Beruflich Dokumente
Kultur Dokumente
By
B.LAVANYA (08BCT19)
A.VENKATESH (08BCT40)
Of
COIMBATORE- 32
Submitted To The
Of
BACHELOR OF SCIENCE
In
COMPUTER TECHNOLOGY
APRIL 2011
CERTIFICATE
BONAFIDE CERTIFICATE
ACKNOWLEDGEMENT
If words are considered as symbols of approval and tokens of acknowledgement, then
words play the heralding role of expressing our gratitude to all who have helped me directly
We express our sincere gratitude and heartfelt thanks to our Head of the Department
Dr.R.Parimelazagan., M.Sc., M.Phil., PhD., for providing the necessary facilities to carry
out our project work and for his continue encouragement .
We accord our sincere and heartfelt thanks our deep sense gratitude to all the Staff
Members of Department of Applied Sciences for their constant support, valuable suggestions
and guidance.
Finally, we propose our heartfelt thanks to all our parents and friends for their
moral support without which we would have not been able to complete this project.
Last but not least our work will be incomplete without expressing our gratitude to
various authors whose works we referred to carry out this project.
ABSTRACT
ABSTRACT
This graduation project aims to present an application that is able of replacing the
traditional mouse with the human face as a new way to interact with the computer. Facial
features (nose tip and eyes) are detected and tracked in real-time to use their actions as mouse
events. The coordinates and movement of the nose tip in the live video feed are translated to
become the coordinates and movement of the mouse pointer on the user’s screen. The
left/right eye blinks fire left/right mouse click events. The only external device that the user
needs is a webcam that feeds the program with the video stream. In the past few years high
technology has become more progressed, and less expensive. With the availability of high
speed processors and inexpensive webcams, more and more people have become interested in
real-time applications that involve image processing. One of the promising fields in artificial
intelligence is HCI(Human Computer Interface.) which aims to use human features (e.g. face,
hands) to interact with the computer. One way to achieve that is to capture the desired feature
with a webcam and monitor its action in order to translate it to some events that communicate
with the computer.
In our work we were trying to compensate people who have hands disabilities that
prevent them from using the mouse by designing an application that uses facial features (nose
tip and eyes) to interact with the Computer. The nose tip was selected as the pointing device;
the reason behind that decision is the location and shape of the nose; as it is located in the
middle of the face it is more comfortable to use it as the feature that moves the mouse pointer
and defines its coordinates, not to mention that it is located on the axis that the face rotates
about, so it basically does not change its distinctive convex shape which makes it easier to
track as the face moves. Eyes were used to simulate mouse clicks, so the user can fire their
events as he blinks.
.
TABLE OF CONTENTS
S.NO TITLE PAGE.NO
1. INTRODUCTION
1.2 OVERVIEW
1.3 MODULES
1.4 OBJECTIVE
2. SYSTEM ANALYSIS
3. SYSTEM SPECIFICATION
4. SYSTEM DESIGN
6. SYSTEM TESTING
8. APPENDICES
software solution and web solutions to the companies situated in around the Coimbatore
and Tamilnadu, our companies developers are well trained and well equipped to fulfill the
needs of our customers. Our web solutions are targeting the Windows Server, Linux
engineering activity across enterprises. Drivers for custom-built solutions for clients are
OctaPace solutions are robust, scalable and will easily integrate with a diverse
range of products and technologies. OctaPace solutions expertise spans the entire gamut
develop and integrate robust and scalable e-business solutions that keep end customer's
requirement in mind.
has recently drawn significant attention. While the focus of energy management has been
on the data-center setting, attention has also been directed recently to the significant
amounts of energy consumed by desktop computers in homes and enterprises. The usual
approach to reducing PC energy wastage is to put computers to sleep when they are idle.
