Sunteți pe pagina 1din 46

list of Thesis Proposals for IT/CS

1. Touch-Screen Based Point-Of-Sale System (POS)


2. Sales and Inventory Monitoring System with SMS
3. Weather Forecast Application using Android
4. Cemetery Mapping and Information System
5. Computer-Aided Instruction with Voice Recognition system
6. Holistic Computerized Faculty Evaluation System
7. Book Catalog Application using Android
8. Hotel Reservation Application with Mobile Compatibility in Android
9. SMS-Based Grade Inquiry System
10. Mobile Voting System using Android
11. Grade Viewer Application in Android
12. SSG Management System with SMS Notification
13. Payroll System with Biometric and Barcode Technology
14. School Event Attendance Monitoring System with Biometric and Barcode Tec
hnology
15. Face Recognition System
16. Android Controlled Car
17. Motorcycle Tracking with GPS using Android
18. Mobile Educational Application for Elementary Student using Android
19. Class Time Table in Android
20. Android-Based Class Attendance Monitoring Application using Barcode
21. Lending Management system
22. Veterinary Clinic and Pet Shop Management System
23. Android Joystick Application using Bluetooth
24. Mobile Point-Of-Sale Application with SMS Notification
25. Group Messenger Application using Android
26. Medicine Inventory and Patient Information system
27. Resort Management System
28. Mobile Reservation for Banquet Halls
29. E-Learning System
30. E-Voting System with SMS technology
31. On Route Travel Assistant for Public Transport Based on Android Technolo
gy
32. Camera-Based Heart Rate Detector using Android
33. Mobile Health Tips using Android
34. Video Rental Application in Android
35. Quiz Application using Android
36. Pharmacy Management System
37. Mobile Pharmacy Application in Android
38. Geographic Information System with Flood-Prone Location
39. RFID-Based Student Monitoring System
40. Home Appliances controlled by Android Smartphone
41. Intelligent Traveler Locator using Google Map Application
42. Bluetooth Controlled Robot using Android Mobile (CoE/CpE/IT/CS)
1. Airline Reservation System
2. Android Controlled Car
3. Android Joystick Application using Bluetooth
4. Android-Based Class Attendance Monitoring Application using Barcode
5. Bluetooth Controlled Robot using Android Mobile (CoE/CpE/IT/CS)
6. Book Catalog Application using Android
7. Camera-Based Heart Rate Detector using Android
8. Cemetery Mapping and Information System
9. Centralized Medical System using Different Sensor for Vital signs Detect
or
10. Class Time Table in Android
11. Client server based guidance system
12. Computer-Aided Instruction with Voice Recognition system
13. E-Learning System
14. Electronic Police Clearance System
15. E-voting system
16. E-Voting System with SMS technology
17. Face Recognition System
18. Fish Counting System
19. Geographic Information System with Flood-Prone Location
20. Grade Viewer Application in Android
21. Group Messenger Application using Android
22. Holistic Computerized Faculty Evaluation System
23. Home Appliances controlled by Android Smartphone
24. Hospital system
25. Hotel management system
26. Hotel Reservation Application with Mobile Compatibility in Android
27. Hotel reservation system
28. Human Resource Management System
29. Intelligent Traveler Locator using Google Map Application
30. Internet Cafe System
31. Judging System
32. Lending Management system
33. library system
34. Medical records system
35. Medicine Inventory and Patient Information system
36. Mobile Educational Application for Elementary Student using Android
37. Mobile Health Tips using Android
38. Mobile Pharmacy Application in Android
39. Mobile Point-Of-Sale Application with SMS Notification
40. Mobile Reservation for Banquet Halls
41. Mobile Voting System using Android
42. Motorcycle Tracking with GPS using Android
43. On Route Travel Assistant for Public Transport Based on Android Technolo
gy
44. Online bidding system
45. Online class scheduling system
46. On-line courseware
47. Online Grade Inquiry
48. Online Grading System
49. Online hotel reservation system
50. Online inventory system
51. Online Lot Reservation
52. Online management system
53. Online membership and billing system
54. Online payroll system
55. Online POS(Point of Sale)
56. Online Product Reservation System
57. Online public access catalog
58. Online shopping cart
59. Online voting system
60. Order Billing Inventory System
61. Payroll system
62. Payroll System with Biometric and Barcode Technology
63. Pharmacy Automation System
64. Touch-Screen Based Point-Of-Sale System (POS)
65. Pharmacy Management System
66. Quiz Application using Android
67. Record management system
68. Resort Management System
69. RFID-Based Student Monitoring System
70. Sales and Inventory Monitoring System with SMS
71. Salon System
72. School Event Attendance Monitoring System with Biometric and Barcode Tec
hnology
73. SMS-Based Grade Inquiry System
74. SSG Management System with SMS Notification
75. Supply inventory system
76. Text Poll System
77. Veterinary Clinic and Pet Shop Management System
78. Video Library Management System
79. Video Rental Application in Android
80. Voting system
81. Weather Forecast Application using Android
82. Web-Based tracking System

Thesis topics in networking - 2016


I (t.moors AT unsw.edu.au) supervise theses (BE, ME/MEngSc, PhD) at UNSW in the
field of networking.
Most are in areas relating to my research interests, primarily video communicati
on, Software Defined Networking (SDN) and network dependability (reliability), b
ut that can cover many technical areas (e.g. wireless, routing, software defined
networking, transport protocols, applications, peer-to-peer, etc).
I may be willing to supervise theses on other topics in networking if there is a
very good match between your interests and background and mine. Please email me
a short description of your proposal.
This web page lists several possible topics intended for undergraduate theses. A
n asterisk (*) before a topic title indicates that a student has started that to
pic, though there may remain much more to do. The topics reflect my research/tea
ching interests, and so could be expanded (vastly, especially with more emphasis
on fundamental theory than practical implementation) to form Masters or PhD the
ses.
I cannot possibly do a good job of concurrently supervising all of these project
s, and generally only supervise 4-6 BE students per semester. Consequently, acce
ptance of students for topics will be done on a competitive basis, with the best
qualified students getting first choice. I'm flattered by emails that I receive
from students around the world asking if I can supervise them doing these proje
cts, but I can only supervise students at UNSW.
If you are interested in any of these topics, then please email your resume and
academic record(s) to t.moors AT unsw.edu.au . The earlier you do that and can c
ommit to a thesis (by completing a Thesis Nomination Form, available from the sc
hool office), the broader your choices will be.
For information about past theses that I have supervised, see http://uluru.ee.un
sw.edu.au/~tim/netskunks/index.html#past_projects
Area Project
Infrastructure
Information centric networking for building management
* Network technologies: Vendor certification to supplement academic courses
*Hacking wacky TCP features
A fine-grained ontology of network technologies
*Defending against phone spam/robocalls
DNS privacy
NetFPGA implementation of ultra-low latency TCP/IP for financial trading applica
tions
Plan a NBN ISP
Networked multiplayer game
Multimedia applications using sockets
Software Defined Networking (SDN)
Clean slate network designs based on Software Defined Networking (SDN)
Software switch implementation/emulation for use with Software Defined Networkin
g (SDN)
* Content distribution across a national Software Defined Networking testbed
Smartphones
Smartphone apps for more effective bus services
Inter-interest app for smartphones
Smartphone app for automated roll checking
Network dependability
* Automated WiFi troubleshooting
* Automated WiFi security troubleshooting
Warn web browsers about upstream caches
* Automated diagnosis of network performance problems
* Censoring private information from network packet traces
Information centric networking for building management
Most Internet protocols are modelled on conventional phone/postal systems in whi
ch a particular source device sends to a particular destination device, leading
to device addresses (e.g. 32b IPv4 or 128b IPv6 addresses) being the primary ide
ntifier that controls how information flows. Other information-centric (aka cont
ent centric or named data networking) systems are possible, which emphasise iden
tifying content rather than devices. Peer-to-peer file sharing systems take this
approach: You don't care which address provides you with parts of the file that
you seek, you only want to publish your interest in a certain file and subscrib
e to any sources that can supply (parts of) that content. Peer-to-peer systems s
uch as Bittorrent are built as overlays on top of IP network, but it is also pos
sible to switch/route content within the network according to content identifier
s and interest, which has led to software routers for named data networking (e.g
. http://named-data.net/doc/NFD/current/). This approach is particularly appeali
ng for managing data from smart buildings (e.g. about the status and control of
lighting, air conditioning, security etc) where the IP address of the device is
secondary to its role, location and the content that exists (e.g. who led to doo
rs x y and z being open on the ground floor at 6:05pm when an event of interest
occurred?). Such an "Internet of Things" approach will be used for the new EE&T
building, and the purpose of this project is to prototype software for building
a named data network that could manage building information systems and test it
using data available from existing UNSW facilities systems.
Smartphones
These projects all involve developing software on smartphones, probably using Ja
va on Android phones (which can be supplied), or using Objective C on iOS device
s.
TM142: Inter-interest app for smartphones
Write an app for smartphones (e.g. running Android) that matches people who are
gathered together according to how well their expressed interests intersect. Req
uires skills in software development, local & personal area networking (Wifi/Blu
etooth), graph theory / social network analysis, algorithms, privacy awareness.
TM150: Smartphone apps for more effective bus services
In this project you will develop a smartphone (Android) app that uses informatio
n available from wifi networks to estimate the behaviour of public transport use
rs and will develop communication mechanisms that allow bus behavior to be optim
ised by considering both existing and imminent bus passengers.
TM148: Smartphone app for automated roll checking
Educators sometimes waste class time by checking a class roll manually. In this
project you will develop a software app for smartphones (probably Android, perha
ps IOS) that will allow educators to check the class roll automatically.
Video
TM131: Computer vision processing of video presentations
Powerpoint (and equivalent) presentations are common in business and education,
for better or for worse. Videos of such presentations are often recorded and mad
e available online, e.g. through Youtube or a Massive Open Online Course. While
often the corresponding PPT/PDF file is also made available online, often it isn
't and potential viewers might seek such a file, e.g. to scan over before decidi
ng whether to watch the presentation. Reciprocally, viewers may have a copy of t
he slides from the presentation, but seek to determine which point of the video
discusses a particular slide, so that they can skip discussion of other slides.
In this project you will develop software (likely using the openCV computer visi
on package) to process online videos and extract useful presentation information
, such as frames that capture slides and the timing of when slides first appear.
Challenges may include dealing with slide animations, obstructions (e.g. the sp
eaker), extracting searchable text from the images, and interfacing with multipl
e video sources (e.g. Youtube) and formats.
References: Video editing software often includes scene change detection functio
nality, but when applied to presentation videos it yields many false positives (
same slide but foreground changes - e.g. speaker moves) and false negatives (sli
de changes but software considers differences between slides to be less signific
ant than ongoing foreground changes). Personal video recorders may detect scene
changes to allow users to skip ads, but such detection is often guided by non-vi
sual factors (e.g. audio, expected ad duration, other signals). http://vis.berke
ley.edu/papers/videodigests/
Network dependability
Businesses depend on network reliability to retain market share, and customers g
et frustrated by network faults. Network reliability is also fun to study becaus
e of the surprising ways in which systems fail and the challenge of understandin
g and defending against complicated failure modes. Current work focuses on impro
ving network reliability by end-user approaches to detect faults and adapt aroun
d them.
The web page http://uluru.ee.unsw.edu.au/~tim/dependable/ provides more context
for this topic.
TM109: * Automated WiFi troubleshooting
Use & extend your understanding of network protocols to develop software that au
tomatically investigates WiFi problems and suggests the best actions for users t
o take to fix those problems.
Requires: TELE3118 & lack of fear of developing software.
TM127: * Automated WiFi security troubleshooting
Two actual scenarios that led to Tim (your potential supervisor) to be unable to
connect to Uniwide because of security problems were when he changed his zpass
at home but didn't update his computers Uniwide password when on campus, and whe
n he tried using a laptop on which the date was set to 1980 (presumably due to a
battery/power problem) which led to root certificates being invalid so no acces
s points could be authenticated. These problems led to the wifi "not working" wi
th few hidden symptoms of the specific cause. Engineers like you and Tim can tro
ubleshoot such problems, but most "normal" people lack the skill or energy to fi
x such problems. The goal of this project is to develop software that can automa
tically diagnose/troubleshoot wifi security problems and tell "normal" people wh
at they need to do in order to fix their specific problem. e.g. output something
like "Check the time on your computer" rather than "Recheck all uniwide instruc
tions, and notice in step 16 that you have no Trusted Root Certification Authori
ties when there should be several, and find on 3rd web search attempt that the c
ause may be an incorrect clock." You will need to use operating system (e.g. Win
dows) APIs to examine network security settings, possibly write sockets programs
to test network connectivity, develop a deep understanding of wifi security, an
d write programs that interpret multiple symptoms and give specific useful instr
uctions to lay people.
TM106: Automated diagnosis of network performance problems
People value their time, and hate waiting for computers. When faced with delays
in accessing a web site, they would often like to know what is causing the delay
, since perhaps they might be able to fix it (e.g. high loss on their WiFi acces
s link) or at least know who to blame. Unfortunately layered protocol stacks and
the complexity of network protocols hide from them the information needed to di
agnose performance problems. What is needed is software that a frustrated user c
an run and which diagnoses the problem and explains it to the user. The performa
nce of network protocols such as TCP depends on environmental characteristics su
ch as transmission and loss rates, propagation delays, as well as configuration
parameters such as the Slow Start threshold. This project will involve analysing
traces of captured packets to explain the cause of performance problems. The an
alyses will initially be manual and use your knowledge of network protocols, but
later be automated, e.g. in Excel spreadsheets or by software that detects and
explains performance problems in real time.
TM77: Warn web browsers about upstream caches
ISPs and network operators often install caches for their benefits such as reduc
ing bandwidth use. Often these caches are transparent to web browsers (e.g. in t
erms of not needing configuration), despite the cache(s) potentially impinging o
n some aspects of service (e.g. delivering stale objects). In this thesis, you w
ill develop software (e.g. web browser add-on) to detect caches and warn users w
hen necessary.
TM74: * Censoring private information from network packet traces
Traces of the packets sent across a network (as presented by sniffers such as Wi
reshark and tcpdump) can be useful for troubleshooting network problems. However
, they can also include private information such as credentials (passwords, cook
ies and keys) and names/addresses that someone who seeks help in troubleshooting
network problems may not wish to disclose. The goal of this thesis is to implem
ent software that can censor such private information from packet traces, making
them suitable for submission with fault reports when seeking help to troublesho
ot network problems.
