Sie sind auf Seite 1von 47

APPLICATION PROJECT ABSTRACTS

1. Remote Task Monitoring System Remote Monitoring System is a versatile utility program that can perform much different protection for our personal computer and network system. On activation of this Remote Monitoring System, it records the process running on the specified system, the applications used by other users and stores them in log files. It will record all the. It records all the applications opened and executed.

Remote Monitoring System also performs screen capturing. We can capture all desktop. We can capture the screen when a new window got focus or at fixed time intervals. Access to the Remote Monitoring System can be prevented with a password. The Application can be run minimized in the system tray or invisibly in stealth mode. It also helps the user to work on the files from the client system on a networking system. Some specified application can be blocked by the user which will be terminated by the system automatically. It will automatically store all the files and we can view from the server and we can set options from the server also. The Remote Monitoring System can be run in any of the Windows Platform such as Windows Me/NT4/2000/XP. The Remote Monitoring System operates in the background, hidden in the system tray. The application is fully password protected and is active at the time of boot up.

2. STUDENT INFORMATION SYSTEM The project work entitled as STUDENT INFORMATION SYSTEM is designed to manage the student activities of the Department. Student information system includes Student Details, Student Parent Details, Student HSC marks, Student Academic Details with Internal marks and Semester marks, Student Achievement Details. This project gives the user, the following features to perform the activities. Master Maintenance Backup and History Generating Reports

Master Maintenance System requires maintenance of certain database on activations will be taking place. The responsibilities of maintaining the data is divided among the user and the modules of the system. Backup and History Daily backups are to be taken for all the data maintained in the system. The user may create history files whenever he or she wishes. Generating Reports System provides a number of outputs. All these reports can be either viewed on the screen or printed by the user. The software is developed in VISUAL BASIC.NET as front end and SQL SERVER as back end. This project gives all the details about STUDENT INFORMATION SYSTEM

3. ONLINE TEXTILE SHOPPING

This project ONLINE TEXTILE SHOPPING is used mainly to reduce the major part of the manual work in the concern. And all the data, which is given into the computer, is stored in the database and this also makes the concern to maintain a very less number of files in them. Also this project is an online project so the customers has an advantage that they can shop their Dress by sitting in their home itself with their credit cards. This project has the search options, which helps a lot for customers who are searching for a particular Dress. The purchased Dresses will be delivered to their home itself. This project entitled ONLINE TEXTILE SHOPPING has four main modules and has been developed with ASP.NET as front end and SQL SERVER 2000 as the back end in Windows XP platform.

4. Active Source Routing Protocol

An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR(Dynamic Source Routing). The Location Aided Routing protocol uses location information to reduce routing overhead of the ad-hoc network! Normally the LAR protocol uses the GPS(Global Positioning System) to get these location informations. With the availability of GPS, the mobile hosts knows there physical location. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks multiple routes between nodes to defend routing against denial of service attacks.

5. DIGITAL STEGANOGRAPHY

Steganography concentrates on hiding a message in an innocuous carrier to try to conceal the existence of the message. It is the technique to hiding a message within images, or in audio file, or in video files. To protect the data from attackers and hacking the message this technique can be of very much important. In this project deals with hiding the image or text files with in an image and transmitted .in this project the image or text to be transmitted is being encrypted, compressed and then embedded with some other image. At the receiving end the file is being extracted, decompressed and decrypted. In this project, the message supplied by the user will be inherited with Image files, in order to make the message as raw one. When hackers trapped the image file containing the message they cant see or hear any message embed within it. They could see the clear image only. The message can be read by the authorized person by providing correct password. Every pixel of Image files will be extracted and replaced subsequent with text typed by the user. It could be done by lose less algorithms. Visual Basic.Net will be the front-end tool for this project. Modules in this project are: Text Editor Image Browser Hide message with Image File Password Authentication Reveal the Original Message

6. PORT SCANNER A Port Scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by hackers to compromise it. To scan the port a host is to scan for multiple listening ports on a single target host. To port sweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service. Port Scanning is one of the most popular reconnaissance techniques attackers use to discover services they can break into. All machines connected to a Local Area Network (LAN) or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available (i.e., what service might be listing to a port). Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. TCP - Transmission Control Protocol and UDP - User Datagram Protocol are two of the protocols that make up the TCP/IP protocol suite which is used universally to communicate on the Internet. Each of these has ports 0 through 65535 available so essentially there are more than 65,000 doors to lock. But the virtual port scanning is happening at now. Through this the user can verify whether any port HTTP, FTP, or SMTP is available, that is open. If so the user can send any application, or program to the client machine. The server monitor is always keeping on watching the client machine for port sweeping. The available and open port can be interrupt by the server administrator. This application is developed using socket controls, and remoting namespace available in Visual Basic.Net. The server will ping the client to establish the connection between the server and client. Once it is achieved the other process is above one.

