Upload
kalamsoftware
View
48
Download
2
Tags:
Embed Size (px)
Citation preview
APPLICATION PROJECT ABSTRACTS
1. Remote Task Monitoring System
Remote Monitoring System is a versatile utility program that can perform much different
protection for our personal computer and network system. On activation of this Remote
Monitoring System, it records the process running on the specified system, the applications used
by other users and stores them in log files. It will record all the. It records all the applications
opened and executed.
Remote Monitoring System also performs screen capturing. We can capture all desktop.
We can capture the screen when a new window got focus or at fixed time intervals. Access to the
Remote Monitoring System can be prevented with a password. The Application can be run
minimized in the system tray or invisibly in stealth mode.
It also helps the user to work on the files from the client system on a networking system.
Some specified application can be blocked by the user which will be terminated by the system
automatically.
It will automatically store all the files and we can view from the server and we can set
options from the server also. The Remote Monitoring System can be run in any of the Windows
Platform such as Windows Me/NT4/2000/XP.
The Remote Monitoring System operates in the background, hidden in the system tray.
The application is fully password protected and is active at the time of boot up.
2. STUDENT INFORMATION SYSTEM
The project work entitled as “STUDENT INFORMATION SYSTEM” is
designed to manage the student activities of the Department. Student information system
includes Student Details, Student Parent Details, Student HSC marks, Student Academic Details
with Internal marks and Semester marks, Student Achievement Details.
This project gives the user, the following features to perform the activities.
Master Maintenance
Backup and History
Generating Reports
Master Maintenance
System requires maintenance of certain database on activations will be taking
place. The responsibilities of maintaining the data is divided among the user and the modules
of the system.
Backup and History
Daily backup’s are to be taken for all the data maintained in the system. The user
may create history files whenever he or she wishes.
Generating Reports
System provides a number of outputs. All these reports can be either viewed on
the screen or printed by the user.
The software is developed in VISUAL BASIC.NET as front end and SQL
SERVER as back end. This project gives all the details about STUDENT INFORMATION
SYSTEM
3. ONLINE TEXTILE SHOPPING
This project ONLINE TEXTILE SHOPPING is used mainly to reduce the major part
of the manual work in the concern. And all the data, which is given into the computer, is stored
in the database and this also makes the concern to maintain a very less number of files in them.
Also this project is an online project so the customers has an advantage that they can shop their
Dress by sitting in their home itself with their credit cards.
This project has the search options, which helps a lot for customers who are searching for
a particular Dress. The purchased Dresses will be delivered to their home itself.
This project entitled ONLINE TEXTILE SHOPPING has four main modules and has
been developed with ASP.NET as front end and SQL SERVER 2000 as the back end in
Windows XP platform.
4. Active Source Routing Protocol
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily
located in such a manner that the interconnections between nodes are capable of changing on a
continual basis. The primary goal of such an ad-hoc network routing protocol is correct and
efficient route establishment between a pair of nodes so that messages may be delivered in a
timely manner. LAR is an on-demand protocol who is based on the DSR(Dynamic Source
Routing). The Location Aided Routing protocol uses location information to reduce routing
overhead of the ad-hoc network! Normally the LAR protocol uses the GPS(Global Positioning
System) to get these location information’s. With the availability of GPS, the mobile hosts
knows there physical location.
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike
traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure.
Instead, hosts rely on each other to keep the network connected. The military tactical and other
security-sensitive operations are still the main applications of ad hoc networks, although there is
a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main
challenge in design of these networks is their vulnerability to security attacks. In this paper, we
study the threats an ad hoc network faces and the security goals to be achieved. We identify the
new challenges and opportunities posed by this new networking environment and explore new
approaches to secure its communication. In particular, we take advantage of the inherent
redundancy in ad hoc networks — multiple routes between nodes — to defend routing against
denial of service attacks.
5. DIGITAL STEGANOGRAPHY
Steganography concentrates on hiding a message in an innocuous carrier to try to conceal
the existence of the message. It is the technique to hiding a message within images, or in audio
file, or in video files. To protect the data from attackers and hacking the message this technique
can be of very much important.
In this project deals with hiding the image or text files with in an image and
transmitted .in this project the image or text to be transmitted is being encrypted, compressed and
then embedded with some other image. At the receiving end the file is being extracted,
decompressed and decrypted.
In this project, the message supplied by the user will be inherited with Image files, in
order to make the message as raw one. When hackers trapped the image file containing the
message they can’t see or hear any message embed within it. They could see the clear image
only. The message can be read by the authorized person by providing correct password.
Every pixel of Image files will be extracted and replaced subsequent with text typed by
the user. It could be done by lose less algorithms. Visual Basic.Net will be the front-end tool for
this project.
Modules in this project are:
Text Editor
Image Browser
Hide message with Image File
Password Authentication
Reveal the Original Message
6. PORT SCANNER
A “Port Scanner” is a piece of software designed to search a network host for open
ports. This is often used by administrators to check the security of their networks and by hackers
to compromise it. To scan the port a host is to scan for multiple listening ports on a single target
host. To port sweep is to scan multiple hosts for a specific listening port. The latter is typically
used in searching for a specific service.