Several sanitization/anonymization tools already exist (e.g. tcpdpriv, SCRUB-tcp
dump and tcpurify) but they tend to be oriented to sanitizing large volumes of n
etwork data (e.g. to create repositories of traces that researchers can be use t
o study network traffic flows) rather than sanitizing traffic from one user. Con
sequently, they focus on sanitizing lower layer protocols (up to TCP) and oblite
rate application layer headers, whereas for troubleshooting, this thesis will se
ek to retain application layer headers while still removing private info (e.g. h
ttp cookies & pop passwords) from those headers.
Infrastructure
TM128: * Network technologies: Vendor certification to supplement academic cours
es
Vendors of networking equipment (e.g. Cisco, Juniper, Huawei) often provide cour
ses and certification (e.g. CCNA, CCNP, CCIE, JNCIA) for how to use their equipm
ent. Such courses overlap university network technology courses (e.g. TELE3118)
in that some of the underlying theory is covered by both, but they also cover mo
re practical (and vendor-specific) aspects that are not covered by academic cour
ses. In this project you will experiment with networking equipment and help deve
lop course material that gives students, who already know (or are currently lear
ning) the underlying theory, access to the practical aspects of such vendor cour
ses.
TM134: Hacking wacky TCP features
In this project you will modify an implementation of the TCP protocol to provide
unusual features, such as the ability to deliver data out of sequence and suppo
rt for multicast, for use in delivering video. This is an advanced topic which w
ill likely require Linux kernel programming (a fallback might be ns3 simulation/
emulation) and in-depth understanding of TCP.
TM137: Clean slate network designs based on Software Defined Networking (SDN)
The TCP/IP stack incorporates many design choices (e.g. see nms.lcs.mit.edu/6829
-papers/darpa-internet.pdf) that have led to its success as a global internetwor
king technology but those choices also limit its suitability for certain narrowe
r applications (e.g. connecting peripherals to a computing device, or for corpor
ate intranets). The recent introduction of Software Defined Networking (SDN) all
ows network owners to customise the behaviour of network devices (e.g. switches/
routers) to levels that are unprecedented with earlier devices that tightly inte
grated the control plane (e.g. OSPF/EIGRP routing) with data forwarding. This pr
oject will involve exploiting this new-found flexibility to implement novel prot
ocols on SDN-enabled switches that are unencumbered by the design constraints of
TCP/IP and so are more highly optimised for certain network applications.
This topic requires extensive programming in order to implement network protocol
s and may require the student operate under a non disclosure agreement. It requi
res strong understanding of existing network protocols, and a creative approach
to questioning existing systems and proposing and implementing alternative desig
ns.
TM151: DNS privacy
Communication privacy is important, and is exemplified by the increasing use of
transport layer security to support HTTPS and similar services. However, domain
names are still typically transmitted in plaintext, e.g. when using DNS to resol
ve names to addresses. Since many sites are hosted by Amazon, Akamai and other s
ervices, eavesdropping the IP address doesn t necessarily indicate which server so
mebody is using, which also leads to domain names being exposed in TLS setup and
would make site privacy possible if names were not exposed through DNS and TLS
setup. This project will implement in software mechanisms to hide domain names (
through encryption and other mechanisms) and will assess the cost of such mechan
isms (e.g. on DNS caching and personalisation of DNS answers, and whether server
s require extra state information)
TM147: Defending against phone spam/robocalls
Unwanted unsolicited communications ("spam") first became a problem for email be
cause of the negligible cost of sending email. It is increasingly becoming a pro
blem for phone services due to falling costs of phone calls themselves and incre
asing international phone access in developing countries where labour costs are
relatively low. Caller ID allows individuals to ignore calls from unknown source
s, but business often revolves around acquiring new customers, and caller IDs ca
n be spoofed. In this project you will investigate technical mechanisms that cou
ld help defend against such phone spam. Examples may include applying collaborat
ive filtering techniques (as used to filter email spam) to filter phone calls an
d in extending phone system software (e.g. the Asterix PBX) to check (e.g. apply
ingress filtering to) caller IDs. You will implement prototypes of such mechani
sms in software, possibly in the form of a smartphone app or Asterix module.
Prequisites: Knowledge of network technologies essential; reasonable programming
skills; willing to learn about phone signalling systems; knowledge of network s
ecurity (e.g. TELE3119) might help
TM115: NetFPGA implementation of ultra-low latency TCP/IP for financial trading
applications
In financial trading, e.g. algorithmic high frequency trading by hedge funds, si
gnificant competitive advantages arise for traders who can observe and act on ma
rket changes with even slightly lower (e.g. millisecond) delays than their compe
titors. Consequently, traders are willing to pay considerably to co-locate their
servers with trading platforms in order to minimise propagation delay. Traders
can compete further by minimising delays in their end-systems. To facilitate tha
t, this project will investigate how the NetFPGA platform can be used to shift T
CP/IP and application layer protocol (e.g. FIX or ITCH/OUCH) processing from sof
tware in servers into hardware, where parallelism and application-specific optim
isation can minimise trading latency.
TM141: Software switch implementation/emulation for use with Software Defined Ne
tworking (SDN)
Software Defined Networking (SDN) allows open programmable control of network sw
itches, but typically works with switch hardware that implements the data plane.
Yet software implementation/emulation of switch data planes is useful for learn
ing about existing, and experimenting/prototyping with new, data plane technolog
ies. In this project you will take an existing modular software implementation o
f switch data plane and extend it to work in a SDN context.
See also this past thesis
TM140: A fine-grained ontology of network technologies
Ontologies name and define the interrelationships between entities in a domain.
An ontology for the field of network technologies would include concepts such as
Ethernet, carrier sensing, Binary Exponential Backoff, retransmission, error co
ntrol, etc, and show how such topics relate to one another. An ontology for netw
orking would be useful for classifying research papers and educational resources
about networking, and for matching queries/questions/problems to resources that
may contain helpful answers. The aim of this project is to develop such an onto
logy for the field of communication networks.
e.g. a coarse initial ontology of networking
TM135: * Content distribution across a national Software Defined Networking test
bed
Software Defined Networking is currently one of the hottest topics in networking
, and UNSW is leading an ARC-sponsored LIEF grant to establish a SDN testbed con
necting 10 universities across Australia. As the lead technology expected to be
used by future networks, SDN must support the increasing network load made by vi
deo traffic. In this project you will develop a system that can be used to demon
strate video content distribution across the National SDN testbed. You will gain
experience in leading edge SDN and CDN technologies, and in network protocols (
e.g. using DNS to redirect clients to the best content replica).
TM114: Plan a NBN ISP
The National Broadband Network promises universal high-speed broadband across Au
stralia, and will "level the playing field" between competing Internet Service P
roviders (ISPs) by charging each the same price for customer access. Combined wi
th the low entry cost for new ISPs (e.g. a national ISP need only connect to 121
NBN Points of Interconnect) it is likely that new ISPs, some with possibly nove
l service and business models, will start up. The goal of this project is to pla
n such an ISP. Business planning (e.g. cost and pricing issues) will dominate, b
ut you will need to use and extend your knowledge of telecommunication networks
in order to thoroughly develop such a plan, e.g. considering the implications of
peering, caching, and partnerships with content distribution networks. Note tha
t "ISP" here need not be limited to Internet data, but may also include broader
telecommunication such as voice and video services, and may include (or partner
with providers of) some wireless/cellular/mobile services.
References:
http://www.nbnco.com.au/getting-connected/service-providers.html
http://www.marketclarity.com.au/documents/market-clarity-understanding-the-trans
-tasman-bb-gap-30-may-2012.pdf
Prequisite: TELE3118 or similar network technologies course Interest, knowledge
or experience in business planning
TM143: Networked multiplayer game
In this project you will develop client and server programs that implement a rea
l-time networked multiplayer game. It will extend your knowledge of TCP/UDP sock
ets programming through a server that broadcasts timing beacons to players, play
ers that broadcast their position in the playing field to nearby players, and re
liable messaging connections between cooperating players so that they can plan t
heir moves.
TM144: Multimedia applications using sockets
In this project you will build your own Skype/Voice-Over-IP(VOIP) equivalent app
lication that allows audio communication over packet-switched networks. It will
extend your knowledge of multimedia networking from courses such as TELE3118 as
you will be required to implement features such as playout buffers for correct t
iming, and also develop skills in programmed multimedia access (e.g. microphone
input and speaker output). While a version should work on the Windows platform,
extension to Android or other smartphone platforms is also possible.

Knowledge Systems Institute


Selected MS Project Thesis Abstracts
E-Approval System
Pharmacy Management System
The Voice-Activated Stolen Vehicle Management System
Project Reporting System
On the Topological Design of Network System: Performance and Cost Perspe
ctive
Mobile Application of Test System
Web-based Incentive Solution
Focused Web Crawler for Searching Mailcious Web Pages
Consultant WEBSMS System
A Mobile Inventory Management System
Community Mobile Application
E-Product Marketing System
Mobile Hotel Management System
The Smart Grocery shopping System Designed in ASP.NET
The Survey and Performance Analysis of modern Wireless Telecommunication
Networks
Koha Library Management System
MOBILE PERSONAL ASSISTANT
P2P Solution for Videoconferencing
Events Management System
Psychological Portraiture in Traditional Art and Digital Art: A Study Ex
ploring the Intrinsic Qualities and Dynamics of Each Media
myCompanion
A Study and Implementation Plan of CPOE for Healthcare Institutions
Bluetooth Enabled Restaurant
PC Remote Controller
Automatic Postage Stamp System
Nature Capture System
Dualis
Torrent Times
Quality Assurance Mentor
The Efficiency and Implementability of Bioinformatics Algorithms
Online Real Estate Managment
Smart Communication: An Intranet Based Collaboration Tool
KSI Library Management System Utilizing RFID
Defect Tracking System (DTS)
Patient Health Care Information Systems
Business Objects
Secured Personal Directory System Using Web
The Chronobot Administrator System
The Chronobot Job Placement System-User Interface
Health Level Seven Integration Design
Applying Sequential Space Relativity for Image Recognition
Online Banking
Online Web Hunt
Designing A Networked Java Action Game For A Cell Phone
Building An Options Trading Analysis Tool Using ASP.Net
The Implementation of Jedtector ? A Tool for Incremental Change In JAVA
Code
Implementation of Voice over IP in Peer to Peer Environment
The Design of Computational Java Bean Component Package for Protein Sequ
ence Analysis
The Design and Implementation of JavaHelp System for Java Client Applica
tion Service
E-Commerce Application Using SQL-Server 2000 And ASP
Digital Video Transmission over Wireless Channels
A Cross Platform Web Service Implementation using SOAP
Software Agent
A Comparative Study and Implementation of Network Security
Data Mining in a Library System
A Small Office Database Management System using Java Servlet
An Online Health Consulting and Shopping Center implemented by Java Serv
er Pages
JAVA Security on the Internet
An E-commerce Implementation Using JAVA Servlet,JSP and MySQL
A Survey and Implementation of E-Commerce in Supply Chain Management
A Visual Editor for Multimedia Application Development
A Survey of Encryption Algorithms
COMPUTER SIMULATION OF Queueing SYSTEMS: CSQS
Network Security
Designing a Personal Information MANAGER with VB 6.0
TSJ: A WEB-BASED TEACHING SYSTEM USING JAVA
A Survey And Performance Comparison of Dynamic HTMLs
AN ONLINE-BANKING SYSTEM USING JAVA AND CORBA
An Implementation of Microsoft Transaction Server
An Implementation of A Spatial Query Language for Multiple Data Sources
The Implementation of a Web Database using the Approach of Java Database
Connectivity: JDBC
A Rule-Based System Verification Tool Using a Matrix Approach
A Client/server Networking Application using JAVA: JWBCB
A TCP/IP NETWORK APPLICATION IMPLEMENTED WITH VISUAL BASIC
DYNAMIC HTML IN INTERNET EXPLORER 4
A Network Application using VBWB
3D Simulation System with Dynamic Object Design
A Loan Pricing Model
A Survey of Distance Learning
Thin Clients For The Internet: Network Computer vs. NetPC
The Implementation of Web-Databases by the Approach of Java Database Con
nectivity: JDBC
Network Application Design Using TCP/IP Protocol in Windows
Customer Service On The Internet
Design And Implementation Of A Text-Based Object-Oriented Base
Full Text Indexing Technology Applying To Web Pages
Network Application Design Using TCP/IP Protocol In Windows
The Design Of A Library On-Line Search Application

E-Approval System
Sarah Anjum
Graduation Date: December 2014
Abstract
The E-Approval System (EAS) was developed due to the global nature of many organ
izations. The key persons involved in the decision-making process in many busine
sses often are based in different parts of the world. The approval process must
flow seamlessly to ensure decisions are made efficiently and work is approved in
a timely manner. However, it is easy to lose documents or simply forget about a
request with all the decisions that must be made. Automating an organization's
approval processes can save time and money while reducing chances of human error
. Compliance with regulatory standards can be facilitated if approval processes
are automated. In the EAS, we have three levels of approvers, along with an admi
n and users who can send documents for approval. A document is encrypted and sen
t over the network to the admin who will decide which level of approvers will re
ceive the document. The approver will be notified once he/she receives the docum
ent. Then the approver can download the file, and after verifying it, will have
to enter his/her digital signature to accept or reject the document. Once he/she
has made a decision, the admin who was keeping track of the document's status w
ill be notified whether the document has been accepted or rejected. The admin fi
nally approves or rejects the document and then the user is notified about the f
inal decision. The (EAS) was developed using Java Programming languages and data
base maintenance uses MySql.
Back to Top
Pharmacy Management System
Talath Shams
Graduation Date: December 2014
Abstract
Pharmacy management system is a web-based application, which is used by pharmaci
es to manage all pharmacy related activities. Pharmacy management system provide
s activities like managing stock details, sales and purchase. The functional com
ponents of the project are managing stock details, where stock details can be ad
ded, edited or deleted. Billing transaction information can be viewed by providi
ng bill number and also getting all the pharmaceutical medication details attach
ed with the bill. Medicine returns can also be taken care with this system. Admi
nistrator is one of the user role defined in this application, where he/she can
see various statistics about the stock and purchase details. Store users have ac
cess to enter stock details and billing information (statistics are restricted f
or this user). In this thesis project, a prototype solution will be implemented
with ASP.NET web technology and SQL server as relational database to save all ap
plication related entries and following by rapid application development approac
h. The basic purpose of this research is to provide effective and efficient phar
macy management facility for both higher and lower management, which has been su
ccessfully fulfilled. It is not possible to develop a system that serves all the
requirements of all users. User requirements keep changing as the system is bei
ng used. Hence, as the requirement evolves, the system can be upgraded as per th
e requirements and specifications. Key technologies used in this project: ASP.NE
T, C#.NET, SQL Server.
