describe how a policy language based framework, which supports group communication using role and attribute based access control can be designed.
We implemented a prototype chat application based on peer to peer framework, JXTA to demonstrate how a secure group layr which integrates authentication, admission control, authorization, fine-grained access control and key management can be created to achieve secure group communication.
The secure group communication abstraction provides both point-to-point and secure multipoint communication. This incremental and dynamic growth pattern is not well supported by a rigid server-client based structure. Thus, the natural alternative to a serverclient based model is to provide a reliable and secure group communication infrastructure to support a dynamic and scalable peer-to-peer model.
Applications like file sharing, online gaming, audio/video conferencing, virtual meeting and disscussion forums are example of systems which are organized as peer group. The group is governed by a set of rules that describe the conditions required to be part of a group. Security in such dynamic collaborative groups is governed by membership control, authentication, access control and key management.
This project deals with designing a framework which facilitates peer to peer communication along with admission and access control with security measures. Peer group framework provide flexible structure to communicate, sharing etc.
Collaborative applications need to support dynamic groups that can scale to large numbers of users. A peer-to-peer model inherently makes these applications easier to design and to operate for groups. Since there are no servers, groups can form ad hoc and there is no setup or scheduling with a centralized authority required.

Why peer to peer ?

An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. This is not case for of a client-server architecture with a fixed set of servers, in which adding more clients could mean slower data transfer for all users. Peer to peer groups have decentralized control thus they avoid single point failure.
Due to decentralized nature they can resist to intentional DoS (Denialof- Service) attacks. Server-client architecture can be in trouble if servers are down due to load caused by large number of requests at same time. When as large number of clients are connecting to same server, we need high performance machines at server end, thus is more costlier as compared to P2P architecture [4].
Peer groups provides us flexibility P2P architecture but we also require that framework be so that it is adaptable to dynamic number of peers and also does traffic load balancing.
So in P2P scenario each peer is communicating to the other but requirement is such that number of message exchanges should be minimum. Along with all these feature, for a secure group communication we will require that re-keying operation should be done when user joins or leaves in order to maintain forward and backward secrecy.

8.      Low Cost Wireless Internet

Introduction

This paper describes an innovative concept using tethered Aerostats as a platform for raising wireless communication payload, which overcomes the two main limitations of high towers listed above. Tethered aerostats are an outcome of Lighter-Than-Air Technology, where static lift production mechanism is based on the Archimedes Principle [1]. An aerostat does not require any additional energy to reach to a certain height.
For a given volume of envelope that contains the lighter than air gas, displaced weight of air creates a vertically upward buoyant force that leads to the lift. One or more Ballonets are provided inside the envelope to adjust the buoyancy.
The envelope volume is large enough to ensure that the displaced air should be able to produce sufficient lift, under the entire range of operating conditions, to balance all the weight groups of the aerostat system, viz., envelope, fin, nose battens, ballonets, pivot mechanism, payload, tether, recovery system, gas filling ports, and safety valves.
Aerostats are used all over the globe as a platform to house high-resolution sensors for applications such as aerial surveillance, regional atmospheric data collection and balloonbarrage system. Depending on the payload, range of surveillance, and operational time, these aerostats can be launched to any desired altitude from a few meters above ground level to as high as 5000 m above ground level. Of course, the payload carrying capacity of an aerostat is reduced as the operational height is increased.
Aerostats can easily be deployed at high altitudes, ensuring disturbance free LOS for the communications payload. Once they are deployed, there is very little recurring additional expenditure to keep them afloat, except in the form of small amounts of lighter-than-air gas, just to top-up for the leakages through the fabric over a period of time.
Due to its aerodynamic shape as well as provision of fins, an aerostat can remain fairly steady even in strong winds and hence can provide stable line of sight connectivity. An omni-directional antenna mounted below the aerostat, leads to a relaxation in the antenna direction alignment requirement.
802.11b [3] uses the ISM (Industrial Scientific Medical) band from 2.400 to 2.495GHz. Due to the ubiquity of equipment and unlicensed nature of the 2.4 GHz ISM band, our work is focused on building a network using 802.11b. It makes use of Direct Sequence Spread Spectrum (DSSS) modulation and has a maximum rate of 11 Mbps, with actual usable data speeds up to about 5 Mbps.
802.11b can be used in a point-to-multipoint configuration, wherein an access point communicates via an omni-directional antenna with one or more clients that are located in the neighborhood of the access point. Typical indoor range is 30 m (100 ft) at 11 Mbit/s and 90 m (300 ft) at 1 Mbit/s.
The overall bandwidth is dynamically shared across all the users on a channel depending on the individual demands. The protocol with few modifications can also be used to achieve a range of several kilometers by using high-gain directional antennas when line of sight connectivity is available in fixed point-to-point arrangements
Depending on the payload requirements, operating altitude, temperature variation and other atmospheric input parameters, the envelope volume is assumed at the start, using a thumb rule. The surface area and other parameters like weight of envelope, tether and the fins are then estimated. Once the weight breakup is obtained, the volume and hence mass of the ballonets are calculated.
Since the value of net lift available is known, the payload capacity of the aerostat can be estimated. The envelope volume is iteratively adjusted till the payload capacity of the aerostat matches the requirement specified by the user.

9.      Comparison & Simulation of Different Queuing Models

Introduction

Queuing Theory is a collection of mathematical models of various queuing systems. It is used extensively to analyze production and service processes exhibiting random variability in market demand (arrival times) and service times.
In queuing theory , a queuing model is used to approximate a real queuing situation or system, so the queuing behavior can be analyzed mathematically. Queuing models allow a number of useful steady state performance measures to be determined, including:
The Average number in the queue, or the system, the average time spent in the queue, or the system, the statistical distribution of those numbers or times, the probability the queue is full, or empty, and the probability of finding the system in a particular state.
These performance measures are important as issues or problems caused by queuing situations are related to customer dissatisfaction with service or may be the root cause of economic losses in a business. Analysis of the relevant queuing models allows the cause of queuing issues to be identified and the impact of proposed changes to be assessed.
Markovian queueing model :- If the arrival process is Poisson and the service time distributions are exponential for a queuing model then it is said to be a Markovian queuing model .

A Markov chain is a sequence of random variables X 1 , X 2 , X 3 , ... with the Markov property , namely that, given the present state, the future and past states are independent. Formally,
\Pr(X_{n+1}=x|X_1=x_1, X_2=x_2 \ldots, X_n=x_n) = \Pr(X_{n+1}=x|X_n=x_n).\,
Birth-death process :
The birth-death process is a special case of continuous-time Markov process where the states represent the current size of a population and where the transitions are limited to births and deaths. Birth-death processes have many applications in demography, queuing theory, performance engineering, or in biology. When a birth occurs, the process goes from state n to n+1. When a death occurs, the process goes from state n to state n-1. The process is specified by birth rates {? i } i=0.8 and death rates {µ i } i=1.8 .


Applications Of Queuing Theory

Queuing Theory has a wide range of applications, and this section is designed to give an illustration of some of these. It has been divided into 3 main sections, Traffic Flow , Scheduling and Facility Design and Employee Allocation . The given examples are certainly not the only applications where queuing theory can be put to good use, some other examples of areas that queuing theory is used are also given.

Traffic Flow

This is concerned with the flow of objects around a network, avoiding congestion and trying to maintain a steady flow, in all directions.
Queuing on roads
Queues at a motorway junction , and queuing in the rush hour

Scheduling

Computer scheduling

Facility Design and Employee Management

Queues in a bank
A Mail Sorting Office


10.  Employee Tracking System

Introduction

In today’s world, man struggles to make his life easier. The need for tracking has assumed high importance because of varied and diverse resources, then be it a product of a company being shipped from the company to consumer, be it the assets, and be it in the supply chain management or for that matter even the man-power. In large organizational buildings, where the man-power is high, people are not always in their cabins.
They have to wander from room to room, floor to floor to perform their work. In such cases, it becomes extremely difficult to keep a track of people and find them when they are needed.
Solution for the above problem is as further a tracking system which can track an individual when they enter a room would suffice the need. This process should take place in a hassle free manner and therefore a wireless system would be advantageous.
A receiver can be placed in each of the rooms in the building and connected to a computer system which can take input from the connected receiver and enter it in a database of all individuals or personnel in the building.
The receiver would receive input from a transmitter which would be given to all the people working in the building. Since all the information is logged in a database, any person in the building will be able to access this information through any computer connected to this system and come to know the location of the person he or she is seeking for.
The system architecture consists of simple format of Central system and peripheral system.
1.Peripheral systems: It includes nodes, desktops that accept information from the RFID readers which are mounted on the doors or at entry to any department.
2.Central systems: It includes server that handles all information of desktops. Server also controls time, attendance, log and manage database.
3. Front end consist of GUI for administrator that do tracking.
4. Back end consist of Database that maintaining log and database, Time and attendance of employee.

PROJECT MODULE:

A software system is always divided into several sub systems that makes iteasier for the development and testing. The different subsystems are knownas the modules and the process of dividing an entire system into subsystemsis known as modularization or decomposition.The different modules are:
1. Add New Employee: This operation is performed when newemployee needs to be added to the system, for e.g. when companyrecruits a new employees, their entry is inserted in the employeedatabase. This option has three choices:
2. Manage Log: When Employee passes from door his information is getretrieved in database and log of entire day will be stored in databasemeans it gives where employee has gone through departments.
3. Time And Attendance: This module keeps entry time of employeeinto company and maintains attendance of employee.
4. Tracking: This module is used to track particular employee and givesflow which is followed by employee throughout the day in thecompany.
5. Authentication Of Employee: When employee passes using RFIDTags through doors using RFID readers he must be authenticated byusing capturing image of employee. If any employee is doing proxy of any one it can be easily identified by administrator and followingaction must be taken on that employee.
6. Provide Interactive GUI: This gives user simple interactionthrough the system.
7. Administrator Login: It gives authentication for administrator for system.
8.REQUIREMENT ANALYSIS

Hardware Requirement Specification:

Processor –Pentium 4 processor with or above 2.4GHz.
Hard-disk –20 G.B. or above.
RAM -256 or more (recommended).
Display option – Monitor.
Input devices – Keyboard, mouse.
Web camera.RFID reader and tags.LAN connection cable.




11.  Empirical Model of HTTP Network Traffic

Introduction

The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies of IP networks will require a model of the traSJic putterns of the World Wide Web, in order to investigate the effects of this increasingly popular application.
We have developed an empirical model of network trafic produced by HTTI? Instead of relying on server or client logs, our approach is based on packet traces of HTTP conversations.
Through traffic analysis, we have determined statistics and distributions for higher-level quantities such as the size of HTTPJiles, the number ofjles per “Web page”, and user browsing behavior. These quantities form a model can then be used by simulations to mimic World Wide Web network applications.
Our model of HTTP traffic captures logically meaningful parameters of Web client behavior, such as file sizes and “think times”. The traffic traces described in the preceding section provide us with empirical probability distributions describing various components of this behavior. It is used these distributions to determine a synthetic workload.
At the lowest level, our model deals with individual HTTP transfers, each of which consists of a request-reply pair of messages, sent over a single TCP connection. We model both the request length and reply length of HTTP transfers. At first glance, it may seem more appropriate for a model of network traffic to deal with the number, size, and interarrival times of TCP segments. However, we note that 3
It is shown that it is appropriate to model the first HTTP transfer on a Web page separately from subsequent retrievals for that page. For simplicity, we have postponed discussion of this distinction. these quantities are governed by the TCP flow control and congestion control algorithms.
These algorithms depend in part on the latency and effective bandwidth on the path between the client and server. Since thi information cannot be known a priori, an accurate packet-level network simulation will depend on a simulation of the actual TCP algorithms. This is in fact the approach taken for other types of TCP bulk transfers in the traffic model described in [lo]. In a similar fashion, our model generates transfers which need to be run through TCP’s algorithms; it does not generate packet sizes and interarrivals by itself.
A Web document can consist of multiple files. A server and client may need to employ multiple HTTP transactions, each of which requires a separate TCP connection, to transfer a single document. For example, a document could consist of HTML text 131, which in turn could specify three images to be displayed “inline” in the body of the document. Such a document would require four TCP connections, each carrying one request and one reply
The next higher level above individual files is naturally the Web document, which we characterize in terms of the number offiles needed to represent a document. Between Web page retrievals, the user is generally considering her next action. We admit the difficulty of characterizing user behavior, due to its dependency on human factors beyond the scope of this study.
However, we can model user think time based on our observations. Assuming that users tend to access strings of documents from the same server, we characterize the locality of reference between different Web pages. We therefore define the consecutive document retrievals distribution as the number of consecutive pages that a user will retrieve from a single Web server before moving to a new one!
Finally, the server selection distribution defines the relative popularity of each Web server, in terms of how likely it is that a particular server will be accessed for a set of consecutive document retrievals.