Port Scanning is one of the most popular reconnaissance techniques attackers use to
discover services they can break into. All machines connected to a Local Area Network (LAN)
or Internet run many services that listen at well-known and not so well known ports. A port scan
helps the attacker find which ports are available (i.e., what service might be listing to a port).
Essentially, a port scan consists of sending a message to each port, one at a time. The kind of
response received indicates whether the port is used and can therefore be probed further for
weakness.
TCP - Transmission Control Protocol and UDP - User Datagram Protocol are two of the
protocols that make up the TCP/IP protocol suite which is used universally to communicate on
the Internet. Each of these has ports 0 through 65535 available so essentially there are more than
65,000 doors to lock.
But the virtual port scanning is happening at now. Through this the user can verify
whether any port HTTP, FTP, or SMTP is available, that is open. If so the user can send any
application, or program to the client machine. The server monitor is always keeping on watching
the client machine for port sweeping. The available and open port can be interrupt by the server
administrator.
This application is developed using socket controls, and remoting namespace available in
Visual Basic.Net. The server will ping the client to establish the connection between the server
and client. Once it is achieved the other process is above one.
7. WEB BASED ADVERTISEMENT AGENCY
SYNOPSIS
In this competitive world everyone needs to achieve their goals within the short span of
time. Like business it developing its wings in enormous way. For that every concern needs to
reach their customers as quick as possible. The mantra for success in marketing field is to
murmuring the success keyword before it comes to the market.
The aim of this project “Web Based Advertisement Agency” is helps the user to post
web based advertisements in online. Users of any kind accessing this website can view the
various free advertisement placed or displayed on this website. In the same way any registered
user can create and can post this advertisement to the website or can order to display on selected
web URL.
To maximize the potential power of every concern, the advertisement plays a vital role.
To computerize the activities developed to succeed the previous manual work. Computerize the
work like Advertising increase its potential, gives reliability, accuracy in any field.
The information supplied by the viewer or user of the website, parsed by the web admin,
verified and checked for the reliability. Once the information acquired from the user is
acknowledged then the admin grants permission to create the advertisement. Then the created
advertisement will be placed in allocated place. The place where the advertisement will be going
to display is decided by the viewer who supplies the information.
This project has been developed by using ASP.Net as Front-end and MS-SQLServer as
Back end.
8. Residential Life Tracking
The Residential Life Tracking system assists the administrative staff to systematically manage
student residential allocation issues, Resident inventories and room maintenance services.
By specifying the allocation criteria, the system is able to automatically generate room
allocation. Alternatively, the administrator may also arbitrarily choose available rooms for
transfer. Queries and reports are also available to help administrators make decisions based on
updated and relevant information.
Besides that, school administrators have the flexibility to configure and define Resident
buildings, blocks, floors and rooms. Should there be an ongoing renovation or repair work, the
status of the building, block or room affected can be deactivated to exclude it from room
allocation. Buildings can also be allocated by gender while guardians or wardens
responsible for the buildings can be stipulated with schedules generated.
The system also has a check-in and check-out function built in, which can be used for room
transfer and exchange, booking and reservation, key collection and such. This feature enables the
administrator to keep track of the tenant moving in and out of the Resident, and extended stay
during school and public holidays.
Modules
1. Resident area/building record system
2. Residents (Student, Faculty) Information management
3. Resident Room reservation
4. Resident (Student, Faculty) complaint record section
5. Resident Inventory Tracking
6. Resident Services management
9. Knowledge Base Management System
Knowledge Management is the collection of processes that govern the creation,
dissemination, and utilization of knowledge. Knowledge management is the management of the
organization towards the continuous renewal of the organizational knowledge base - this means
e.g. creation of supportive organizational structures, facilitation of organizational members,
putting IT-instruments with emphasis on teamwork and diffusion of knowledge (as e.g.
groupware) into place.
The project “Knowledge Base Management System” streamlines the entire
documentation process for companies to share information with employees, customers, and
partners. The flexible, self-learning knowledge base captures and presents current, relevant
information to customers, in a Web self-service mode, and to agents through a flexible portal
within the single screen agent interface. It reduces the volume of e-mail access, phone calling,
conferencing, and seminar classes. It provides the facility Powerful search and retrieval
methodologies; ensuring customers receive rapid, accurate, and consistent responses.
This project is developed using Asp.Net as front-end and SQL Server as back-end.
Knowledge Management system is an intelligent, multi-user system. It enhances self-service
customer support, help desk operations, and document management applications.
The interactive users of this system are Authors (Knowledge creators), approver
(Knowledge Management) and customer or employee. The Authors can create, edit and organize
their knowledge. The approver will verify the knowledge and publishing it to the content of the
website. Finally it will deliver to the search process to share knowledge.
10. HRMS Resource Planning
The revolutionary trends of computerization have reached the peaks achieving
global goals in all fields and sectors. The ERP-HRMS systems getting computerized are
leading to a new and innovative way to approach to above said. With the major organizations
hosting services of HRMS our project specifically aims to the total computerization of the
ERP-HRMS.