Back to Top
The Voice-Activated Stolen Vehicle Management System
karn Mukesh Pandya
Graduation Date: December 2014
Abstract
The Voice-Activated Stolen Vehicle Management System (SVMS) is a web-based mobil
e application for the police department and general public. This application wil
l basically help in finding the actual owner of the recovered stolen vehicle in
a timely manner. This will be achieved by creating a centralized application for
the police department to query the details of the vehicle recovered. This appli
cation will allow users to gather the details of the stolen vehicle along with t
he owner and FIR details. Thus when someone queries for this vehicle, when found
based on the VIN number, they get the information about the actual owner as wel
l as the Police Station in which the complaint was launched. This application wi
ll also have a voice search option where a user can search the vehicle using voi
ce i.e. by saying the VIN number. The same application can also be used by the g
eneral public when buying a used vehicle to check if it is stolen property. Last
ly, this application can also be used to check the details of any suspicious una
ttended vehicles, thus encouraging public participation in recovering stolen veh
icles. The application will be able to run on various android powered mobile dev
ices. The client side of the application will be developed using Android Softwar
e Development Kit in eclipse IDE. Server side coding will be done in PHP, HTML,
CSS with MySQL as the Database.
Back to Top
Project Reporting System
Niha Sultana
Graduation Date: December 2014
Abstract
The Project Reporting System (PRS) is a web-based time tracking and manpower all
ocation system that employees will use this program to allocate budget and forec
ast resource and record actual time spent on each project. Every employee will h
ave a unique login to enter into the system and the function to enter the time s
pent on each project they are supporting. All the employees should enter work ho
urs on a weekly basis every week. The PRS system gets locked on the last Friday
of each month and changes cannot be made prior on the entries. It is designed to
reduce project costs and to help complete projects on time and on a fixed budge
t. In this project, there will be three (3) users: Administrator, Reporting Mana
ger and Employee. As this is a web application project that uses the .NET framew
ork technology along with Microsoft Visual Studio .Net-2008. AJAX Tool kit, Web
Services and MS SQL Server. The project is planned to have the view of distribut
ed computing. Constructs of MS-SQL Server will be used and all the user interfac
es will be designed using the ASP.Net technologies. The database connectivity is
planned using the "SQL Connection" methodology. This application is designed to
analyse the whole structure of project reporting based on one project to multip
le projects in every corporate computing systems by using three main modules Adm
in,Manager and Employee who will be having individual access.
Back to Top
On the Topological Design of Network System: Performance and Cost Perspective
Ruqayyah Habeeb
Graduation Date: August 2014
Abstract
The following report examines the components and structures of different network
topologies with aims of understanding their strengths, limitations, cost and fl
exibility. Different network topologies are analyzed within the contents of arch
itecture, flexibility, cost of implementation and performance. The report is sub
divided into two parts; the first part analyses the general topology characteris
tics of Mesh, Star, Bus, Ring and Tree topologies while the second part illustra
tes the process of implementing a small office network using Star topology. A co
st-performance analysis is conducted through quantification of topology structur
es and the Star network selected as the best due to flexibility, speed, low cost
of maintenance and ease of expansion. The project cost for implementing a five-
node Star topology is $15,757.00. One of the major limitations found is the labo
r cost due to the level of expertise required.
Back to Top
Mobile Application of Test System
Qingyan Deng
Graduation Date: August 2014
Abstract
The thesis introduces the Mobile Application of Test System (MATS) developed on
Android mobile devices. It explains the development background of the MATS and p
oints out that the MATS could help users, particularly for students, to train an
d practice on their own mobile devices select professional knowledge tests and e
xercises. Thereafter, it discusses the key technologies which being used in deve
loping the MATS's development, e.g. Android system architecture, Android activit
y lifecycle method, Eclipse platform, Java JDK. The main functionalities of the
MATS seven modules are presented. In the chapters, the author analyzes the syste
m design architecture, such as components and activity diagrams and describes th
e data structure of the SQLite database. The thesis describes how the MATS offer
s the random questions and answers options to users. It also displays how to use
each function in the seven modules. The two simulated test modules bring users
the experience of a real test by offering counting down timer and test score. Th
e collection of questions which users answer incorrectly during practicing also
is a MATS special feature. At the end, the author proposes the possible future e
nhancements to the MATS.
Back to Top
Web-based Incentive Solution
Mohammed Abdul Muqeeth Siddiqui
Graduation Date: May 2014
Abstract
Web-based Incentive Solution provides an incentive solution for organizations th
at wants to inspire their employees. Companies rely on rewards programs to retai
n and motivate employees and sales partners, incorporating a fonnalized recognit
ion program helps strengthen their relationship with the company. This system ca
n be used to create a new site especially for an organizations which enables the
ir employees to earn points for worthy performance, actions and behaviour which
can be redeemed at a participating merchant store for merchandise, gift certific
ates or other items. This web application caters to three users: Program Admin,
Partner, Employee. This web application offers all the services required by the
Program Admin including: adding new employee/partner details, providing gifts an
d points to the employees, preserving anniversary points of the employees, displ
ay employee status of the points and etc. This project discussess all the aspect
s of the Partner including generating voucher details, add/update new items and
keeping track of the orders received from an employee. From an employee perspect
ive, this project offers services like placing an order with voucher details, ch
ecking the status of the order, checking the total points earned and etc.
Back to Top
Focused Web Crawler for Searching Mailcious Web Pages
Anuraj Saxena
Graduation Date: May 2014
Abstract
Computer systems connected to the internet are confronted with a plethora of sec
urity threats ranging from computer worms, viruses to Bot networks'. For any wor
m, virus or a bot agent to be planted in a computer system, web attacks are now-
a- days a preferred medium. Drive by download attacks, from malicious web sites,
which use malicious JavaScript to attack through the browser, are on the rise.
Detection of malicious web content on the internet to avoid compromise of the ho
st PC is an area of active research being promoted by all companies and agencies
world- wide.
To search for malicious web pages, typically the first step is to use a crawler
to collect URLs which are live on the Internet. Then, fast pre-filtering techniq
ues are employed to reduce the amount of pages needed to be examined by more pre
cise, but slower, analysis tools (such as honey clients) [5][7][8]. While effect
ive, these techniques require a substantial amount of resources. A key reason is
that the crawler encounters many pages on the web that are benign, that is, the
"toxicity" of the stream of URLs being analyzed is low. This issue can be overc
ome by having a focused crawler which can seek more malicious sites and avoid be
nign sites.
Problem statement: In this thesis work, I have developed a focused web crawler w
hich can crawl and search malicious web site in an efficient manner. The focused
web crawler designed in this thesis has the following
capabilities- It can crawl more malicious sites in a unit time compared to a gen
eric crawler, it can handle cloaking, entanglement in malicious sites, and AJAX2
content. This crawler has been developed on the Java platform. It has used the
JSoup library for parsing of web pages, Rhino Engine for JavaScript emulation in
a Sandbox, HTML Unit Engine for Browser emulation in a Sandbox and WEKA library
for Data Mining analysis results. The crawler was tested on the internet and th
e results obtained were analyzed to check the efficacy of this focused crawler.
Back to Top
Consultant WEBSMS System
Ajaz Ahmad Mohammed
Graduation Date: May 2014
Abstract
Consultant WEBSMS System is a web-based application which helps the consulting c
ompany to easily communicate with their consultant. It allows the consulting com
pany to send messages to a consultant mobile phone. Messages can be sent free of
cost to any mobile phone in any part of the country. This application helps man
agement consulting company to track their timesheet and remind the consultant on
a weekly basis to send their timesheet with this application. The problem assoc
iated with traditional spreadsheet application is that as the business grows the
problems escalate and the management ends up wasting billable time across the o
rganization consultants take longer to fill in their time, admin staff have to c
onsolidate and re-enter the data, the finance team is forever sending out new sp
readsheet versions with the latest job codes, and management has to do their own
spreadsheet analysis to get the data they need in the right format.
There are functions to download and upload files such as Timesheet, Pay checks,
W2's and other related files also. One of the other important facilities of this
website is the discussion forum, where consultants can share ideas as well as s
et appointments to meet other consultants who are interested in the same topic.
There is an option to send alerts like different packages to Consultants.
Back to Top
A Mobile Inventory Management System
Peng Xu
Graduation Date: May 2014
Abstract
The Mobile Inventory Management System provides a stable mobile platform for a s
mall business to manage their inventory. It can be easily used by company staff
through mobile devices. Additionally, the system manages suppliers' information,
buyers' information and product information. This System was developed using JA
VA language with Eclipse IDE in junction of Android Developer Tools and Microsof
t SQL Server as the backend database system for implementation. It runs on andro
id devices.
The project provides an efficient platform for a manager to retrieve and update
basic information such as suppliers' data and customers' data, as well as use th
e special barcode scanner function to get a commodity's ID number much faster an
d more accurately. It updates and shares the current inventory list in real time
, manages user accounts. In the case of an inventory shortage, the system will n
otify the manager for reloading automatically. The company can use this system i
n order to improve productivity and reduce manpower need.
Back to Top
Community Mobile Application
Rarikrishna Kaitheri Manikkoth
Graduation Date: December 2013
Abstract
This thesis is intended to build a community mobile app that provides individual
s information about their communities in an easy to understand, graphic manner o
n their smart phones. Community members can create and manage their profiles thr
ough the functionality provided by this mobile app.
This app makes provides ease for individuals with limited digital or English pro
ficiency to view through touch screens without extensive instructions and by red
ucing the number of clicks. It delivers contract and seasonal job alerts in Engl
ish, gives a quick way to browse through all events that take place in their com
munity and members can search via keywords for the various community details suc
h as; events, attractions, properties, etc., during their spare time.
This app assists individuals to browse through apartment rentals, houses for ren
t, property in th e community to buy or sell, attractions in the community, land
marks, upcoming events that are t aking place and also helps to find restaurants
in one specific community. The mobile app is implemented using Java frame work
with PHP for Android phones.
Back to Top
E-Product Marketing System
Viquar Mohammed Taufeeq
Graduation Date: December 2013
Abstract
E-Product Marketing System is an intranet application that uses an internet prot
ocol technology to share information, operational systems or computing services
within an organization. Campaigning is used by several organizations to reach an
d influence people. There are different campaigns for different products. Compan
anies make the strategy of running some product marketing campaigns for its new
products to be sold to the prospective customers. Before the campaign starts, th
e estimations are made on sales to be achieved and budget allocations are set fo
r each campaign by the company. When the definite data is captured, the actual a
mount is calculated. The difference between the actual and the estimated amount
provides the company with an insight into their estimation, and helps them in ma
king strategic decisions about budgets. In order to develop this complete inform
ation system regarding a campaign, it is necessary to collect the entire data wh
ich captures the functionality described above. The proposed system is developed
using .NET technology. Moreover, ASP.NET is used for designing user interface f
orms, and business logic is developed using C# language. SQL server is used for
storing relational database entities.
The basic purpose of this research was to provide effective and efficient campai
gn management facility for both higher and lower management, which has been succ
essfully fulfilled. It is not possible to develop a system that serves all the r
equirements of all users. User requirements keep changing as the system is being
used. Hence, as the requirement evolves, the system can be upgraded as per the
requirements and specifications. Key technologies used in this project: ASP.NET,
C#,.NET, SQL Server.
Back to Top
Mobile Hotel Management System
Lisha Ma
Graduation Date: August 2013
Abstract
The Mobile Hotel Management System is developed for the large-scale hotels to im
prove the quality of service, management level and reduce cost. The system provi
des a mobile platform for the staff to query room information, room reservations
, check-in and check-out, report repairs that are needed, room service or some o
ther issues by using the mobile devices.
The advantages of the system are:
1) To provide an effective and efficient way for hotel managers, service staff,
receptionist, etc to share and manage the flow of information through the mobile
devices in order to improve the service quality.
2) Make it easy for the customers to make reservations and receive service withi
n a short period of time
3) Make it easy for the maintenance technicians to receive their report and prov
ide updates on the status of repairs.
4) Make it easy for the human resource manager to query and update the employee
list.
The proposed system will be developed in Eclipse IDE for JAVA EE with the Androi
d Developer Tools (ADT) plugin, it will use JAVA language to implement all of th
e features in the system and use the SQLite to do the database maintenance.
Back to Top
The Smart Grocery shopping System Designed in ASP.NET
Kathy Y. Lin
Graduation Date: May 2013
Abstract
In this current economy, saving money is all the rage. Americans love bargains,
they brave the crowds on Black Friday to get what they want. Unfortunately, it h
as never been an easy task for grocery shoppers. Grocery manufacturers issue cou
pons and stores offer incentives to provide the shopper money saving opportuniti
es. Coupons must be clipped from the newspaper inserts or printed from online so
urces. Oftentimes, you find the coupons are disorganized, out of date or just pl
ain missing when you need them. There is also difficulty and confusion in matchi
ng a coupon to the best sale to maximize your savings. Many items said to be "on
sale" tend not to be as cost effective as buying them at a competitive store. W
hile you can spend hours matching coupons with the sales manually with some succ
ess, a web based application can ease this task and achieve better results.
This research project is to create a dynamic grocery coupon organizer applicatio
n using the power, flexibility and scalability of ASP.NET web development tool s
upplemented by VB.NET, HTML, CSS and SQL relational database technologies.
Back to Top
The Survey and Performance Analysis of modern Wireless Telecommunication Network
s
Faraz Ahmed
Graduation Date: August 2012
Abstract
This project concerns with a descriptive information of the wireless technology
from 2G to 4G (which means the start of digital and onwards). It gives an insigh
t to the back end of the technology and talks about network architecture and its
sub-system elements, its specifications and services they provide to the end us
ers. However, the focus of this report lies not only on the network elements its
elf but also on the interfaces between them. Also, this dissertation is meant to
provide a brief, but complete description of all systems and protocol architect
ures that can serve as an essential, conceptual document that can be used as a b
ase for extending and relating the mobility-specific functions of all networks w
ith that of the up-coming generation technology like Wimax and LTE - Long Term E
volution.
Back to Top
Koha Library Management System
Afshan Anjum Nayeem
Graduation Date: May 2013
Abstract
The focus of the thesis is on Library Management System for KSI. Koha is an open
source Web Based Integrated Library System. It contains various modules includi
ng Cataloging, Circulation, Online Public Access Catalog (OPAC), acquisitions an
d patrons. Koha also supports MARC21 (Machine-Readable Cataloging) and UNIMARC f
or professional cataloging. All modules, style and appearance are fully customiz
able. Koha has two interfaces - one for the library staff and the other is web O
PAC for public access.