12.  Crypto Acceleration Using Asynchronous FPGAs

Introduction

The goal of this project, sponsored by General Dynamics C4 Systems, is to evaluate proprietary FPGA technology developed by Achronix Semiconductor Corporation and its effectiveness using a 128-bit, one clock cycle multiplier in a finite field, GF(2 128 ), as a test application. The testing will determine if there is a significant increase in speed that can be achieved by simple modifications of existing synchronous HDL designs using three metrics: number of LUTs, number of registers, and clock speed
Throughout the course of this project, multiple software tools were used in order to facilitate simulation, version comparison and simplification processes to increase productivity. The most important of these tools are explained in further detail in this section.

Mentor Graphics QuestaSim


Questa is Mentor Graphics' Advanced Functional Verification (AFV) tool and is an integrated platform that includes QuestaSim. QuestaSim is capable of high efficiency advanced verification of large electronic systems, and includes built-in management and debugging utilities. QuestaSim, based upon Mentor Graphics' ModelSim, seen in Figure 1 , is a standards-based digital simulator capable of receiving VHDL or a variety of other languages' code as input and simulating results based on test bench waveforms.

QuestaSim displaying simulation results for a period of 400ns

QuestaSim boasts a variety of features in addition to its primary functionality, such as low-power design verification and fast time-to-debug using assertions and a multi-abstraction debug environment [11].

Synplicity Synplify and Synplify Pro

Synplify is synthesis engine that is used to create FPGA designs. It takes in VHDL or Verilog code and outputs a netlist which can be optimized for a variety of FPGA vendors and packages. Synplify uses Behavior Extracting Synthesis Technology® (B.E.S.T. T) to produce designs which are fast and highly efficient. Additionally, it is designed with a simple interface so that it is easy to use
Synplify Pro is similar in operation and use to that of Synplify, but offers better algorithms for compilation and mapping. In addition, it also improves the user interface (the Synplify Pro interface can be seen in Figure 3) and adds a great deal more options that may be used in design. This project uses both Synplify and Synplify Pro, the latter being used in situations concerning benchmarking due to the need of the auto constraining feature found within Synplify Pro.

Achronix CAD Environment (ACE)

The Achronix CAD Environment runs as a complementary tool to Synplicity's Synplify Pro software, seen in Figure 3 , and allows for enhanced optimization techniques using Achronix's proprietary technology to decrease routing delays. This results in an overall throughput increase of the system and allows for FPGAs to run some applications at speeds greater than 1GHz. ACE, which can be seen in Figure 4 , has been designed to be intentionally easy to use and while it functions on the premises of an asynchronous logic design, all input to the program is standard architecture, synchronous logic designs. This allows for current configurations to only require slight HDL modifications in order to benefit from the performance improvements ACE offers.
Altera's Quartus II software is a product of the Altera Corporation that provides a unified development design flow for FPGAs, structured ASICs, and CPLDs. Quartus II is capable of easily addressing problems relevant to designs such as post place-and-route design modifications. Compared to the Xilinx ISE, Quartus II provides higher benchmarks in performance with relevance to FPGA and CPLD designs. Quartus II also provides tools such as TimeQuest and PowerPlay that assist in timing analysis and power analysis, respectively, as well as a pin planner feature to be used in I/O pin assignment

13.  Ant Colony Optimization Technique For Manets

Introduction

The purpose of this project is to provide a clear understanting of the Ants-based algorithm, by giving a formal and comprehensive systematization of the subject. The simulation developed in Java will be a support of a deeper analysis of the factors of the algorithm, its potentialities and its limitations.
Swarm intelligence (SI) is a type of artificial intelligence based on the collective behavior of decentralized, self-organized systems. The expression was introduced by Gerardo Beni and Jing Wang in 1989, in the context of cellular robotic systems.
SI systems are typically made up of a population of simple agents or boids interacting locally with one another and with their environment. The agents follow very simple rules, and although there is no centraized control structure dictating how individual agents should behave, local, and to a certain degree random, interactions between such agents.

PARTICLE SWARM OPTIMISATION

Particle swarm optimization (PSO) is a swarm intelligence based algorithm to find a solution to an optimization problem in a search space, or model.

ANT COLONY OPTIMISATION

The ant colony optimization algorithm (ACO), is a probabilistic technique for solving computational problems which can be reduced to finding good paths through graphs. This algorithm is a member of ant colony algorithms family, in swarm intelligence methods,the first algorithm was aiming to search for an optimal path in a graph; based on the behavior of ants seeking a path between their colony and a source of food. The original idea has since diversified to solve a wider class of Numerical problems, and as a result, several problems have emerged, drawing on various aspects of the behavior of ants.

OBJECTIVES

§ Propose an easy approach to the Ant Colony Algorithm, with appropriated vocabulary and global explanation, as well as details about its behaviour.
§ Develop a Java application which shows the working of the algorithm and gives a better understanding.
§ Give a straightforward analysis of the state-of-the-art studies on Ants-based Routing
Algorithms and the implementations which have been done.

THE SOURCE OF INSPIRATION: THE ANTS

Ant as a single individual has a very limited effectiveness. But as a part of a well-organised colony, it becomes one powerful agent, working for the development of the colony. The ant lives for the colony and exists only as a part of it. Each ant is able to communicate, learn, cooperate, and all together they are capable of develop themselves and colonise a large area. They manage such great successes by increasing the number of individuals and being exceptionally well organised. The self organising principles they are using allow a highly coordinated behaviour of the colony. Pierre Paul Grassé, a French entomologist, was one of the first researchers who investigate the social behaviour of insects. He discoveredi that these insects are capable to react to what he called significant stimuli," signals that activate a genetically encoded reaction. He observed thatthe effects of these reactions can act as new significant stimuli for both the insect that produced them and for the other insects in the colony. Grassé used the term stigmergy to describe this particular type of indirect communication in which the workers are stimulated by the performance they have achieved
Stigmergy is defined as a method of indirect communication in a self-organizing emergent system where its individual parts communicate with one another by modifying their local environment. Ants communicate to one another by laying down pheromones along their trails, so where ants go within and around their ant colony is a stigmergic system In many ant species, ants walking from or to a food source, deposit on the ground a substance called pheromone. Other ants are able to smell this pheromone, and its presence influences the choice of their path, that is, they tend to follow strong pheromone concentrations. The pheromone deposited on the ground forms a pheromone trail, which allows the ants to find good sources of food that have been previously identified by other ants.


14.  Image Steganography

Introduction

The techniques for secret hiding of messages in an otherwise innocent looking carrier message belong to the field of steganography. The purpose of steganography is to conceal the very presence of secret information. To make the communication more secure, the secret information can be compressed and encrypted before it is hidden in the carrier. This is important because in this way we minimize the amount of information that is to be sent, and it is also easier to hide a random looking message into the carrier than to hide a message with a high degree of regularity. Encrypting the compressed message before hiding is recommended and provides double protection

Image steganography

As stated earlier, images are the most popular cover objects used for steganography. In the domain of digital images many different image file formats exist, most of them for specific applications. For these different image file formats, different steganographic algorithms exist.

Image definition

To a computer, an image is a collection of numbers that constitute different light intensities in different areas of the image . This numeric representation forms a grid and the individual points are referred to as pixels. Most images on the Internet consists of a rectangular map of the image's pixels (represented as bits) where each pixel is located and its colour . These pixels are displayed horizontally row by row.
The number of bits in a colour scheme, called the bit depth, refers to the number of bits used for each pixel . The smallest bit depth in current colour schemes is 8, meaning that there are 8 bits used to describe the colour of each pixel . Monochrome and greyscale images use 8 bits for each pixel and are able to display 256 different colours or shades of grey. Digital colour images are typically stored in 24-bit files and use the RGB colour model, also known as true colour . All colour variations for the pixels of a 24-bit image are derived from three primary colours: red, green and blue, and each primary colour is represented by 8 bits . Thus in one given pixel, there can be 256 different quantities of red, green and blue, adding up to more than 16-million combinations, resulting in more than 16-million colours . Not surprisingly the larger amount of colours that can be displayed, the larger the file size
The development of the software involves a series of production activities where opportunities of human feasibility are enormous. Errors may begin to occur at the very inception of the process where the objectives maybe erroneously or imperfectly specified as well as in later design and development stages because of the human inability to perform and communicate with perfection.
A test case is simply a test with formal steps and instructions. They are valuable because they are repeatable, reproducible under the same environments, and easy to improve upon with feedback. A test case is the difference between saying that something seems to be working ok and proving that a set of specific tasks are known to be working correctly.
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and testing.
Once the source code has been generated, the software must be tested to uncover as many errors as possible before delivery to the customer .Software testing is critical element of software quality assurance and represents the ultimate review of specification design and code generation.

Testing Principles

• All test should be traceable to customer requirements
• Test should be planned large before testing
• Testing should begin in the small and progress towards in the large.
• Testing is the major quality measure employed during the software engineering development. Its basic function is to detect error in the software. Testing is necessary for the proper functioning of the system.

Testing Objectives

• Testing is a process of executing a program with the intention of finding an error .
• A good test case is one that has a high probability of finding an error as yet discovered.
A successful test is one that uncovers an as yet undiscovered error.

15.  J3ME and Bluetooth Enabled Mobile Based Full Duplex Automation System
Introduction
WT12 is a next-generation, class 2, Bluetooth® 2.0+EDR (Enhanced Data Rates) module. It introduces three times faster data rates compared to existing Bluetooth® 1.2 modules even with lower power consumption! WT12 is a highly integrated and sophisticated Bluetooth® module, containing all the necessary elements from Bluetooth® radio to antenna and a fully implemented protocol stack. Therefore WT12 provides an ideal solution for developers who want to integrate Bluetooth® wireless technology into their design with limited knowledge of Bluetooth® and RF technologies.
By default WT12 module is equipped with powerful and easy-to-use iWRAP firmware. iWRAP enables users to access Bluetooth® functionality with simple ASCII commands delivered to the module over serial interface - it's just like a Bluetooth® modem.
FEATURES:
• Fully Qualified Bluetooth system v2.0 + EDR, CE and FCC
• Integrated chip antenna
• Industrial temperature range from -40 o C to +85 o C
• Enhanced Data Rate (EDR) compliant with v2.0.E.2 of specification for both 2Mbps and 3Mbps modulation modes
• RoHS Compliant
• Full Speed Bluetooth Operation with Full Piconet
• Scatternet Support
• USB version 2.0 compatible
• UART with bypass mode
• Support for 802.11 Coexistence
• 8Mbits of Flash Memory
Liquid Crystal Display:


LCDs have become very popular over recent years for information display in many 'smart' appliances. They are usually controlled by microcontrollers. They make complicated equipment easier to operate.
LCDs come in many shapes and sizes but the most common is the 16 character x 2 line display. It requiresonly 11 connections - eight bits for data (which can be reduced to four if necessary) and three control lines. It runs off a 5V DC supply and only needs about 1mA of current. The display contrast can be varied by changing the voltage into pin 3 of the display, usually with a trimpot. To get the display working requires eight bits of data, a register select line (RS) and a strobe line (E). These are supplied from the microcontroller port .
The 89C51 microcontroller
The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash programmable and erasable read only memory (PEROM). The device is manufactured using Atmel's high-density nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applications.
Relay Driver & Relays:
The relay driver is used to select one of eight different relays which ca be used to activate or deactivate the required device. A Led for each relay is provided to indicate that status of the relay. According to the signals from the microcontroller the respective relays are act6ivated or deactivated.
Software Description:
For the microcontroller we will be using the Keil C51 Compiler. The Keil C51 Cross Compiler is an ANSI C Compiler that is written specifically to generate fast, compact code for the 8051 microcontroller family. The C51 Compiler generates object code that matches the efficiency and speed of assembly programming. The software for the mobile handset will be developed using Java language. The Software will have a display on mobile handset as shown in schematic.


16.  Collaboration Server

Introduction

This is a cooperative project requiring the combined efforts of everyone in the class. Participants will be assigned roles in the project, and grades will be based on:
• how well each of your carries out your assigned role, as measured by products you generate.
• quality of the final product.
• conduct of a series of specification, design, and test reviews leading up to the final product qualification test
An Architectural description is provided on the next page, along with additional notes and comments. Also included are job descriptions for each of the roles to be assigned.