With the total automation of ERP-HRMS, the manual dependency is minimized to a large
extent. It inherits all the properties of computerizing a system which includes quick response,
less processing time, non-diligence, fast recovery, robustness, flexibility, reliability,
scalability.
Today’s trend demands high rate of automation for the ERP-HRMS as the organizations
a re growing in exponential form and maintaining employee records in a consistent format.
To satisfy the needs of clients, today’s organization need more and more of workforce. The
ERP-HRMS system takes care of this by taking in resumes from new aspirants and allowing
the HR to view them in and do selections there upon.
11. Automated Vehicle tracking System
The ‘Vehicle tracking System ’ keeps track the information about the Vehicles, Maintenance,
Repair, Parts, Employees, Location and Vendors. It also keeps track the maintenance performed
for different vehicles which are used for transportation. The super users of the system are the
‘ADMIN’ and the ‘MANAGERS’ of the different departments allocated by the admin. The
admin may be the owner of the transportation organization or the manager of transportation
department of a particular manufacturing company.
If any other vehicle is added to the fleet which already exists for the
organization/department the details of the vehicle is added. The details includes whether it
is a new one or taken any loan/lease. Any employee is newly appointed or the existing
employee is taken off both the details are maintained including their personal details and
profession details.
The details of the maintenance that are being performed such as repairs/services and to
be performed are also maintained. The maintenance to be performed can also be scheduled
for each type of vehicles. The details of the parts/inventory used for the vehicles are
maintained. The reorder level and the reorder quantity are predefined for each particular
type of part.
The Vendors or suppliers of the vehicles, parts and performs maintenance required for
the vehicles. The particulars of the various vendors are maintained in this system.
12. YARN-DEPOT MANAGEMENT SYSTEM
The project work entitled “YARN-DEPOT MANAGEMENT SYSTEM” is developed
for “Color World”. This project has been developed for any concern handling Yarn Details. The
Main objective of this project is to maintain inward and outward details with stock and to prepare
Billing details.
The system has been developed to reduce the response time and ensure flexibility. The
system also comfortable for further development and enhancement of the exiting system. It
computerizes the process of entire yarn department in real life. The type of yarns used for
production, the needles that are used for production, employee details, and daily transaction will
be maintained in the database.
This project has been developed by using Visual Basic 6.0 as Front-end and MS-Access
as Back-end. The entire application is developed to suite Windows XP/98 and above
configurations.
Modules in this Project are,
Master
Transaction Details
Yarn Availability View
Reports
13. Advertisement Agency
In this competitive world everyone needs to achieve their goals within the short span of
time. Like business it developing its wings in enormous way. For that every concern needs to
reach their customers as quick as possible. The mantra for success in marketing field is to
murmuring the success keyword before it comes to the market.
To maximize the potential power of every concern, the advertisement plays a vital role.
To computerize the activities of an advertisement agency this project entitled “Advertisement
Agency” has been developed to succeed the previous manual work. Computerize the work like
Advertising increase its potential, gives reliability, accuracy in any field.
Here, this project Advertisement Agency has multiple activities in their day to day
activity. Like, they have to maintain their clients either new or golden customers, the details
regarding their customer, customer ad details, booking details, ad media details etc,.
This entire process has been converted into systemized. Front-end for this application is
Visual Basic 6.0 and MS-Access will be the back-end. Every module has its own unique nature
to maintain the records. The billing calculation module reduces the workload of ad agency owner
in the mean time of preparing the bill for their clients.
To computerize every activity it needs the detail study and grasping of field activity.
Finally the reports can be generated from Data Report to produce detailed reports for a weekly,
monthly or quarterly basis.
This project is categorized into some basic modules, they are, client details, order
booking details module, advertisement details module and billing calculation module. For every
module there should be one report is available.
14. Efficient Broadcasting
An efficient broadcast scheme in mobile ad hoc networks is to determine a small set of
forward nodes to ensure full coverage. Previously used methods that guarantee coverage when
the local view of each node on its neighborhood information is updated in a timely manner then
we consider a general case where nodes move even during the broadcast process, making it
impractical to maintain up-to-date and consistent local views. A formal framework is used to
model inaccurate local views in MANETs, where full coverage is guaranteed if three sufficient
conditions, connectivity, link availability, and consistency, are met. Three solutions are proposed
to satisfy those conditions. First, we give a minimal transmission range that maintains the
connectivity of the virtual network constructed from local views. Then, we use two transmission
ranges, one for neighborhood information collection and the other for actual data transmission, to
form a buffer zone that guarantees the availability of logical links in the physical network. We
propose a mechanism called aggregated local view to ensure consistent local views. The
effectiveness of the proposed scheme is confirmed with performance analysis.
15. LIBRARY MANAGEMENT SYSTEM
Library Management is related to library management which provides reading services to
its members. It will deal with the process of maintaining data about the books and many other
things as well as transactions, which are taking place in the library with respect to the issue and
return of the books. This solution helps the administrator to accomplish his tasks at ease.
Any student of any department from this college can become a member of the library by
filling a prescribed form. They can get the book issued, so that they can take home and return
them. Staffs also can take the books from the library. Any student can make use of it for
providing information about author, content of the available books.