7. WEB BASED ADVERTISEMENT AGENCY SYNOPSIS In this competitive world everyone needs to achieve their goals within the short span of time. Like business it developing its wings in enormous way. For that every concern needs to reach their customers as quick as possible. The mantra for success in marketing field is to murmuring the success keyword before it comes to the market. The aim of this project Web Based Advertisement Agency is helps the user to post web based advertisements in online. Users of any kind accessing this website can view the various free advertisement placed or displayed on this website. In the same way any registered user can create and can post this advertisement to the website or can order to display on selected web URL. To maximize the potential power of every concern, the advertisement plays a vital role. To computerize the activities developed to succeed the previous manual work. Computerize the work like Advertising increase its potential, gives reliability, accuracy in any field. The information supplied by the viewer or user of the website, parsed by the web admin, verified and checked for the reliability. Once the information acquired from the user is acknowledged then the admin grants permission to create the advertisement. Then the created advertisement will be placed in allocated place. The place where the advertisement will be going to display is decided by the viewer who supplies the information. This project has been developed by using ASP.Net as Front-end and MS-SQLServer as Back end.

8. Residential Life Tracking The Residential Life Tracking system assists the administrative staff to systematically manage student residential allocation issues, Resident inventories and room maintenance services. By specifying the allocation criteria, the system is able to automatically generate room allocation. Alternatively, the administrator may also arbitrarily choose available rooms for transfer. Queries and reports are also available to help administrators make decisions based on updated and relevant information. Besides that, school administrators have the flexibility to configure and define Resident buildings, blocks, floors and rooms. Should there be an ongoing renovation or repair work, the status of the building, block or room affected can be deactivated to exclude it from room allocation. Buildings can also be allocated by gender while guardians or wardens responsible for the buildings can be stipulated with schedules generated. The system also has a check-in and check-out function built in, which can be used for room transfer and exchange, booking and reservation, key collection and such. This feature enables the administrator to keep track of the tenant moving in and out of the Resident, and extended stay during school and public holidays. Modules 1. Resident area/building record system 2. Residents (Student, Faculty) Information management 3. Resident Room reservation 4. Resident (Student, Faculty) complaint record section 5. Resident Inventory Tracking 6. Resident Services management

9. Knowledge Base Management System

Knowledge Management is the collection of processes that govern the creation, dissemination, and utilization of knowledge. Knowledge management is the management of the organization towards the continuous renewal of the organizational knowledge base - this means e.g. creation of supportive organizational structures, facilitation of organizational members, putting IT-instruments with emphasis on teamwork and diffusion of knowledge (as e.g. groupware) into place. The project Knowledge Base Management System streamlines the entire documentation process for companies to share information with employees, customers, and partners. The flexible, self-learning knowledge base captures and presents current, relevant information to customers, in a Web self-service mode, and to agents through a flexible portal within the single screen agent interface. It reduces the volume of e-mail access, phone calling, conferencing, and seminar classes. It provides the facility Powerful search and retrieval methodologies; ensuring customers receive rapid, accurate, and consistent responses. This project is developed using Asp.Net as front-end and SQL Server as back-end. Knowledge Management system is an intelligent, multi-user system. It enhances self-service customer support, help desk operations, and document management applications. The interactive users of this system are Authors (Knowledge creators), approver (Knowledge Management) and customer or employee. The Authors can create, edit and organize their knowledge. The approver will verify the knowledge and publishing it to the content of the website. Finally it will deliver to the search process to share knowledge.

10. HRMS Resource Planning

The revolutionary trends of computerization have reached the peaks achieving global goals in all fields and sectors. The ERP-HRMS systems getting computerized are leading to a new and innovative way to approach to above said. With the major organizations hosting services of HRMS our project specifically aims to the total computerization of the ERP-HRMS.

With the total automation of ERP-HRMS, the manual dependency is minimized to a large extent. It inherits all the properties of computerizing a system which includes quick response, less processing time, non-diligence, fast recovery, robustness, flexibility, reliability, scalability.

Todays trend demands high rate of automation for the ERP-HRMS as the organizations a re growing in exponential form and maintaining employee records in a consistent format. To satisfy the needs of clients, todays organization need more and more of workforce. The ERP-HRMS system takes care of this by taking in resumes from new aspirants and allowing the HR to view them in and do selections there upon.