Koha is written in Perl programming language. It has client-server architecture.
Though Koha software can be installed on any operating system, Debian Linux is
recommended. Any web browser like Mozilla, Firefox or Internet Explorer can be u
sed to access Koha. Koha runs on the LAMP platform i.e. Linux, Apache, MySQL and
Perl. Z39.50 communication protocol is used for search and retrieval of data.
The main objective of the thesis is to implement and configure Koha for the KSI
library. Implementation of Koha includes configuration of Linux, Apache, MySQL,
Zebra, YAZ and Perl packages. Various tools required for installing the Koha sof
tware stack include - APT Package Manager for Linux packages, Make Utility for P
erl modules and CPAN Shell. Koha system has to be configured to maintain informa
tion about items in the library. MARC Frameworks, Authority Control and Authoriz
ed values are configured in the Cataloging Module. Library items loaned to the u
sers and mapping of library's circulation rules and policies are configured in t
he Circulation Module. Patron access controls are set in OPAC preferences. Data
from the current library database has to be extracted and imported into the new
system using Koha's import tools.
Back to Top
MOBILE PERSONAL ASSISTANT
Dheeraj Bhushan
Graduation Date: May 2013
Abstract
The mobile devices or the next generation smart phones are becoming the de-facto
computing platform for the masses. With performance now available at a reasonab
le cost these mobile giants are the devices that will serve as the primary means
of interaction between most computer users of tomorrow and their online life. T
he rapid transformation fromarge desktops, to laptops, to notebooks and then to
netbooks, is a testament to this inevitability. However, there is a real gap in
needs of the mobile netizens of today and the assistance software available. The
primary applications such as email, IM , chat and voice are abundant, however t
he needs now are vastly different; with people plugged into the Internet in so m
any ways there has not been a real attempt at assimilating this information in o
ne place to add value across means of interaction. Truly though, before the adve
nt of the very powerful mobile devices of today, this would have been an endeavo
r in futility; however the devices of today boast processing power many times ab
ove laptops of 10 years ago. The mobile devices of today operate at several Ghz
of CPU frequency coupled with several Gigabytes of storage. These devices are ho
wever largely underused. This project is aimed at creating a repository of infor
mation for the netizen of their mobile capability to provide assistance with On-
line interaction. The device of choice at this point is Google Android for sever
al reasons. First and foremost the programming language is Java, this makes the
Android a long-term leader as compared to the Objective-C base iPhone devices. A
lthough the iPhone is presently the leader of the pack, history tells us that th
e leaders of technology rarely maintain their position for too long. Irrespectiv
e of position, the choice of Android has several benefits. Besides lower barrier
for entry, the Android platform is designed for long-term application life from
ground up. The ability to use part of a class within and across applications is
the first step in that direction. Moreover, the certificate policy requirement
for releasing applications with certificate expiration after October 31, 2033; a
lthough an indirect indication, is a strong pointer to what Google aspires for t
heir platform Finally, there are several devices that will be coming into the ma
rket with the Android platform under the hood presently the count stands at 10 f
or the year 2009 and the number of devices in 2010 is already over 20. Therefore
the first attempt at this application will be made on Google Android as the tar
geted platform.
Back to Top
P2P Solution for Videoconferencing
Wen Shi
Graduation Date: December 2012
Abstract
Typical videoconferencing usually uses a Multipoint Control Unit (MCU) or a cent
ral control computer to negotiate among several remote points. All the video and
audio data are transferred through this central point. This kind of structure b
rings additional hardware costs as well as a bottleneck according to the capacit
y of the central point. In this project, we are seeking a method to get rid of t
he MCU part by adopting 'peer-to-peer' connection architecture. Treating the who
le Internet as a cluster, we are going to shield physical differences of a hybri
d environment and implement basic functions for videoconferencing by pure softwa
re.
Back to Top
Events Management System
Sangeetha Sathish
Graduation Date: May 2012
Abstract
This project is aimed at developing an Events Management System that can be acce
ssed by the supply chain group in an organization. The ?Events Management ?is an
intranet based application. This system can be used to track the items for the
customers in the sales team lead. An event notification form was developed for t
he supply chain to submit the information. There are features such as email noti
fications and also the automated alert notifications when the items are altered
by the sales team lead. There are contributing permission levels given to the sa
les team lead and documents shared among employees using this intranet site. The
automated email remainder was developed prior to the deadline. There are regist
ered people in the system and the amount of sales where calculated on a regular
basis. The system is proposed to be implemented using share point 2010 and wss 3
.0, which is built upon component asp.net and sql server database. This is a web
-controlled intranet based application can be developed for the interaction betw
een the client and the server system. This web application uses a share point te
chnology along with Asp.net 3.5 and Sql Server 2005.
Back to Top
Psychological Portraiture in Traditional Art and Digital Art: A Study Exploring
the Intrinsic Qualities and Dynamics of Each Media
Angela Redmond
Graduation Date: May 2012
Abstract
Within this project, I am examining the use and effect of psychological portrait
ure in traditional and digital art. A psychological portrait is defined as an im
age that reveals inner aspects of its subject. This can be portrayed by framing
the portrait in such a certain composition that certain features are revealed an
d others are concealed, as well as incorporating extreme angles and dramatic lig
hting. This technique is often displayed within paintings, drawings, and photogr
aphy, but also within digital media such as feature films and abstract video pie
ces. Psychological portraiture evokes emotion and curiosity in the viewer. Withi
n this project, I am exploring the use of psychological portraiture in Tradition
al Art as well as Digital Art, and deciphering which particular qualities are be
st expressed in each media.
Back to Top
myCompanion
Praveen Kumar R. Paidi
Graduation Date: May 2012
Abstract
Currently available Internet applications provide generic information about a gi
ven place. They primarily lack personalized information, which is the most impor
tant factor for revisiting that place.
Every time people visit a place, they recollect that they have been to that plac
e before but may not remember their past experience at that location, namely res
taurants, retail stores, etc. Also when visiting a new place, they would like to
know any available information to become more familiar with that place. This ca
n be achieved by automatically identifying the user's location, finding all the
information about that location, and presenting it to the user in a simplified a
nd easy-to-use format.
The purpose of this project is to design an Android mobile application that uses
GPS and Wi-Fi location services available in the platform to precisely identify
the location, retrieve user experience information, and present it to the user.
When visiting a new location, the application searches online for information s
uch as type of location, available services, general reviews, and comments. Thes
e are then processed and presented to the user in a precise and simple format.
The application will be developed using Android SDK and Eclipse IDE with an Andr
oid emulator and development tools plug-in.
Using this application, a person can comfortably visit any location, new and old
alike, with profound information about that location.
Back to Top
A Study and Implementation Plan of CPOE for Healthcare Institutions
Hany A. Hamad
Graduation Date: May 2012
Abstract
Patient safety has become a focus for hospital administrators and policymakers.
Medication errors in particular have received the most attention because of thei
r high prevalence, slignificant harm to patients, and high costs to hospitals. W
hile the hospital medication process is prone to errors at all stages, the great
est percentage of preventable adverse drug events occur during physician orderin
g, rendering that phase the prime target for error- reducing strategies. Healthc
are institutions have installed computerized physician order entry (CPOE) system
s from multiple vendors such as GE, McKesson and Siemens to address the problems
inherent in manual order writing. All CPOE systems share a common functionality
at their core, but this paper will only focus on some benefits of having a CPOE
in place and then give an overview of implementation planning in the healthcare
institution.
Back to Top
Bluetooth Enabled Restaurant
Student Name: Syed Adil
Graduation Date: December 2011
Abstract
The project entitled Bluetooth Enabled Restaurant is based on implementing a cat
alog based service on Bluetooth in a restaurant. It gives Bluetooth experience t
o the customers who visit the restaurant. A person, with his Bluetooth enabled m
obile device can place the order for food items and later pay for the order from
his device itself, eliminating the need of waiters. The application even has a
song dedication module as an entertainment feature where in the customer can pla
y the songs of his choice from the available list of songs adding his personal m
essage. The form interface needed to connect to the Master through the mobile ha
s been developed in the Symbian OS, an Operating System for Mobile Phones, provi
des a flavor of C++ called Symbian C++ whose programs are complied and executed
using the Compliers-WINS, ARMI and THUMB. The project is based on Point to Point
communication over sockets where transfer of List of Items or Songs takes place
between the master and the slave that is the mobile device.
Back to Top
PC Remote Controller
Student Name: Mohammed Imran
Graduation Date: August 2011
Abstract
The project entitled PC REMOTE CONTROLLER is based on implementing controlling o
f devices using Bluetooth. It gives Bluetooth experience to the user who control
s his personal devices. A person, with his Bluetooth enabled mobile device can c
ontrol some of the applications of his PC like Windows Media Player, Change Back
ground Screens & also various closing operations. There is a listener program on
the System side written in VB.NET to execute the given commands given by the mo
bile phone which resides on COM PORT. The form interface needed to connect to th
e Master through the mobile has been developed in the Symbian OS, an Operating S
ystem for Mobile Phones, provides a flavor of C++ called Symbian C++ whose progr
ams are complied and executed using the Compliers-WINS, ARMI, THUMB. The forms f
or the Mobile Phone are first emulated on an emulator called EPOC, proprietary s
oftware of Nokia, later this is loaded into the Mobile Phone. The project is bas
ed on Point to Point communication over sockets where transfer of List of menu i
tems takes place between the mobile & PC. An attempt has been made to play the d
esired song in Windows Media Player of the Computer System, which is activated b
y a program developed in VB.NET, which uses the information provided by the Mobi
le Phone. The commands have been sent from the Mobile Phone to the Computer Syst
em using an API called BTSocket and BTSerialService provided by the Symbian C++.

Back to Top
Automatic Postage Stamp System
Student Name: Nooruddin Mohammed
Graduation Date: August 2011
Abstract
This project deals with the online posting of objects without going to the post
office. Updating the mechanism of postage with technology and reducing the overh
ead of going manually to the post office there comes an AUTOMATIC POSTAGE STAMP
SYSTEM" (APSS) into picture. With APSS everyone can do the online postage from t
heir organization and it will be the responsibility of post office to collect th
e postage object from you. The APSS application take the type and weight of the
object to be sent, along with the source and destination address. Based on these
three values it calculates the amount of money required to send the object. The
main objective development in the field of internet and distributed networking
along with distributed databases has shown a lot of changes in the department of
banking, telecommunication, electricity etc. But there are not much changes fou
nd in the department of post offices for posting of articles. In this study we a
re determining a way to change the efficiency of the postal department. The day-
to-day new technology in the market, which is supporting the 3-tier architecture
framework, can make a change in the mechanism of posting objects between two lo
cations. The two technologies, which are supporting distributed computing, are S
un's J2EE and Microsoft dot net. Using one of these technologies along with the
backend database we can get our goal done. The software will be developed in Jav
a as the user-interface using JSP, web-logic sever and Oracle as the backend.
Back to Top
Nature Capture System
Student Name: Liwei Jiang
Graduation Date: May 2011
Abstract
The Nature Capture System is developed for digitally capturing environmental obj
ects, storing and retrieving associated metadata over the internet. It helps use
rs to capture, share, store and retrieve data that are related to specific envir
onmental objects. The system provides a platform to share and increase systemati
c knowledge of the objects which belong to the biological kingdoms of fungi. Nat
ural objects will be captured by users through external devices, such as digital
cameras, and uploaded into either the application database or system servers ov
er the internet.
Back to Top
Dualis
Student Name: Yu-Chian Wang
Graduation Date: May 2011
Abstract
Animation techniques are used in film, video and art production for diverse goal
s. Animation is used to add realistic qualities to scenes and special effects, i
t can create magical qualities, or it can determine an entire stylistic vision.
No matter the end purpose of the animation technique, the ultimate purpose is to
create illusion. This research will investigate the many processes of creating
animation and Visual effects (Visual F/X or VFX) including traditional 2D, stop-
motion, 3D modeling, computer generated imagery (CGI), and present a history of
such techniques, citing specific examples. Specifically, the process of mixed an
imation technique will be explored through discussion of examples and investigat
ion of types of mixed animation technique, especially where dream sequences and
portrayal of alternate worlds is involved. Finally, I will present my own art wo
rk with an original musical composition by Martin Simon, a piece of animation wh
ich explores diverse techniques within the work itself, and uses the contrasting
styles to explore and define my creative and narrative process.
Back to Top
Torrent Times
Student Name: Wen Liu
Graduation Date: August 2010
Abstract
Torrent Times is a project about human's instincts. The focal point in this proj
ect is human emotion and desire. I want my audience to get into this project and
chose their own way to play with it. I want to leave this project open enough,
so there will be more possibilities which will be created or found by the user.
From the very beginning of human culture, we were already there. Now we are stil
l here in the same place, but different time. Time flows really fast, it never w
aits for anyone or anything. We will be ashes. We will die. But it doesn't matte
r. It is just like raining, everything flows with the rain drops and we flow wit
h time. Torrent Times is a representation of rapid changes. With our emotions an
d desires, we have changed our life and history. But in this project I am not em
phasizing history or life. I am reaching for different emotions and desires of d
ifferent people. (Everyone loves different things, the emotion is love, but the
desires are different. For instance, I love to play basketball, so my desire is
the game of basketball. My brother loves to read books, so his desire is to read
books. We have the same emotion which is love, but we have totally different de
sires.) The important factor in this project is the relationship between emotion
and desire. But if I put emotion and desire separately they can still create ma
ny possibilities. We are controlled by our emotion and desire. What if we are ou
t of control of our emotion and desire? What will happen? "Torrent Times" contai
ns video, audio and computer graphic transformation techniques. With the written
text, "Torrent Times" will show you my own definition about human instincts.
Back to Top
Quality Assurance Mentor
Student Name: Masarath Durraj Mohammed
Graduation Date: August 2010
Abstract
The main requirements of this project are to provide an interaction medium for t
he customers and the employees of the organization which is undergoing the asses
sment for a Quality Assurance certification. The main modules of this project in
volve the customer and employee. The customer module deals with collecting the i
nformation from the customer who is interested in getting certified with some Qu
ality Assurance certificate. The customer here will disclose matters related to
the enterprise. The Employee module includes the work done by the auditors, surv
eillance team during the visit to the company under assessment. The reports subm
itted to the company will be used to analyze the company's track record its prod
uct quality etc before issuing the certification.