Hence in the existing system for Library Management System, the performance
evaluation system and the maintenance are done manually. The proposed system will maintain
all the information in a standard database and will be able to generate reports as and when
necessary. Accessing and the user has the right to search based on the above mentioned criteria.
This Project entitled “Library Management System” is developed with asp.net as front
end and Sql server as back end.
This project Contains modules such as,
Admin Module:
Login, Create Group, Create Member
Books issue, Books Return, Transaction
User Module:
User Login
Update Profile
View status
16. DEPARTMENTAL STORE MAINTENANCE SYSTEM
The project is entitled as “DEPARTMENTAL STORE MAINTENANCE
SYSTEM”. The main aim of this project is to computerize the daily activity performed in
departmental store. The daily transactions are sales & purchase. So, the computerization is a
must.
This project can be viewed into three modules such as purchase details, sales
details and stock details of garments. The DEPARTMENTAL STORE work as a whole sale
distributor for the products as well as retailer.
Purchase order is prepared once the stock of goods attains reorder level. After the
purchase bill of products, the quantity of that particular products are updated in the stock file.
During the sales also, the sales quantity is updated. Dealer payments are maintained.
The system generates the following reports needed for the organization.
Report on Daily stock details
Reports on Daily Customer details
Report on Daily Supplier details
Report on Daily Purchase details
Report on Daily Sales details
17. Finance Automation
A broad category of software that deals with accounting and monetary
transactions. It includes payroll, accounts receivables and payables, general ledger, spreadsheets,
financial planning, check writing and portfolio management.
Finance automation is a specialized software application for the finance businesses.
With the Finance automation software will be able to efficiently and accurately manage your
finance contracts and relationships with customer and companies.
Features
Full Windows Application - with mouse, menus, and toolbars. Easy to learn and use, it's
similar to other Windows products. Aesthetically pleasing and readable screens - no codes or
encrypted messages. Get up to speed quickly and even a casual user can remain proficient.
Multiple networking support - runs on Microsoft Windows from 98 to XP. Provides greater
flexibility and ensures long-term support.
Modules
1.Master
a)Company Details
In the Company Detail Module all the Company details are got and maintained.
b)Branch Details
In the Branch Detail Module the Branch code for companies are created. This is based on
the Company Master
c)Bank Details
In the Bank Detail Module all the details of the banks like Bank code, Bank name,
address are got and maintained.
d)Deposit Details
In the Deposit details Module the details of the depositor are got and maintained. It includes the
details like name of the depositor, address and their informations.
e)FD Party Details
In the Competitor Contact Module the details like the Fixed depositor’s are got and maintained.
It includes the details like name, their designation, department and communication address
f)Transaction Receipt Details
In the Transaction Receipt Details Module the details of the transaction receipt for a
particular transaction are maintained. It includes the details like Transaction no, Transaction Date
,Amount value,Incentives, Issue date,Receipt date,Receipt mode , Cheque, Bank charges and
Bank name.
g)Tax Details
In this module available government taxes for finance are maintained .It includes Tax
code ,Tax name and tax percentage.
2.Transaction
a) HP Transaction
Through HP Transaction the activities performed by High Purchaser are monitored. It
includes details like name of the customer, Asset Name,Asset value, Amount financed Emi
Amount and Emi date.
b)Deposit Details
In the Deposit Details Module the details of the Deposit type, Interest rate, Deposit
Amount ,period, Repayment mode, renDate, Broker name, Broker type and etc.
c)Payments
In the Deposit Details Module the details of PTC no,name,payment date,coupon no,payment
mode,cheque/ddno,cheque/dddate,place,bank etc.
d)Closure Details
In the Deposit Details Module the details of closure no,closure date,closure
type,Inamt,investment,investment date, maturity date,paidamount,totalamount,payment mode
etc,
e)Part Refund Details
In the Deposit Details Module the details of the PTC no, refund date,depositor,depttype and etc
f)Renewal Details
In the Deposit Details Module the details of the new PTC no, renewal date,renewal type, old
PTC amount,trno,tramount,paidamount,new PTC amount and etc.
3.Reports
This module generate all PTC information, interest rates, maturity list based on deposit type
wise or Transaction no wise for daily,weekly,monthl and yearly .This MIS report contains all
the details of day by day transactions. The following reports are created
a) PTC ledger
b) Interest Payments
c) Maturity List
d) PTC closure reports
e) PTC renewal reports
18. Harnessing Depth Edges with Images
The project entitled “Harnessing Depth Edges with Images” has been developed to
identify the sharp edges for the given images, which are useful in various technical applications.
The ability to highlight the depth discontinuities makes it possible to produce stylized
photographs, which are useful in technical applications such as medical imaging. The depth
edges are important low-level features for many computer vision tasks, such as visual
recognition. Instead of using expensive, elaborate equipment for geometry acquisition, the
images can be easily exploited using this technique. The system looks for depth discontinuities
reducing the general 3D problem of depth edge recovery to one of 2D intensity edge detection.
Creating stylized images from photographs has recently received a great deal of attention. The
majority of the available techniques for image stylization involve processing a single image as
the input, using image processing and computer vision techniques like image segmentation etc.