11. Automated Vehicle tracking System The Vehicle tracking System keeps track the information about the Vehicles, Maintenance, Repair, Parts, Employees, Location and Vendors. It also keeps track the maintenance performed for different vehicles which are used for transportation. The super users of the system are the ADMIN and the MANAGERS of the different departments allocated by the admin. The admin may be the owner of the transportation organization or the manager of transportation department of a particular manufacturing company. If any other vehicle is added to the fleet which already exists for the organization/department the details of the vehicle is added. The details includes whether it is a new one or taken any loan/lease. Any employee is newly appointed or the existing employee is taken off both the details are maintained including their personal details and profession details. The details of the maintenance that are being performed such as repairs/services and to be performed are also maintained. The maintenance to be performed can also be scheduled for each type of vehicles. The details of the parts/inventory used for the vehicles are maintained. The reorder level and the reorder quantity are predefined for each particular type of part. The Vendors or suppliers of the vehicles, parts and performs maintenance required for the vehicles. The particulars of the various vendors are maintained in this system.

12. YARN-DEPOT MANAGEMENT SYSTEM The project work entitled YARN-DEPOT MANAGEMENT SYSTEM is developed for Color World. This project has been developed for any concern handling Yarn Details. The Main objective of this project is to maintain inward and outward details with stock and to prepare Billing details. The system has been developed to reduce the response time and ensure flexibility. The system also comfortable for further development and enhancement of the exiting system. It computerizes the process of entire yarn department in real life. The type of yarns used for production, the needles that are used for production, employee details, and daily transaction will be maintained in the database. This project has been developed by using Visual Basic 6.0 as Front-end and MS-Access as Back-end. The entire application is developed to suite Windows XP/98 and above configurations. Modules in this Project are, Master Transaction Details Yarn Availability View Reports

13. Advertisement Agency In this competitive world everyone needs to achieve their goals within the short span of time. Like business it developing its wings in enormous way. For that every concern needs to reach their customers as quick as possible. The mantra for success in marketing field is to murmuring the success keyword before it comes to the market. To maximize the potential power of every concern, the advertisement plays a vital role. To computerize the activities of an advertisement agency this project entitled Advertisement Agency has been developed to succeed the previous manual work. Computerize the work like Advertising increase its potential, gives reliability, accuracy in any field. Here, this project Advertisement Agency has multiple activities in their day to day activity. Like, they have to maintain their clients either new or golden customers, the details regarding their customer, customer ad details, booking details, ad media details etc,. This entire process has been converted into systemized. Front-end for this application is Visual Basic 6.0 and MS-Access will be the back-end. Every module has its own unique nature to maintain the records. The billing calculation module reduces the workload of ad agency owner in the mean time of preparing the bill for their clients. To computerize every activity it needs the detail study and grasping of field activity. Finally the reports can be generated from Data Report to produce detailed reports for a weekly, monthly or quarterly basis.

This project is categorized into some basic modules, they are, client details, order booking details module, advertisement details module and billing calculation module. For every module there should be one report is available.

14. Efficient Broadcasting An efficient broadcast scheme in mobile ad hoc networks is to determine a small set of forward nodes to ensure full coverage. Previously used methods that guarantee coverage when the local view of each node on its neighborhood information is updated in a timely manner then we consider a general case where nodes move even during the broadcast process, making it impractical to maintain up-to-date and consistent local views. A formal framework is used to model inaccurate local views in MANETs, where full coverage is guaranteed if three sufficient conditions, connectivity, link availability, and consistency, are met. Three solutions are proposed to satisfy those conditions. First, we give a minimal transmission range that maintains the connectivity of the virtual network constructed from local views. Then, we use two transmission ranges, one for neighborhood information collection and the other for actual data transmission, to form a buffer zone that guarantees the availability of logical links in the physical network. We propose a mechanism called aggregated local view to ensure consistent local views. The effectiveness of the proposed scheme is confirmed with performance analysis.