However, the presence of the user makes this particularly challenging in a desktop
(e.g., login sessions, IM presence, file sharing), background computation (e.g., syncing
and automatic filing of new emails), and keeping their machine reachable even while it is
idle. Putting a desktop PC to sleep is likely to cause disruption (e.g., broken connections),
thereby having a negative impact on the user, who might then choose to disable the
energy savings mechanism altogether. To reduce user disruption while still allowing
machines to sleep, one approach has been to have a proxy on the network for a machine
that is asleep. However, this approach suffers from an inherent tradeoff between
1.3 MODULES:
User Manager
Storage System
State Manager
State Finding
Virtual Dispatcher
This module is used to manage the user details and their permission details. User
details include their unique userid, password and their working system information.
This module is the storage server which stores all the user virtual machines. The
storage system on the server hosts the guest VMs that have been migrated to it from
(idle) desktop machines. The server also includes a controller, which is the brain of
Network Green. The controller receives periodic updates from stubs on the desktop,
resources on the level of user and computing activity on the desktops. The controller
also tracks resource usage on the server. Using all of this information, the controller
orchestrates the migration of VMs to the server and back to the desktop machines, and
manages the allocation of resources on the server. We have chosen a centralized design
for the controller because it is simple, efficient, and also enables optimal migration
This is the primary module which manages the state of the users running
programs each thread and its preferences through their working session on to the
storage system. Entire user’s application UI and Code related preferences are
The presence of any UI activity initiated by the user, through the mouse or the
keyboard (e.g., mouse movement, mouse clicks, key presses), in the recent past
machine is active. Even though the load imposed on the machine might be rather
minimal, we make this conservative choice to reflect our emphasis on minimizing the
impact on the interactive performance perceived by the user. In the default policy, the
presence of UI activity is taken as the only indicator of whether the machine is active.
So, the absence of recent UI activity is taken as an indication that the machine is idle.
load on the machine. Specifically, if the CPU usage is above a threshold, the
machine is deemed to be active. So, for the machine to be deemed idle, both the
absence of recent UI activity and CPU usage being below the threshold are
necessary conditions.
To avoid too much bouncing between the active and idle states, network green
introduces hysteresis in the process by (a) measuring the CPU usage as the average
This module is used to dispatch the saved virtual machine on to the user
machine when user starts the system. Dispatching of virtual machine state starts only
when the user is get authenticated. Storage system stores the user application
preferences; dispatcher then loads the preferences on to the user computer. Users
will get back their system on the same state as last time the left with user activities
Dispatcher allows users to load their application on any computer outside the
1.4 OBJECTIVE
desktop energy by employing a novel approach to minimizing user disruption and avoiding
then migrating it between the user’s physical desktop machine and a VM server, depending
minutes (e.g., for a coffee break), the desktop VM is migrated to the VM server and the
physical desktop machine is put to sleep. When the desktop becomes active again (e.g.,
when the user returns), the desktop VM is migrated back to the physical desktop machine.
Thus, even when it has been migrated to the VM server, the user’s desktop environment
remains alive (i.e., it is “always on”), so ongoing network connections and other activity
(e.g., background downloads) are not disturbed, regardless of the application involved. The
“always on” feature of NetworkGreen allows energy savings whenever the opportunity
arises, without having to worry about disrupting the user. Besides long idle periods (e.g.,
nights and weekends), energy can also be saved by putting the physical desktop computer to
sleep even during short idle periods, such as when a user goes to a meeting or steps out for
coffee. Indeed, our measurements indicate that the potential energy savings from exploiting
desktop computers. The typical desktop PC consumes 80-110 W when active and 60-80 W
when idle, excluding the monitor, which adds another 35-80 W. The relatively small
difference between active and idle modes is significant and arises because the processor itself
only accounts for a small portion of the total energy. In view of this, multiple S (“sleep”)
states have been defined as part of the ACPI standard. In particular, the S3 state (“standby”)
suspends the machine’s state to RAM, thereby cutting energy consumption to 2-3 W. S3 has
the advantage of being much quicker to transition in and out of than S4 (“hibernate”), which
Proxy-based Approach
As discussed above, the only way of cutting down the energy consumed by a PC is to
put it to sleep. However, when a PC it put to sleep, it loses its network presence, resulting in
machine even becoming inaccessible over the network. The resulting disruption has been
recognized as a key reason why users are often reluctant to put their machines to sleep.