Purpose of the :

The goal of the Collaboration Server System (CSERV) is to support conduct of shared work activities of software development teams, which may be separated in both space and time. The primary function of CSERV is to support project management activities, rather than project products. That is, the goal of CSERV is to manage people, tasks, and information about software development projects that are registered with it.
The Collaboration Server will support multiple projects, and provide role-based and team-based access to information about each project. The intent is that most project information is viewable by everyone with a Collaboration Server account, but the ability to modify a stored item is, by default, awarded only to the responsible individual for that item. Any project administrator may override that default, and an item's responsible individual may grant permission to modify it to other project members.
The CSERV provides a set of tools for working with a common set of project data for: technical collaboration, documentation, disclosure, scheduling, notification, and monitoring progress against schedule. Since all tools share the same information, they work together to provide a diverse, but consistent view of a project's management information. A change in project data made by one tool is immediately visible by any other tool that accesses the same information.
The main functions provided by the Collaboration Server are:
• Record and disclose project team structures and staffing
• Organization chart with contact, job description, and biography information for each project member attached
• Announcements of new additions and changes of responsibility
• Support development, recording, disclosure, and assignment of work packages to teams and people.
• Work packages define specific activities, start and completion dates, and responsible individuals (RIs).
• Each package provides links to issues statements and completed work.
• Each package has an associated list of zero or more action items with responsible individuals and creation dates. Usually, the responsible individual will be the package RI, but additional people may be assigned co-responsibility for action completion.
• Completed action items have resolution statement and date.
• Provide scheduling support for each project, team, and individual.
• Work schedules, e.g., start, duration, and completion of each work package
• Alerts for scheduled reviews and collaboration events
• Specialized schedules for reviews, deliveries, and meetings.
• Support daily communication between teams.
•  and team whiteboards
•  and team Wikis
• Notification service

• Document management:

• Web-based document management system
• All documentation is available via webpages, except for correspondence with customers
•  Progress Monitor:
• Evaluate and display progress of work package completion versus schedule for any registered project
• Evaluate and display a set of progress metrics for each team
• i. List of task completions with completion time relative to scheduled completion, in percent of project time ahead of schedule (+) or behind schedule (-).
• ii. Reviews assigned/completed
• iii. Tests assigned/completed
• iv. Documents assigned/completed

• Browsing Service:

• Supports the role-based examination of all data stored on the Collaboration Server.
• Distributed Clients:
• CSERV Clients provide access to the CSERV server information.
• Each Client supports local project communication tools, e.g., whiteboard, access to Wikis, notification client, and support for digital meetings.
• Communication System based on message-passing through sockets and web services:
• Supports client/Collaboration Server communication and Client/Client communication.
• Supports notifications.
• Data Management:
• Supports storage of all shared data, as described above, on the Collaboration Server.
• The unit of storage is an item, and every item has one, and only one, responsible individual.
Start and completion dates are associated with each work package. The schedule accesses this information for editing and display. Documentation includes specifications, design documents, code (production, test, and prototypes), schedules, and all other project planning documents. Specifications, design documents, and code are usually held in a repository, but the tools to create specifications and design documents as web pages are provided by CServ. Also, CServ provides the tool or tools to create webpage representations of code.

17.  Web based Applications for Insurance Services

Introduction

Insurance is a contract for payment of a sum of money to the person assured on the happening of the event insured against. Usually the contract provides for the payment of an amount on the date of maturity or at specified dates at periodic intervals or at unfortunate death, if it occurs earlier.
Among other things, the contract also provides for the payment of premium periodically to the Corporation by the assured. Insurance is universally acknowledged to be an institution which eliminates `risk', substituting certainty for uncertainty and comes to the timely aid of the family in the unfortunate event of death of the breadwinner.
This software provides five types of Insurance services, which includes Life Insurance, medical Insurance, Motor Insurance. Home Insurance, Travel Insurance.
Presently this project follows Internet mode i.e. the details can be viewed and updated by the officials of the company.
Online Insurance Service has the following features:-
1). A User can view the details of various policies and schemes offered by the Insurance Company.

2).New Users can register with the site so that he can get information online.

3).An existing policyholder can view his policy details and calculate the premium.

4).The web site provides information about the new strategies and subsidiary schemes of the company.

5).Provides loan facility for policyholders and online payments.
This software is developed in ASP.Net using C# as front end and MS SQL server 2000 as backend on Windows 2000 platform.

18.  Virtual Class Rooms

Introduction

Exam management is a sophisticated tool used for conducting exams in the project VIRTUAL CLASS ROOM. So before giving a description about the Exam management software, it is necessary to have a detailed concept of the main project VIRTUAL CLASS ROOM.
VIRTUAL CLASS ROOM is a modern educational concept, which is purely virtual in nature.Virtual classroom makes uses of the JAVA Internet technologies such as serviettes, AFC and swim. JavaScript; socket programming, and JDBC with ORACLE as back end. The Virtual class room concept binds together the Educational experts and the Students all over the world, who are online, into a classroom, which is purely virtual in nature.
The experts and the students who are learning from them may be living at different Geographical zones. But a feeling is sustained that everybody is together with in a hand reach. The figure given below illustrates this concept.
In the virtual classroom concept, students from all over the world can participate in the courses offered by registering themselves with the website. Anybody who satisfies [he prerequisites can join the courses offered, irrespective of the caste, creed. religion, age or skin colour. Everybody is at par in the virtual classroom.
All these .functionalities are made possible with the JAVA technologies.
A student can logic by providing ids and password. After the successful logic, he/she can watch the lessons that are taken by the experts online, can ask questions, or doubts online by using the multiclient chat provided. Students can chat with each other using the chat application.
White board technology is used in tile virtual classroom, so e\ cry user, who is online, will get a similar whiteboard on their computer screens. So the expert on makes whatever changes his whiteboard will reflect on the screens of tile students who are online, so the student-teacher interaction retains the same feeling oh a real world-class room..
The experts from all over the world design. Coerces. Coerce contents earl be modified or new cources can be designed by the experts easily at his by using the sophisticated coerce management, module- management, topic management interfaces. Virtual classroom retains all the characteristics of a real world classroom such as various types of examinations, assignments, grading etc..
A student must quality all file examinations lie appears. The teaching faculty regularly evaluates student performance. A student will receive his report cards through bulletins,e-mails,reporting systems etc.. Messaging systems such as email,bulletins,notice boards,reporting,chatroom etc. are available. Virtual Classroom project comprises of nineteen modules. All these modules, with their corresponding screen shots.

19.  Audio Manager

Introduction

An Mp3 is an audio file format which is encoded from an Audio CD or other audio formats like wav, ram etc... Mp3 is the most popular format for music in the present world. Nowadays Mp3 players are available making Mp3's the best form of audio.
These Mp3 files are of different quality which is decided by the bit-rate of the file. Greater the bit-rate bigger the size of the file. These Mp3's have a great advantage of being able to store the various information about the audio file, namely the artist, album , year etc.. This is achieved with the help of a tag.
The basic idea of this project is to create a software which can store the contents of our Mp3 CD's in a catalog based form so that if we have 'n' number of CD's it will be easy for us to manage the CD's. This helps us to create a catalog of our disk collection.
By using such catalog, we can easily find all necessary files and folders without the need to insert disks into the drive. We can also Sort files, folders, disks and categories by attributes, names, locations, creation date, artist, album etc. The duplicate files will be notified by the software. We can update file, folder, and disk information at any time.

20.  Electronic Mail Server

Introduction

The 'electronic mail server' has been developed to simplify and enhance inter personnel communication in an intra-organizational setup. This follows a client-server approach where the website works on the server and the user form the client.
The client requests the server for services and the server responds by transferring required information to the user.The site is going to be operated by the Internet users and administered by the organizational administrator who will be server based.
The administrator will have the privilege to limit the number of users that can register as members. He can limit the number of mail a particular user can store for him self. The administrator can also restore vital information in case of a serious breakdown.
The user will operate from the client side by accessing the provisions provided by the website. This can be done irrespective of the geographical location.
However, an internet connection with its entire infrastructure is a must. The provisions include, getting registered as a member in the official website, composing and sending e-mail to his counterparts thus sharing official information and official status on a particular aspect.
Also is included the option of deleting unwanted messages from ones mailbox and the facility to modify/change personal information provided in the website like ones password, telephone number etc.

21.  SUDOKU

Introduction

The main aim of the project is providing security to the PC. The project develops a system, which prompts the user to enter a password during the booting process itself. The user in cannot skip this process anyway once the software is installed.
Only by entering the correct password we can enter to the next screen or else the system reboots. This prevents any illegal entries into the system. Any changes in the system can be brought only when the correct password is entered. Then we can go to the setup and change the password and encryption key if we require.
Thus the system which have Windows98 as it's operating system is completely protected by the user by a password which he has entered during the setup of the software and no user of the system can skip this password checking. This confirms that the system is not being hacked and this is the main objective of the software.
The project "SUDOKU" game on student based PC provide flexibility and also to have abroader outlook a guest mode is to be implemented for infrequent or temporary accessories of the host's computer Since it is a student based version only a limited number access the PC.So we limit the number of users .The project consists sample numbers in the correct position and the player have to fill the remaining numbers in the correct order to win the game.The other features mentioned in sample,about statements.
So the "SUDOKU" game is more easy as the ultimate aim should be developed.
The project is object oriented one.So the primary requirement is the use of store and manipulate the numbers. In order to satisy the infrequent users a guest mode is required with limited but necessary facilities.
The most important requirement is that the software developed should be user friendly and unreachable.

22.  Bluetooth Home Automation

Introduction

Currently, automation of housing is developing in many directions at once. Consumers are incorporating automation to increase security, safety, convenience, access to information, energy management and other functions with great speed. The development of sophisticated integrated systems however, is not proceeding at the same pace as market penetration of key products like security systems.
It is clear that consumers are interested in specific benefits rather than features. They purchase one or more “gateway” device to achieve those benefits. The challenge for the industry is to learn how to educate the consumer about system integration and to insure that all the various sub-systems being installed in homes can eventually be tied together into one system and controlled by the consumer simply and easily.

ADVANTAGES

There are many benefits to home automation -
The first is greater comfort and convenience.
A second is improved safety and security.
A third is a high level of control over operating costs (e.g., energy conservation).

23.  Chat Server

Introduction

The package "CHAT SERVER" using JAVA and MS ACCESS aims at developing a new chat server that could be easy for users and which could teach a new user how to involve in fluent chat and get well equipped with Chat server.The main goal of our package is communication. It allows all the registered users to establish good relations with all types of people involved in the internet.
The users can develop their communication skills. It also helps in gathering information's about different peoples. It also helps in understanding the culture of different peoples involved in the Internet
The other attraction of our site is that you could easily change the look and appearance of the site according to the users taste. This package is not restricted to any one any one who has registered as a valid user could access this package and it is absolutely free. Even though the site is very much secured after fulfilling the security criteria one would find it very interesting and easy.
The entire package is developed by JDK 1.3.1, JAVA SWINGS, SOCKETS and MICROSOFT ACCESS for Database users The whole package works in WINDOWS 98 or any platform using client server technology.

Overview of Projects

The project titled "CHAT SERVER" deals with mail communication with peoples involved in the internet searching the site and chatting.The main aim of the project has been to develop web enabled model software to computerize the life style of peoples. our site named "CHAT SERVER" generates environment for communication.
Usually it is a long boring task of waiting in front of the computer searching for users who have entered the server.
Our program Eliminates this It is also seen that certain systems get disconnected from the internet so often, this is also deleted from our site.Moreover we had developed the site keeping in mind of this package getting used by users of any level.
It could be a Computer engineer or a small boy or even one who has freshly learned Internet.By this site it is possible fro the users to communicate with other side of the world. user can make appointment with some professionals, persons and so on. Through the searching option we can search for different matters.

24.  Virtual Shopping

Introduction

This is a an e-commerce online shopping web application which helps you to do the major part of online shopping by using this site and can be managed by online, You (or the Customer) can do the all major transaction in a secured way. Here the customer will feel a virtual shopping by adding the selected product to his cart in addition to that, he can also do bulk addition into the cart before purchasing.
To ensure the authentication of the customer, He/She must have to register before proceeding. This is well secured with Session State management. It provides standard features of e-commerce like:
Register (for new users)
Login (Existing users)
View Products by product category
Select products and add them to cart.
Update the product quantities in the cart
View cart contents
Checkout the cart contents for order processing
Edit user profile such as address, contact information and password

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET



25.  BLUETOOTH HOTSPOT

Introduction

Wifi hotspots are very common now days. Laptops and PDAs use these hotspots to access the internet as these devices have Wifi facility built into it. But mobile phones do not have Wifi facility in them. Nokia is releasing some models with Wifi, but still those models are costly. But lower end models also come with Bluetooth now. So its a better idea to create a Bluetooth hotspot where Bluetooth mobiles can access the internet.
With this technology mobile phones need not have a GPRS connection or even a SIM card in it to access the internet. This project has two parts. A client application and a server application. The server application runs in a normal PC with Bluetooth dongle.
This PC acts as the gateway to the internet for the mobile. The mobile will host the client application which will connect to the server application in a hotspot environment and provide the mobile with internet access.