15. LIBRARY MANAGEMENT SYSTEM

Library Management is related to library management which provides reading services to its members. It will deal with the process of maintaining data about the books and many other things as well as transactions, which are taking place in the library with respect to the issue and return of the books. This solution helps the administrator to accomplish his tasks at ease. Any student of any department from this college can become a member of the library by filling a prescribed form. They can get the book issued, so that they can take home and return them. Staffs also can take the books from the library. Any student can make use of it for providing information about author, content of the available books. Hence in the existing system for Library Management System, the performance evaluation system and the maintenance are done manually. The proposed system will maintain all the information in a standard database and will be able to generate reports as and when necessary. Accessing and the user has the right to search based on the above mentioned criteria. This Project entitled Library Management System is developed with asp.net as front end and Sql server as back end. This project Contains modules such as, Admin Module: Login, Create Group, Create Member Books issue, Books Return, Transaction

User Module: User Login Update Profile View status

16. DEPARTMENTAL STORE MAINTENANCE SYSTEM The project is entitled as DEPARTMENTAL STORE MAINTENANCE SYSTEM. The main aim of this project is to computerize the daily activity performed in departmental store. The daily transactions are sales & purchase. So, the computerization is a must. This project can be viewed into three modules such as purchase details, sales details and stock details of garments. The DEPARTMENTAL STORE work as a whole sale distributor for the products as well as retailer. Purchase order is prepared once the stock of goods attains reorder level. After the purchase bill of products, the quantity of that particular products are updated in the stock file. During the sales also, the sales quantity is updated. Dealer payments are maintained. The system generates the following reports needed for the organization. Report on Daily stock details Reports on Daily Customer details Report on Daily Supplier details Report on Daily Purchase details Report on Daily Sales details

17. Finance Automation A broad category of software that deals with accounting and monetary transactions. It includes payroll, accounts receivables and payables, general ledger, spreadsheets, financial planning, check writing and portfolio management. Finance automation is a specialized software application for the finance businesses. With the Finance automation software will be able to efficiently and accurately manage your finance contracts and relationships with customer and companies. Features Full Windows Application - with mouse, menus, and toolbars. Easy to learn and use, it's similar to other Windows products. Aesthetically pleasing and readable screens - no codes or encrypted messages. Get up to speed quickly and even a casual user can remain proficient. Multiple networking support - runs on Microsoft Windows from 98 to XP. Provides greater flexibility and ensures long-term support. Modules 1.Master a)Company Details In the Company Detail Module all the Company details are got and maintained. b)Branch Details

In the Branch Detail Module the Branch code for companies are created. This is based on the Company Master c)Bank Details In the Bank Detail Module all the details of the banks like Bank code, Bank name, address are got and maintained. d)Deposit Details In the Deposit details Module the details of the depositor are got and maintained. It includes the details like name of the depositor, address and their informations. e)FD Party Details In the Competitor Contact Module the details like the Fixed depositors are got and maintained.

It includes the details like name, their designation, department and communication address f)Transaction Receipt Details In the Transaction Receipt Details Module the details of the transaction receipt for a particular transaction are maintained. It includes the details like Transaction no, Transaction Date ,Amount value,Incentives, Issue date,Receipt date,Receipt mode , Cheque, Bank charges and Bank name. g)Tax Details In this module available government taxes for finance ,Tax name and tax percentage. 2.Transaction a) HP Transaction are maintained .It includes Tax code

Through HP Transaction the activities performed by High Purchaser are monitored. It includes details like name of the customer, Asset Name,Asset value, Amount financed Emi Amount and Emi date.

b)Deposit Details In the Deposit Details Module the details of the Deposit type, Interest rate, Deposit Amount ,period, Repayment mode, renDate, Broker name, Broker type and etc. c)Payments In the Deposit Details Module the details of PTC no,name,payment date,coupon no,payment mode,cheque/ddno,cheque/dddate,place,bank etc. d)Closure Details In etc, e)Part Refund Details In the Deposit Details Module the details of the PTC no, refund date,depositor,depttype and etc f)Renewal Details In the Deposit Details Module the details of the new PTC no, renewal date,renewal type, old PTC amount,trno,tramount,paidamount,new PTC amount and etc. the Deposit Details Module the details of closure no,closure date,closure

type,Inamt,investment,investment date, maturity date,paidamount,totalamount,payment mode

3.Reports This module generate all PTC information, interest rates, maturity list based on deposit type wise or Transaction no wise for daily,weekly,monthl and yearly .This MIS report contains all the details of day by day transactions. The following reports are created a) PTC ledger b) Interest Payments c) Maturity List d) PTC closure reports e) PTC renewal reports