Researchers have found that roughly 60% of office desktop PCs are left on continuously
CHAPTER 2
SYSTEM ANALYSIS
• WoL Proxy:
The simplest proxy allows the machine to be woken up using the Wake-on-
LAN mechanism supported by most Ethernet NICs. To be able to send the “magic” WoL
packet, the proxy must be on the same subnet as the target machine and needs to know the
MAC address of the machine. Typically, machine wakeup is initiated manually.
• Protocol Proxy:
A more sophisticated proxy performs Automatic wakeup, triggered by a
filtered subset of the incoming traffic. The filters could be configured based on user input and
also the list of network ports that the target machine was listening on before it went to sleep.
Other traffic is either responded to by the proxy itself without waking up the target machine
(e.g., ARP for the target machine) or ignored (e.g., ARP for other hosts).
• Application Proxy:
While the cost, management, and energy savings might make the model
attractive in some environments, there remain questions regarding the up-front hardware
investment needed to migrate to thin clients. Also, thin clients represent a trade-off and may
not be suitable in settings where power users want the flexibility of a PC or insulation from
even transient dips in performance due to consolidation. So addressing the problem of energy
consumed by desktop PCs remains important.
CHAPTER-3
SYSTEM SPECIFICATION
• RAM : 1GB
• GRAPHICAL SERVICES
All graphics, including desktop items like windows, are rendered using
Direct3D. This aims to provide a unified avenue for displaying graphics and is the
enabling factor that allows 2D, 3D, media, and animation to be combined in a single
window. Allows more advanced graphical features when compared to Windows
Forms and its GDI underpinnings.
• MEDIA SERVICES
• ANIMATIONS
• EFFECTS
WPF 3.0 provides for Bitmap Effects, which are raster effects applied
to a Visual. These raster effects are written in unmanaged code and force rendering of
the Visual to be performed on the CPU and not hardware accelerated by the GPU.
Bitmap Effects were deprecated in .NET 3.5 SP 1.The .NET Framework 3.5 SP1 adds
the Effect class, which is a Pixel-Shader 2.0 effect that can be applied to a visual,
which allows all rendering to remain on the GPU.The Effect class is extensible
allowing application to specify their own shader effects..NET 3.5 SP1 ships with two
built-in effects, BlurEffect and DropShadowEffect.
• ASP.NET
o Web page designs A powerful Web page editor that includes WYSIWYG
editing and an HTML editing mode with IntelliSense and validation.
o Page design features Consistent site layout with master pages and consistent
page appearance with themes and skins.
o Code editing A code editor that enables you to write code for your dynamic
Web pages in Visual Basic or C#. The code editor includes syntax coloration
and IntelliSense.
o Testing and debugging A local Web server for testing and a debugger that
helps you find errors in your programs.
o FEATURES
o Local variables cannot shadow variables of the enclosing block, unlike C and
C++. Variable shadowing is often considered confusing by C++ texts.
o In C#, memory address pointers can only be used within blocks specifically
marked as unsafe, and programs with unsafe code need appropriate
permissions to run. Most object access is done through safe object references,
which always either point to a "live" object or have the well-defined null
value; it is impossible to obtain a reference to a "dead" object (one which has
been garbage collected), or to a random block of memory. An unsafe pointer
can point to an instance of a value-type, array, string, or a block of memory
allocated on a stack. Code that is not marked as unsafe can still store and
manipulate pointers through the System.IntPtr type, but it cannot dereference.
o C# is more typesafe than C++. The only implicit conversions by default are
those which are considered safe, such as widening of integers. This is enforced
at compile-time, during JIT, and, in some cases, at runtime. There are no
implicit conversions between booleans and integers, nor between enumeration
members and integers (except for literal 0, which can be implicitly converted
to any enumerated type). Any user-defined conversion must be explicitly
marked as explicit or implicit, unlike C++ copy constructors and conversion
operators, which are both implicit by default.