Back to Top
The Efficiency and Implementability of Bioinformatics Algorithms
Student Name: Mohammadali Towhidlou
Graduation Date: May 2010
Abstract
This thesis is intended to introduce biological and algorithmic ideas that, when
combined, link issues in biology to computer science and mathematics and theref
ore proves valuable to scientists in deriving conclusions. It demonstrates that
relatively few design techniques can be used to solve a large number of practica
l problems in biology, and presents the ability to implement bioinformatics algo
rithms intuitively. This seeks to demonstrate the mechanics of algorithms in the
context of the mechanics of input and output using mathematical and logical equ
ations that are always accurate and efficient, and never fail if they are design
ed correctly. In this study, will deal with serious bioinformatics problems and
show how efficiently applying those algorithmic ideas to these biological issues
can help us find correct solutions in a timely manner.
Back to Top
Online Real Estate Managment
Student Name: Wajid Ali Imran Mohammed
Graduation Date: August 2009
Abstract
Real estate business is a boom nowadays. The market in real estate is giving an
individual an immense opportunity to develop his business successfully. This pro
ject is aimed at developing an online real estate agent system that is of benefi
cial to either a real estate agent or a prospective. The "Online Real Estate Man
agement" is an internet based application. This system can be used to store and
search the property portfolios. The system will be implemented over a network, c
omparing hosts at different levels of hierarchy. The data will be stored on the
servers and controlled access will be provided to the users. Moreover, the data
transmission should be a secured one. Only authorized users will be allowed to a
ccess data on the server. The system is proposed to be implemented using ASP .NE
T. The database will be stored in the SQL server. Web Controlled based applicati
ons can be developed for the interaction between the Client and the Server syste
ms. This is a web application project that uses the .NET framework technology, a
long with the SQL Server 2000 Database. The Operating system supported is the Wi
n2K or later with .Net framework technology. The Minimum hard disk storage capac
ity is 5 GB, with Pentium IV or higher processor. The RAM supported is 256MB.
Back to Top
Smart Communication: An Intranet Based Collaboration Tool
Student Name: Nazim Khaja
Graduation Date: May 2009
Abstract
The objective of implementing this project is to increase productivity and helps
in faster and better decision-making. There is a need for a system that would a
ssist team members in communicating and collaborating with each other. Further g
oals of the project include avoid duplicated effort, avoid delays in performing
revision and encourage creativity and issue solving. Communication is a process
that allows organisms to exchange information by several methods. Communication
requires that all parties understand a common language that is exchanged with ea
ch other. Exchange requires feedback. The word communication is also used in the
context where little or no feedback is expected such as broadcasting, or where
the feedback may be delayed as the sender or receiver use different methods. Tec
hnologies, timing and means for feedback. There are auditory means, such as spea
king, singing and sometimes tone of voice, and nonverbal, physical means, such a
s body language, sign language, Para language, touch, eye contact, or the use of
writing. The users of this system are not naive users; they use computers to pe
rform tasks, such as monitoring a server or maintaining a database. Team members
would be encouraged to use the system. Since the project will be implemented wi
th employees with knowledge of computers, it's easier for the members to use the
product. It would also be possible to track the usage of the system by team mem
bers.
Back to Top
KSI Library Management System Utilizing RFID
Student Name: Javier Vazquez Navarrete
Graduation Date: May 2009
Abstract
RFID (Radio Frequency Identification) is the latest technology to be used in lib
rary management systems to date. Unlike EM (Electro-Mechanical) and RF (Radio Fr
equency) systems which have been used in libraries for decades, RFID-based syste
ms move beyond traditional systems and are more efficient in the management of m
aterials throughout the library. This thesis project presents the functioning of
a RFID library management system consisting of a radio frequency module (the re
ader) connected to local computer with a Web-Based library manager database appl
ication installed. The KSI library RFID system will be designed to take on the a
ppearance and functionality of the current KSI library system to simplify and sp
eed the process of identification and management of each library item. Libraries
commonly deal with the large amounts of transactions that are reported every da
y in strict records that must keep in some sort of database to ensure the integr
ity and availability of the library catalog. For years, this process was done by
hand, whereby borrowed or returned books would be counted daily and records wou
ld have to be updated manually. The RFID system allows items to be identified wi
th an RFID transponder that would wirelessly read the tag on an item. The RFID s
ystem will be configured with a communication interface to the reader among vari
ous other components. It will receive the unique information from a passive libr
ary tag; the tag will be read only from 3 to 5 inches of distance from the anten
na. The data or information will be processed against its own local database, af
ter which the librarian can start another transaction. In this project the libra
ry's staff will practice with the RFID technology to manage fast and efficiently
the library materials. The patron will perceive and experience the process of c
heck in-out as a quick automated operation. The implementation of this RFID proj
ect named "KSI Library Management System Utilizing RFID" will give the KSI libra
ry the opportunity to explore, and eventually consider if this solution is viabl
e according to future expectative of management Library Catalog. The RFID techno
logy is the future for libraries.
Back to Top
Defect Tracking System (DTS)
Student Name: Pavan Goverdhana
Graduation Date: December 2008
Abstract
This project is aimed at developing an online defect tracking system useful for
applications developed in an organization. The Defect Tracking System (DTS) is a
web based application that can be accessed throughout the organization. This sy
stem can be used for logging defects against an application/module, assigning de
fects to individuals and tracking the defects to resolution. There are features
like email notifications, user maintenance, user access control, report generato
rs etc in this system. The entire project has been developed keeping in view of
the distributed client server computing technology, in mind. The specification h
as been normalized up to 3NF to eliminate all the anomalies that may arise due t
o the database transaction that are executed by the general users and the organi
zational administration. The user interfaces are browser specific to give distri
buted accessibility for the overall system. The internal database has been selec
ted as MS-SQL server 200.The basic constructs of table spaces, clusters and inde
xes have been exploited to provide higher consistency and reliability for the da
ta storage. The MS-SQL server 200 was a choice as it provides the constructs of
high-level reliability and security. The total front end was dominated using the
ASP.Net technologies. At all proper levels high care was taken to check that th
e system manages the data consistency with proper business rules or validations.
The database connectivity was planned using the latest "SQL Connection" technol
ogy provided by Microsoft Corporation. The authentication and authorization was
crosschecked at all the relevant stages. The user level accessibility has been r
estricted into two zones .
Back to Top
Patient Health Care Information Systems
Student Name: Shailaja Akula
Graduation Date: December 2008
Abstract
The Patient Health Care Information System (PHCIS) is a web-based system which c
an be considered as the heart of almost all Health Care organizations, Hospitals
etc., relating to Patients and their health conditions, Health Insurance and Co
verage, Doctors and Treatments at any Health Care Organization. PHCIS helps the
management of the Hospital to maintain an intelligent database about the patient
health care details. This project will go a long way in helping the Health care
Community to grow further. The PHCIS deals with all the administrative tasks of
the health Care organization like Inpatient and Outpatient Info, Hospital Visit
s, Treatments, Health Insurance and coverage etc., to meet the needs of Doctors
and staff in managing their Patient information. The system is intended to be de
signed using Business Objects, ASP.NET, C#.NET and MS SOL Server 2005. The proje
ct has been planned to be having the view of distributed architecture, with cent
ralized storage of the database. The application for the storage of the data has
been planned. Using the constructs of MS-SOL Server 2005 and all the user inter
faces has been designed using the ASP.Net technologies. The database connectivit
y is planned using the "SOL Connection" methodology. The standards of security a
nd data protective mechanism have been given a big choice for proper usage. The
application takes care of different modules and their associated reports, which
are produced as per the applicable strategies and standards that are put forward
ed by the administrative staff. The Project also includes BUSINESS OBJECTS 6.5 t
o build the PHCIS Universe and generate associated reports to analyze and enhanc
e the process of PHCIS as required.
Back to Top
Business Objects
Student Name: Pavan Kumar Devarasetti
Graduation Date: December 2008
Abstract
Any organization needs how it is growing, what are its positives and negatives.
In order do that they need reports of all above mentioned things and Speed up th
e organization to new levels of performance. Business Objects is the ftrst and o
nly business intelligence (BI) platform to deliver a complete set of market-lead
ing, end-to-end BI capabilities: best-in-class enterprise performance management
(EPM), dashboards and visualization, reporting, query and analysis, and enterpr
ise information management (ElM). Business Objects introduces significant innova
tions that deliver BI in new ways to a broad set of users. A Business Objects im
plementation is a project that you will never fmish and is one in which the best
you can do is to provide a starting point for users to make more informed decis
ions and discover opportunities. With so much product capability, you must stay
focused on the business value of business intelligence. Your challenge will be t
o understand how the history of business intelligence in your company influences
your users' attitudes, understanding, and receptiveness towards Business Object
s Main aim of this project is to do a case study on Business Intelligence tool a
nd to build reports for the island resort company from the scratch. This involve
s 3 stages 1. Building a data base 2. Building a universe (using the front end B
usiness objects Designer module) 3. Finally producing the reports for the compan
y as required.
Back to Top
Secured Personal Directory System Using Web
Student Name: Bharath Kumar Katukuri
Graduation Date: December 2008
Abstract
The purpose of this thesis is to design a Secured Personal Directory System whic
h can assist the users in adding and updating their personal contact information
on Web, so that user can get the details at any time by connecting to the speci
fied URL. The application allows users: ~ To add information such as Contact Nam
es, Address Location, Telephone Numbers, Email Address and so on using a secured
Username and Password. ~ To modify the information they have entered, the funct
ion to Have Scheduling, Event reminders, Group Notice etc. ~ Easy retrieval of i
nformation by using Directory Criteria. The Secured Personal Directory System wi
ll a Web based, User Friendly, Powerful and simple to use graphical user interfa
ce application which will be developed following a Tier based design and Usage o
f components approach using ASP.NET Web based technology. SQL Server 2005 will b
e used as database back end and stored procedures are used for database retrieva
l and updates.
Back to Top
Yellow + Blue = Life
Student Name: Mei Miao Lu
Graduation Date: December 2008
Abstract
As a student in Digital Art Program at KSI/ Knowledge Systems Institute, I belie
ve that any single life on earth is a gift from God. Human beings are the most p
recious gift of God, and while we live in a technologically enhanced environment
we cannot live without a variety of natural resources. We convert natural resou
rces into products and use them in many different ways. The expression and inter
pretation of these concerns are the focus of my artistic experiments. The ideas
of "Go Green" and "ECO-friendly" have become popular topics nowadays. The reason
s are extreme population growth and global warming. Our life has been changed in
many ways since the rapid growth of human society. Therefore, the balance betwe
en human beings and Nature has been lost. My thesis "Yellow+ Blue= Life" consist
s of the video work and computer graphic art imagery, along with the written tex
t. The written text includes three main chapters. "Media Arts in East Asia and i
n the World" involves a short art history of East Asia, which will focus on four
countries in East Asia. These are China, Japan, Korea, and Taiwan. "Background"
talks about some artworks that are related to my subject of ECO-Friendliness. "
Project :Yellow+ Blue= Life" talks about my video work and computer graphic art
imagery and the Colors, which are the primary colors of pigments and light. A co
mputer graphical transformation from shadow to light or from colors to colors wi
ll embody my thoughts and wishes for our environment.
Back to Top
The Chronobot Administrator System
Student Name: Hsuan Wei Peng
Graduation Date: December 2008
Abstract
The Chronobot System is a very useful system for storing and borrowing time. The
system allows the Chronobot members to exchange time and knowledge. Members can
borrow time from some one else and return time to the same person or a differen
t perrsion. This system is developed by using JavaServer Pages (JSP), Apache Tom
cat and Microsoft SQL Server. Those are very popular and powerful tools for buil
ding various kinds of web-based systems. The Chronobot System has already includ
ed many functions, such as to create an auction, and place bids at an auction. T
hose functions are useful for members to exchange time and knowledge. However, t
his system needs a very important role, which is the administrator. Administrato
rs would be able to manage the Chronobot System. They would be able to manage al
l auctions which are provided by a member, and can manage any bidding room; they
will also be able to manage any member in this system. This project is to devel
op the administrator's functions for the Chronobot System. Those functions are d
eveloped by using Java and have a web page interface to maintain and manage the
system. These functions are based on the Chronobot System. This project will mak
e the Chronobot System easier to maintain.
Back to Top
The Chronobot Job Placement System-User Interface
Student Name: Tu-Lun Pan
Graduation Date: 7/2007
Abstract
The purpose ofthis project is to develop a job posting and searching website tha
t provides a job placement service for job seekers and employers. The job placem
ent service acts as an intermediary between job seekers and employers to help th
em find the right job and the right person for the job. The service gives job se
ekers access to job postings and information about the labor market and employme
nt data. It also allows them to post their resumes. As for the employers, the se
rvice allows them to post job openings and obtain information that will assist t
hem on job postings. The website is implemented on top ofthe Chronobot System wi
th JavaServer Pages (JSP) technology, which enables web developers and designers
to rapidly develop and easily maintain, information-rich, dynamic web pages tha
t leverage existing business systems.
Back to Top
Health Level Seven Integration Design
Student Name: Zhiyang Zheng
Graduation Date: May 2007
Abstract
Healthcare is a very wide concept which mainly refers to the prevention, treatme
nt, and management of illness and the preservation of mental and physical well-b
eing through the services offered by the medical and allied health professions.
Nowadays, it is amazing to see how Information Technology progressively contribu
tes in the healthcare industry. The Computer and Information System plays an inc
reasingly important role in the information managements on almost all the medica
l activities. There are many of sub-systems within the Healthcare Information Sy
stem (HCIS). Together they help people manage data like demographics, billings,
diagnoses and laboratory results of patients. They share data but work separatel
y. Thus, a big challenge is how to integrate different sub-systems to offer a se
cure and efficient data environment. This thesis is about to provide a solution
for communication between two separated subsystems within the Healthcare Informa
tion System (HCIS), the HIS (Hospital Information System) and EMR (Electronic Me
dical Report) system by using HL 7 messages, a standard of data format. HL 7, wh
ich stands for Health Level 7, makes it possible to use the same language no mat
ter what vendor provides the system. In addition, a data interface is responsibl
e to control the transferring among systems. The author will demonstrate an inte
rface design and implementation of a middleware to handle the transform in HL 7
standard.
Back to Top
Applying Sequential Space Relativity for Image Recognition
Student Name: Roby Chhokar
Graduation Date: May 2006
Abstract
In this research we attempt to perform image recognition using some of the known
properties that humans possess. In particular, we use the property of the eye p
erforming saccades on an image. We correlated space and time as the essence ofth
is type ofbehavior. We described space as the amount of space the current image
portion in the visual was taking during a saccade, and time was described as the
sequence of saccades. From intuition, we introduced the notion of relativity fr
om one saccade to another, and used this idea to build a sequence. A system was
developed to implement this theory that consisted of 100 training images, and 40
0 distorted images to test the system's recognition ability. The distorted image
s were created from the training images and had either been: rotated/mirrored; s
caled (larger or smaller); partially removed; or noise-added. The system present
ed a 95% accuracy rate for partial images, 62% for scaled images, 60% for noise-
added images, and 55% for flipped images. We found that the theory's applicabili
ty may be promising for industrial applications, if it can exhibit sequence path
changes and saccadic distance changes dynamically during Recognition.