18. Harnessing Depth Edges with Images The project entitled Harnessing Depth Edges with Images has been developed to identify the sharp edges for the given images, which are useful in various technical applications. The ability to highlight the depth discontinuities makes it possible to produce stylized photographs, which are useful in technical applications such as medical imaging. The depth edges are important low-level features for many computer vision tasks, such as visual recognition. Instead of using expensive, elaborate equipment for geometry acquisition, the images can be easily exploited using this technique. The system looks for depth discontinuities reducing the general 3D problem of depth edge recovery to one of 2D intensity edge detection. Creating stylized images from photographs has recently received a great deal of attention. The majority of the available techniques for image stylization involve processing a single image as the input, using image processing and computer vision techniques like image segmentation etc. Accurately locating edge point is important for image measurement. Edges are generally characterized by sharp transition in grey level. They are important in computer image processing. Many edge detection methods are based on the idea to find the large difference area between the images. Edge detection is used to locate position where changes of image values are large. The methods include grayscale method, mean removal method, deep filter method, difference method etc. The system captures additional information compared to traditional systems and therefore has the potential to enhance visualization. The system works for images from devices and stored images. The system works well for the color images as well as black and white images. The accurate detection of depth edges is also useful in many object recognition tasks and humancomputer interaction applications. Pathology departments produces

documents involving surgical and autopsy specimens. The system involves special methods for eliminating unwanted shadows, which aid the person in analyzing such documents.

19. PRODUCT SALES MANAGEMENT Introduction Product Sales Management software is general software developed for product selling stores and other shops of the same type. This software helps them to do billing and account maintenance. Purpose The purpose of this document is to specify requirements and to give guidelines for the development of above said project. In particular it gives guidelines on how to prepare the above said project. This document is intended to be a practical guide for people who developing this software. Scope As this is generic software it can be used by a wide variety of outlets (Retailers and Wholesalers) to automate the process of manually maintaining the records related to the subject of maintaining the stock and cash flows. Goal The main goal of the application is to maintain the records of Product Sales and account details with cash transaction maintenance. Overview Product Sales Management software is very needy for general product selling stores. This software help them maintain day to day transaction in a computer.

20. ONLINE TOURISM This project ONLINE TOURISM is used to reduce the major part of the manual work in the concern. Customers can surf the places, hotels, travels and also they can specify their requirements. Enquiring about places and facilities also available through online tourism. The data which is given into the computer is stored in the database and this also makes the concern to maintain a very less number of files in them. Also this project is an online project so the customers has an advantage that they can Surf for tourists spots and can make schedule by sitting in their home itself with their credit cards. This project has the search option which helps a lot for customers who are searching for tourist spots.

21. PUBLIC AUDITING IN CLOUD Cloud computing is a long dreamed vision of computing as a utility, where users can remotely store their data into cloud so as to enjoy the services from a shared pool of configurable resources. Many users place the data in cloud, so maintaining the data with security is a prime concern. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this project, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. This project employs the JAVA technology.

22. Result Automation: PURPOSE: The purpose of result automation system is used to manage the student result details of the college in an efficient manner and no time wasting for checking the paper. In this project we collecting all mark details and feed them in to database then we calculating the percentage of individuals and ranking among them. We added comparitive between each subjects and also departments. We added web scraping technique in our work. It is used to collect web information automatically. The main objective of result automation system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. SCOPE: Scope of this project is very broad in terms of other manually taking exams. Few of them are: This can be used in educational institutions. Can be used anywhere any time as it is a web based application(user Location doesnt matter). Staffs can easly calculate the result summary details automatically.

FEATURES: Secure Easy to use

Reliable and accurate Automatically calculate the result percentage

23. Garments Industry Management This project titled as Garments Industry Management is a network of facilities and distribution options that performs the functions of procurement of Items, transformation of these materials into intermediate and finished goods, and the distribution of this finished products to customer. This project devoleped in Visual basic 6.0 as front end and Microsoft access as back end to store informations These are some of the modules to be computerized. MODULES: Material Details: This module contains detail description about material details used to store in the database. Such as material name, type, unit etc Buyer Details This module used to store buyer details. Such as buyer name, address, phone, cst no, tin no etc Party Details This module used to stores the party details Such as party name, address, phone, cst no, tin no etc Agent Details This module used to stores the agent details Such as agent name, address, phone, etc Lorry Details

This module used to stores the transport details Such as lorry no, driver name, phone no Expenses This module used to stores the expenses details such as bill no, date, expenses, amount Reports: This module generate reports for Buyer, Party, Agent, Lorry Expenses details

24. SALES MANAGEMENT SYSTEM The project report presented here is SALES MANAGEMENT SYSTEM. This system is

developed in visual basic 6.0 (front end) and ms access 7.0 (back end) .Under Windows NT platform. The developed system maintains and manipulates the data regarding stores and purchase department. The main objective of the system is to assist in preparing the inventory analysis for L&T. This project is to develop an application software to computerize the inventory level of all materials and the stores Department and also some operations of the purchase department of GOPINATH ENTERPRISES, COIMBATORE.The project STOCK MANAGEMENT SYSTEM for GOPINATH ENTERPRISES is developed for the use of stores & purchase department, COIMBATORE. It includes the following activities. Purchase Storing the items for the future needs