CHAPTER -4
SYSTEM DESIGN
System design sits in the technical kernel of software engineering and applied
science regardless of the software process model that is used. Beginning once the software
requirements have been analyzed and specified, tests that are required in the building and
verifying the software is done. Each activity transforms information in a number that
ultimately results in validated computer software.
There are mainly three characteristics that serve as guide for evaluation of
good design,
• The design must be implement all of explicit requirements contained in the analysis
model, and it must accommodate all of the implicit requirements desired by the
customer.
• The design must be readable, understandable guide for those who generate code and
for those who test and subsequently support the software.
• The design should provide a complete picture of software, addressing the data, its
functional and behavioral domains from the implementation perspective.
Logical Design of the system is performed where its features are described,
procedures that meet the system requirements are formed and a detailed specification of the
new system is provided
As per the design phase the following designs had to be implemented, each of
these design were processed separately keeping in mind all the requirements, constraints and
conditions. A step-by-step process was required to perform the design.
Process Design is the design of the process to be done; it is the designing that
leads to the coding. Here the conditions and the constraints given in the system are to be
considered. Accordingly the designing is to be done and processed.
The Output Design is the most important and direct source of information to
the user. The output design is an on-going activity during study phase. The objectives of the
output design define the contents and format of all documents and reports in an attractive and
useful format.
4.2 DESIGN CONCEPTS
The data flow diagram (DFD) is a graphical tool used for expressing
system requirements in a graphical form. The DFD also known as the “bubble chart” has the
purpose of clarifying system requirements and identifying major transformations that will
become programs in system design. Thus DFD can be stated as the starting point of the
design phase that functionally decomposes the requirements specifications down to the
lowest level of detail. The DFD consists of series of bubbles joined by lines. The bubbles
represent data transformations and the lines represent data flows in the system. A DFD
describes what data flow is rather than how they are processed, so it does not depend on
hardware, software, data structure or file organization.
Process should be named and numbered for easy reference. Each name
should be representative of the process. The direction of flow is from top to bottom and from
left to right. That is data flow should be from source to destination. When a process is
exploded into lower level details, they are numbered. The name of the data stores, sources
and destinations are written in capital letters. Process and data flow names have the first letter
of each word capitalized. The DFD is particularly designed to aid communication. If it
contains dozens of process and data stores it gets too unwieldy. The rule of the thumb is to
explode the DFD into a functional level. Beyond that, it is best to take each function
separately and expand it to show the explosion in a single process. If a user wants to know
what happens within a given process, then the detailed explosion of that process may be
shown.
Data Constraints
All business in the world runs on business data being gathered stored and
analyzed. Business managers determine a set of rules that must be applied to the data being
stored to ensure its integrity.
There are two types of data constraints that can be applied to data being
inserted into a database table .One type of constraint is called an I/O constraint. The other
type of constraint is called a business rule constraint.
I/O Constraints
The input /output data constraint is further divided into two distinctly
different constraints.
• That the data entered in the table column is unique across the entire column.
• That none of the cells belonging to the table column are left empty.
The Foreign Key Constraint
• Column Level
• Table Level
If data constraints are defined along with the column definition where
creating or altering a table structure, they are column level constraints.
If data constraints are defined after defining all the table columns when
creating or altering a table structure, it is a table level constraint.
A NULL value is different from a blank of zero. NULL values are treated
specially by the database. A NULL value can be inserted into the columns of any data type.
Not Null Constraint Defined at the Column Level
Object role modeling can be used if you just want to model the classes and
their relationships.
External links
Dependency
Dependency is a weaker form of relationship which indicates that one class
depends on another because it uses it at some point of time. Dependency exists if a class is a
parameter variable or local variable of a method of another class.
Multiplicity
The association relationship indicates that (at least) one of the two related
classes makes reference to the other. In contrast with the generalization relationship, this is
most easily understood through the phrase 'A has a B' (a mother cat has kittens, kittens have a
mother cat).