Back to Top
Online Banking
Student Name: Abdulmubeen Mohammed
Graduation Date: December 2006
Abstract
The main purpose of this proposed system is to provide a customer of bank with v
alue added service like making available the Banking activities through Internet
. The services are like to enable registered account details, to transfer amount
from one account to another account and making request for bank statements, che
que books and bill payments. Customers can view their transaction. The registere
d user will also be able to modify any personal details such as address etc. It
will reduce the amount of time spent by the employees and by sitting at remote p
lace also you can do the transactions globally. The online banking is time savin
g and accurate.
Back to Top
Online Web Hunt
Student Name: Muhammas Qaisar Masood
Graduation Date: December 2006
Abstract
Online Web Hunt is a virtual space for users to meet online, job seekers and emp
loyers alike. A database is used to collect the minute details about job seekers
and employers. Web Hunt serves to collect multiple resumes from the job seekers
. Web Hunt aims to provide potential employers with detailed information about j
ob seekers. The online system is to support various functions so that users have
different levels of control over data. Both job seekers and employers are poten
tial clients to the Web site. Users will be required to register themselves prio
r to their access to the site regardless of his or her status as a job seeker or
a potential employer. An individual job seeker's profile will contain informati
on such as professional experience, education, skills, affiliations, and so fort
h. File submission will be supported for all job seekers to upload their resumes
. Also, it will be important to set up a search engine for data search purposes
which meets the critical needs of potential employers when they look for suitabl
e candidates. In this thesis project, a prototype solution will be implemented w
ith ASP.NET Web technology following the rapid application development approach.

Back to Top
Designing A Networked Java Action Game For A Cell Phone
Student Name: Naudina Punch
Graduation Date: December 2005
Abstract
Technology has become an ever-present factor of our lives. Those of us living in
the Western Society cannot get by without it. During the last century the radio
and television have become indispensable tools of modem living. But, as we have
entered upon the twenty-first century we fmd another little mechanism, much les
s obtrusive yet far more dominant. It is the cell phone. This minute apparatus i
s with us everywhere we go. Since the situation is inescapable, we may as well f
md whatever means possible to maximize its usefulness. A number of wise innovato
rs have found the cell phone to be a ready tool of innovation. It has been used
to provide ordinary telephone services, as a clock, for banking transactions, se
nding and receiving text messages, as an instrument for playing games, et cetra.
There seems to be no limit to the versatility of this little mobile instrument.
This thesis shows another feature that can be added to the cell phone. A two pl
ayer networked game. This will provide much more fun than is presently possible,
where only one player can perform at a time. No matter how interesting a game m
ay be, there is intrinsically much more happiness when it can be shared with ano
ther party, instead of one having to play all alone. In this game two persons ma
y engage each other regardless of where they may be physically located at a part
icular moment. A phone may not be a great game device by comparison to modem con
soles or computers, but people have their phones with them almost all the time.
Give them good games to play when away from home, and they will play. This game
is done on the Java 2 Platform, Micro Edition (J2ME) which provides a flexible a
nd robust environment for small devices such as cell phones.
Back to Top
Building An Options Trading Analysis Tool Using ASP.Net
Student Name: Pien Chen Tsai
Graduation Date: December 2005
Abstract
The world of financial markets is changing more quickly than ever. A host of new
products and financial instruments has been introduced and better understood ag
ainst a backdrop of the digital age of investment that seems to make revolutiona
ry advances daily. The well-understood financial instruments make investment dec
isions easier and more profitable. Successful investment requires knowledge abou
t how the investment works, comfort with the specialized language unique to that
investment, and an understanding of the risks involved. Although it is held as
a general opinion that options are appropriate only for highrolling speculators
willing to take extraordinary risks, this thesis will discuss a simple technique
or trading strategy for using stock options that retail investors can apply to
their own stock portfolio. Options can be used to hedge stock investment positio
ns, or even as a form of insurance against the risk of loss in a stock investmen
t. In other words, stock options can be used as an effective tool to manage or r
educe risks of owning stocks. Options provide far more opportunities and protect
ion than investing solely in stocks. Therefore, this thesis project is also inte
nded to develop a decision support tool using ASP.NET, which is designed to help
return on investment (ROI) analysis for retail investors to take advantage of s
tock options trading strategies in order to enhance portfolio performance and fu
rther mitigate stock price risks involved in equity investment.
Back to Top
The Implementation of Jedtector ? A Tool for Incremental Change In JAVA Code
Student Name: Xiang Zhou
Graduation Date: May 2004
Abstract
During software evolution, programmers add new functionalities and release new v
ersions of software. This can be a complicated and tedious work, particularly fo
r large applications. This paper introduces a tool named JavaDetector that helps
programmers to make incremental changes in Java applications easy and efficient
. In particular, the tool supports the following functions: 1) extracting depend
ency information from source code; 2) querying, accessing, processing and updati
ng the incremental changes in Java program; 3) helping programmers implement the
concept location; 4) detecting change occurrence, analyzing impact, and recover
ing inconsistence in the whole system. The usefulness of the tool has been prove
d by a case study of a change in the open source application, called JHotDraw.
Back to Top
Implementation of Voice over IP in Peer to Peer Environment
Student Name: Ching-Yusn Tseng
Graduation Date: December 2004
Abstract
The purpose of the communication over IP networks is it offers endless opportuni
ties to improve business information flow, provide new methods to achieve goals,
and reduce transaction and deployment costs. That means there is no expensive e
quipment to buy, no meeting rooms to book and no separate phone lines or connect
ions to coordinate. A simple headset or microphone and Network connection, user
can speak with other meeting participants without paying long distance call char
ges. The contents for this project are: 1. Do the theory study of voice over IP.
2. Do the survey of growing marketing product for voice over IP. 3. Implement p
eer to peer system. Real-time Net-Voice system is a PC-to-PC/ Client-to-Client s
peech sounds with microphone over IP networks transmission. Microsoft Multimedia
Audio function records the voice and then compresses it and then sends it to th
e connected TCP sockets. Application access the Transmission Control ProtocoV In
ternet Protocol {TCP/IP) stack through the Windows Socket (Winsock) interface. W
insock is used to discover and use the communications capabilities of underlying
transport protocols. It enables programmers to create advanced Internet, intran
et, and other network-capable applications to transmit application data across t
he wire, independent of the network protocol being used.
Back to Top
The Design of Computational Java Bean Component Package for Protein Sequence Ana
lysis
Student Name: Andy Lo (Bio-informatics concentration)
Graduation Date: September 2003
Abstract
Based on the complexity of genome information analysis, this thesis represents a
custom design component package for analysising the genome sequence data and un
it. This thesis will represent the software component design pattern and impleme
ntation for supporting the design processes of bioinformatics components. By fol
lowing this custom package which is designed to be a collection of reusable comp
onents under SUN Java platform, this thesis is prepared in an attempt to help th
e bioinformatics software developers easily inherit this protein sequence alignm
ent functionality as well as enhance their software design in any demanding fiel
ds of biotechnology.
Back to Top
The Design and Implementation of JavaHelp System for Java Client Application Ser
vice
Student Name: Andy Lo (Software Engineering concentration)
Graduation Date: September 2003
Abstract
This thesis is intended to explore the major technical challenges facing develop
ers and authors of online help systems who need to integrate online help feature
s into proprietary software programs in a local or network setting, which involv
es adoption of proven strategies of help system design and help documentation an
alysis. It discusses the help system development process using the architecture
of reusable JavaHelp components from Sun Microsystems. It also explains the prog
ramming details of building a sample help system as well as implementation of Ja
vaHelp to integrate online help features into a proprietary software program.
Back to Top
E-Commerce Application Using SQL-Server 2000 And ASP
Student Name: Kaplesh Zala
Graduation Date: June 2003
Abstract
Delivering the high levels of reliability and availability required of business-
to-consumer Web sites requires not only great technology, but also great operati
onal processes. Building a scalable, highly available application is a necessary
process in becoming functional as an e-commerce entity. Here the author has tri
ed developing the most basic modules required in an online business, using Micro
soft SQL-server, ASP and IIS Web server. All of the key processes and tools are
covered in this store from retail storefront to back end management. The real sc
enario of this store is presented in the chapter 5 and source code is included i
n appendix. The author is going to develop a real world application using this m
odel for the company that employs him.
Back to Top
Digital Video Transmission over Wireless Channels
Student Name: P Wang
Graduation Date: June 2003
Abstract
Wireless technology has become the most exciting area in telecommunication and n
etworking. The rapid growth of mobile telephone use, various satellite services,
and now the wireless Internet are generating tremendous changes in telecommunic
ations and networking. Wireless is convenient and often less expensive to deploy
than fixed service, but wireless is not perfect. There are limitations, politic
al and technical difficulties that may ultimately prevent wireless technologies
from reaching their full potential. Regardless of the design of the transmission
system, there will be errors, resulting in the change of one or more bits in a
transmitted frame. In this thesis, we focus on different characteristics of wire
less channels and their applications to video transmission framework. Channel co
ding and interleaving techniques have long been recognized as an effective techn
ique for combating the deleterious effects of noise, interference, jamming, fadi
ng, and other channel impairments. The basic idea of channel coding is to introd
uce controlled redundancy into the transmitted signals that is exploited at the
receiver to correct channel induced errors by means of forward error correction.
Channel coding can also be used for error detection in schemes that employ auto
matic repeat request (ARQ) strategies. ARQ strategies must have a feedback chann
el to relay the retransmission requests from the receiver back to the transmitte
r when errors are detected. ARQ schemes require buffering at the transmitter and
/or receiver and, therefore, are suitable for data applications but are not suit
able for delay sensitive voice applications. Problem of video transmission over
wireless channels has been addressed in literature. In this thesis, we will pres
ent a review of these techniques. However, we will mainly focus on different cha
racteristics of wireless channels and their implications on video transmission f
ramework. Therefore, before discussing specific tools in chapter 7, we first pre
sent the characteristics of wireless channels in chapter 5 and chapter 6. In cha
pter 8, we present the performance of the protocol, based on a network simulatio
n. In chapter 9, we present conclusions and future work.
Back to Top
A Cross Platform Web Service Implementation using SOAP
Student Name: Richard Huang
Graduation Date: January 2003
Abstract
SOAP's place in the web services technology stack is as a standardized packaging
protocol for the messages shared by the applications. It uses Extensible Markup
Language (XML) as the mechanism for information exchange. Since Web protocols a
re installed and are available for application by all major operating system pla
tforms, HTTP and XML provide an already at-hand solution to the problem of how p
rograms run under different operating systems in a network. SOAP specifies exact
ly how to encode an HTTP header and an XML file so that a program in one compute
r can call a program in another computer and pass its information. It also speci
fies how the called program can return a response. SOAP is XML. That is, SOAP is
an application of the XML specification. It relies heavily on XML standards lik
e XML Schema and XML Namespaces for its definition and function. XML messaging i
s where applications exchange information using XML documents. It provides a fle
xible way for applications to communicate, and forms the basis of SOAP. All SOAP
messages are encoded using XML. In this thesis, web services, SOAP, WSDL and UD
DI are discussed. A web service which queries stock quotes from Yahoo! Finance u
sing SOAP under different server platforms (JAVA and ASP) is implemented and com
pared in this project.
Back to Top
Software Agent
Student Name: Daniel Li
Graduation Date: December 2002
Abstract
"Agent" and "agent software" have become popular words in computer software. The
reason why this area gains the popularity is because it is based upon AI (Artif
icial Intelligence) but works only in its specific field, like a narrowly focuse
d AI program. Agent software has been developed for many different uses in a var
iety of areas because of its extraordinary ability of adapting to the specific f
ield of interest. This project first presents an overview of the software agent,
which starts from the introduction of the definition of the software agent, its
terminology, its formal frameworks and its other basics. Afterwards, the concep
ts and specifications of 'smart' agent framework are brought into context to des
cribe how the software agent works behind the scene. This includes action, opera
tion, autonomous behavior and communication of agents. The way that a software a
gent generates its goals of achievement and to evaluation of its progress is als
o very important in keeping agent working in the right path. Next, we discuss th
e new generation of intelligent software agents to take a brief look at how an i
ntelligent software agent can complete its tasks and what it can do in the prese
nt time. The Growing Book project is a very typical software agent application t
hat helps distance learning students obtain the correct course material. With th
e correct input of a username and password, the students will have all the class
material available for them in a short time on their local computer. This saves
a lot of work for students and it also greatly decreases the chance that studen
ts may download the wrong material. On the other hand, this agent protects the c
lass material file server from access by outsiders. A scenario of the Growing Bo
ok software agent is included in the Appendix A.
Back to Top
A Comparative Study and Implementation of Network Security
Student Name: Chien-Wen Lo
Graduation Date: December 2002
Abstract
Companies without controlled doors cannot ensure the security and safety of thei
r employees, nor can they prevent piracy and theft. Networks without controlled
access cannot guarantee the security or privacy of stored data, nor can they kee
p network resources from being exploited by hackers. This study adopts several d
ifferent firewall programs and uses Windows 2000 Server as the platform to test,
and ultimately compare in detail, two different facets of each program, functio
nality and performance. Network security is always the most important issue of t
he company. From this study, recommendations will be provided through the testin
g of the firewall programs. When a company starts to use a firewall or other sec
urity measures, the performance of the network will be reduced. Trade-offs betwe
en security of the network and ease of access must be resolved. However, the sol
ution to the negative aspects of firewalls is another issue to be dealt with in
the future.
Back to Top
Data Mining in a Library
Student Name: Kun-Lin Tsai
Graduation Date: April 2002
Abstract
This system is designed for librarians to help them manage the library easily. D
ata Mining is an inductive data analysis method. It involves different kinds of
technologies, solutions and techniques. Because of its pattern-recognition featu
re, it can be applied to a large database. Data mining software can relate one f
ield to the other fields in the database. It can be used to analyze the on-line
users' behavior and to predict the future potential users. Now, we can apply dat
a mining to library systems using artificial intelligence technology. This syste
m will focus on using interactive feedback. For KSI students who use the library
frequently, it can help students to find information, and build a more useful K
SI library system. This project will provide many kinds of statistic results and
enhance our current library system to reach this goal. The Application Program
Interface (API) of the system was designed by using Java Servlet technology and
combining it with the database of Microsoft SQL Server 2000.