The main function of the purchase department can be categorized as follows: Purchase requestion Enquiry Quotation Purchase order

The main function of stores department can be categorized as follows: material receiving note Custody and issues Inventory control

25. HOSPITAL TRACKING SYSTEM

Hospitals currently use a manual system for the management and maintenance of critical information. The current system requires numerous paper forms, with data stores spread throughout the hospital management infrastructure. Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost in transit between departments requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple copies of the same information exist in the hospital and may lead to inconsistencies in data in various data stores. A significant part of the operation of any hospital involves the acquisition, management and timely retrieval of great volumes of information. This information typically involves; patient personal information and medical history, staff information, room and ward scheduling, staff scheduling, operating theater scheduling and various facilities waiting lists. All of this information must be managed in an efficient and cost wise fashion so that an institution's resources may be effectively utilized HTS will automate the management of the hospital making it more efficient and error free. It aims at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.

26. Pump Management System

This project is concerned with developing the service software using Visual Basic with Oracle Database. To provide a quick & faster service . the daily service calls are recorded in call registration form the entire service software is designed in such a way that any user can operate with case and it provide all the information for the service. In the system all item details are maintained using separate tables. In this information are used at item to be sales. The contract information are maintained in this company. The contract means a mutual agreement is made between the customer of the company before the service begin, that stipulated form is just entered in the contract entry form. It contains the customer details. Daily service calls are recorded initially in call registration form, the details required for a call to get registered are registration no, item code, location, contract type etc. The investigation into system operation and possible change to the system is called system analysis system analysis is a important activity that takes place when we are building new information system or changing the existing one .

27. Provident Fund Management Provident Fund Management (PFM) is an integrated software to keep track on the Provident Fund Investment/Details etc. It has covered practically all the modules that a company looks for in a Provident Fund Management Software. PFM has been developed with VisualBasic and back end RDMS tools SQL Server. It's a true GUI based 32 bit user friendly Software which supports an inbuilt Report Writer and Draft Mode Printing. The amazing computing speed of the software reduces computing time to a great extend. Provident fund details are described here The Employees' Provident Fund & MP Act,1952 is an important piece of Labour Welfare legislation enacted by the Parliament to provide social security benefits to the workers . At present, the Act and the Schemes framed there under provides for three types of benefits -Contributory Provident Fund, Pensionary benefits to the employees/ family members and the insurance cover to the members of the Provident Fund. At the inception of the scheme an employee who was in receipt of pay up to Rs.300/- p.m. , and who worked for one year was eligible for membership of the fund. As a result of amendments made from time to time, the conditions of eligibility for membership of the fund have been liberalized in favor of employee. Presently an employee at the time of joining the employment and getting wages up to Rs.6500/- is required to become a member. Now an employee is eligible for membership of fund from the very first date of joining a covered establishment.

28. SYSTEM SPY System Spy Software is a versatile utility program that can perform much different protection for our personal computer and network system. On activation of this System Spy Software, it records the process running on the specified system, the applications used by other users and stores them in log files. It will record all the. It records all the applications opened and executed.

System Spy Software also performs screen capturing. We can capture all desktop. We can capture the screen when a new window got focus or at fixed time intervals. Access to the System Spy Software can be prevented with a password. The Application can be run minimized in the system tray or invisibly in stealth mode. It also helps the user to work on the files from the client system on a networking system. Some specified application can be blocked by the user which will be terminated by the system automatically. It will automatically store all the files and we can view from the server and we can set options from the server also. The System Spy Software can be run in any of the Windows Platform such as Windows Me/NT4/2000/XP. The System Spy Software operates in the background, hidden in the system tray. The application is fully password protected and is active at the time of boot up.

29. Face Recognition

We propose an appearance-based face recognition method called the Laplacianface approach. By using Locality Preserving Projections (LPP), the face images are mapped into a face subspace for analysis. Different from Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) which effectively see only the Euclidean structure of face space, LPP finds an embedding that preserves local information, and obtains a face subspace that best detects the essential face manifold structure. The Laplacianfaces are the optimal linear approximations to the eigen functions of the Laplace Beltrami operator on the face manifold. In this way, the unwanted variations resulting from changes in lighting, facial expression, and pose may be eliminated or reduced. Theoretical analysis shows that PCA, LDA, and LPP can obtained from different graph models. We compare the proposed Laplacianface approach with Eigenface and Fisher face methods on three different face data sets. Experimental results suggest that the proposed Laplacianface approach provides a better representation and achieves lower error rates in face recognition.