The UML representation of an association is a line with an optional arrowhead
indicating the role of the object(s) in the relationship, and an optional notation at each end
indicating the multiplicity of instances of that entity (the number of objects that participate in
the association).
USER MANAGEMENT:
USER MANAGEMENT
APPLICATION SETTING
AddSettings
Try
[try]
Create SettDataContext
OnCreated()
<<return>>
Create Setting
OnCreated()
<<return>>
InsertOnSubmit
Datas.Settings.InsertOnSubmit(Data)
<<return>>
Return
return "true"
[catch (Exception)]
Return
return ex.T…
this : Login D : AppState F : Form1
button1_Cl…
Create AppState
new StateNotify.AppState()
<<return>>
CheckUser
D.CheckUser(textBox1.Text, text…
<<return>>
If
[else]
Create Form1
I nitializeComponent()
<<return>>
this : Form1 D : AppState
Form1_Load
Create AppState
new StateNotify.AppState()
<<return>>
Try
[try]
AddSettings
D.AddSettings(UserSession.inSes…
<<return>>
[catch (Exception)]
ReturnSettings
D.ReturnSettings(UserSession.in…
<<return>>
this : AdminHOme U : CreateUser
createUser…
Create CreateUser
InitializeComponent()
<<return>>
GetTable<TEntity> :
this : CreateUser Datas : UsersDataContext Data : UserTB
Table<UserTB>
button1_Cl…
Create UsersDataContext
OnCreated()
<<return>>
Create UserTB
OnCreated()
<<return>>
InsertOnSubmit
Datas.UserTBs.InsertOnSubmit(Data)
<<return>>
this : ViewUsers Datas : UsersDataContext source : Table<UserTB> data : IQueryable<UserTB>
ViewUsers…
Create UsersDataContext
OnCreated()
<<return>>
Select<UserTB,UserTB>
Select (k)
<<return>>
ToList<UserTB>
ToList
<<return>>
4.4 Table Design
Foreignkey: Userid
Primarykey: Settingsid
Foreignkey: Userid
Primarykey: Resourceid
Foreignkey: Userid
CHAPTER – 5
CHAPTER – 5
SYSTEM IMPLEMENTATION
After the successful study of requirement analysis the next step involved is the Design
and Development phase that practically helps to build the project.
The Linear Sequential Model or Classic Life Cycle or the Waterfall Model develops
project. This is a sequential approach to software development that begins at the system level
and progresses through analysis, design, coding and testing
The design process translates requirements into a representation of the software that can
be accessed for quality before coding begins. Like requirements, the design is documented
and becomes part of the software configuration.
Code Generation
The design must be translated into a machine-readable form. The code generation step
performs this task. If design is performed in a detailed manner, code generation can be
accomplished mechanistically.
After completing the design phase, code was generated using Visual Basic
environment and the SQL Server 2000 was used to create the database. The server and the
application were connected through ADO.Net concepts.
The purpose of code is to facilitate the identification and retrieval of items of
information. Codes are built with the mutually exclusive features. They are used to give
operational distractions and other information. Codes also show interrelationship among
different items. Codes are used for identifying, accessing, sorting and matching records. The
code ensures that only one value of code with single meaning is correctly applied to give
entity or attribute as described in various ways. Codes can also be designed in a manner
easily understood and applied by the user.
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and code generation. Once the source code has been
generated, software must be tested to uncover as many errors as possible before delivery to
the customer. In order to find the highest possible number of errors, tests must be conducted
systematically and test cases must be designed using disciplined techniques.
White box testing sometimes called as glass box testing is a test case design method
that uses the control structures of the procedural design to derive test cases.
Using White Box testing methods, the software engineer can derive test case, that
guarantee that all independent paths with in a module have been exercised at least once,
exercise all logical decisions on their true and false sides, execute all loops at their boundaries
and within their operational bounds, exercise internal data structures to ensure their validity.
“Logic errors and incorrect assumptions are inversely proportional to the probability that a
program path will be executed“.