Accurately locating edge point is important for image measurement.
Edges are generally characterized by sharp transition in grey level. They are important in
computer image processing. Many edge detection methods are based on the idea to find the large
difference area between the images. Edge detection is used to locate position where changes of
image values are large. The methods include grayscale method, mean removal method, deep
filter method, difference method etc. The system captures additional information compared to
traditional systems and therefore has the potential to enhance visualization. The system works
for images from devices and stored images. The system works well for the color images as well
as black and white images.
The accurate detection of depth edges is also useful in many object recognition
tasks and human–computer interaction applications. Pathology department’s produces
documents involving surgical and autopsy specimens. The system involves special methods for
eliminating unwanted shadows, which aid the person in analyzing such documents.
19. PRODUCT SALES MANAGEMENT
Introduction
Product Sales Management software is general software developed for product selling stores and
other shops of the same type. This software helps them to do billing and account maintenance.
Purpose
The purpose of this document is to specify requirements and to give guidelines for the
development of above said project. In particular it gives guidelines on how to prepare the above
said project.
This document is intended to be a practical guide for people who developing this software.
Scope
As this is generic software it can be used by a wide variety of outlets (Retailers and Wholesalers)
to automate the process of manually maintaining the records related to the subject of maintaining
the stock and cash flows.
Goal
The main goal of the application is to maintain the records of Product Sales and account details
with cash transaction maintenance.
Overview
Product Sales Management software is very needy for general product selling stores. This
software help them maintain day to day transaction in a computer.
20. ONLINE TOURISM
This project ONLINE TOURISM is used to reduce the major part of the manual work in the
concern. Customers can surf the places, hotels, travels and also they can specify their
requirements. Enquiring about places and facilities also available through online tourism. The
data which is given into the computer is stored in the database and this also makes the concern to
maintain a very less number of files in them.
Also this project is an online project so the customers has an advantage that they can Surf for
tourists spots and can make schedule by sitting in their home itself with their credit cards. This
project has the search option which helps a lot for customers who are searching for tourist spots.
21. PUBLIC AUDITING IN CLOUD
Cloud computing is a long dreamed vision of computing as a utility, where users can
remotely store their data into cloud so as to enjoy the services from a shared pool of configurable
resources. Many users place the data in cloud, so maintaining the data with security is a prime
concern. Thus, enabling public auditability for cloud data storage security is of critical
importance so that users can resort to an external audit party to check the integrity of outsourced
data when needed. This work studies the problem of ensuring the integrity of data storage in
Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on
behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. Cloud
Computing moves the application software and databases to the large data centers, where the
management of the data and services may not be fully trustworthy. This unique attribute,
however, poses many new security challenges which have not been well understood. In this
project, we focus on cloud data storage security, which has always been an important aspect of
quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective
and flexible distributed scheme with two salient features, opposing to its predecessors. By
utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme
achieves the integration of storage correctness insurance and data error localization, i.e., the
identification of misbehaving server(s). Unlike most prior works, the new scheme further
supports secure and efficient dynamic operations on data blocks, including: data update, delete
and append. This project employs the JAVA technology.
22. Result Automation:
PURPOSE:
The purpose of result automation system is used to manage the student result details of
the college in an efficient manner and no time wasting for checking the paper. In this project we
collecting all mark details and feed them in to database then we calculating the percentage of
individuals and ranking among them. We added comparitive between each subjects and also
departments. We added web scraping technique in our work. It is used to collect web information
automatically. The main objective of result automation system is to efficiently evaluate the
candidate thoroughly through a fully automated system that not only saves lot of time but also
gives fast results.
SCOPE:
Scope of this project is very broad in terms of other manually taking exams.
Few of them are:-
This can be used in educational institutions.
Can be used anywhere any time as it is a web based application(user Location doesn’t
matter).
Staffs can easly calculate the result summary details automatically.
FEATURES:
Secure
Easy to use
Reliable and accurate
Automatically calculate the result percentage
23. Garments Industry Management
This project titled as “Garments Industry Management” is a network of facilities
and distribution options that performs the functions of procurement of Items, transformation of
these materials into intermediate and finished goods, and the distribution of this finished
products to customer.
This project devoleped in Visual basic 6.0 as front end and Microsoft access
as back end to store informations
These are some of the modules to be computerized.
MODULES:
Material Details:
This module contains detail description about material details used to store in the database. Such
as material name, type, unit etc
Buyer Details
This module used to store buyer details. Such as buyer name, address, phone, cst no, tin no etc
Party Details
This module used to stores the party details Such as party name, address, phone, cst no, tin no etc
Agent Details
This module used to stores the agent details Such as agent name, address, phone, etc
Lorry Details
This module used to stores the transport details Such as lorry no, driver name, phone no
Expenses
This module used to stores the expenses details such as bill no, date, expenses, amount
Reports:
This module generate reports for Buyer, Party, Agent, Lorry Expenses details
24.24. SALES MANAGEMENT SYSTEM
The project report presented here is SALES MANAGEMENT SYSTEM. This system is
developed in visual basic 6.0 (front end) and ms access 7.0 (back end) .Under Windows NT
platform. The developed system maintains and manipulates the data regarding stores and purchase
department. The main objective of the system is to assist in preparing the inventory analysis for
L&T. This project is to develop an application software to computerize the inventory level of all
materials and the stores Department and also some operations of the purchase department of
GOPINATH ENTERPRISES, COIMBATORE.The project “STOCK MANAGEMENT
SYSTEM” for GOPINATH ENTERPRISES is developed for the use of stores & purchase
department, COIMBATORE. It includes the following activities.