Back to Top
A Small Office Database Management System using Java Servlet
Student Name: Yan Li
Graduation Date: April 2002
Abstract
This thesis describes how to use Java to operate the database through network an
d how to set tables in database and how to configure the Java servlet engine. Th
rough such processes, we may understand how to set up remote database for some s
mall businesses, how to retrieve and output data. We may also understand how to
install the Java servlet engine in its server environment as well as how to use
browser to communicate with Web server.
Back to Top
An Online Health Consulting and Shopping Center implemented by Java Server Pages
Student Name: Hsien-Min Yeh
Graduation Date: January 2002
Abstract
Electronic commerce (e-commerce) has been sweeping the globe. For a long time, i
nformation technology was mainly passive; users went online and downloaded data.
Today, information technology offers interactive and communication functions, w
hich makes e-commerce more than a fad. Now, it has become a part of the way peop
le live their lives. Dynamic Web sites contain Web pages that display constantly
changing content; a technique that is an important foundation of e-commerce. Th
ere are two ways to achieve dynamic content generation: programmatic content gen
eration, and template-based content generation. Java servlets falls into the fir
st category, while JavaServer Pages (JSP) belongs to the second category. JSP is
a simple but powerful technology used to generate dynamic HTML on the server si
de. They are a direct extension of Java servlets and provide a way to separate c
ontent generation from content presentation. In this project, Tomcat was adopted
to be the JSP engine and this thesis designs an online health consulting and sh
opping center that can provide users personal dietary assessment, nutritional ne
ws, professional knowledge of nutrition, special diets for patients, the posting
of questions and shopping for nutritional supply products. On the other hand, t
he project connects to a Microsoft Access database using a type 1 JDBC-ODBC Brid
ge, plus ODBC driver. In this way, staff can easily manage different kind of inf
ormation in the database of this health center. In short, JSP is more convenient
to write by using conventional HTML writing tools and easier to modify because
only the dynamic parts need to be changed when updating a web page. Furthermore,
JSP with Java is more flexible because they are platform independent.
Back to Top
JAVA Security on the Internet
Student Name: Lifeng Zhang
Graduation Date: January 2002
Abstract
Whenever someone uses a Java-enabled browser like Netscape Navigator or Microsof
t Internet Explorer to surf the Web, he becomes a java user. All Java users are
taking security risks, because most java code is automatically downloaded across
the network and runs on the user's machine. The hostile Java programs could tra
sh their machine. Fortunately, the creators of Java made a good effort to protec
t users from these hazards. Security for the Java Platform has multiple layers.
First of all, the Java language is strongly typed and does not include any unsaf
e constructs, such as array accesses without index checking. Second, mechanisms
(for example, class loaders) are in place to ensure a sufficient degree of separ
ation between multiple Java programs. Third, access to crucial system resources
is mediated by the Java virtual machine. A security manager is installed to deny
all requests for unauthorized access. The Java 2 and the latest version incorpo
rate a security architecture that support policy-driven, fine-grained, flexible,
and extensible access control. This thesis is meant to introduce basic concepts
of Java and about risks, and to provide a general overview of Java security in
distributed program environments and give references for more detailed informati
on.
Back to Top
An E-commerce Implementation Using JAVA Servlet,JSP and MySQL
Student Name: Tung-Lin Tsai
Graduation Date: December 2001
Abstract
E-commerce has changed the global business-model and economic structure complete
ly. The Internet's development has created a global electronic marketplace that
goes beyond the limitation of time and space. Server-side Java and database are
a perfect combination for an E-commerce web site development. An example for tha
t is a JavaServer Page (JSP), Servlet engine such as the Apache Jakarta project'
s Tomcat, and a database like MySQL. All of them are freely available and have a
n open source. Java Servlet and JSP technology provide an attractive alternative
compared to other types of dynamic Web scripting/programming. These attractive
things are platform independence, enhanced performance, separation of logic from
display, ease of administration, extensibility into the enterprise and most imp
ortantly, the ease of use. MySQL database is fast in retrieving data and very re
liable. Many ISPs (Internet Service Providers) offer MySQL at little or no extra
charge. This project will attempt to build a small to midsize E-commerce web si
tes by using Java Servlet and JSP technology and combining them with MySQL datab
ase.
Back to Top
A Survey and Implementation of E-Commerce in Supply Chain Management
Student Name: Hui-Chun Lee
Graduation Date: December 2001
Abstract
With the growth of the Internet, more and more companies are dedicated to e-busi
ness. Supply chain management has been deemed as one of the useful tools for bus
inesses to promote their competitiveness, and to build up their trust relationsh
ip with up and down stream businesses. In order to link the whole value chain, i
nformation technology (IT) application has already been essential for enterprise
s. This study adopts a database-oriented approach and uses a server side program
, Java Servlets, to manage a web-based inventory management system. The idea is
to make information readily and easily available to people who are interested in
the data. Once a company integrates the all-internal systems, it can further co
mbine its up and down stream businesses. In conclusion, enterprises must converg
e enterprise resource planning (ERP), electronic supply chain management (E-SCM)
, and customer relationship management (CRM) systems to win competitive advantag
e. Usually, it may take couple of years to build an integrated ERP system and E-
SCM system. Information technology provides a more efficient way to build the sy
stem.
Back to Top

A Visual Editor for Multimedia Application Development


Student Name: Angela Guercio
Graduation Date: August 2000
This report describes TAOEDIT, a Visual Editor to create and edit Teleaction Obj
ects or TAOs, which are multimedia objects that can be composed together to deve
lop a multimedia application. TAOEDIT is a powerful tool. It can be used to crea
te TAO, convert TAO into TAOML (a markup language for TAOs), and generate XML de
scription of TAO.
Back to Top
A Survey of Encryption Algorithms
Student Name: Julie A. Cronin
Graduation Date: December 1999
This paper introduces major topics of cryptography such as basic terminology and
encryption methods. It then discusses the two types of encryption algorithms av
ailable, which are symmetric and public-key. These two types are compared based
on how keys are distributed and implementation. Next, the only known algorithm t
hat is considered perfectly secure, a one-time pad, is discussed and why it is r
arely used in spite of its strong security. A chapter devoted to key management
follows this. A separate section is devoted to key management, because even if a
n algorithm is considered tightly secure it becomes weak if the key used with th
e algorithm is improperly managed. The third chapter is devoted to the Data Encr
yption Standard(DES), because it is considered one of the strongest algorithms c
urrently available to the public, and marks the beginning of widespread interest
in cryptography. Finally, conclusions are made about which type of algorithms a
re strong and what implementations they are best suited for. A reiteration on th
e management of keys is included in this final section.
Back to Top
COMPUTER SIMULATION OF Queueing SYSTEMS: CSQS
Student Name: Tongyou Ji
Graduation Date: August 20,1999
Simulation generally involves some kind of model or simplified representation. D
uring the course of a simulation, the model mimics important elements of what is
being simulated. A simulation model may be a physical model, a mental conceptio
n, a mathematical model, a computer model, or some combination of all of these.
Computer simulation is currently used in a wide range of applications, since phy
sical models are often relatively expensive to build and unwieldy to move. Queui
ng systems are used to characterize a broad class of processes sharing a common
mathematical structure but which may include many diverse physical realizations.
All these processes are stochastic processes with three characteristics, which
can be used to describe the system: an input process, a service mechanism, and a
queue discipline. The presence of uncertainty is the thing which makes these sy
stems challenging to analyze and design, since randomness in one or more of thes
e three characteristics is the rule rather than the exception. Furthermore, the
distributions used to describe these events may be nonstationary, which adds fur
ther complication to their study.
Back to Top
Network Security
Student Name: Eric L. Schmitt
Graduation Date: August 1999
Network Security begins with a brief look at how to design and implement effecti
ve security measures, which begins with a well-planned Security Policy. We open
with an assessment of what equipment, data, and software the company has, what t
he company is trying to protect, what is at risk and what the threats are agains
t those items at risk. This discussion includes who should be involved in the de
velopment of company policy and a brief look into possible policy items covering
passwords, access, the Internet, firewalls, computer viruses, and encryption. W
e continue with an overview of backups, destruction of media, response to intrus
ions/policy violations/incidents, and a recovery plan. Next we provide a brief o
verview of some threats and a few possible solutions to those threats. Which inc
ludes viruses, Trojans, some email issues, denial of service, passwords, sniffer
s, spoofing, and the role of Telnet in attacks. We are given a brief look at Int
ernet/World Wide Web languages and their security problems. This is followed by
a similar discussion about operating systems/network software. The importance of
logging and auditing is briefly covered, as are firewalls and the services they
provide. Moving on we will look at using encryption for email, communications,
and data storage. We will wrap things up with a brief look at some security soft
ware packages and training options.
Back to Top
Designing a Personal Information MANAGER with VB 6.0
Student Name: Seut-Ping Lim
Graduation Date: 1999
The purpose of this thesis is to design a Personal Information Manager (PIM) sys
tem which can assist people to organize their daily work more easily and simply.
The system allows users to store information such as appointments, contacts, no
tes, tasks and so on. The system also has a holiday list, which allows users to
add to or modify it. The system can provide reminders to the users prior to holi
days or special occasions and enable them make preparation. Besides the system's
obvious functionality, this project is designed to show the appropriate way to
develop a graphics user interface. A properly designed user interface can standa
rdize the input and output mechanisms, therefore allowing users to easily manage
the entire system. The program was developed by using Visual Basic 6.0, which i
s simple to use and provides many tools and ActiveX controls to develop an effec
tive application. It also has powerful performance and friendly user interface.
Back to Top
TSJ: A WEB-BASED TEACHING SYSTEM USING JAVA
Student Name: Chien-Ju Lee
Graduation Date: August 1999
The purpose of this thesis is to design a teaching system that helps children to
learn elementary biology - such as insect species and their structure, life cyc
le, habitat, and so on - on the World Wide Web. Java, which was developed by Sun
Microsystems, is a simple, robust, object-oriented, platform-independent, multi
threaded, dynamic, general-purpose, architecture neutral programming environment
. The crucial difference between a Java-based program and a traditional PC appli
cation is that Java programs are, by nature, network-aware and truly distributed
. As creatures of the Internet, Java programs offer all the benefits of locally
executed programs including responsiveness, and the capability to take advantage
of local computing resources and even the global Internet. Based on these advan
tages, this project will be implemented using Java as the main tool. Other Inter
net Web programming languages, such as Hypertext Markup Language, Standard Commo
n Gateway Interface, and JavaScript, are used as secondary tools. On the Interne
t, this project will provide a very interesting, creative and active environment
through Java for children and their parents.
Back to Top
A Survey And Performance Comparison of Dynamic HTMLs
Student Name: Tzu-Sheng Su
Graduation Date: December 1, 1998
Netscape and Internet Explorer are the most widely used Internet browsers in the
world. Last year Netscape and Microsoft Company created a new technology, calle
d Dynamic HTML. Dynamic HTML is the world of point-and-click, drag-and-drop. Wit
h Dynamic HTML, one can layer multiple images on top of one another, precisely c
ontrol the layout of a Web page, and add new interactivity and much more without
using Java. This can be accomplished by using existing technologies and feature
s on the Web, including HTML, scripting, and object-oriented programming. Some c
onflict exists between these two products. One browser's technique cannot work w
ith the other. Netscape Communicator's plug-in cannot work on Internet Explorer,
because Internet Explorer uses Active X. They are created in different ways; ea
ch one has a different effect. In this thesis, a comparison will be made by desi
gning several programs to demonstrate the difference between these two browsers.
Back to Top
AN ONLINE-BANKING SYSTEM USING JAVA AND CORBA
Student Name: Sheng-Ta Liu
Graduation Date: November 1, 1998
The Common Object Request Broker Architecture (CORBA) is the Object Management G
roup's answer to the need for interoperability among the rapidly proliferating n
umber of hardware and software products available today. Simply stated, CORBA al
lows applications to communicate with one another no matter where they are locat
ed or who has designed them. Object Management Group (OMG) introduced CORBA 1.1
in 1991. It defined the Interface Definition Language (IDL) and the Application
Programming Interfaces (API) that enable client/server object interaction within
a specific implementation of an Object Request Broker (ORB). The purpose of thi
s project is to introduce the CORBA architecture, services, and IDL. I have buil
t a system using Java based on CORBA to demonstrate its powerful client/server a
rchitecture.
Back to Top
An Implementation of Microsoft Transaction Server
Student Name: YUAN HUANG
Graduation Date: 1998
The project introduces the fundamental principles and programming concepts of Mi
crosoft Transaction Server (MTS). The important new features that are included i
n Microsoft Transaction Server, how these new features benefit customers, and ho
w to configure and set up the MTS server/client environment are demonstrated in
this paper.
Back to Top
An Implementation of A Spatial Query Language for Multiple Data Sources
Student Name: Jie Xue
Graduation Date: 1998
To support the retrieval, fusion and discovery of visual/multimedia information,
a spatial query language for multiple data sources is needed. In this paper we
describe a spatial query language interpreter which is based upon the a-operator
sequence and in practice expressible in an SQL-like syntax. The algorithm for t
he a-query translator is explored in detail. The implementation of the algorithm
including data structures, pseudo-codes and source codes in C is presented. Que
ry examples handled successfully by the a-query implementation are also given ou
t.
Back to Top
The Implementation of a Web Database using the Approach of Java Database Connect
ivity: JDBC
Student Name: Ching-Ho Hung
Graduation Date: October 1998
Web database publishing is a new way to publish information electronically. A ty
pical Web database publishing system has a Web browser as its user interface, a
database server as its information store, and a Web server connecting the two. T
he basic idea of this project is to use JDBC to search databases directly from a
n Internet Web browser. The database is kept on an NT server. JDBC is used to in
teract with Web pages. This project uses a simple interface to help the administ
rator update the database on the Web server. Some security issues are discussed
also. There are four purposes in this project: 1. To study a real time database
system 2. To design a Web-Oriented user interface 3. To discuss Web security 4.