OVERVIEW

Here we are using Bluetooth enabled Smart phone supporting windows application .This Smart phone incorporates a device discoverer which lists all the nearby Bluetooth enabled devices, out of which we can select any of the device to which the key depression data is to be transmitted.
At the client side with the help of a newly defined protocol we generate the text message to be sent the application program in this side converts the text message to the corresponding ASCII codes. The ASCII codes are given to the Bluetooth of the mobile which converts into the Bluetooth frequency signal.
The ASCII code from the client side to the server side is transmitted by means of Bluetooth .At the server side we implement Bluetooth on system by means of a device called a Dongle, which is inserted to a USB port.
This dongle contains a firmware (embedded software) which accepts the Bluetooth signal send to the system. And converts this signal to the USB data format. Through the universal serial bus (USB) which is accepted by the firmware of the dongle is passed to the system.
In this system we generate application software which gets data from USB port as input. In application software we implement a Parser which works according to the defined protocol and parses the incoming data and identify the corresponding command function of the ASCII code received. This application software executes the command in order to perform the specific operation.

26.  Threshold-Multisignature in Distributed System

Introduction

Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold (t) or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature.
The main objective of this paper is to propose such a secure and efficient threshold-multisignature scheme. The paper uniquely defines the fundamental properties of threshold multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject.
The efficiency of the proposed scheme is analyzed and shown to be superior to its counterparts. The paper also proposes a discrete logarithm based distributed-key management infrastructure (DKMI), which consists of a round optimal, publicly verifiable, distributed-key generation (DKG) protocol and a one round, publicly verifiable, distributed-key redistribution/ updating (DKRU) protocol.
The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first round, thus avoiding multiple protocol executions.

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 512 MB
Hard Disk : 40GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : J2SE (network,IO,Swings, Util,crypto)


27.    Trackerz

 

Introduction

Trackerz is a B2B is the term which informs us about the business. This concept is build related to business activities. The main criteria of the project is to build a web portal for transactions like online shopping ,tenders, auctions ,classifieds, Admin controls this web portal and users access through unique id,through the id user can select the product and purchase by entering the details of the transaction. In short we can say that it is a B2B portal.
Business-to-business ( B2B ) is a term commonly used to describe commerce transactions between businesses, as opposed to those between businesses and other groups, such as business-to-consumers (B2C) or business-to-government (B2G). More specifically, B2B is often used to describe an activity, such as B2B marketing, or B2B sales, that occurs between businesses and other businesses.
The volume of B2B transactions is much higher than the volume of B2C transactions. The primary reason for this is that in a typical supply chain there will be many B2B transactions involving subcomponent or raw materials, and only one B2C transaction, specifically sale of the finished product to the end customer.
For example, an automobile manufacturer makes several B2B transactions such as buying tires, glass for windshields, and rubber hoses for its vehicles. The final transaction, a finished vehicle sold to the consumer, is a single (B2C) transaction

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET
Webserver : Apache Tomcat 5x
GUI Tools : HTML/JavaScript

28.  UA Portal

Introduction

UA Portal acts as online community management system for a Club, Association, and Corporation, Nonprofit or any other company or organization. It combines several online applications into one easy to use package. This portal involves event list, classifieds, news and discussions.
This application uses the data stored in the central database on the server. It can use MS-Access, MYSQL, etc to store the database. Database can be installed virtually on web server in the organization.
Portal uses four security levels. Security level 0, security level 1, security level 2, security level 3.By default all users fall under security level 0 with limited permissions. It allows users only to view portal areas. Administrator will assign the security levels and permissions.

Portal Settings:

Configurable Portal Settings
Approvals of User Submissions
Email to Club Members
Member Export to Excel
Fully customizable look and feel via HTML templates and Cascading
Style Sheets
Full compatibility with all web bro wsers.

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET

29.  Survey Logics

Introduction

Surveys may be used as part of dispute resolution, or to solicit opinions before making significant changes or decisions. They can be useful in developing consensus when community opinion is not immediately obvious in normal discussion. For example, a survey may bring in opinions from people who agree with one position ,who doesn't agree and we can plan our stratagies according customer voice.
The results of a survey are not binding, and may be subject to interpretation. A survey may sometimes be called a poll, and it may involve voting for different options, but it is not the same thing as an election.
Opinion surveys should be used to determine whether a consensus exists, not to decide which side "wins". Successful surveys and polls can never generate consensus, they can only show an existing consensus, if any.
Using a survey may be useful because some people who disagree will nevertheless recognize and accept the consensus opinion of the community.All the these things we can do it with the help of this simple tool called Survey
Survery Tool helps us in collecting opinions or voice of the people about an issue through online instead of manually taking the feedback or manually conducting an opinion polls. This reduces the waste of time to request the people and get them participate in this poll by manually coming and disturbing their works. And it is a tedious process to calculate and get the final result of the poll also can get the immediate access to your realtime results. You can restrict the access to results.
This Tool allows us to manage the survey questions and the type of type of to answers in a user-friendly manner. We can edit the change of surveys content, their background colors and fonts efficiently on fly using this tool. We can also copy, delete the questions which are in the survey flexibly.

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET

30.  Mingle Box

Introduction

Mingle Box is a marketplace where people who need custom software developed can find coders in a safe and business-friendly environment. Buyers can pick from a pool of registered coders...enabling them to hire a coder across the country or across the globe from the comfort of their computers.
Coders and buyers both can be benefited from this Bidding. Buyers who wish to hire internationally, can take advantage of favorable overseas exchange rates, resulting in work being done for 50-90% less than if the project were done in-country.
Coders are also given access to a huge pool of potential work and have the ability to work independently from their homes rather than for a company

Features of the project:

The proposed web application serves the following range of ads.
• Registration of Coders
• Registration of Buyers
• Adding projects for bidding
• Conduct online bidding
• Selecting coders through bidding
• Payments for the completed work by buyers to coders.

Modules:

The application comprises the following major modules.
• Administration
• Coders
• Buyers

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET



31.  Telephone Billing System

Introduction

The purpose of the pro ject is to present the requirement of the Computerization of Telephone Billing System. The project thus calculates the t elephone bills automatically. It does almost every work which is related to automatic telephone billing connection system via- new connection , customer record modific ation, viewing custo mer records & all works related to rate of bills, meter readings in addition to bill calculation and bill generation.
Telephone Billing System is developed as per seeing the increasing requirement to speed up t he work and incorporate a new work culture. Thus a new software has been proposed to reduce manual work, improving work efficiency, saving time and to provide greater flexibility and user-friendliness as the system previously followed was totally manual one w ith lots of errors.

OBJECTIVE OF THE PROJECT

The main objective while implement ing the project Telephone Billing System were to minimize the work and at the same time increase the speed of the work done. This new system is built with the following objective:
1) Information retrieval will beco me easy.
2) Maintenance of database as we ll as overall project will become easy.
3) Security measure will be adopted, by maintaining the login of username and the password.
4) Data redundancy will be great ly reduced because t his new system is buil t using V isual Basic 6.0 as front-end. It entails looking into duplication of efforts , bottlenecks and inefficient existing procedures
System analysis is the performance management and documentation of activities related to the four life cycle phases of any software namely:
‡ The Study Phase
‡ The Design Phase
‡ The Development Phase
‡ The Operators Phase System analysis is a vast field of study through which system analyst puts his thoughts and searches for the solution of problem. He has to get a clear idea of what he has in hand and what he has to prod uce. He has to extract the essence o f expectations.
He has to satisfy the user in the very possible way. System analysis needs and should include the following steps o f study: Å¡ Study of current methods, the basic inputs available a nd output desired.
The splitting of a variable inputs into (.dbf) files so as to reduce redundancy and increase consistency.
Give the idea of key field (if any) .
Ideas regarding code generation. Software Analysis starts with a preliminary analysis and later switches on to a detailed one. During the preliminary analysis the Analyst takes a quick look at what is needed and whether the cost benefits.
Detailed analysis studies in depth all the cornered factors, which builds and strengthens the software. A system study is a step-by-step process used to identify and then developed the software needed to control the processing of specific applicat ion. System study is also known as SDLC (Software Development Life Cycle)


32.  Vehicle Management System

Introduction

Vehicle Management System is software which is helpful for bus operators, who wants to operate many bus trips in a day. Vehicle Management System is a windows application written for 32-bit Windows operating systems which focused in the area of adding, editing and deleting the passengers, staff and the bus routes.
In this software a person can be register as a user and he can manage the bus routes and the staff, passengers' details. He can add a bus and its details including bus route details. User can also add the details of the staff and their duty time in the system.
There are mainly 5 modules in this software
Bus Management
Route Management
Employee Management
Passenger Management
In Bus module a user can add a new bus details to the database. He can set the details of the route and the timing also. Bus details like the type, engine number, seating capacity and the route in which the bus is going to be operated are added. Whenever the user wants to modify these details he can update new values through this software.
Route Management module deals with the route management of the bus. A user can add the route and if he wants he can change it or delete that route.
The main advantage is that this module is helpful for the agents to get details of the route and the details of the bus which have trip to that route. He can also get the information of the number of seats available in a particular day.
Employee details of any bus can add to the database and this is helpful to the bus operators in the case of the salary and bates for the employee. An operator can add the personal details and if we want to edit or delete he can done modification using the Vehicle Management System.
This is very helpful for the passenger also; if they have any complaint against staff he can approach the operator and easily identify the employee. Details of every passenger are stored in the system. A user can add a passenger only one time and if he came again operator can identify that person. Operator can add, edit and delete the details of the passenger.
The proposed system is very useful for the operators and passengers. This avoids the overheads for the operators. They can minimize the working stress and can keep essential documents related to the bus and the passengers as a softcopy. The advantage of the proposed system is the reduction in the cost of the office equipments and the transaction is done quickly. Any operator can answer if any seats for a particular route in a particular day are available or not.

Our proposed system has several advantages

• User friendly interface
• Fast access to database
• Less error
• More Storage Capacity
• Search facility
• Look and Feel Environment
• Quick transaction


33.   Universal Web Based File Coordinator

Introduction

Universal Web Based File Manager provides an easy user interface and online administration which will allow you to manage users/permissions without the need of server configuration knowledge.
This system is designed to allow developers to access their web server files over the internet. The application supports multiple users with user level permissions on directories, uploads, creation and editing of files and folders. There are also permissions based off file extensions. The application is also has a text file editor and text file viewer.

• Features of the project:

The proposed web application has to following features.
• Users can access web servers files over the internet
• Supports multiple users
• File/Folder accessibility is based on permissions provided to the users.
• File extension based permissions can also be given
• Users can upload and download files from web server via internet.
• The application has a text file viewer which enables view text based file content.
• User creation and security are managed by the administrator.

• Modules:

The application comprises the following major modules.
• User module
• Administrator module

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET


34.   Value card - Smart card based Loyalty

Introduction

Universal Web Based File Manager provides an easy user interface and online administration which will allow you to manage users/permissions without the need of server configuration knowledge.
This system is designed to allow developers to access their web server files over the internet. The application supports multiple users with user level permissions on directories, uploads, creation and editing of files and folders. There are also permissions based off file extensions. The application is also has a text file editor and text file viewer.

• Features of the project:

The proposed web application has to following features.
• Users can access web servers files over the internet
• Supports multiple users
• File/Folder accessibility is based on permissions provided to the users.
• File extension based permissions can also be given
• Users can upload and download files from web server via internet.
• The application has a text file viewer which enables view text based file content.
• User creation and security are managed by the administrator.

• Modules:

The application comprises the following major modules.
• User module
• Administrator module

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET


35.   Web Enabled Interactive, Dynamic And Authenticated Work Order System

Introduction

The basic interaction of the customer to the vendor is through the Internet. So Internet plays the major role in the e-commerce. Generally in a big organization assigning a work to a Solves this problem.
This WORK ORDER SYSTEM solves this problem effectively. This is an Internet based application, which will be useful for the big organization that wants to complete his work can place this in the official site of the company.
The administrator of the company will view the orders placed by the Customer. He will then analysis the customers order and chooses an appropriate worker for that customer.
The worker of the company should have to register his presence daily by logging daily into the site. Once he has logged in, he will come to know about his work to done. After the end of the day the worker is requested to update the status of his work.
Following is the list of possible challenges
• Identification of the Authorized customer:
As this site based interaction many customers may see the site but only authorized person can place the order. So finding the authorized customer is the foremost problem.
• Identifying the free worker:
The administration has the rights to allocate the work to the worker. So finding the free worker is the key problem work can be allocated based on the time and efficiency.
• Assigning work to the worker:
The worker should not be free so that whenever he finished his work immediate message will be sent to the administrator so that he can submit another work.
• Managing Web-site Structure Information:
The structure of the web site is important information. With the continuous changes in creating and maintaining electronic documents.

Hard ware Specification :

Processor : Intel P- III based system
Processor Speed : 250 MHz to 833MHz
RAM : 64MB to 256MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Language : JDK 1.5 (JSP, JDBC, Servlets)
Database : SQL Serve, Oracle-10g
Operating System : WindowsNT/95/98/2000
Webserver : Apache Tomcat 5x
GUI Tools : HTML/JavaScript


36.   Student Attendance Management System

Introduction

Attendance Management System is software developed for daily student attendance inschools, colleges and institutes. If facilitates to access the attendance information of aparticular student in a particular class. The information is sorted by the operators, whichwill be provided by the teacher for a particular class. This system will also help inevaluating attendance eligibility criteria of a student.