The logical flow of a program is sometimes counterintuitive, meaning that
unconscious assumptions about flow of control and data may lead to make design errors that
are uncovered only once path testing commences.
“Typographical errors are random“
When a program is translated into programming language source code, it is likely that
some typing errors will occur. Many will be uncovered by syntax and typing checking
mechanisms, but others may go undetected until testing begins. It is as likely that a type will
exist on an obscure logical path as on a mainstream path.
Black box Testing
Black box testing, also called as behavioral testing, focuses on the functional
requirements of the software. That is, black box testing enables the software engineer to
derive sets of input conditions that will fully exercise all functional requirements for a
program. Black box testing attempts to find errors in the following categories:
1. Incorrect or missing functions
2. Interface errors
3. Errors in data structures or external data base access
4. Behavior or performance errors
5. Initialization and termination errors
By applying black box techniques, a set of test cases that satisfy the following criteria
were been created: Test cases that reduce, by a count that is greater than one, the number of
additional test cases that must be designed to achieve reasonable testing and test cases that
tell something about the presence or absence of classes of errors, rather than an error
associated only with the specific test at hand.
Black - box testing is not an alternative to white - box testing techniques. Rather it is
complementary approach that is likely to uncover a different class of errors than white - box
methods.
Validation Testing
Validation testing provides the final assurance that software meets all functional,
behavioral and performance requirements. Validation testing can be defined in many ways,
but a simple definition is that validations succeed when the software functions in a manner
that is expected by the user. The software once validated must be combined with other system
element.
System testing verifies that all elements combine properly and that overall system
function and performance is achieved. After the integration of the modules, the validation test
was carried out over by the system. It was found that all the modules work well together and
meet the overall system function and performance.
Integration Testing
Acceptance Testing
In fact acceptance cumulative errors that might degrade the system over time will
incorporate test cases developed during integration testing. Additional testing cases are added
to achieve the desired level functional, performance and stress testing of the entire system.
Unit testing
Static analysis is used to investigate the structural properties of source code. Dynamic
test cases are used to investigate the behavior of source code by executing the program on the
test data. This testing was carried out during programming stage itself.
After testing each every field in the modules, the modulus of the project is tested
separately. Unit testing focuses verification efforts on the smallest unit of software design and
field. This is known as field - testing.
CHAPTER- 7
CONCLUSION:
FUTURE WORK:
Live migration assumes that the disk is shared between the source and
destination machines, say in the form of network attached storage (NAS). This avoids the
considerable cost of migrating disk content. However, this is a Limitation of our current
system since, in general, client machines would have a local disk, which applications (e.g.,
sharing of local files) need access to. Recent work has demonstrated the migration of VMs
with local virtual hard disks (VHDs) by using techniques such as pre-copying and mirroring
of disk content to keep the downtime to under 3 seconds in a LAN setting. Note that since the
base OS image is likely to be already available at the destination node, the main cost is that of
migrating the user data.