To practice network communication
Back to Top
A Rule-Based System Verification Tool Using a Matrix Approach
Student Name: Chao-hua Lin
Graduation Date: August, 1998
This project proposes to use matrix formalism for the verification of rule-based
systems. The matrix operation is one of the mathematical foundations of Petri N
ets. This approach is different from directed hypergraphs and Predicate/Transiti
on net (Pr/T net) in rule-based systems verification. The errors in rule-based s
ystems fall into two parts. One is the syntactic error; the other one is the sem
antic error. This project will focus on semantic errors. Typical semantic errors
in a rule-based system consist of four types. They are redundancy, inconsistenc
y, circularity, and incompleteness. This project presents a tool implemented in
JAVA to verify these semantic errors. The program consists of the following phas
es. First, the program will normalize the rules into Horn clauses and rearrange
these normalized rules. Then, it will transform these rules into matrix form and
the verify matrix to find semantic errors. This paper also describes how to bui
ld a diagnosis system and use a verification tool to verify the rule base. This
diagnosis system will diagnose liver diseases using Chinese Traditional Medicine
(CTM). In this paper, chapter one outlines the general concepts of expert syste
ms. Chapter two describes the knowledge base verification. Chapter three discuss
es more details about semantic errors. The different approaches to verify rule-b
ased systems are described in chapter four. Chapter five describes the matrix ap
proach for rule-based systems. Illustrations are shown in Chapter six. Finally,
Chapter seven gives the conclusion.
Back to Top
A Client/server Networking Application using JAVA: JWBCB
Student Name: Yu-Lung Lu
Graduation Date: 1998
Java is an object-oriented programming language developed by Sun Microsystems. A
useful feature of Java is that its programs can be executed on World Wide Web p
ages. Java programs enable Web pages t i become more interactive with users. The
Java language consists of classes and methods that provide basic variable types
, system input and output capabilities, and other functions. It also includes cl
asses to support networking, Internet protocols, and graphical user interface fu
nctions. Java's networking capabilities are contained in the java.net package. S
tream sockets and datagram sockets are provided by Java. With stream sockets a p
rocess creates a connection to another process. When the connection is establish
ed, data flows between the processes in the stream. JWBCB (Java Whiteboard and C
hatBoard) is the network application, using the client/server model, developed f
or this thesis. Its implementation deepened the author's understanding of basic
Java networking capabilities and client/server networking concepts.
Back to Top
A TCP/IP NETWORK APPLICATION IMPLEMENTED WITH VISUAL BASIC
Student Name: JUN TIAN
Graduation Date: May, l998
This thesis concerns the design of a TCP/IP network application for playing the
game of Go on the Internet. It is implemented in Visual Basic 5.0. TCP/IP and Wi
ndow Socket is used in this project for data commutation on the network. TCP/IP
is a dominant protocol for data communications on the Internet. Numerous applica
tion services have been developed for transport using the TCP/IP protocol suite.
This project, playing Go on the network, introduces the basic concepts of TCP/I
P, and demonstrates how to transfer data among processes in client/server models
. A software component, A socket derived from Mabry Software, Inc., is used in t
his project. It is a windows custom control that provides easy access to TCP net
work services, and can be used in many development environments, such as Visual
Basic, Visual C++, MS Access or Visual FoxPro.
Back to Top
DYNAMIC HTML IN INTERNET EXPLORER 4
Student Name: Chin-Chang Wu
Graduation Date: August 5, 1998
Welcome to the dawn of the point-and-click, drag-and-drop, interactive Web, Also
to the new future technology - Dynamic HTML. What is Dynamic HT'ML? Dynamic HTM
L is a combination of technologies, including HTML HyperText Markup Language), s
cripting, and object-oriented programming combined to create individual Web page
s. It is not a new version of HTML, it is not a new scripting language, and it i
s not a new way of structuring documents. It is a new way of tying all of those
pieces together to make pages that cross the traditional static Web page boundar
y. But in technology, one can just say Dynamic HTML. relieves a Web server's loa
d by shifting the processing demands for animation, data processing, and other i
nteractive features to the client machine. Why Dynamic HTML? Dynamic HTML makes
extensive use of new style sheet specifications to give a Web author more contro
l over the exact placement and appearance of elements on the Web page. Therefore
, Dynamic HTMI. seems to be the future Hyper Text Markup language for Web page a
uthors. It is necessary to research the implementation of Dynamic HTML within We
b pages and to explain how the ActivX controls work in Dynamic HTML.
Back to Top
A Network Application using VBWB
Student Name: Jenn-Iong Chang
Graduation Date: August 5, 1998
Data communications (computer communications) is commonly used in everyday life.
What makes it possible? Largely the TCP/IP protocol. In this thesis, we study h
ow TCP/IP works with a socket of an application program and how the Visual Basic
socket custom control works with TCP/IP in a Microsoft Windows implementation.
In this project, we use Visual Basic to implement a Network Whiteboard applicati
on. Whiteboard is an interactive, two-view environment, in which users can creat
e programs by manipulating concrete pictorial data or examples of data structure
s, or by entering it into a text editor. The users can move back and forth betwe
en the visual and text Editors. By providing both a visual and a textual represe
ntation, it should be possible to determine those operations which a programmer
views as intrinsically visual on one hand and textual on the other.
Back to Top
3D Simulation System with Dynamic Object Design
Student Name: Jin-Ghee Lu
Graduation Date: May 1998
The purpose of this project is to develop a general-purpose graphical simulation
system. It provides users an environment to conduct simple 3D simulation. To ex
periment with a simulation model, users must create a simulation scene, construc
t or use existing objects, then put them into the scene to run. By adjusting the
proper behaviors of the objects, the system can run under different scenarios a
nd accomplish specific results. The three-dimensional graphics techniques in the
system implements OpenGL library. OpenGL supplies a lot of graphics commands, w
hich produce very impressive 3D objects. This project also provides a script lan
guage for users to design their simulation models. They can use simple object-de
finition statements to create objects with polygons, boxes and other elements, t
hen incorporate them with certain behaviors for them to move or act. After loadi
ng a script file into the system, users can execute the scenario and watch the s
ystem perform an animated simulation. Users can also modify the behaviors of the
objects until they serve the purpose of the model. Since the composition of an
object is object-based, the architecture of the project should be object-oriente
d. This project is developed under Microsoft Visual C++ 4.0. It uses Visual C++
and Microsoft Foundation Class (MFC) to design the major application architectur
e and user interface, implements the object classes and functions using C++, and
invokes OpenGL commands and C functions to display three-dimensional objects an
d perform animation and interaction.
Back to Top
A Loan Pricing Model
Student Name: Ling-Te Wang
Graduation Date: April, 1998
Abstract This project is intended to build a framework of a loan pricing model t
o determine loan interest rate for a commercial bank. The major task of this loa
n pricing model illustrates a conceptual guideline and methodology in order to p
rocess loan transaction more efficiently. The model of this project contains fol
lowing major procedures: 1. Determining the cost of loan fund to be utilized in
a loan transaction. 2. Developing a credit rating calculation and identify the r
ating category for corporate loan applicants. 3. Distributing the risk premium b
ased on rating category. 4. Charging the overhead experience to reflect the cost
of the loan. 5. Allocating the target profit of the loan transaction to achieve
a desired return for the bank's management. Although some issues of this model
may need further discussion, this model, however, provides a fundamental approac
h for a bank staff to process loan transactions.
A Survey of Distance Learning
Student Name: Vincenzo Devito
Graduation Date: May 1998
Abstract
Distance Education is defined as a planned teaching/learning experience that use
s a wide spectrum of technologies to reach learners at a distance and it is desi
gned to teach students who do not have easy access to a traditional classroom. W
ith this kind of technology one can teach to a remote site such as a rural area
or it can make corporate training more economical.
With the advent of the new technologies distance learning is a convenient rather
than a necessary learning tool. The tools that can be used are: videotape recor
ders, computers, telephones, videoconferencing, faxes, etc. Schools using distan
t education include K-12, high schools, colleges and graduate schools. The diffe
rent forms of distance education are: a. Synchronous -- where students get lesso
ns in real-time, as it happens. b. Asynchronous -- where lessons are stored for
later study. Asynchronous has the potential to be used 24 hours a day. There are
several benefits to asynchronous education such as: a) Ability to see and repla
y class presentation on demand b) On-line record of all class presentations, rea
dings, discussions c) On-line submissions, examinations and grade reporting Many
schools are using distant education such as National-Louis University, Walden U
niversity and hundreds of others listed in Bear's Guide to Earning College degre
es non- traditionally, and Thorson's Campus-Free College Degrees, listed in the
bibliography.
In this thesis we will see how New York University, Knowledge Systems Institute
and Wayne State University have used distance learning.
Back to Top
Thin Clients For The Internet: Network Computer vs. NetPC
Student Name: Miao-Wen Hsieh
Graduation Date: Spring 1998
Abstract
The rapid growth of the Internet has moved the focus of desktop computing toward
network computing. Thin clients for the Internet, which include Network Compute
rs and NetPCs, are vital in the new era of network computing. They can solve man
y of the problems in Client/Server computing and provide an expanded choice for
desktop users. First will be outlined the general conception of Network Computer
s and NetPCs. Then will be indicated the differences between dumb terminals, and
thin and fat clients. Next will be described the components of Network Computer
s and NetPCs, including software, hardware and a comparison. The relation of Jav
a and Network Computers will be discussed in this project. Also the new technolo
gies which are intended to improve Network Computers and NetPCs will be describe
d. Push is a new technology that affects network transmission; therefore, push t
echnology and the relation of push technologies, Network Computers, and NetPCs w
ill be defined in this project. The markets for Network Computers and NetPCs wil
l be reviewed and analyzed including current, potential, and future markets. Fin
ally, the conclusions of this study will be presented.
Back to Top
The Implementation of Web-Databases by the Approach of Java Database Connectivit
y: JDBC
Student Name: Ching-Ho Hung
Graduation Date: Spring 1998
Abstract
Web database publishing is a new way to publish information electronically. A ty
pical Web database publishing system has a Web browser as its user interface, a
database server as its information store, and a Web server connecting the two. T
he basic idea of this project is to use JDBC to search databases directly from a
n Internet Web browser. The database is kept on a SUN Web server. JDBC is used t
o interact with Web pages. This project uses a simple interface to help the Some
security issues are discussed also. There are four purposes of this project: 1.
To study a real time database system 2.To design a Web-Oriented user interface 3
.To discuss Web security 4.To practice network communication
Back to Top
Network Application Design Using TCP/IP Protocol in Windows
Student Name: Chun Wang
Graduation Date: Spring 1998
Abstract
One of the challenges in computer programming is internetworking with TCP/IP, no
t only because of its popularity, but also because of its complexity. This thesi
s attempts to explain the way the socket programming interface works on TCP/IP a
nd the way the Visual Basic socket custom control works on TCP/IP within the 32-
bit Windows environment. Finally the thesis presents an object, the Chinese Ches
s game. Implemented with Visual Basic and a socket custom control, the project w
orks in the client/server model, on TCP/IP network protocol, under the 32-bit Wi
ndows environment. One may find that using a Visual Basic socket custom control
to implement an application on TCP/IP is not very difficult.
Back to Top
Customer Service On The Internet
Student Name: Yueh-Fei Liao
Graduation Date: December 1997
Abstract
Nowadays much commerce is taking place on the Internet. This new tool will chang
e what we do traditionally. In this technological era, old methods may not fit t
he new world. Handling customer service via Internet is an opportunity to succee
d for some specific types of companies. In this project, I will discuss related
topics about how to deal with customer service on the Internet successfully such
as what a company needs to do, what their customers think about, and how techno
logy can help. Not all companies can follow the same rules; different types of c
ompanies should use different aspects of Internet service. The result will depen
d upon how a company pays attention to things that happen around them.
Back to Top
Design And Implementation Of A Text-Base Object-Oriented Base
Student Name: Jiaping Fu
Graduation Date: August 1997
Abstract
The paper introduces the principles, methods, and strategies of Object-Oriented
database design. Based on the carefully defined file object manipulating functio
ns, the implementation of an OO Base is presented in detail.
Back to Top
Full Text Indexing Technology Applying To Web Pages
Student Name: Chun-Liang Tung
Graduation Date: December 1997
Abstract
The purpose of this thesis is to improve IBM's Storage And Information Retrieval
System(STAIRS) and use the modified theory (Full Text Indexing Technology) to d
esign a full-text-index search engine on the Internet. The design and implementa
tion of the Full Text Indexing Technology (FTIT) can help people to efficiently
search for useful information on the huge Internet.
The FTIT search engine consists of the spider, the database, and the search tool
. The spider, which delves and retrieves the web content from the Internet, stor
es all of the valid tokens to a database of the FTIT search engine. The database
, which is a kind of knowledge base database, collects a great deal of informati
on about valid tokens such as the name of valid tokens, the attributes of valid
tokens, and the addresses of home pages. The search tool, which is a search util
ity, looks for information in the database of the FTIT search engine and reports
the result of the searching task to users via CGI.
In order to achieve the purpose of explaining the function of FTIT, the thesis w
ill use Visual C++, standard Common Gateway Interface, Hypertext Markup Language
, and Windows NT network to demonstrate.
Back to Top
Network Application Design Using TCP/IP Protocol In Windows
Student Name: Chun Wang
Graduation Date: August 1997
Abstract
One of the challenges in computer programming is internetworking with TCP/IP, no
t only because of its popularity, but also because of its complexity.
This thesis attemps to explain the way the socket programming interface works wi
th TCP/IP and the way the Visual Basic socket custom control works with TCP/IP w
ithin 32-bit Windows environment. Finally the thesis presents an application, th
e Chinese Chess game. Implemented with Visual Basic and a socket custom control,
the application works in the client/server model, with TCP/IP network protocol,
under the 32-bit Windows environment. Readers may find that using the Visual Ba
sic socket custom control to implement an application using TCP/IP is not very d
ifficult.
Back to Top
The Design Of A Library On-Line Search Application
Student Name: Anbin Huang
Graduation Date: December 1997
Abstract
This thesis concerns the design of a Library On-Line Search Application for Know
ledge Systems Institute library books. It is based on the Internet Web programmi
ng. Three Web programming methods have been used to implement the book search th
rough the Internet. They are HTML, CGI and Java.
HTML, which stands for HyperText Markup Language, keeps everything on the World
Wide Web anchored to a common ground. It makes the Web dynamic. One of the power
ful features of HTML is its this special HTML feature, we catalog all the books
in the library and connect them all in the Web page. This is the first test of t
he project.
Secondly we use a special mechanism that supports the dynamic creation of HTML d
ocuments. This mechanism is based on the invocation of external applications, us
ually referred to as CGI scripts, that run under the auspices of a WWW server, a
nd that are called by the client browser in the form of an ordinary- looking URL
from the Web document currently in use. CGI, which stands for Common Gateway In
terface, supplies the middleware between WWW servers and external databases and
information sources. We use CGI applications to perform the book search processi
ng and formatting tasks on behalf of their WWW servers.
Thirdly we use Java, one of the most popular Web programming languages, to imple
ment the on-line book search.
Back to Top

S-ar putea să vă placă și