Purpose & Scope:-

The intention of developing Attendance Management System is to computerized thetradition way of taking attendance. Another purpose for developing this software is togenerate the desired reports automatically at the end of the session or in the betweenof the session as they require.
This project is basically a desktop application which means self contained software runson the system on which it has been installed under the user control and it will work for aparticular institute or college only.

PROPOSED SYSTEM

This Application is built for automating the processing of attendance. It also enhances the speed of the performing attendance task easily. It also generates periodic reports to keep a check on the students who are regular & who are not.
A Faculty has to login to the system & then in the attendance option they have to select appropriate class, semester and subject. So this will display the list of the students who are eligible to appear in this session. So now the faculty has to just select the students name from the manual attendance sheet according to their roll number and then submit the sheet. This will add the selected students as present student in that particular session.
This system is very useful to the office staff also because they can generate various types of reports and submit them to respective faculties also or also can be submitted to the College Coordinator. Office staff can also generate black list of students who have attendance less than 50% or 80%. So this kind of various reports can be generated

ADVANTAGES OF THE PROPOSED SYSTEM

A Computer can work more efficiently then compared to a hu man being . The work becomes easy for the employees and thus, some amount of human resources is saved . Data accuracy is maintained . Accurate information can be achieved within a short span of time Data can be accessed easily and randomly . This also saves a lot of time. Data is protected with the help of login system. Because of this login system, unauthorized persons cannot access the data .Comple x ity of the work can be reduced by using the system which was not possible in manual or semi-automated system. So it saves the time utmost.

REQUIREMENT SPECIFICATIONS

A ccording to the requirements the sys tem should minimum generate following kinds of reports. List of report is give below
? Semester wise A ttendance
? Daily A ttendance
? Attendance for e x tra class
? Subject wise attendance
? L eave reports o A pproved o Not approved o Medical leaves
? Black listed below 50%
? Black listed below 75%

37.   Training & Placement Cell Management

Introduction

Development of distributed scalable web enabled application, for "Training and Placement officer of a college to evaluate and handover the list of candidates of third year and final year for short listing them on the basis of criterion specified conditions by companies.
Description:
This application provides automated system for on-line recording of academic details of students for third and final year for all semesters of students. The TPO office shall verify the records by actual documents.
Once verified records of students are made available to TPO he/she can supply short listed candidates as per declared cut of marks as well as some other criterion desired by companies coming for conducting campus drive. The list of short listed can be sent to companies using system generated email.

Benefits:

• Reduce the paperwork and storage area.
• Improve the output of operators.
• Improve accuracy in result.
• Allow easy navigation through CV's and company information.
• Manage the man and machine resources efficiently.
• It has user friendly interface having quick authenticated access to documents.
• Easily scalable to grow with changing system requirement.
• Secured check in, check out & updates.
. Locate CV's easily by various parameters

Functions:

Creation of student input records about academic career from 10 th , 12 th and all semester with facilities to modify the records and viewing changed records with full security.
Creation of Finally checked and verified records state by TPO level users. Once approved and verified by TPO, records can not be modified by any student, without getting modification permission from TPO.
Interface for generating the terms ad condition for campus selection criterion for a particular year. Provision has to be taken for specifying the new set of conditions for separate campus drive.
Building search interface for eligible candidates for a company's particular campus (for specified conditions) for 3 rd year student, 4 th year student and both type of student.
Short listed candidate for a particular campus needs to be stored.
Sending email to company for complete list of shortlisted candidates for particular campus.
Indication of hall ticket issued to candidates


38.   Trade Service Engine

Introduction

An organization/company will have a number of products and services they may offer to their customers. Depending on the type of business or service offered the customers may have several doubts/complaints/problems. The "Online Business Service Engine" helps to accomplish this task of solving and clarifying the customers' queries. This product facilitates the user to submit online complaints independent of the system
The "Business Service Engine" can be used by a business organization to provide online support to its customers. This may include questions about their services or even complaints the customers may have. Although a manual system can be done, time plays an important role in customer satisfaction.
A customer always expects services to be offered as soon as possible and the organization is responsible for making sure its customers stay satisfied. As most organizations are going, or are already online, the "Online Business Service Engine" will prove an added advantage to them in this internet world.

 

 

Objectives of the

The manual submission of complaints and customer servicing has been the most tedious part of the business. The time delay for a response and accuracy of complaint solving plays as vital role for customer servicing.
This scenarios and objectives play the mandatory development of application to serve the customer with customer service satisfaction. This System will allow the business process to run efficiently and will be used to assist or satisfy the customer by giving a brief solution for their complaint within a minimum time. The Customer receives the solution within a day online.
The customers may arise with many problems which cannot be solved at the same time with full support by the business. The main aim of the business is the Customer satisfaction. This system helps the customers to give their problems online whenever the customer needs, without any constraints implied on them. This system helps the customers to briefly explain their complaint without any hesitation.
Through this system the customers are assisted with some predefined complaints and immediate solutions which save the precious time of the customers. The customers receive the solutions for their complaint within a day and the customer can also view the status of the complaint at any time using the complaint no. Through this system the customers receive a brief solution for their complaint.

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET
39.   Online Bus Reservation

Introduction

This is Online Bus Reservation package to manage B uses, Routes, Services, Passengers & avail a degree of comfort to both Organization & Passenger. Today the leading Bus Travel companies are using these Packages to have a ease of mentality with their work.

Features:

The project keep track of following modules:
Avail Online Reservation
Rootmaps
Availability of seats
Fares
Services
Payment

Development:

This project is coded under c # .net environment in «\A S P.NETProj\Online_reservation
DATABASE: The finance management system handles MS - Access database called«\ Finance\App_Data\ bus.mdb
.This database contains four tables with following structures:
1. Source
2.Destination
3.Arrival Time
4.Departure Time
5. Fare

40.   Implementation Of a Mini Search Engine

Introduction

In this project, we will design and implement a mini search engine that is used to search through a collection of documents. The data structures used are files for storing, has h tab les for indexing and trees for searching the documents.
The documents will be stored using files and given a set of texts and a query, the search engine will locate all the documents that contain the keywords in that query. The purpose of this project is to provide an overview of how a search engine works and to gain hands-on experience in using hash tables, files and trees.

Indexing 

The documents stored as files will be indexed based on their words/tokens using hashing functions. This is done in order to make it easier to retrieve the required documents.

Searching 

Searching will be done using trees, and depend in g upon the efficiency and complexity of the algorithm we will use AVL trees or balanced binary search trees. In order to allow efficient searching, for every word a list of documents where it will occur will be stored. The queries may contain simple Boolean operators, that is AND/OR, which act in a similar manner with the well-known analogous logical operators. For each such query, the document that satisfies that query will be displayed.

For instance, a query:

Keyword1 AND Keyword2 -- should retrieve all documents that contain both these keywords (elements).
Keyword1 OR Keyword2 -- instead will retrieve documents that contain either one of the two keywords







41.  Implementation of Security in WAN

Introduction

Internet is a network of networks that consists of millions of private, public, academic, business,and government networks of local to global scope that are linked by a broad array of electronic and optical networking technologies.
The Internet carries a vast array of information resources and services. Different Network elements such as routers, switches, hubs etc.. has been interconnected together for commincation of data over the transmission media.
The routers are connecting the WAN interefaces through the serial ports for data transmission and forwarding the packets using routing tables where as switches and hubs are connecting the LAN.
Static routing tables and dynamic routing protocols tell the routers where to forward IP traffic .These routers mainly route the data traffic between networks without any filterattion.
The job of traffic filtering is best performed by Access Control Lists. Access list filters the traffic by restricting the packets are to be forwarded or to be blocked at the router’s interfaces. Router examine each packet and forward or discard the packet based on the information available in the access control list. Restriction of the traffic can be either source I.P. address, Destination I.P. address, port numbers also
Finally, in the reports trinees has to give different commands on the router on various routing techniques and accesslists to get the require results for connection establishment and troubleshooting of WAN interefaces and LAN networks.


42.  Securable Network in Three-Party Protocols

Introduction

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two mediator protocols, one with implicit user authentication and the other with explicit mutual authentication, are proposed to demonstrate the merits of the new combination, which include the following:
1) security against such attacks as man-in-the-middle, eavesdropping and replay,
2) efficiency is improved as the proposed protocols contain the fewest number of communication rounds among existing QKDPs, and
3) two parties can share and use a long-term secret (repeatedly). To prove the security of the proposed schemes, this work also presents a new primitive called the Unbiased-Chosen Basis (UCB) assumption.

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 512 MB
Hard Disk : 40GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : J2SE (network,IO,Swings, Util,crypto)

43.  Web Mining

Introduction

Web Mining plays an important role in the e-commerce era. Web mining is the integration of web traffic with other traditional business data like sales automaton system, inventory management, accounting, customer profile database, and e-commerce databases to enable the discovery of business co-relations and trends.
The system basically deals with web configuration on over network, the web divides various domains for hosting and supporting n-number of web against virus, spam and hackers, web manager have to analyze visualization structure of webs for manipulating access details and graph structure for sorting process, when data transfer over network it has to privilege data by encoding and it has to Proactive management support that continually monitors and automatically improves the network topology and configuration in real time based on route efficiency and end-user performance, ensuring the fastest and most reliable network connections.
Following is the list of possible challenges

Identification of the origin of the visitor is required:

To get the more out of the click stream data it is required to characterize the web site visitors, based on their demographics. The customers are to be identified by the IP address of the connection from which he is accessing the web site.

Calculation of the Dwell time for a content page:

The time spent by the visitor on a particular page provides a good measure showing the interests of the visitor.

Identification of an User Session:

A visitor can be characterized by studying his browsing behavior in a session, which is a collection of web-based transactions related by time.

Managing Web-site Structure Information:

The structure of the web site is important information. With the continuous changes in creating and maintaining electronic documents.

This system describes Trace graph it's a data presentation system for Network Simulator on over internet Trace graph system provides many options for analysis, has capabilities to calculate many parameters characterizing network simulation .
The simulator leaves lot of statistical data as the output of a particular simulation of various domains and domain functionalities. Using this data that particular network can be analyzed for its performance. This analysis may include the capturing of Information from the simulator and drawing the graphs, according to this network performance the domain can be configured in a SEO system for providing better search results to end users
Hosting Layer : This module describes about web server hosting into the web of various end users, this hosting mechanism describes about the system hosting functionalities according to the various servers with respective memory usage
Access Mode : the basic functionalities about this module to provide accessing permission for various web servers to support at global system where server will registered by various domain levels
Control panel layer : this layer creates control structure of a system for managing various functionalities of a system such as like controlling the domains and sub domains and user access structure
Performance Layer : this layer is monitor performance about web servers in the web against various users accessibility here this layer manipulates how system supports to multiple end users while serving to the users
Network Analyzer mode : this mode monitors various network assessors in between various network layer standards which describes how data is transferring on over net with respective actions
Visualization Manager : this module supports network trace graph for visualizing the performance factors by understanding the various network services which shows a performance graph about various servers
Report manager : This module is all about various MIS reports of web servers and web traffics and user accessing etc


44.   Security System For DNS Using Cryptography

Introduction

The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through different stages of development up to the currently used Domain Name System (DNS).
The DNS Security is designed to provide security by combining the concept of both the Digital Signature and Asymmetric key (Public key) Cryptography. Here the Public key is send instead of Private key.
The DNS security uses Message Digest Algorithm to compress the Message(text file) and PRNG(Pseudo Random Number Generator) Algorithm for generating Public and Private key. The message combines with the Private key to form a Signature using DSA Algorithm, which is send along with the Public key.
The receiver uses the Public key and DSA Algorithm to form a Signature. If this Signature matches with the Signature of the message received, the message is Decrypted and read else discarded.

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 512 MB
Hard Disk : 40GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : J2SE (network,IO,Swings, Util,crypto)


45.   Student Information System

Introduction

The Student Information System is a secure, confidential collection of data about students attending early college high schools throughout the United States. The SIS provides information and analyses to guide the development and improvement of early college high schools. It also provides evidence on how well early college high schools are achieving their mission: to help young people progress toward the education and experience they need to succeed in life and a family-supporting career.
Jobs for the Future coordinates the SIS and analyzes school and student outcomes and trends. JFF is a non-profit organization with overall responsibility for coordinating the Early College High School Initiative nationwide.
EDsmart, a leader in data systems for school districts, and Policy Studies Associates provide support for the development of the SIS, including the engagement of local school districts and higher education institutions in the effort.

What information is in the SIS?