30. AUTOMATED DATABASE MIGRATION XML Database Migration is a project of migrating the existing databases into XML format. Conversion of databases to XML file format, the databases like Ms-Access, Oracle and MS-SQL connects in the network or the oracle in the personal computer can be connected for the generation of XML code. Let us consider, user runs a firm with three companies with different databases respectively. User planned to mingle the entire databases of the firm in to a single database. The user wants to migrate the entire database in to a single database. Migration of a database to another database is a huge process and a complex one. In such case our project can be used as we are converting the entire database into a XML file and then it is to a single database.

31. Automated employee information System

Payroll system is the heart of any Human Resource System of an organization. The solution has to take care of the calculation of salary as per rules of the company, income tax calculation and various deductions to be done from the salary including statutory deductions like Income tax and provident fund deductions. It has to generate pay-slip, cheque summary and MIS reports. It is understood that we are tired of managing thousand of odd papers, pay slips, payroll reports, and salary details and so on. Imagine that we have a payroll processing system which will generate our pay slips and payroll reports within seconds. We can help others automated your payroll system by developing a customized payroll application that suits your specific requirements. Main aim of developing Employee Payroll Managementis to provide an easy way not only to automate all functionalities involved managing leaves and Payroll for the employees of Company, but also to provide full functional reports to management of Company with the details about usage of leave facility. We are committed to bring the best way of management in the various forms of EPM.We understand that EPMin not a product to be sold, it is a tool to manage the inner operation of Company related to employee leave and Payroll. This Application works in Multiple PCs installed on multiple Computers but sharing same database by which users of different department can use it sitting at different locations simultaneously. But in future we can make the Application where the database will be hosted in order to manage the all departments which will be located in different places and by keeping domain of Application as Online.

Benefits To improve the efficiency. Quickly find out information of an employee details. To provide easy and faster access information. To provide user friendly environment.

32. Network System Information Tool SYNOPSIS The project entitled Network System Information Tool The Computer plays

an important role in the maintenance of the organization. The project involves in the development of a tool for getting the network system information of the computer system that is in use. The software Network System Information Tool collects all the information about the network system. The system has helped in reducing redundancy of data and improving the consistency of data in the system. The system excellently checks for most of the entry areas. The system is flexible, user friendly and has its own full data security. The system helps the topmanagement in quick decision-making. The network information module used to display the details about the network being used in the network systems. The system information module used to display the details about the network systems. The hardware information module displays the information about the output devices and its configuration in network systems. The drive information module displays the details about the drives in the system that is being used. The purpose of the project is to display the details about the memory in the Network systems.

33. CALL LOGGING SYSTEM SYNOPSIS The project entitled CALL LOGGING SYSTEM is prepared for the service sectors and company maintaining information regarding their customer service. This project is dealt with the maintenance of Call Logging. This project is developed using Visual Basic 6.0 for programming and user access, which is connected with backend MS Access using the OLEDB 32bit Middleware. The project Call Logging is a facility for tracking the problems in Customer Support Division, which is logged by the customer from a telephone. Logging information includes: the Customer details like who made the call, problem priority, problem description and duration of call etc. It is mainly used to solve the problems and maintain the record of the solved informations for future reference. Call logging is a feature or service offered by some private exchanges, virtual private networks and computer integrated telephony solutions, it provides telephone records for a given telephone number/extension number/ customer account etc. Depending on the system, call logs can be output either via a printer or to a PC. This Call logging project provides a method to appropriation sections of problem solving period. It provides methods of quality control by allowing the customers to log the call through

network and how fast a telephone call is answered, typical length of call based on the problem priority useful for applications including: help desks or sales performance evaluation, etc.

Some of the modules in this project are, Customer details Sales Entry details Service calls Problem Assigning Reports

34. COURSE REGISTRATION SYSTEM

SYNOPSIS

The COURSE REGISTRATION SYSTEM is developed for handling the students course information. This information system is very helpful to the faculties, Students and the administration etc. This system divided in to separate modules for reducing the burden of work. There are six modules in this project. Those are Student Registration, Staff Master, Course Master, Course Selection, Student Fees, Exam Details and Reports for the above modules. In the student registration module, it deals with the detailed student information, contact address, contact number, like vise. In the exam module, it helps the student to attend examination. It deals with the functions like the examination process and the results. The exam results module helps to know the overall performance of the student. It evaluates the student on the basis of monthly, terminally exams. The proposed system has been designed to replace the existing system. The computerization of Course Registration System aims to reduce the work load of the staff and administration is ready for the quick reference on different files to retrieve the necessary information. Microsoft Visual Basic is used as the front tool for making an object oriented approach to development of this software. Microsoft access is used as the backend for this system. Modules in this project are,