Purchase
Storing the items for the future needs
The main function of the purchase department can be categorized as follows:-
Purchase requestion
Enquiry
Quotation
Purchase order
The main function of stores department can be categorized as follows:
material receiving note
Custody and issues
Inventory control
25. HOSPITAL TRACKING SYSTEM
Hospitals currently use a manual system for the management and maintenance of critical
information. The current system requires numerous paper forms, with data stores spread
throughout the hospital management infrastructure. Often information (on forms) is incomplete,
or does not follow management standards. Forms are often lost in transit between departments
requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple
copies of the same information exist in the hospital and may lead to inconsistencies in data in
various data stores.
A significant part of the operation of any hospital involves the acquisition, management
and timely retrieval of great volumes of information. This information typically involves; patient
personal information and medical history, staff information, room and ward scheduling, staff
scheduling, operating theater scheduling and various facilities waiting lists. All of this
information must be managed in an efficient and cost wise fashion so that an institution's
resources may be effectively utilized HTS will automate the management of the hospital making
it more efficient and error free. It aims at standardizing data, consolidating data ensuring data
integrity and reducing inconsistencies.
26. Pump Management System
This project is concerned with developing the service software using Visual Basic with
Oracle Database. To provide a quick & faster service . the daily service calls are recorded in call
registration form the entire service software is designed in such a way that any user can operate
with case and it provide all the information for the service.
In the system all item details are maintained using separate tables. In this information are
used at item to be sales. The contract information are maintained in this company. The contract
means a mutual agreement is made between the customer of the company before the service
begin, that stipulated form is just entered in the contract entry form. It contains the customer
details.
Daily service calls are recorded initially in call registration form, the details required for a
call to get registered are registration no, item code, location, contract type etc.
The investigation into system operation and possible change to the system is
called system analysis system analysis is a important activity that takes place when we are
building new information system or changing the existing one .
27. Provident Fund Management
Provident Fund Management (PFM) is an integrated software to keep track on the Provident
Fund Investment/Details etc. It has covered practically all the modules that a company looks for
in a Provident Fund Management Software.
PFM has been developed with VisualBasic and back end RDMS tools SQL Server. It's a true
GUI based 32 bit user friendly Software which supports an inbuilt Report Writer and Draft
Mode Printing. The amazing computing speed of the software reduces computing time to a
great extend. Provident fund details are described here
The Employees' Provident Fund & MP Act,1952 is an important piece of Labour Welfare
legislation enacted by the Parliament to provide social security benefits to the workers . At
present, the Act and the Schemes framed there under provides for three types of benefits -
Contributory Provident Fund, Pensionary benefits to the employees/ family members and the
insurance cover to the members of the Provident Fund.
At the inception of the scheme an employee who was in receipt of pay up to Rs.300/- p.m. ,
and who worked for one year was eligible for membership of the fund. As a result of
amendments made from time to time, the conditions of eligibility for membership of the fund
have been liberalized in favor of employee. Presently an employee at the time of joining the
employment and getting wages up to Rs.6500/- is required to become a member. Now an
employee is eligible for membership of fund from the very first date of joining a covered
establishment.
28. SYSTEM SPY
System Spy Software is a versatile utility program that can perform much different
protection for our personal computer and network system. On activation of this System Spy
Software, it records the process running on the specified system, the applications used by other
users and stores them in log files. It will record all the. It records all the applications opened and
executed.
System Spy Software also performs screen capturing. We can capture all desktop. We
can capture the screen when a new window got focus or at fixed time intervals. Access to the
System Spy Software can be prevented with a password. The Application can be run minimized
in the system tray or invisibly in stealth mode.
It also helps the user to work on the files from the client system on a networking system.
Some specified application can be blocked by the user which will be terminated by the system
automatically.
It will automatically store all the files and we can view from the server and we can set
options from the server also. The System Spy Software can be run in any of the Windows
Platform such as Windows Me/NT4/2000/XP.
The System Spy Software operates in the background, hidden in the system tray. The
application is fully password protected and is active at the time of boot up.
29. Face Recognition
We propose an appearance-based face recognition method called the Laplacianface
approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face
subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant
Analysis (LDA) which effectively see only the Euclidean structure of face space, LPP finds an
embedding that preserves local information, and obtains a face subspace that best detects the essential
face manifold structure.
The Laplacianfaces are the optimal linear approximations to the eigen functions of the
Laplace Beltrami operator on the face manifold. In this way, the unwanted variations resulting from
changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis
shows that PCA, LDA, and LPP can obtained from different graph models. We compare the proposed
Laplacianface approach with Eigenface and Fisher face methods on three different face data sets.