The SIS includes information about each student’s academic achievement in early college high school, prior academic achievement going back to at least the eighth grade, and college attainment after graduation from early college.
School districts supply information on:
• Demographics (e.g., race, age, gender, free/reduced lunch)
• Standardized test scores (including two to four years before enrolling in early college high school)
• Student attendance and persistence
• Rates of attendance
• Courses taken and grades (including two to four years before enrolling in early college high school)
• SAT/PSAT and ACT scores
• Date high school diploma awarded
Colleges and universities supply information on:
• College placement test results
• College courses taken and grades in those classes, including pass/fail
• Degrees or credentials awarded to early college high school students
• Grade Point Average
• Results on college placement exams
In addition, through the National Student Clearinghouse, the SIS will follow the progress of former early college high school students as they pursue postsecondary credentials following graduation from early college.

46.   Generic SQL Explorer

Introduction

Any SQL Explorer is a common editor from where more than one database types can be accessed, queried. It's basically a windows application targeted for e learning domain and software industry.
Presently in the market, we have single database explorers through which one can access/query a particular database engine for each of which we need a dedicated database explorer. Using Any SQL Explorer one can access any database provided with the database credentials.
Any SQL Explorer is a powerful, yet easy-to-use graphical tool for all database developers. It allows you to connect any ODBC complaint databases present in the local machine or anywhere within the network, such as Oracle, DB2, SQL Server, etc. and edit SQL scripts and queries with syntax highlighting


Software Requirements:

• Development:
Microsoft. Net framework 2.0.
Microsoft visual studio 2005.
Windows 2000 service pack4 or higher versions.
Two different databases (Oracle, SQL server 2005) for testing.
Microsoft C# 2.0 programming language.
SQL server express.



47.   E-Mail Campaign System

Introduction

This is for a franchise world that will be sending all GUEST e-mails, where the Guest's will be participating in the e-mail campaign and filling in after we create this tool.
Once the Guest receives an e-mail from the franchise and would interested to take part in the e-mail campaign, our tool needs to be active and enable the participant with an online questionnaire where in the participant could respond his answers in a successive flow.
The participant should have the options to go back to the previous questions and can be allowed to answers the successive questions once answering the following questions.
This required creating another system, where we can present a thanks note to the guest who participated in the Online Survey organized by there respective Franchise so that it gives a nice impression for the Guest and us too. In addition to that, we can also represent a request note along with the thanks note saying, if they are planning to host a party in future then the Franchise can help them organize it for them.

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET

48.   Log Reader Based Code Analyzer

Introduction

Our project deals with developing some tools, which help in enhancing the activities at different stages in the software development life cycle (SDLC). Our tools will fall under the category of CASE tools which enable sophistication during the software development.
We aim at developing two tools, (a) Code Analyzer ( jBrowser ) and (b) Log Reader. The jBrowser would be a tool that would help the user track control flow between java classes via method calls.
Given a starting point, this tool tracks the entire path within a particular location spotting various method calls under different scenarios. We aim at building this tool as an effective tool to understand the control flow while reengineering and reverse engineering and as a testing tool which would identify the broken links between the java classes

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
Clock Speed : 700 MHZ
RAM : 128 MB
Monitor : 14" SVGA Digital Color Monitor
Keyboard : 107 Keys Keyboard
Floppy Drive : 1.44MB
Compact Disk Drive : 700MB
Hard Disk : 20GB
Printer : Canon BJC 2100 SP
Mouse : Logitech Mouse

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : Java Swings, JDBC, Servlets

49.   XML Enabled Wrapper Construction

Introduction

The amount of useful semi-structured data on the web continues to grow at a stunning pace. Often interesting web data are not in database systems but in HTML pages, XML pages, or text les. Data in these formats is not directly usable by standard SQL-like query processing engines that support sophisticated querying and reporting beyond keyword-based retrieval. Hence, the web users or applications need a smart way of extracting data from these web sources.
One of the popular approaches is to write wrappers around the sources, either manually or with software assistance, to bring the web data within the reach of more sophisticated query tools and general mediator-based information integration systems.
In this paper, we describe the methodology and the software development of an XML-enabled wrapper construction system - XWRAP for semi-automatic generation of wrapper programs.
By XML-enabled we mean that the metadata about information content that are implicit in the original web pages will be extracted and encoded explicitly as XML tags in the wrapped documents. In addition, the query-based content ltering process is performed against the XML documents. The XWRAP wrapper generation framework has three distinct features.
First, it explicitly separates tasks of building wrappers that are specic to a Web source from the tasks that are repetitive for any source, and uses a component library to provide basic building blocks for wrapper programs.
Second, it provides inductive learning algorithms that derive or discover wrapper patterns by reasoning about sample pages or sample specications.
Third and most importantly, we introduce and develop a two- phase code generation framework.
The first phase utilizes an interactive interface facility to encode the source-specic metadata knowledge identied by individual wrapper developers as declarative information extraction rules. The second phase combines the information extraction rules generated at the rst phase with the XWRAP component library to contruct an executable wrapper program for the given web source.
The two-phase code generation approach exhibits a number of advantages over existing approaches. First, it provides a user-friendly interface program to allow users to generate their information extraction rules with a few mouse clicks. Second, it provides a clean separation of the information extraction semantics from the generation of procedural wrapper programs (e.g., Java code).
Such separation allows new extraction rules to be incorporated into a wrapper program incrementally. Third, it facilitates the use of the micro-feedback approach to revisit and tune the wrapper programs at run time. We report the performance of XWRAP and our experiments by demonstrating the benet of building wrappers for a number of Web sources in di
erent domains using the XWRAP generation system.

Architecture

The architecture of XWRAP for data wrapping consists of four components - Syntactical Structure Normalization, Information Extraction, Code Generation, Program Testing and Packaging. Figure 1 illustrates how the wrapper generation process would work in the context of data wrapping scenario.
Syntactical Structure Normalization is the rst component and also called Syntactical Normalizer, which prepares and sets up the environment for information extraction process by performing the following three tasks. First, the syntactical normalize accepts an URL selected and entered by the XWRAP user, issues an HTTP request to the remote server identified by the given URL, and fetches the corresponding web document (or so called page object).
This page object is used as a sample for XWRAP to interact with the user to learn and derive the important information extraction rules. Second, it cleans up bad HTML tags and syntactical erros.
Third, it transforms the retrieved page object into a parse tree or so-called syntactic token tree. Information Extraction is the second component, which is responsible for deriving extraction rules that use declarative speciation to describe how to extract information content of interest from its HTML formatting. XWRAP performs the information extraction task in three steps -
(1) identifying interesting regions in the retrieved document,
(2) identifying the important semantic tokens and their logical paths and node positions in the parse tree, and
(3) identifying the useful hierarchical structures of the retrieved document. Each step results in a set of extraction rules specified in declarative languages.
Code Generation is the third component, which generates the wrapper program code through applying the three sets of information extraction rules produced in the second step.

50.   Digital Diary

Introduction

We have developed Digital Diary application to makes ease the work of users by this computerised software. By this application a user can store contact details, retrieve contact details, set reminder for important meetings of works and make dead line notes on single platform.
Thus the user can manage his contacts and daily working schedules through this application. This application avoids user to make manual contact diaries to store the contact address. A user who is working on system can set reminder for the important work while doing some another work. Reminde r will remind him about that work.
He can also set reminder message which will tell him what to do at which time by s tealing his attention. Through dead line note book a user can set the start date, start date message, end date and end date message for any project.
This will remind him about a project that he had started on which date and when to submit that project. On the whole this application will make a user punctual. The dead line note book will show current date dead line notes through red colour as a warning. So, this application is convenient platform for a user to manage, contacts, daily work schedules and to enhance the punctuality of the user.
This the product which can used as only for personal use. User uses it in their laptop and desktops. It isshort and precise application.

The Overall Description

It includes general factors that affect the product design and implementation in Digital Diary requirementsand necessary features. Digital Diary requirements and specifications will be the main factor determiningthe design of the components since this is a single user product.

Interfaces

All component interfaces will be GUI interfaces.Logical Characteristics:
(1) View Status

(a) View list of contact persons at once or differently(b) Can display all the upcoming appointments through reminders(c) Can display all the start and end dates of the projects to be accomplished
(2) Change Status

(a) Options for changing a person¶s information(b) Interface is easy to find person in list(c) Options to edit reminder- time, date, message and date, message for the coming projects.


51.   Intruder Detection System Over Abnormal Internet Sequence

Introduction

This paper reports the design principles and evaluation results of a new experimental hybrid invasion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based invasion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks.
By mining anomalous traffic sequences from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected.
HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate invasion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/ Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively.
This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting invasions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection sequences.

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 512 MB
Hard Disk : 40GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : Java Swings, JDBC, Servlets

52.   Digital System Architecture

Introduction

Develop a Verilog based UART (Universal Asynchronous Receiver and Transmitter), and demonstrate its working (as both transmitter and receiver) by interfacing it to Microsoft Windows HyperTerminal.
UART is a device that has the capability to both receive and transmit serial data. UART exchanges text data in an American Standard Code for Information Interchange (ASCII) format in which each alphabetical character is encoded by 7 bits and transmitted as 8 data bits.
For transmission the UART protocol wraps this 8 bit subword with a start bit in the least significant bit (LSB) and a stop bit in the most significant bit (MSB) resulting in a 10 bit word format.
UART transmitter controls transmission by fetching a data word in parallel format and directing the UART to transmit it in a serial format. Likewise, the Receiver must detect transmission, receive the data in serial format, strip of the start and stop bits, and store the data word in a parallel format.
Since the UART is asynchronous in working, the receiver does not know when the data will come, so receiver generate local clock in order to synchronize to transmitter whenever start bit is received. Asynchronous transmission allows data to be transmitted without the sender having to send a clock signal to the receiver.
The transmitter and receiver agree on timing parameters in advance and special bits are added to each word which is used to synchronize the sending and receiving units.
When a word is given to the UART for Asynchronous transmission, a bit called the “Start Bit” is added to the beginning of each word that is to be transmitted. The Star Bit is used to alert the receiver that a word of data is about to be sent, and to force the clock in the receiver into synchronization with the clock in the transmitter. After the Start Bit, the individual bits of the word of data are sent, with the Least Significant Bit (LSB) being sent first.
Each bit in the transmission is transmitted for exactly the same amount of time as all of the other bits, and the receiver “looks” at the wire at approximately halfway through the period assigned to each bit to determine if the bit is a 1 or a 0. For example, if it takes two seconds to send each bit, the receiver will examine the signal to determine if it is a 1 or a 0 after one second has passed, then it will wait two seconds and then examine the value of the next bit, and so on.
Then at least one Stop Bit is sent by the transmitter. Because asynchronous data is “self synchronous”, if there is no data to transmit, the transmission line can be idle.

53.   ER Diagram Maker

Introduction

The aim of the project was exhaustive and exploratory study of Computer Graphics under C. The programming uses the basic graphics functions and techniques. Though not as sophisticated as the same, it nevertheless provides all the basic requirements expected out of a graphics. It can be further improved upon to provide better facilities and user interface
In computer graphics, pictures or graphics objects are presented as a collection of discrete picture elements pixels. The pixel is the smallest addressable screen element. It is the smallest piece of the display screen, which we can control.
The control is achieved by setting the intensity and color of the pixel, which compose the screen. Each pixel on the graphics display does not represent mathematical point. Rather, it represents a region which theoretically contain an infinite number of points.
Computer graphics can be used in the following areas

User Interface

Interactive plotting in business science and technology.
Office automation and electronic publishing.
Computer aided drafting and design.
• Simulation and animation for scientific visualization and entertainment.
• Art and Commerce
• Process control and Crystallography
For drawing any graphics on the screen header file GRAPHICS.H and library file GRAPHICS.LIB are needed. The header file contains definitions and explanation of all the graphics functions and constants, whereas the graphics and functions are kept in graphics library file.
Before carrying out any drawing activity the first thing required is to switch over to graphics mode. This is done depending on the adapter and monitor installed on the computer.

54.   Early Congestion Indication

Introduction

Service prioritization among different traffic classes is an important goal for the Internet. Conventional approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide "better-than-best-effort" service.
We explore the opposite approach, and devise a new distributed algorithm to realize a low-priority service (as compared to the existing best effort)from the network endpoints. To this end, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilize only the excess network bandwidth as compared to the "fair share" of bandwidth as targeted by TCP.
The key mechanisms unique to TCP-LP congestion control are the use of one-way packet delays for early congestion indications and a TCP-transparent congestion avoidance policy. The results of our simulation and Internet experiments show that:
1) TCP-LP is largely non-intrusive to TCP traffic.
2) Both single and aggregate TCP-LP flows are able to successfully utilize excess network bandwidth; moreover, multiple TCP-LP flows share excess bandwidth fairly
3) Substantial amounts of excess bandwidth are available to the low-priority class, even in the presence of "greedy" TCP flows
4) Despite their low-priority nature, TCP-LP flows are able to utilize significant amounts of available bandwidth in a wide-area network environment

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

• Processor: Intel Pentium III Processor
• Random Access Memory: 128MB
• Hard Disk: 20GB
• Processor Speed: 300 min

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : Java Swings, JDBC, Servlets

55.  SMTP Mail Server

Introduction

The "SMTP MAIL SERVER" deals with identifying multiple users with in the same login and enabling them to send and receive mails. The current environment requires a login for each user to handle all mails related information. But more than one user can't use the same login and personalized security on mail transmission and reception.
Hence it becomes necessary to have a login for every user to communicate with each other by sending and receiving mails that are currently available in the default UNIX environment. A utility that will allow multiple clients to login under the same login name and have personalized mail information e developed.