CHAPTER 8
APPENDICES
HOME PAGE:
ADMIN HOME:
USER CREATION:
MANAGING USERS:
USER DETAILS:
STATE MANAGER:
USER LOGIN:
BROWSER APPLICATION:
BROWSER APPLICATION STATE MANAGED:
DOCUMENT EDITOR:
DOCUMENT APPLICATION LAST STATE RETAINED:
APPENDIX II- CODINGS
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Windows;
using System.Windows.Controls;
using System.Windows.Data;
using System.Windows.Documents;
using System.Windows.Input;
using System.Windows.Media;
using System.Windows.Media.Imaging;
using System.Windows.Navigation;
using System.Windows.Shapes;
using System.Xml.Linq;
using Microsoft.Win32;
namespace NetworkGreenTestApp
{
/// <summary>
/// Interaction logic for MediaP.xaml
/// </summary>
public partial class MediaP : UserControl
{
public MediaP()
{
InitializeComponent();
XElement SettingsData;
SettingsData = new XElement("Controls",
new XElement("Ctrl",
new XAttribute("name", "mediaply"),
new XAttribute("pos", "0"))
);
D.AddSettings(UserSession.inSession + "s2", "a2", UserSession.inSession,
SettingsData).ToString();
}
catch (Exception ex)
{
}
TimeSpan f = new TimeSpan();
char[] ch = { ':' };
StateNotify.Setting S = D.ReturnSettings(UserSession.inSession, "a2",
UserSession.inSession + "s2");
var t = S.Configuration;
if (t.Element("Ctrl").Attribute("name").Value == "mediaply")
{
string val = t.Element("Ctrl").Attribute("pos").Value.ToString();
f = new TimeSpan(long.Parse(val));
}
mediaElement1.Position = f;
mediaElement1.Play();
}
dlg.InitialDirectory = "F:\\";
dlg.RestoreDirectory = true;
label1.Content = selectedFileName;
mediaElement1.Play();
}
}
}
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
namespace NetworkGr
{
public partial class CreateUser : Form
{
public CreateUser()
{
InitializeComponent();
}
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Xml.Linq;
namespace NetworkGreenTestApp
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}
XElement SettingsData;
SettingsData = new XElement("Controls",
new XElement("Ctrl",
new XAttribute("name", "toolStripComboBox1"),
new XAttribute("text", toolStripComboBox1.Text)),
new XElement("Ctrl",
new XAttribute("name", "toolStripLabel1"),
new XAttribute("text", toolStripLabel1.Text)),
new XElement("Ctrl",
new XAttribute("name", "Form1"),
new XAttribute("text", this.Text))
);
D.AddSettings(UserSession.inSession + "s1", "a1", UserSession.inSession,
SettingsData).ToString();
}
catch (Exception ex)
{
StateNotify.Setting S =
D.ReturnSettings(UserSession.inSession,"a1",UserSession.inSession+"s1");
var t = S.Configuration;
if (t.Element("Ctrl").Attribute("name").Value == "toolStripComboBox1")
{
toolStripComboBox1.Text = t.Element("Ctrl").Attribute("text").Value.ToString();
}
}
}
}
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Xml.Linq;
namespace NetworkGreenTestApp
{
public partial class DocumentEdi : Form
{
public DocumentEdi()
{
InitializeComponent();
this.Close();
}
XElement SettingsData;
SettingsData = new XElement("Controls",
new XElement("Ctrl",
new XAttribute("name", "doc"),
new XAttribute("pos", richTextBox1.Text)),
new XElement("Ctrl",
new XAttribute("name", "copy"),
new XAttribute("pos", Clipboard.GetText()))
);
D.UpdateSettings(UserSession.inSession + "s3", "a3", UserSession.inSession,
SettingsData).ToString();
}
catch (Exception ex)
{
}
}
XElement SettingsData;
SettingsData = new XElement("Controls",
new XElement("Ctrl",
new XAttribute("name", "doc"),
new XAttribute("pos", richTextBox1.Text)),
new XElement("Ctrl",
new XAttribute("name", "copy"),
new XAttribute("pos", ""))
);
D.AddSettings(UserSession.inSession + "s3", "a3", UserSession.inSession,
SettingsData).ToString();
}
catch (Exception ex)
{
XElement SettingsData;
SettingsData = new XElement("Controls",
new XElement("Ctrl",
new XAttribute("name", "doc"),
new XAttribute("pos", richTextBox1.Text)),
new XElement("Ctrl",
new XAttribute("name", "copy"),
new XAttribute("pos", Clipboard.GetText()))
);
D.UpdateSettings(UserSession.inSession + "s3", "a3", UserSession.inSession,
SettingsData).ToString();
}
catch (Exception ex)
{
}
}
}
BIBLIOGRAPHY
Books Referred:
4. Karli Watson, Richard Anderson , “Professional ASP.NET 1.1” , 2004 Edition, Wrox
Publications
Websites:
1. www.msdn.microsoft.com
2. www.vbcity.com
3. www.vbdotnetheaven.com
4. www.codeguru.com