Experimental results suggest that the proposed Laplacianface approach provides a better representation
and achieves lower error rates in face recognition.
30. AUTOMATED DATABASE MIGRATION
XML Database Migration is a project of migrating the existing databases into XML
format. Conversion of databases to XML file format, the databases like Ms-Access, Oracle and
MS-SQL connects in the network or the oracle in the personal computer can be connected for the
generation of XML code. Let us consider, user runs a firm with three companies with different
database’s respectively. User planned to mingle the entire database’s of the firm in to a single
database. The user wants to migrate the entire database in to a single database. Migration of a
database to another database is a huge process and a complex one. In such case our project can
be used as we are converting the entire database into a XML file and then it is to a single
database.
31. Automated employee information System
Payroll system is the heart of any Human Resource System of an organization. The
solution has to take care of the calculation of salary as per rules of the company, income tax
calculation and various deductions to be done from the salary including statutory deductions like
Income tax and provident fund deductions. It has to generate pay-slip, cheque summary and MIS
reports.
It is understood that we are tired of managing thousand of odd papers, pay slips, payroll
reports, and salary details and so on. Imagine that we have a payroll processing system which
will generate our pay slips and payroll reports within seconds. We can help others automated
your payroll system by developing a customized payroll application that suits your specific
requirements.
Main aim of developing Employee Payroll Managementis to provide an easy way not
only to automate all functionalities involved managing leaves and Payroll for the employees of
Company, but also to provide full functional reports to management of Company with the details
about usage of leave facility.
We are committed to bring the best way of management in the various forms of EPM.We
understand that EPMin not a product to be sold, it is a tool to manage the inner operation of
Company related to employee leave and Payroll.
This Application works in Multiple PC’s installed on multiple Computers but sharing
same database by which users of different department can use it sitting at different locations
simultaneously.
But in future we can make the Application where the database will be hosted in order to
manage the all departments which will be located in different places and by keeping domain of
Application as Online.
Benefits
To improve the efficiency.
Quickly find out information of an employee details.
To provide easy and faster access information.
To provide user friendly environment.
32. Network System Information Tool
SYNOPSIS
The project entitled “Network System Information Tool” The Computer plays
an important role in the maintenance of the organization. The project involves in the
development of a tool for getting the network system information of the computer system
that is in use. The software “Network System Information Tool” collects all the
information about the network system.
The system has helped in reducing redundancy of data and improving the consistency of
data in the system. The system excellently checks for most of the entry areas. The system
is flexible, user friendly and has its own full data security. The system helps the top-
management in quick decision-making.
The network information module used to display the details about the network being used
in the network systems. The system information module used to display the details about
the network systems. The hardware information module displays the information about
the output devices and its configuration in network systems.
The drive information module displays the details about the drives in the system that is
being used. The purpose of the project is to display the details about the memory in the
Network systems.
33. CALL LOGGING SYSTEM
SYNOPSIS
The project entitled “CALL LOGGING SYSTEM” is prepared for the service sectors
and company maintaining information regarding their customer service. This project is dealt with
the maintenance of Call Logging.
This project is developed using Visual Basic 6.0 for programming and user access, which
is connected with backend MS Access using the OLEDB 32bit Middleware.
The project Call Logging is a facility for tracking the problems in Customer Support
Division, which is logged by the customer from a telephone. Logging information includes: the
Customer details like who made the call, problem priority, problem description and duration of
call etc. It is mainly used to solve the problems and maintain the record of the solved
information’s for future reference.
Call logging is a feature or service offered by some private exchanges, virtual private
networks and computer integrated telephony solutions, it provides telephone records for a given
telephone number/extension number/ customer account etc. Depending on the system, call logs
can be output either via a printer or to a PC.
This Call logging project provides a method to appropriation sections of problem solving
period. It provides methods of quality control by allowing the customers to log the call through
network and how fast a telephone call is answered, typical length of call based on the problem
priority – useful for applications including: help desks or sales performance evaluation, etc.
Some of the modules in this project are,
Customer details
Sales Entry details
Service calls
Problem Assigning
Reports
34. COURSE REGISTRATION SYSTEM
SYNOPSIS
The “COURSE REGISTRATION SYSTEM” is developed for handling the student’s
course information. This information system is very helpful to the faculties, Students and the
administration etc.
This system divided in to separate modules for reducing the burden of work. There are
six modules in this project. Those are Student Registration, Staff Master, Course Master, Course
Selection, Student Fees, Exam Details and Reports for the above modules.
In the student registration module, it deals with the detailed student information, contact
address, contact number, like vise. In the exam module, it helps the student to attend
examination. It deals with the functions like the examination process and the results.
The exam results module helps to know the overall performance of the student. It
evaluates the student on the basis of monthly, terminally exams.
The proposed system has been designed to replace the existing system. The
computerization of Course Registration System aims to reduce the work load of the staff and
administration is ready for the quick reference on different files to retrieve the necessary
information.
Microsoft Visual Basic is used as the front tool for making an object oriented approach
to development of this software. Microsoft access is used as the backend for this system.