Features of the project:

• Registration of mail ID's
• Address List maintenance
• Mail management

Modules:

Current application is differentiated into the following modules which are closely integrated to each other.
• User administration.
• Mail organization.
• Message composition.
• Message Address list
• Message Deletion

Hard ware Specification :

Processor : Intel P-VI based system
Processor Speed : 250 MHz to 833MHz
RAM : 512MB to 1024 MB
Hard Disk : 2GB to 30GB
Key Board : 104 keys

Software Specification:

Software : Visual Studio .Net 2005
Language : C# .Net
Database : SQL Serve-2005, Oracle-9i
Operating System : Windows 2000,XP,2003
Web Technologies : HTML, Java Script, ASP.NET


56.  Support Vector Machines For Face Recognition

Introduction

Neural networks have been applied extensively in computer vision and pattern recognition. Support vector machines have been recently proposed as new kinds of feed-forward networks for pattern recognition .Intutively , given a set of points belonging to two classes , a SVM finds the hyperplane that separates the largest possible fraction of points of the same class on the same side , while maximizing the distance from either class to hyperplane.
This hyperplane is called optimal separating hyperplane which minimizes the risk of misclassifying not only the examples in training set , but also the unseen examples of the test set .The SVM is essentially developed to solve two class problem.
The application of SVMs to computer vision problem have been proposed recently . SVM is trained for face detection where the discrimination is between two classes : face and nonface , each with thousand of examples .
It is difficult to discriminate or recognize different persons by there faces because of similarity of the faces . In this project , we focus on the face recognition problem , and show that the discrimination function learned by SVMs can give much higher recognition than the poular standard eigenface approach or other approach .
After the features are extracted , the discrimination functions between each pair are learned by SVMs . Then the disjoint test set enters the system for recognition . We will construct a binary tree structure to recognize the testing samples .
We will develop a multi-class recognition strategy for the use of conventional bipartite SVMs to solve the face recognition problem .

Objective :

• Efficiently applying SVM to the n-class problem of face recognition
• Figuring out training and/or image preprocessing strategies
• Comapring how SVMs compare to other techniques

SOFTWARE AND TOOLS / TRAINING DATA :

• Thorsten's SVM Light
• Java Netbeans
• Visual Studio
• Image datasets for training and testing

57.  Inventory Management System

Introduction

There are many items in a departmental store, which are sold to customer and purchased from supplier. An order is placed by the customer-required details, which are listed below:
�� Item name
�� Quantity
�� Delivery time
The order processing executes, look up the stock of each item is available or not then order fulfilled by the management of departmental store. The system periodically checks the stock of each item if it is found below the reorder level then purchase order placed to the supplier for that item, if the supplier is not able to supply whole order then rest of quantity supplied by the another supplier.
After fulfilled the formalities, bill generated by the system and sent to the customer. Item details maintained by the management this whole process is being done manually. The work area is to automate the above process or to generate a more efficient system.

ITEM DETAIL TABLE

It contains information about item like item name, minimum quantity in stock, maximum quantity, and reorder status etc.

A. Item code: - It represents the code to identify an item. It helps to search the item in the stock according to requirement.

B. Item name: - This field shows the name of item.

C. Minimum quantity in stock: - This field helps to know the min-qty in stock.
D. Max quantity: - This field shows max quantity in stock.

E. Reorder status: - This field shows reorder status when quantity goes below to minimum quantity in stock

Purchase order table

This table contains the information about the purchase order like vender code, order code, supplier name, supplier address, order date, item code, item name, quantity, deliver time etc.
Vender code: - This field determine the code of vender.

Order code :-It determines the code of the order that has been ordered by the customer.

Supplier address: - This field helps to know the address of the supplier.

Order date: - This field shows the date of the order.

Item code: - It determines the code of the item.

Item name: - It contains the name of the item.

Quantity: - It specifies the quantity of the order.

Delivery time: - It shows the time of the deliver

58.  Creepy Crawler System

Introduction

For many years, bug-tracking mechanism is employed only in some of the large software development houses. Most of the others never bothered with bug tracking at all, and instead simply relied on shared lists and email to monitor the status of defects. This procedure is error-prone and tends to cause those bugs judged least significant by developers to be dropped or ignored.
Creepy crawler System is an ideal solution to track the bugs of a product, solution or an application. Bug Tracking System allows individual or groups of developers to keep track of outstanding bugs in their product effectively. This can also be called as Defect Tracking System. The creepy crawler System can dramatically increase the productivity and accountability of individual employees by providing a documented workflow and positive feedback for good performance.

Some salient features are .

Product and Component based
Creating & Changing Bugs at ease
Query Bug List to any depth
Reporting & Charting in more comprehensive way
User Accounts to control the access and maintain security

Simple Status & Resolutions

Multi-level Priorities & Severities.
Targets & Milestones for guiding the programmer
Attachments & Additional Comments for more information
Robust database back-end

Hardware Specification :

Main Memory : 128 MB
Micro Processor : Pentium II
Hard Disk Drive : 10 GB
Printer : Laser Printer
Disk Drives : 1.44 Mb FDD

Software Specification:

Front End : Html,jsp,Servlets
Back End : Oracle8i
Server : Apache Tomcat
Operating System : Windows 2000
Browser : Microsoft Internet Explorer


59.  Bandwidth-Allocation-for-Distributed-Algorithm

Introduction

Service prioritization among different traffic classes is an important goal for the Internet. Conventional approaches to solving this problem consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide "better-than-best-effort" service.
We explore the opposite approach, and devise a new distributed algorithm to realize a low-priority service (as compared to the existing best effort)from the network endpoints. To this end, we develop TCP Low Priority (TCP-LP), a distributed algorithm whose goal is to utilize only the excess network bandwidth as compared to the "fair share" of bandwidth as targeted by TCP. The key mechanisms unique to TCP-LP congestion control are the use of one-way packet delays for early congestion indications and a TCP-transparent congestion avoidance policy.
The results of our simulation and Internet experiments show that:
1) TCP-LP is largely non-intrusive to TCP traffic.
2) Both single and aggregate TCP-LP flows are able to successfully utilize excess network bandwidth; moreover, multiple TCP-LP flows share excess bandwidth fairly
3) Substantial amounts of excess bandwidth are available to the low-priority class, even in the presence of "greedy" TCP flows
4) Despite their low-priority nature, TCP-LP flows are able to utilize significant amounts of available bandwidth in a wide-area network environment

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

• Processor: Intel Pentium IV Processor
• Random Access Memory: 128MB
• Hard Disk: 20GB
• Processor Speed: 300 min

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : Java Swings, JDBC, Servlets





60.  Network Monitoring for Remote Task Executor

Introduction

This is mainly focused on finding different active nodes connected on the network and to perform different remote operations. The modules in this project are
• Analyzing the network.
• Remote task execution.
• Remote Java properties
• Host task Executor
• Checking Remote Platform
• Shutdown Remote Node
• Adding New Nodes
Before proceeding operation in the remote network. It is necessary to add node name to the system using Add Nodes module. Once it is done the user can proceed to perform operation on remote system. In RemoteTaskExecutor the user can perform remote operation such as opening Notepad, Calculator, Shutdown, Winword, Time Execution on remote system by selecting the preferred node. In Remote Java Properties the user can find the java home path, JVM version and JRE directory in selected node.
In Host Task Executor the user can perform operation such as opening Notepad, Calculator, Shutdown, WinWord, Time Execution only in the particular system. In Remote File Manager the user can choose the remote system and list the files and folders present in the remote system and can able to download in to the host node. In Checking Remote Platform the user can identify the java home path, JVM version and JRE directory in selected remote node. In Shutdown Remote System the user can perform remote shutdown by specifying time to the remote nodes.

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 512 MB
Hard Disk : 40GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : J2SE (network,IO,Swings, Util,crypto)

61.  GPS Rover

Introduction

This project consists of a mobile robot vehicle which can be controlled using data from an onboard GPS unit and a remote laptop base station. The robot uses advanced communication mediums in order to control and monitor its movement. Although the robot itself has a limited use, the purpose of developing the vehicle is a proof of concept. The combined technology used in this project may lead t o future development in the area of GPS navigation.
A GPS receiver is used to determine the current location of the robot. A wireless communications device with WiFi capability captures the GPS raw data from the receiver and transmits the data to a base station. Based on the GPS data readings, the base station calculates the direction the robot needs to travel in order to reach the final destination.
The base station does not take into account the mechanical issues with the physical structure of the robot or the obstacles that may be in the way of the vehicle. The base station sends data and commands via wireless link to a microprocessor onboard the vehicle.
The microprocessor controls the physical motion of the vehicle, taking into account the obstacles that may be in the way and adjusts the steering accordingly.
There are always accuracy issues in any mechanical device. Some of the issues include wheel slippage, steering adjustments and speed of communication between mechanical and electrical devices. The microprocessor provides the control and speed to handle these mechanical problems and adjusts the robot's motion accordingly
The goal of this project is to design and develop a logical robotic vehicle which has the ability to receive commands and move in the appropriate direction without any collisions.
The robot should have the ability to avoid obstacles that may be in the way while it is traversing between a set of predefined waypoints on relatively smooth ground and arrive at its final destination. The vehicle's physical motion is controlled by a DC motor to move forward and back and a stepper motor which controls the steering from left to right.
The signals used to activate both motors are received by an onboard processor that takes into account the range of steering, obstacles and steering calibration before its sends data to t he mechanical devices.
The microprocessor obtains data from a logical pc program that calculates the direction the vehicle must travel in order to reach the various waypoints using GPS technology and a control algorithm.
This report explains the strategy used in implementing the various different communication mediums as well as the hardware used to communicate data between systems. It also covers various mechanical and electrical design specifications which are crucial to the operation of the system
GPS technology has evolved quickly over the years. What seemed impossible at its outset can now fit in a shirt pocket. GPS technology has become accurate enough to pinpoint one's location to within three meters or less given the proper environment. With affordable receivers and free signal services, GPS based applications are worth exploring.
An inexpensive GPS-controlled vehicle would serve as a stepping stone for a variety of commercial applications, such as fleet management, vehicle tracking and remote navigation. With the addition of an 802.11b wireless interface, the vehicle could be operated remotely from anywhere in the world

62.  Partial Face Recognition Using Core features Of The Face

Introduction

Face recognition is a wide area which is currently studied by lot of researchers and vendors but still there are some areas that even researchers have not touched. Partial face recognition can be considered as one of these areas. Few years back researchers considered that partial face recognition is an unrealistic approach because there is less information which can use to recognize a person.
But after the research conducted by researchers like Sato et al (1998), it is proven that partial face region also contain some amount of information that can use to recognition. By conducting this project, I tried to investigate how far partial face regions involve recognizing individual.
The artifact allows users to input probe images and then the system will determin e individual's face whose belongs that particular face region. Even though it appears to be a simple process the system should perform intensive amount of work to achieve it.
A domain research, which has conducted to identify and study about the problem, related to face recognition, similar system. Then by analysing it I decided to the area that needed constrain in system research. During system research researcher studied about the fundamentals about the image processing, face detection techniques and face recognition techniques.
Then after analysing them it decided to select appropriate techniques to extract partial face regions and recognize individuals. The document contains introduction, domain research, system research, project development plan, requirement specification and technical investigation, which contain details about above-mentioned areas.
Finally appropriate image processing techniques, face detection techniques and face recognition techniques were selected and justified along with selection of the project developing methodologies and project developing platforms.
This face recognition system will identify individuals based on characteristics of separate face segmentations and the objectives of the project as follows.
? Investigation of unique face features of eye, nose and mouth regions for recognises individuals. When it come to separate face regions there are less unique features that help to identify individuals. Identifying unique features of the individuals has being archiving throughout this project.
? Improve capabilities of the detecting features of local segmentations of face It is necessary to find the efficient algorithm to extract features of the face segmentations.
? Implement robust, efferent face recognition system based on facts found in the research. A thorough research being carried on face recognition techniques and available algorithm on partial face recognition and choose a appreciate method and implement face recognition system based in it