Student Master Staff Master Course Master Course Registration Student Fees Exam Details Reports

35. File Distribution Protocol in Peer to Peer Systems ABSTRACT In the past few years, P2P file distribution applications (e.g., Bit Torrent) are becoming so popular that they are the dominating source of Internet traffic. This creates significant problems to Internet Service Providers (ISPs), not only because of the added complexity in traffic engineering, but the increase of traffic, in particular on the cross-ISP links, implies congestion and a higher operating cost. In this paper, we consider an ISP-friendly file distribution protocol which uses the exploiting-the-locality principle (ELP) to reduce the crossISP traffic. To show its benefit, we derive an upper and lower bound of cross-ISP traffic for the protocols which rely on ELP and show that the cross-ISP traffic can be reduced significantly when the number of peers within an ISP increases. To carry out realistic study, we design and implement our ISP-friendly protocol (which is compatible with the current Bit Torrent protocol) and carry out large scale experiments on Planet Lab to measure the reduction of the cross ISPtraffic and the file downloading time. More important, we also show how the proposed ISPfriendly protocol can handle the black-hole security attack. This paper sheds light on the merits and design direction of ISP-friendly content distribution protocols.

36. Effective key Generation for Multimedia Application ABSTRACT The project entitled Effective key Generation for Multimedia Application is the application developed to embed a video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Steganography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Steganography. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.

37. LIC management System

ABSTRACT The main objective of the project is to provide full computerization of his agent carrier. This project is under friendly and reusable to all LIC agents. This project provides all information about Loans, Mediclaim, children plans, vehicle and pension policies. By this project these peoples can interest easily towards their customers by giving readymade solutions to customers queries. As such, policy details, premium calculation, etc. The users of this project can obtained day today customer list, premium details, due dates, remainder letters and appointment details are generated as report daily. The easy to use interface allows you to keep track of your policies and their premium. Support for surrender value, Delete Policy and Lapse Policies. Commission Report, Deposit Slip Report, Maturity Check etc. have been added.By this project it is very compatible and very helpful to maintain the customer relationship.

38. Corporate Training Corporate Training for the facilities in the campus. This is an Intranet based application that can be accessed throughout the campus. This system can be used to automate the workflow of service requests for the various facilities in the campus. This is one integrated system that covers different kinds of facilities like class-rooms, labs, hostels, mess, canteen, gymnasium, computer center, faculty club etc. Registered users (students, faculty, lab-assistants and others) will be able to log in a request for service for any of the supported facilities. These requests will be sent to the concerned people, who are also valid users of the system, to get them resolved. There are features like email notifications/reminders, addition of a new facility to the system, report generators etc in this system. It is very useful for students to know about the facilities provided in the campus when ever they want to check easily and it takes less time.In mandatory checking they have to maintain many files and it takes much time to check about particular facility and all the details. So to overcome the problems in the mandatory maintainense,the online help desk tool can give the fast and accurate checking of the facility details in less time.

39COMPANY ADDRESS BOOK ABSTRACT Company address book mainly developed for an organization to store their employees personal data. The System consists of various users like the Administrator, HR manager and Employees. Everyone have their own responsibilities.HR manager has the privileges to add/delete the employees. Administrator registers the employees and allocates the IDs for the employees. Employees can login and store their personal data. Company address book is a system provided to the adding, deleting, editing the important addresses. Keeping employees contact records up-to-date plays a vital role in promoting effective communications. Features: Making records of addresses of the employees. Making records of details of employees Adding and deleting the employees. Allocating ids to the employees

40.Airline Reservation System ABSTRACT Airline Reservation System contains the details about flight schedules and its fare tariffs, passenger reservations and ticket records. An airlines inventory contains all flights with their available seats. The inventory of an airline service is generally divided into three category of classes (e.g. First, Business or Economy class) and each category is having seats up to 26 bookings, along with prices and booking conditions. Inventory data is imported and maintained through a Schedule Distribution System over standardized interfaces. One of the core functions of the inventory management of airline reservations is the inventory control. Inventory control steers how many seats are available for the different booking classes, by opening and closing individual booking classes for sale. In combination with the fares and booking conditions stored in the Fare Quote System the price for each sold seat is determined.

Das könnte Ihnen auch gefallen