Modules in this project are,
Student Master
Staff Master
Course Master
Course Registration
Student Fees
Exam Details
Reports
35. File Distribution Protocol in Peer to Peer Systems
ABSTRACT
In the past few years, P2P file distribution applications (e.g., Bit Torrent) are becoming
so popular that they are the dominating source of Internet traffic. This creates significant
problems to Internet Service Providers (ISPs), not only because of the added complexity in
traffic engineering, but the increase of traffic, in particular on the cross-ISP links, implies
congestion and a higher operating cost. In this paper, we consider an ISP-friendly file
distribution protocol which uses the “exploiting-the-locality principle” (ELP) to reduce the cross-
ISP traffic. To show its benefit, we derive an upper and lower bound of cross-ISP traffic for the
protocols which rely on ELP and show that the cross-ISP traffic can be reduced significantly
when the number of peers within an ISP increases. To carry out realistic study, we design and
implement our ISP-friendly protocol (which is compatible with the current Bit Torrent protocol)
and carry out large scale experiments on Planet Lab to measure the reduction of the cross ISP-
traffic and the file downloading time. More important, we also show how the proposed ISP-
friendly protocol can handle the “black-hole” security attack. This paper sheds light on the merits
and design direction of ISP-friendly content distribution protocols.
36. Effective key Generation for Multimedia Application
ABSTRACT
The project entitled Effective key Generation for Multimedia Application is the application
developed to embed a video file in another video signal. It is concerned with embedding
information in an innocuous cover Speech in a secure and robust manner. This system makes the
Files more secure by using the concepts Steganography and Cryptography. Steganography, poor
cousin of Cryptography is the art of hiding messages inside other messages such that the very
existence of the message is unknown to third party. The goal of cryptography is to make data
unreadable by a third party, the goal of Steganography is to hide the data from a third party
Through the use of advanced computer software, authors of images and software can place a
hidden trademark in their product, allowing them to keep a check on piracy. This is commonly
known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object
from a similar object is known as finger printing. Together, these two are intended to fight
piracy. The latter is used to detect copyright violators and the former is used to prosecute them.
But these are only examples of the much wider field of Steganography.
The cover data should not be significantly degraded by the embedded data, and the
embedded data should be as imperceptible as possible. The embedded data should be as immune
as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is
necessary that the hidden message should be encrypted.
37. LIC management System
ABSTRACT
The main objective of the project is to provide full computerization of his agent carrier. This
project is under friendly and reusable to all LIC agents. This project provides all information
about Loans, Mediclaim, children plans, vehicle and pension policies. By this project these
people’s can interest easily towards their customers by giving readymade solutions to customer’s
queries. As such, policy details, premium calculation, etc.
The users of this project can obtained day today customer list, premium details, due
dates, remainder letters and appointment details are generated as report daily. The easy
to use interface allows you to keep track of your policies and their premium. Support for
surrender value, Delete Policy and Lapse Policies. Commission Report, Deposit Slip Report,
Maturity Check etc. have been added.By this project it is very compatible and very helpful to
maintain the customer relationship.
38. Corporate Training
Corporate Training for the facilities in the campus. This is an Intranet based application that can
be accessed throughout the campus. This system can be used to automate the workflow of
service requests for the various facilities in the campus. This is one integrated system that covers
different kinds of facilities like class-rooms, labs, hostels, mess, canteen, gymnasium, computer
center, faculty club etc. Registered users (students, faculty, lab-assistants and others) will be able
to log in a request for service for any of the supported facilities. These requests will be sent to the
concerned people, who are also valid users of the system, to get them resolved. There are
features like email notifications/reminders, addition of a new facility to the system, report
generators etc in this system.
It is very useful for students to know about the facilities provided in the campus when ever they
want to check easily and it takes less time.In mandatory checking they have to maintain many
files and it takes much time to check about particular facility and all the details. So to overcome
the problems in the mandatory maintainense,the online help desk tool can give the fast and
accurate checking of the facility details in less time.
39COMPANY ADDRESS BOOK
ABSTRACT
Company address book mainly developed for an organization to store their employee’s personal
data. The System consists of various users like the Administrator, HR manager and Employees.
Everyone have their own responsibilities.HR manager has the privileges to add/delete the
employees. Administrator registers the employees and allocates the IDs for the employees.
Employees can login and store their personal data.
Company address book is a system provided to the adding, deleting, editing the important
addresses. Keeping employees contact records up-to-date plays a vital role in promoting
effective communications.
Features:
Making records of addresses of the employees.
Making records of details of employees
Adding and deleting the employees.
Allocating ids to the employees
40.Airline Reservation System
ABSTRACT
Airline Reservation System contains the details about flight schedules and its fare tariffs,
passenger reservations and ticket records. An airline’s inventory contains all flights with their
available seats. The inventory of an airline service is generally divided into three category of
classes (e.g. First, Business or Economy class) and each category is having seats up to 26
bookings, along with prices and booking conditions. Inventory data is imported and maintained
through a Schedule Distribution System over standardized interfaces. One of the core functions
of the inventory management of airline reservations is the inventory control. Inventory control
steers how many seats are available for the different booking classes, by opening and closing
individual booking classes for sale. In combination with the fares and booking conditions stored
in the Fare Quote System the price for each sold seat is determined.