63.  Multi-Tasking Sockets

Introduction

This article is about a client/server multi-threaded socket class. The thread is optional since the developer is still responsible to decide if needs it. There are other Socket classes here and other places over the Internet but none of them can provide feedback (event detection) to your application like this one does. It provides you with the following events detection: connection established, connection dropped, connection failed and data reception (including 0 byte packet).
This article presents a new socket class which supports both TCP and UDP communication. But it provides some advantages compared to other classes that you may find here or on some other Socket Programming articles.
First of all, this class doesn't have any limitation like the need to provide a window handle to be used. This limitation is bad if all you want is a simple console application. So this library doesn't have such a limitation.
It also provides threading support automatically for you, which handles the socket connection and disconnection to a peer. It also features some options not yet found in any socket classes that I have seen so far. It supports both client and server sockets.
A server socket can be referred as to a socket that can accept many connections. And a client socket is a socket that is connected to server socket. You may still use this class to communicate between two applications without establishing a connection. In the latter case, you will want to create two UDP server sockets (one for each application).
This class also helps reduce coding need to create chat-like applications and IPC (Inter-Process Communication) between two or more applications (processes). Reliable communication between two peers is also supported with TCP/IP with error handling. You may want to use the smart addressing operation to control the destination of the data being transmitted (UDP only). TCP operation of this class deals only with communication between two peers

SYSTEM REQUIREMENTS

HARDWARE REQUIREMENTS

Processor : Intel Pentium IV
RAM : 128 MB
Hard Disk : 20GB

SOFTWARE REQUIREMENTS

Operating System : Windows 98,2000,xp
Tools : jdk1.5.0
Technologies : Java Swings, JDBC, Servlets

64.  Bank Management System

Introduction

The limited time and resources have restricted us to incorporate, in this project, only a main activities that are performed in a Bank Management System, but utmost care has been taken to make the system efficient and user friendly. "Bank Management System" has been designed to computerized the following functions that are performed by the system:

Customer Details Functions

• Opening a New Account
• Closing the existing Account
• Modification to customer details
• Daily transaction record to require customer A/C

Fixed Deposit Functions

• Open New Fixed Deposit
• Details of Fixed Deposit in Bank
• Close particular Fixed Deposit in Maturity
• Fixed Deposit amount report on Maturity

Report/Details Functions

• Statement of customer Account
a.1) Monthly statement
a.2) Daily statement
• Total numbers of Customer in Bank
• Total balance in Bank
• Individual Customer Report

Authorization Functions

• Password checking functions
. Password change functions
The basic objective of Bank Management System is to generalize and simplify the day to day or activities of Company like New Account opening, Daily transaction, Report/Statements etc. which has to be performed repeatedly on regular basis. To provide efficient, fast, reliable and user-friendly system is the basic motto behind this exercise.
A bank is a primer body is sources of money storage where we can deposit the money when we not much needed and can withdraw whenever require. In Bank, we can issue cheque or draft, which are other way of transferring the money from one source to other.

65.  Hospital Management System

Introduction

The project Hospital Management system includes registration of patients, storing their details into the system, and also computerized billing in the pharmacy, and labs. The software has the facility to give a unique id for every patient and stores the details of every patient and the staff automatically. It includes a search facility to know the current status of each room. User can search availability of a doctor and the details of a patient using the id.
The Hospital Management System can be entered using a username and password. It is accessible either by an administrator or receptionist. Only they can add data into the database. The data can be retrieved easily. The interface is very user-friendly. The data are well protected for personal use and makes the data processing very fast.
The purpose of the project entitled as “HOSPITAL MANAGEMENT SYSTEM” is to computerize the Front Office Management of Hospital to develop software which is user friendly, simple, fast, and cost – effective. It deals with the collection of patient’s information, diagnosis details, etc.
Traditionally, it was done manually. The main function of the system is to register and store patient details and doctor details and retrieve these details as and when required, and also to manipulate these details meaningfully System input contains patient details, diagnosis details; while system output is to get these details on to the CRT screen.
A form is a major part of Visual Basic application, which allows the user to enter the data as well as view the result. A control is an object that we draw on a form to enable or enhance user interaction with an applicatio.
Hence a Visual Basic application is a combination of object like forms and controls, procdures that can respond to Events and other general-purpose procedure. Event procedures are where we do the actual computer programming and are saved with the form in the file with the frm extension. These procedures are where we write BASIC language statements.
You will learn a lot of programming and BASIC language in this course. The BASIC you will learn is very similar to the original BASIC used by Bill Gates and Paul Allen when starting Microsoft.

ADVANTAGES

 It is fast, efficient and reliable·
 Avoids data redundancy and inconsistency·
 Very user-friendly·
 Easy accessibility of data·
 Number of personnel required is considerably less·
 Provides more security and integrity to data·

66.  Development of an Online Course Portal for a campus

Introduction

This project aims at creating a Courses portal for a campus/organization. This allows registered users of the system to join a course available in the site and access the materials published for the course. People can register themselves as students of a course or Faculty for a course.
When a person registers himself as a Faculty, an approval mechanism should be triggered which sends an email to the Administrator for approving the person as a Faculty. There will be an admin approval page where admin can approve the faculty members for the course.
The course home page should contain the title of the course and a brief description. There will be a discussion board for each course where students can interact, an announcement section, which contains the latest announcements, and a course content section which gives the links for the material available for the course. For faculty members there will be an extra link for uploading the course content in a zip file format.
The course content should be html pages, which should be uploaded in the zip file format. There should be a mechanism for the faculty members to create a test for the course specifying the test title and a set of multiple-choice questions and duration of time of the test.

Keywords

Databases Web Server, Programming
Generic Technlogy keywords
Specific Technology keywords
Oracle/MS-SQL server, Tomcat servlet Engine., java/jsp/servlets
type keywords
Analysis, Design, Implementation, Testing, User Interface

Functional components of the project

There will be a Course Portal home page where there will be a registration link as well as a login screen is available.
There are three types of users in the system
Administrator
Faculty
Student (for a course)
The administrator should be able to do the following:-
Create a Course, by providing the course title and description.
Approve Faculty members for a Course
Delete the members of a Course
Publish announcements
A page to view all the feedbacks received.



67.  Computer Troubleshooting Intelligent System

Introduction

Since computers are playing a critical role in managing the UCF Student Health Center where the majority of the users are Health workers with minimal knowledge of computers the presence of an expert system to troubleshoot simple and complex day-to-day problems can go a long way in oiling the process. The CTIS will also be an able assistant to partially skillful and new employees of the Computer Services department who may not know and cannot be trained to very minute detail.

User Profile

Most of the users would be doctors, nurses, pharmacists and Health care workers. But a significant number of others like the Business office staff, the accounting staff, the cashiers, appointments staff and others would also be active participants in the system.

Goals

The CTIS intends to replicate the knowledge of the experts Mr.Leon Stanley and his colleague Mr. Jim Kotlaba, who have been a part of the Computer Services department for a long time. We intend to extract their knowledge and also provide a way for future growth of the system.

Hardware Constraints

Sometimes the problem could be with the computer itself and hence the user may not be able to reach the CTIS. Under such cases the inability to reach CTIS is a constraint posed by the situation, hence the assumption is that the user has a minimum hardware capability to reach the CTIS.

Speed of Execution

The execution will depend on the server's capability to handle the database, since the Health Center is pretty well equipped one can expect it to be fast enough for the user to be unaware of the processing time.

Maintainability

There is a database maintenance part, which can weigh on the institution, but from our interaction with the Computer Services personnel, they seem to think the task would put a minimal stress on them.

Reliability

The system may not be 100% reliable since it uses heuristic to get to the answers, but the user can place his trust on the system for consistent answers, which in the longer run would make it a reliable system.

Security

The users cannot not change the system data, the privilege will be held by the administrators of the system. The Health Center already ahs a Security policy in place, which makes the situation far less volatile.

68.  ATM Reporting system

Introduction

The project entitled "ATM Reporting system" has been developed using Serviette and Jsp as front end and Oracle8i as back end.
The main objective of this project is reporting application based on an existing client/database application. The existing application gathers all the transaction data from different ATM machine''. The goal of the application is to allow manager to view general reporting information through a web browser and not require the installation of the client or exhaustive training.
The scope of this application is 4 graphical reports, a security module. Which are ATM availability, Transaction types and volume, On-us and Not On-us transactions, Average withdrawal amounts etc., the reports will primarily be accessing data in the transaction log, which contains most of the prevalent information for managers.

Description

The project is a web based reporting application.The existing application gathers all the transaction data from different ATMMachines.The goal of the application is to allow managers to view general reporting information of all ATMs through a web browser and not require the installation of a client or exhaustive training. The web reporting application is being built in java . The backend database is oracle.The web application server is Apache Tomcat. The scope of the application is seven graphical reports,a security module.The reports will primarily be accessing data in the transaction log(which contains most of the prevalent information for managers).

This project has four modules

1.ATM Availability
2. Transaction type and volume
3. On-us versus not on-us transactions
4. Average withdrawal Amounts

Hardware Specification :

Main Memory : 128 MB
Micro Processor : Pentium II
Hard Disk Drive : 10 GB
Printer : Laser Printer
Disk Drives : 1.44 Mb FDD

Software Specification:

Front End : Html,jsp,Servlets
Back End : Oracle8i
Server : Apache Tomcat
Operating System : Windows 2000
Browser : Microsoft Internet Explorer


69.  File Compression

Introduction

The Domain "File Compression" lets you reduce the overall number of bits and bytes in a file so it can be transmitted faster over slower Internet connections, or take up less space on a disk. Domain File compression is a System Based Software. The software will be done using Core Java. It can use in the System as a utility. The type of compression we will use here is called lossless compression .
The user need not depend on third party software's like winzip, winrar, Stuff etc. the software can be used to compress files and they can be decompressed when the need arises. For implementing this Software we want to use algorithms
The main algorithms are: Huffman algorithm
The Domain File Compression mainly include 7 modules
• Compress A File Or Folder
• De-Compress the file or folder
• View files in the compressed file
• Facility to set icon
• Facility to set your own extension

Compress file or folder

This module helps us to compress a file or folder. The compressed file will have a extension that has been given at the development time. We can send the compressed file over the internet so that users having this software can decompress it.

Decompress a file or folder

This is the reverse process of file compression. Here we can decompress the compressed file and get the original file.

View files in the compressed file

Here we can view the list of files inside our compressed file. We can view the files before decompressing and decide to decompress or not.

Set icon and extension

This is additional feature in our project. We can set our own extension to the compressed file. More than that we can specify the style of icon for the compressed file. Users will also be given a option to change the icon as per their preference.
The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides data accuracy and save disc space. The existing system has several disadvantages and many more difficulties to work well. The proposed system tries to eliminate or reduce these difficulties up to some extent.
The proposed system is file/folder compression or decompression based on the Huffman algorithm and GZip algorithm. The proposed system will help the user to consume time. The proposed system helps the user to work user friendly and he can easily do the file compression process without time lagging .
The system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features E nsure data accuracy, minimize manual data entry , m inimum time needed for the various processing , g reater efficiency , better s ervice .


70.  Online Examination System

Introduction
The Purpose of this project is to conduct the online examinations for Each and every course present in the university. This project comprises of three applications:
• Question Bank maintenance Application
• Exam processing Application
• Report Generation Application
1. Question Bank maintenance:
This application deals with question bank maintenance. This application is supposed to contain the following modules.
• Entry Check: Enables the user to make subject selection and Checks the entry of faculty by using a login form before Entering/Updating questions.
• Question Entry: Enables the authorized faculty to enter new questions in Text/Image format into the database.
• Question Editor: This module deals with modifying existing questions and deleting the questions from the database by the authorized faculty.
• Maintaining the student Details and Course details in the database.
• Creating the tables necessary for Exam conducting application.
2. Exam Processing:
The main purpose of this application is to conduct the exam and to store the results of each and every candidate in a subject wise order. Also the application stores the questions and specified answers of each question for each student in the proof table for future verification. This application is supposed to contain the following Modules.
• Connecting to Database: In this Module, the application connects to the database with the help of user credentials such as Server Name, User id and password. After successful connection to the database it will display the student login form
• Student identification: in this step the candidate will enter his own credentials given by the authority which include roll number, user id and password. After successful login, the candidate will be displayed his question form. With all the required options.
• Submission of results: After answering all the questions, the candidate needs to click on "Submit" button available at the bottom of the question form. This will store the details of questions and answers of each candidate and compares with correct answers and soon it will display the marks report to the candidate.
3. Report Generation:
This application serves the authority to make a report of the examination results course wise (or) Semester wise (or) Roll number wise. The facility for the authority to store the results in an excel file is also included in the application. This application comprises of the following Modules.
• Entry Screen: This module will display all the subject codes of each and every semester/Course, for which the examination is conducted.
• Marks Report for Each Course: This module will generate the marks reports Subject wise / Semester wise/Course wise.
• Transferring report to excel file: This enables the authority to take an excel copy of the reports that are generated.

No comments:

Post a Comment